ArticlePDF Available

Wireless Internet, Multimedia, and Artificial Intelligence: New Applications and Infrastructures

Authors:

Abstract

The potential offered by the Internet, combined with the enormous number of connectable devices, offers benefits in many areas of our modern societies, both public and private. The possibility of making heterogeneous devices communicate with each other through the Internet has given rise to a constantly growing scenario, which was unthinkable not long ago. This unstoppable growth takes place thanks to the continuous availability of increasingly sophisticated device features, an ever-increasing bandwidth and reliability of the connections, and the ever-lower consumption of the devices, which grants them long autonomy. This scenario of exponential growth also involves other sectors such as, for example, that of Artificial Intelligence (AI), which offers us increasingly sophisticated approaches that can be synergistically combined with wireless devices and the Internet in order to create powerful applications for everyday life. Precisely for the aforementioned reasons, the community of researchers, year by year, dedicates more time and resources in this direction. It should be observed that this happens in an atypical way concerning the other research fields, and this is because the achieved progress and the developed applications have practical applications in numerous and different domains.
future internet
Editorial
Wireless Internet, Multimedia, and Artificial Intelligence: New
Applications and Infrastructures
Roberto Saia 1,* , Salvatore Carta 1and Olaf Bergmann 2


Citation: Saia, R.; Carta, S.;
Bergmann, O. Wireless Internet,
Multimedia, and Artificial
Intelligence: New Applications and
Infrastructures. Future Internet 2021,
13, 240. https://doi.org/10.3390/
fi13090240
Received: 14 September 2021
Accepted: 17 September 2021
Published: 21 September 2021
Publisher’s Note: MDPI stays neutral
with regard to jurisdictional claims in
published maps and institutional affil-
iations.
Copyright: © 2021 by the authors.
Licensee MDPI, Basel, Switzerland.
This article is an open access article
distributed under the terms and
conditions of the Creative Commons
Attribution (CC BY) license (https://
creativecommons.org/licenses/by/
4.0/).
1Department of Mathematics and Computer Science, University of Cagliari, 09124 Cagliari, Italy;
salvatore@unica.it
2Department of Mathematics and Computer Science, University of Bremen, D-28359 Bremen, Germany;
bergmann@tzi.org
*Correspondence: roberto.saia@unica.it
Abstract:
The potential offered by the Internet, combined with the enormous number of connectable
devices, offers benefits in many areas of our modern societies, both public and private. The possibility
of making heterogeneous devices communicate with each other through the Internet has given rise
to a constantly growing scenario, which was unthinkable not long ago. This unstoppable growth
takes place thanks to the continuous availability of increasingly sophisticated device features, an
ever-increasing bandwidth and reliability of the connections, and the ever-lower consumption of
the devices, which grants them long autonomy. This scenario of exponential growth also involves
other sectors such as, for example, that of Artificial Intelligence (AI), which offers us increasingly
sophisticated approaches that can be synergistically combined with wireless devices and the Internet
in order to create powerful applications for everyday life. Precisely for the aforementioned reasons,
the community of researchers, year by year, dedicates more time and resources in this direction. It
should be observed that this happens in an atypical way concerning the other research fields, and
this is because the achieved progress and the developed applications have practical applications in
numerous and different domains.
Keywords:
internet; wireless; multimedia; artificial intelligence; machine learning; ubiquitous
computing; wireless sensor; networks; Internet of Things; security; deep neural networks; big data
1. Introduction
The increasing power of the connected devices, as well as the continuous improve-
ments in terms of reliability and bandwidth of the Internet, have given rise to the so-called
data age since an ever-increasing number of devices generate a continuous flow of infor-
mation. This data flow can be exploited to our advantage, although it exposes us to risks
in terms of security and privacy. For this reason, in recent years, we have witnessed an
increase in investments in research, both in terms of money and human resources, in order
to exploit the potential of this scenario and reduce the related risks.
Therefore, massive data generation, which is mainly related to the capability of
connecting heterogeneous devices, represents a distinctive mark of our age, but these
stimulating technological opportunities must be properly managed, as the ever-increasing
potentialities often do not go hand in hand with efficient implementations in terms of both
functionality and security.
