亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        Intelligent Service Search Model Using Emerging Technologies

        2023-12-12 15:51:24FarhanAminandGyuSangChoi
        Computers Materials&Continua 2023年10期

        Farhan Amin and Gyu Sang Choi

        Department of Information and Communication Engineering,Yeungnam University,Gyeongsan,38541,Korea

        ABSTRACT In recent years,the Internet of Things (IoT) has played a vital role in providing various services to users in a smart city.However,searching for services,objects,data,and frameworks remains a concern.The technological advancements in Cyber-Physical Systems (CPSs) and the Social Internet of Things (SIoT) open a new era of research.Thus,we propose a Cyber-Physical-Social Systems (CPSs) for service search.Herein,service search and object discovery operation carries with the suitable selection of friends in the network.Our proposed model constructs a graph and performs social network analysis(SNA).We suggest degree centrality,clustering,and scalefree emergence and show that a rational selection of friends per service exploration increases the overall network navigability.The efficiency of our proposed system is verified using real-world datasets based on service processing time,path length,giant component,and network diameter.The simulation results proved that our proposed system is efficient,robust,and scalable.

        KEYWORDS Internet of Things;Social Internet of Things;Cyber-Physical Social systems;smart cities;service search;smart cities

        1 Introduction

        The traditional networks and services are efficiently utilized under the umbrella of a smart city [1].The key services are smart traffic management,smart healthcare,waste management,urban transport,etc.The Internet of Things(IoT)is a leading technology that connects a huge number of homogeneous and heterogeneous objects.These objects can communicate and provide various services in these application scenarios.According to a recent research survey [2],the number of IoT devices will be in billions by 2025.Therefore,searching for a service in IoT devices acts as a challenging task[3–5].In addition,since a device can have several connections,therefore requires a large search space.The IoT is based on centralized systems and hence has limited the service selection and also has scalability issues.To address the scalability issue,a new technology is introduced,named the Social Internet of Things (SIoT).SIoT works as a cluster between the IoT and social networks [6].Moreover,the social networking feature is not only limited to the online social networking for instance;Facebook and Twitter,but it could applied to the natural sciences.The communication among these devices is improved by using smart objects,especially when they were connected to others.These smart objects can communicate directly or indirectly by utilizing their neighbors.The power of establishing social relationships enables the SIoT objects to establish relationships and also behave socially [7].Therefore,smart objects can request and also provide various services.One of the promising features of the SIoT is that every object can look for a desired service by using neighborhood relations,such as querying neighbors in a distributed manner.Hence,the overall network navigability is increased.The Cyber-Physical Systems(CPS)are popular nowadays and becoming the fundamental conceptual approaches of Industry 4.0 [8].These intelligent systems comprised controllers,sensors,actuators,etc.All these devices work together and provide support for the physical and cyber worlds [9].A necessity in the modern world is to provide the cyber-physical infrastructure combined with new software platforms that combine emerging technologies [10].Presently,the global world is evolving into a hybrid world with the integration of cyber,physical,and social aspects.These are referred to as Cyber-Physical-Social Systems(CPSs)[11,12].The objectives of CPSS to provide efficient,convenient,and personalized services to the humans[13,14].The general structure of a CPSS is shown in Fig.1.In this figure,we can see those cyber,physical,and social systems were connected.The social system(networks) interact with each other and are hence composed of virtual and physical spaces.The social system is comprised of people having relations among them.The relation is formed based on the social interaction and measurement of performance based on personal experience,perception,and observation.The physical systems were divided into sensors and actuators.The sensing devices comprised of sensors,temperature sensors,and actuators as shown in the figure.These smart objects were connected using different technologies using wired and wireless techniques to process the valuable data and shown in the virtual space.CPSS has been an active research topic for more than a decade and plays a very important role as an interface between several objects to send and receive data and carry out actions.The integration of CPSs and emerging technologies helps to improve the user services especially in smart cities.Many researchers have worked in this direction.For instance,Zhou et al.[15]presented a survey on the development of CPSs.For evaluation,they identified five diverse aspects and listed are as follows.The development of CPS to CPSSs,architecture design,applications,and standards,the enabling techniques,and networks.A technical study conducted by Amin et al.[16]proposed CPSs for the analysis of high communication traffic areas in a smart city.It is a two-step procedure,in the first step;the high communication areas named hotspots were extracted in the network.In the second step;to quantify the importance of each hotspot a deep analysis has been performed based on certain network metrics,for example,degree,and Eigenvector centrality etc.The authors concluded that these metrics help to identify the importance of each hotspot in the network.In addition,this study is helpful for the researchers who were working in the telecom domain.A similar research carried by Ahmad et al.[17] proposed a Socio-cyber network based on the human behaviors.In this study,they have performed a big data analysis.The proposed model integrates the social network with the technical network.The friendship is established based on the trust index and geolocation information of the user.The proposed model provides a better understanding of extracting knowledge.Similarly,Dautovic et al.[18] proposed a collaborative data processing platform using stream processing technology.The key objective of this platform is to distribute the workload among all devices.Yetis et al.[19] proposed a cyber-physical-social system for a smart city.The proposed system regularly reports smart city problems that people face in their environment by solving cyber,physical,and social factors.Li et al.[20] focused on multi-objective optimization based on power load stability.From this literature,we found that although the research on this topic is recent and ongoing;however,there is limited literature reported on the SIoT,especially in the development of CPSS.Therefore,there is a need to find alternative services and data retrieval methods[21]using CPss and emerging technologies.