For this reason, the idea behind our Special Issue was that of bringing together
scientists from a large variety of research areas, as to face multiple aspects of the scenario
taken into account, believing that the meeting between ideas from people that belong to
different research areas can bring advantages to each of them.
Future Internet 2021,13, 240. https://doi.org/10.3390/fi13090240 https://www.mdpi.com/journal/futureinternet
Future Internet 2021,13, 240 2 of 3
2. Contributions
This Special Issue of Future Internet received valuable contributions, both in terms of
fundamental and applied research papers and high-quality surveys.
An example of this is the work in [
1
], where the authors present an innovative ap-
proach for damage detection of infrastructures on-edge devices by exploiting a brain-
inspired algorithm, or in [
2
], where, instead, two techniques aimed at supporting the user
in making privacy choices about sharing personal content online have been proposed by
the authors. Another interesting work, which aimed to estimate the perceived quality of
service (PQoS) of video conferencing using only 802.11-specific network performance pa-
rameters collected from Wi-Fi access points (APs) on customer premises, has been proposed
in [3].
A completely different but important domain is that of the work proposed in [
4
],
where the authors propose a method for extracting implicit answers from large tweet
collections, with the aim of collecting tweets related to heart attacks, which contain useful
information. The contribution in [
5
], which is focused on network security, first provides
an extensive overview of the scenario, then proposes a novel Local Feature Engineering
(LFE) approach, which is based on a data pre-processing strategy, to face some well-
known problems that affect state-of-the-art solutions. The application of a solar-powered
unmanned aerial vehicle (UAV) for securing communication with a ground node in the
presence of eavesdroppers in urban environments has been considered in [
6
], whereas a
study aimed at identifying the most probable future development of social media over the
next five to ten years has been provided in [7].
As for the surveys, in [
8
], the authors provide an extensive study of various local-
ization techniques and classified them based on centralized, distributed, iterative, range-
based, range-free, device-based, device-free, and their sub-types, discussing the problems,
challenges, various technologies, and available approaches, as well as the localization
applications for a smart city such as services, infrastructure, mobility, transport, and health.
Some innovative fruition modalities of cultural heritage sites have been discussed in the
survey in [
9
], where the authors propose an approach based on User Localization, Multi-
modal Interaction, User Understanding, and Gamification. Lastly, the research domain
related to the Free-Space Optical Communication (FSOC) has been taken into account in
the survey proposed in [10].
Acknowledgments:
We wish to thank all the authors involved in the submitted papers, as well as
all the reviewers for their precious work, and the Future Internet journal for the valuable support at
every stage of the publication process of our Special Issue.
Conflicts of Interest: The authors declare no conflict of interest.
References
1.
Barchi, F.; Zanatta, L.; Parisi, E.; Burrello, A.; Brunelli, D.; Bartolini, A.; Acquaviva, A. Spiking Neural Network-Based Near-Sensor
Computing for Damage Detection in Structural Health Monitoring. Future Internet 2021,13, 219.
2.
Contu, F.; Demontis, A.; Dessì, S.; Muscas, M.; Riboni, D. AI-Based Analysis of Policies and Images for Privacy-Conscious
Content Sharing. Future Internet 2021,13, 139.
3.
Morshedi, M.; Noll, J. Estimating PQoS of Video Conferencing on Wi-Fi Networks Using Machine Learning. Future Internet
2021
,
13, 63.
4.
Karajeh, O.; Darweesh, D.; Darwish, O.; Abu-El-Rub, N.; Alsinglawi, B.; Alsaedi, N. A Classifier to Detect Informational vs.
Non-Informational Heart Attack Tweets. Future Internet 2021,13, 19.
5.
Carta, S.; Podda, A.S.; Recupero, D.R.; Saia, R. A local feature engineering strategy to improve network anomaly detection. Future
Internet 2020,12, 177.
6.
Huang, H.; Savkin, A.V. Autonomous Navigation of a Solar-Powered UAV for Secure Communication in Urban Environments
with Eavesdropping Avoidance. Future Internet 2020,12, 170.
7. Studen, L.; Tiberius, V. Social Media, Quo Vadis? Prospective Development and Implications. Future Internet 2020,12, 146.
8.
Ghorpade, S.; Zennaro, M.; Chaudhari, B. Survey of Localization for Internet of Things Nodes: Approaches, Challenges and
Open Issues. Future Internet 2021,13, 210.
Future Internet 2021,13, 240 3 of 3
9.
Augello, A.; Infantino, I.; Pilato, G.; Vitale, G. Site Experience Enhancement and Perspective in Cultural Heritage Fruition—A
Survey on New Technologies and Methodologies Based on a “Four-Pillars” Approach. Future Internet 2021,13, 92.
10.
Garlinska, M.; Pregowska, A.; Masztalerz, K.; Osial, M. From mirrors to free-space optical communication—Historical aspects in
data transmission. Future Internet 2020,12, 179.
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Video conferencing services based on web real-time communication (WebRTC) protocol are growing in popularity among Internet users as multi-platform solutions enabling interactive communication from anywhere, especially during this pandemic era. Meanwhile, Internet service providers (ISPs) have deployed fiber links and customer premises equipment that operate according to recent 802.11ac/ax standards and promise users the ability to establish uninterrupted video conferencing calls with ultra-high-definition video and audio quality. However, the best-effort nature of 802.11 networks and the high variability of wireless medium conditions hinder users experiencing uninterrupted high-quality video conferencing. This paper presents a novel approach to estimate the perceived quality of service (PQoS) of video conferencing using only 802.11-specific network performance parameters collected from Wi-Fi access points (APs) on customer premises. This study produced datasets comprising 802.11-specific network performance parameters collected from off-the-shelf Wi-Fi APs operating at 802.11g/n/ac/ax standards on both 2.4 and 5 GHz frequency bands to train machine learning algorithms. In this way, we achieved classification accuracies of 92–98% in estimating the level of PQoS of video conferencing services on various Wi-Fi networks. To efficiently troubleshoot wireless issues, we further analyzed the machine learning model to correlate features in the model with the root cause of quality degradation. Thus, ISPs can utilize the approach presented in this study to provide predictable and measurable wireless quality by implementing a non-intrusive quality monitoring approach in the form of edge computing that preserves customers’ privacy while reducing the operational costs of monitoring and data analytics.
Article
Full-text available
In this work, we present an innovative approach for damage detection of infrastructures on-edge devices, exploiting a brain-inspired algorithm. The proposed solution exploits recurrent spiking neural networks (LSNNs), which are emerging for their theoretical energy efficiency and compactness, to recognise damage conditions by processing data from low-cost accelerometers (MEMS) directly on the sensor node. We focus on designing an efficient coding of MEMS data to optimise SNN execution on a low-power microcontroller. We characterised and profiled LSNN performance and energy consumption on a hardware prototype sensor node equipped with an STM32 embedded microcontroller and a digital MEMS accelerometer. We used a hardware-in-the-loop environment with virtual sensors generating data on an SPI interface connected to the physical microcontroller to evaluate the system with a data stream from a real viaduct. We exploited this environment also to study the impact of different on-sensor encoding techniques, mimicking a bio-inspired sensor able to generate events instead of accelerations. Obtained results show that the proposed optimised embedded LSNN (eLSNN), when using a spike-based input encoding technique, achieves 54% lower execution time with respect to a naive LSNN algorithm implementation present in the state-of-the-art. The optimised eLSNN requires around 47 kCycles, which is comparable with the data transfer cost from the SPI interface. However, the spike-based encoding technique requires considerably larger input vectors to get the same classification accuracy, resulting in a longer pre-processing and sensor access time. Overall the event-based encoding techniques leads to a longer execution time (1.49×) but similar energy consumption. Moving this coding on the sensor can remove this limitation leading to an overall more energy-efficient monitoring system.