        Figure 1:General structure of CPSS

        1.1 Motivation and Problem Statement

        The potential service selection and the framework for achieving a greater connection is a key problem in IoT and remains the same in the development of smart cities[7].The primary motivation of our research study is to find the desired service for objects in the IoT.Therefore,we propose to develop an innovative solution for the service search using emerging intelligence,i.e.,SIoT,and CPSS.Our proposed model is expected to boost the selection and composition of services provided by objects and networks that have access to the physical world.The key objective of this research is to provide a model for object discovery and potential services selection using intelligent friend selection.In particular,the recent CPSs systems were developed without considering SIoT.Therefore,our research aims to fully exploit the emerging technologies combined with the advantages in the existing systems.We proposed a system for the potential service selection and showed how required service discovery has been performed with the proper selection of potential friends in the network and will impact in terms of achieving higher network navigability.We perform a detailed analysis using service processing time,average path length,degrees,network diameter,etc.

        1.2 Benefits of Our Research

        Our research is beneficial for researchers who have the intention to learn the structural properties of a large-scale network and wants to learn the interactions among devices in a distributed manner,as well as low-cost routing and service search methods.

        1.3 Contribution of This Study

        ? The current state-of-the-art models are purely based on global network navigability and thus lack existing short paths.Thus,a large time is required for service search in the network.We solve this problem by employing local network navigability.In our proposed system,we suggested network-based properties for instance;neighborhood degree,local clustering,and scale-free emergence to increase the overall network navigability.

        ? The distributed nature of our proposed system can discover the desired services very quickly and hence it requires less service execution time and also is scalable.

        ? We analyzed how the proposed system behaves when the routing is performed by each object only exploiting local information for instance;friends,namely their degrees.Hence,it guarantees lows cost routing.

        ? The proposed system is evaluated using four real data sets and compared with current state of art models.The efficiency is measured by considering the giant component,network diameter,path length,and service processing time.

        The rest of the study is organized as follows.Section 2 presents the relevant background and the core concepts of emerging technologies.Section 3 explains our proposed multilevel system design model.Section 4 explains the experimentation and finally,Section 5 concludes the conclusion of our study.

        2 Related Work

        Herein,we review the most recent literature.Herein we briefly discuss the current state of the art along with suitable supporting literature.