Article
Full-text available
With exponential growth in the deployment of Internet of Things (IoT) devices, many new innovative and real-life applications are being developed. IoT supports such applications with the help of resource-constrained fixed as well as mobile nodes. These nodes can be placed in anything from vehicles to the human body to smart homes to smart factories. Mobility of the nodes enhances the network coverage and connectivity. One of the crucial requirements in IoT systems is the accurate and fast localization of its nodes with high energy efficiency and low cost. The localization process has several challenges. These challenges keep changing depending on the location and movement of nodes such as outdoor, indoor, with or without obstacles and so on. The performance of localization techniques greatly depends on the scenarios and conditions from which the nodes are traversing. Precise localization of nodes is very much required in many unique applications. Although several localization techniques and algorithms are available, there are still many challenges for the precise and efficient localization of the nodes. This paper classifies and discusses various state-of-the-art techniques proposed for IoT node localization in detail. It includes the different approaches such as centralized, distributed, iterative, ranged based, range free, device-based, device-free and their subtypes. Furthermore, the different performance metrics that can be used for localization, comparison of the different techniques, some prominent applications in smart cities and future directions are also covered.
Article
Full-text available
Thanks to the popularity of personal mobile devices, more and more of the different types of private content, such as images and videos, are shared on social networking applications. While content sharing may be an effective practice to enhance social relationships, it is also a source of relevant privacy issues. Unfortunately, users find it difficult to understanding the terms and implications of the privacy policies of apps and services. Moreover, taking privacy decisions about content sharing on social networks is cumbersome and prone to errors that could determine privacy leaks. In this paper, we propose two techniques aimed at supporting the user in taking privacy choices about sharing personal content online. Our techniques are based on machine learning and natural language processing to analyze privacy policies, and on computer vision to assist the user in the privacy-conscious sharing of multimedia content. Experiments with real-world data show the potential of our solutions. We also present ongoing work on a system prototype and chatbot for natural language user assistance.
Article
Full-text available
This paper deals with innovative fruition modalities of cultural heritage sites. Based on two ongoing experiments, four pillars are considered, that is, User Localization, Multimodal Interaction, User Understanding and Gamification. A survey of the existing literature regarding one or more issues related to the four pillars is proposed. It aims to put in evidence the exploitation of these contributions to cultural heritage. It is discussed how a cultural site can be enriched, extended and transformed into an intelligent multimodal environment in this perspective. This new augmented environment can focus on the visitor, analyze his activity and behavior, and make his experience more satisfying, fulfilling and unique. After an in-depth overview of the existing technologies and methodologies for the fruition of cultural interest sites, the two experiments are described in detail and the authors’ vision of the future is proposed.
Article
Full-text available
Video on demand (VoD) services such as YouTube have generated considerable volumes of Internet traffic in homes and buildings in recent years. While Internet service providers deploy fiber and recent wireless technologies such as 802.11ax to support high bandwidth requirement, the best-effort nature of 802.11 networks and variable wireless medium conditions hinder users from experiencing maximum quality during video streaming. Hence, Internet service providers (ISPs) have an interest in monitoring the perceived quality of service (PQoS) in customer premises in order to avoid customer dissatisfaction and churn. Since existing approaches for estimating PQoS or quality of experience (QoE) requires external measurement of generic network performance parameters, this paper presents a novel approach to estimate the PQoS of video streaming using only 802.11 specific network performance parameters collected from wireless access points. This study produced datasets comprising 802.11n/ac/ax specific network performance parameters labelled with PQoS in the form of mean opinion scores (MOS) to train machine learning algorithms. As a result, we achieved as many as 93–99% classification accuracy in estimating PQoS by monitoring only 802.11 parameters on off-the-shelf Wi-Fi access points. Furthermore, the 802.11 parameters used in the machine learning model were analyzed to identify the cause of quality degradation detected on the Wi-Fi networks. Finally, ISPs can utilize the results of this study to provide predictable and measurable wireless quality by implementing non-intrusive monitoring of customers’ perceived quality. In addition, this approach reduces customers’ privacy concerns while reducing the operational cost of analytics for ISPs.