        2.1 The Current State of ART in CPSs

        The IoT is a leading technology and is widely used to develop the infrastructure in smart cities.The objects in the IoT were connected and passed data to the others.Millions of objects were connected and transferred data at the same time therefore,it leads to the generation of large data and hence the scalability issue arises.The service search is the key challenge that remains for the growth of IoT[16].In order,to overcome this issue,the Social Internet of Things(SIoT)has been developed.The SIoT works as a cluster between the IoT and social networks.The power of utilizing social relationships is helpful to overcome the issue of scalability.In addition,generally,social networks have large data and the power of SIoT is also helpful to solve problems in handling large-scale data.For example;Sivrikaya et al.[14]proposed a framework for service selection in a smart city using IoT.The research is excellent,however,they did not consider the centrality metrics.Another study conducted by Keung et al.[22]proposed a framework for robotic and facility control using edge intelligence for the industrial Internet of Things(IIoT).They suggested Artificial Intelligence(AI)and IIoT-based agnostic robotic architecture for resource synchronization.Another research conducted by Keung et al.[23] addressed the issue of value utilization and creation in IIoT.For this,they proposed a graph theory-based solution named multi-deep Robotic Mobile Fulfillment System (RMFS).It is used for identifying the short paths using fast computing.For this purpose,they proposed three-tier IIoT architecture including RMFS,a supplier,and a disposal center.The proposed model comprised different storage locations.The assignment rules and strategies were implemented under the particular parties to reduce the operation cost.For performance evaluation,they compared with a genetic heuristic algorithm,Astar,and the Dijkstra algorithm.Zheng et al.[24] presented a manufacturing network based on graph knowledge and the multi-agent re-enforcement learning for the IIoT.They suggested self-X cognitive manufacturing which is the combination of self-configuration,self-optimization,and selfadjust.Similarly,Xia et al.[25]proposed a novel convolutional network-based approach for predicting the material removal rate in a chemical plantation.The Knowledge Graphs (KG) were used for unorganized maintenance.Xia et al.[26]researched maintenance planning and recommendation using knowledge and neural network graphs.In this research,at first,a KG is formed.The maintenance is established based on a well-defined domain-specific ontology schema.Then,a compressed relational graph convolutional network is proposed to predict the faults in maintenance.Finally,a maintenance test case using oil drilling equipment is carried out to check the efficiency.One more study conducted by Xia et al.[27] proposed an approach for fault diagnosis in complex networks.Presently,fault diagnosis in graphs is performed using Graph Neural Networks(GNN)is performed based on data similarity.Therefore,they cannot guarantee the quality.Therefore,a proposed hybrid approach is combined with the hypergraph construction method.Zhou et al.[28] developed a deep learningbased personalized recommender system.This system predicts the click-through rate for a given item and is suitable for online advertising.Zhang et al.[29] proposed a model for wind power operation and maintenancebased on social and physical information.They suggested cognitive measurement and intelligent guide using simulation.Tan et al.[30] proposed a block-chain-based access control framework to increase the privacy preservation.The access control is ensured and the transactions issued and the encryption is performed by using a domain management server.Two problems were associated;first,it takes plenty of time to protect the security and privacy and secondly occupied a large space,therefore,not suitable for the mobile devices.Secondly,the operation function does not provide a standard permission mechanism to access the chain of records in the network.Keung et al.[31]presented a study on the development of a cloud-based Robotic Mobile Fulfillment System(RMFS).They first presented a critical analysis of cloud-based services for IoT development.Secondly,theoretical research was conducted from the most recent literature.In addition,they proposed a cloudbased architecture using a conflict avoidance strategy in the multi-layer multi-deep warehouse.One more similar research was conducted by Kung et al.[23]and addressed value creation by utilizing the IIoT.In this research,a graph-based heuristic is used for computing the short paths in the network.They suggested Diikstra,A-star,and genetic algorithm for the comparison.The unique feature of this model is that it integrates the physical and cyber layers using cloud.From literature,we concluded that SIoT is useful in the development of CPSs.But,there is a limited research has been reported on this topic.Therefore,we proposed a service discovery model using SIoT and CPSs.The proposed model is explained given in Section 3.

        3 Proposed Multilevel System Design Model

        The proposed conceptual multilevel system model is shown in Fig.2.It is a four-layered model consisting of data collection,communication,processing,and application layers.In this section,we explain the functionality of each layer in detail.

        3.1 DataCollection Layer

        The first layer(the top layer shown in the figure)is used for data generation.The main function of our proposed system is to generate and efficiently process large graphs from Facebook,Slashdot,Bright kite,and IoT real objects.The IoT data set for a smart city is comprised of sensors and actuators etc.The data generation layer integrates all the features necessary to gather sensor information on a real-time basis.The preprocessing is performed and the data set size is reduced.In this way,unnecessary information will be discarded efficiently.

        Figure 2:Proposed multilevel system design model

        3.2 Communication Layer

        In this layer,all devices were equipped with a communication medium,for instance;Wireless Fidelity (WIFI) and Worldwide Interoperability for Microwave Access (WiMax),etc.This layer handles the data collected from various objects for instance;Bright kite,Facebook,Real IoT,and other social networks.The purpose is to collect the data from the source to the design system.Herein,we suggest,high-speed communication technologies such as;Long-Term Evolution (LTE),WIFI,WiMax,and Ethernet technologies.These technologies are helpful to transfer the data from the source to the designed server.It is possible if the devices and systems are kept near each other.At first,a graph is created.When the incoming data is received the graph is modified by adding new nodes and edges.

        3.3 Data Processing Layer

        This layer receives the data from the above layer with the key function to normalize the data into a meaningful form.In this way,the useful information is extracted.Usually,the processing of a large amount of data requires more power and resources.The traditional methods of data processing are not feasible to analyze large amounts of data.Therefore,there is a need to develop a system that can efficiently pre-process the incoming stream of data.For this purpose,the incoming data is first stored in the database and then handled by using Python Data analysis(Pandas)as shown in Fig.2.The key functions of Pandas are to perform cleansing,transforming,and the manipulation of the data.Network X[32]generates a graph from the dataset,and then,network centrality metrics were applied.The data storage initially creates‘filtered big data’and Herein,the errors and the redundant data were removed.The servers process an equal amount of data and generate the output at the same time.Finally,the error-free data is converted into a graph.The graph database extracts the potential friendship metrics for instance;degree centrality,and clustering coefficient,and the scalefree emergence structure has been applied to the graph.After following these steps,the processed data is forwarded to the next layer.