Article
Full-text available
Social media sites are considered one of the most important sources of data in many fields, such as health, education, and politics. While surveys provide explicit answers to specific questions, posts in social media have the same answers implicitly occurring in the text. This research aims to develop a method for extracting implicit answers from large tweet collections, and to demonstrate this method for an important concern: the problem of heart attacks. The approach is to collect tweets containing “heart attack” and then select from those the ones with useful information. Informational tweets are those which express real heart attack issues, e.g., “Yesterday morning, my grandfather had a heart attack while he was walking around the garden.” On the other hand, there are non-informational tweets such as “Dropped my iPhone for the first time and almost had a heart attack.” The starting point was to manually classify around 7000 tweets as either informational (11%) or non-informational (89%), thus yielding a labeled dataset to use in devising a machine learning classifier that can be applied to our large collection of over 20 million tweets. Tweets were cleaned and converted to a vector representation, suitable to be fed into different machine-learning algorithms: Deep neural networks, support vector machine (SVM), J48 decision tree and naïve Bayes. Our experimentation aimed to find the best algorithm to use to build a high-quality classifier. This involved splitting the labeled dataset, with 2/3 used to train the classifier and 1/3 used for evaluation besides cross-validation methods. The deep neural network (DNN) classifier obtained the highest accuracy (95.2%). In addition, it obtained the highest F1-scores with (73.6%) and (97.4%) for informational and non-informational classes, respectively.
Article
Full-text available
This paper considers the navigation of a solar-powered unmanned aerial vehicle (UAV) for securing the communication with an intended ground node in the presence of eavesdroppers in urban environments. To complete this task, the UAV needs to not only fly safely in the complex urban environment, but also take into account the communication performance with the intended node and eavesdroppers. To this end, we formulate a multi-objective optimization problem to plan the UAV path. This problem jointly considers the maximization of the residual energy of the solar-powered UAV at the end of the mission, the maximization of the time period in which the UAV can securely communicate with the intended node and the minimization of the time to reach the destination. We pay attention to the impact of the buildings in the urban environments, which may block the transmitted signals and also create some shadow region where the UAV cannot harvest energy. A Rapidly-exploring Random Tree (RRT) based path planning scheme is presented. This scheme captures the nonlinear UAV motion model, and is computationally efficient considering the randomness nature. From the generated tree, a set of possible paths can be found. We evaluate the security of the wireless communication, compute the overall energy consumption as well as the harvested amount for each path and calculate the time to complete the flight. Compared to a general RRT scheme, the proposed method enables a large time window for the UAV to securely transmit data.
Article
Full-text available
Fast communication is of high importance. Recently, increased data demand and crowded radio frequency spectrum have become crucial issues. Free-Space Optical Communication (FSOC) has diametrically changed the way people exchange information. As an alternative to wire communication systems, it allows efficient voice, video, and data transmission using a medium like air. Due to its large bandwidth, FSOC can be used in various applications and has therefore become an important part of our everyday life. The main advantages of FSOC are a high speed, cost savings, compact structures, low power, energy efficiency, a maximal transfer capacity, and applicability. The rapid development of the high-speed connection technology allows one to reduce the repair downtime and gives the ability to quickly establish a backup network in an emergency. Unfortunately, FSOC is susceptible to disruption due to atmospheric conditions or direct sunlight. Here, we briefly discuss Free-Space Optical Communication from mirrors and optical telegraphs to modern wireless systems and outline the future development directions of optical communication.
Article
Full-text available
The dramatic increase in devices and services that has characterized modern societies in recent decades, boosted by the exponential growth of ever faster network connections and the predominant use of wireless connection technologies, has materialized a very crucial challenge in terms of security. The anomaly-based Intrusion Detection Systems, which for a long time have represented one of the most efficient solutions in order to detect intrusion attempts on a network, then have to face this new and more complicated scenario. Well-known problems, such as the difficulty of distinguishing legitimate activities from illegitimate ones due to their similar characteristics and their high degree of heterogeneity, today have become even more complex, considering the increase in the network activity. After providing an extensive overview of the scenario under consideration, this work proposes a Local Feature Engineering (LFE) strategy aimed to face such problems through the adoption of a data preprocessing strategy that reduces the number of possible network event patterns, increasing at the same time their characterization. Unlike the canonical feature engineering approaches, which take into account the entire dataset, it operates locally in the feature space of each single event. The experiments conducted on real-world data have shown that this strategy, which is based on the introduction of new features and the discretization of their values, improves the performance of the canonical state-of-the-art solutions.