        Graph Building

        The graph-building process has been performed in this layer.Herein,the social network data is denoted by an undirected and unweighted GraphG,and whereG=(V,E),whereVandEare vertices and edges.In this network,the edge is a connection between pairs,andn=|V|denotes nodes or objects,andm=|E|denotes edges.A reference graph deployment is shown in Fig.3.Our proposed multi-level system design model is empowered with various powerful algorithms and hence equally processes the large-scale data.Finally,the dataset has been sent for processing to a designated server.Once the processing has been completed the data is stored on local a disk for future use.

        Figure 3:Reference graph deployment

        3.4 Application Layer

        The key parts in this layer are a data center using the cloud,data storage,and prediction as shown in Fig.2.The upper layer graph database sends the partial and complete results to this layer.At first,these results were stored in the data center using the cloud.As the functionality of both servers same.Therefore,It depends upon the user if he wants to choose two separate servers is feasible.The decision is depending upon the keeping because of systems cost.In addition,the application layer handles the database management and storage.Moreover,several essential activities for instance;data storage and analysis were performed by the objects that were stored.Finally,our proposed system first stores secondly analyze,and third presents the results to users.

        4 Results Analysis and Discussion

        Herein,we discuss the details of the experimental results.For the readers,we have divided it into two parts.In the first part,we discuss the basic network indicators and then we discuss the dataset and the achieved experimental results based on the proposed network indicators.

        4.1 Network Indicators

        These metrics capture the connectivity and the centrality of objects in the network and are known as network indicators [33].The basic network properties are clustering coefficient,degree of connectivity,network diameter and path length,etc.The explanation details were given below.

        4.1.1 Network Degree

        A network is a collection of nodes and edges altogether.The network degree distribution P(k)of a network is then defined to be the fraction of nodes in the network with degreekor simply network degree the probability distribution of the node degree[34].It is one of the most important properties of scale-free networks[35].The degrees were calculated in Eq.(1).

        wherenis the total number of nodes in a network andnkof them have degreek.In addition,this is a very important property and it affects the overall network navigability.The nodes that have higher degrees are helpful in terms of achieving higher network navigability.

        4.1.2 Average Degree

        The average number of edges per node in a graph is known as the average degree.It is increased by increasing the number of edges in the network.

        4.1.3 Clustering Coefficient

        This measure is introduced by Watts et al.in[36].It is a measure of the closeness of nodes to form a clique[7].Its range is from(0,1).It is measured based on the below equation:

        wherenis the number of objects andCiis the local clustering.

        4.1.4 Degree of Connectivity(Giant Component)

        A portion or group of nodes is directly or indirectly connected and the nodes in a graph.It is increased by increasing the number of links in the network.In many cases,it is observed as high and known as a higher giant component.If the network is fully connected it means that it has a 100%giant component and all objects were reachable to all others in the network using neighbors or friends.

        4.1.5 Path Length

        The path length in a graph is the average number of edges that must be traversed to go from one vertex to another.To assess the size of the network,the average path length is suggested.It is simply the average distance between two vertices and averaged over possible pairs of vertices.It is measured by adding all the minimum distances betweeniandjvertices.The average path length is determined as

        whereNdenotes the total number of vertices in the network,the distance is denoted by nodeIandjbyLijandNchoose 2 denotes all possible numbers of pair vertices.For an efficient algorithm,the path length should be short/low.

        4.2 Dataset Description and Preparation

        In this research,we take a real large-size IoT-generated dataset.The datasets include 1)the Real IoT dataset[37]including all the details of the points of various places in a smart city.In this dataset,a variety of real IoT objects were collected.2)Social network datasets,such as Facebook[38],Brightkite[38],and Slashdot[39].The Facebook and Brightkite dataset was developed by the SNAP library at Stanford University.

        4.3 Potential Service Search and Object Discovery

        Fig.4 illustrates the reference model for potential service discovery in a social network and is derived from Fig.3.In this figure,Nrnamed service seeker is looking for a specific service and provider namedNb.The dotted line designates an initiating request betweenNr Nb.To accept this request,NbimplementsAlgorithm1.Initially,the computation of degrees has been performed.We suggested the maximum number of links or friends byr=5.Upon request initiation in Step 1,the degree of each object is computed until each object reaches a certainr.This is to attain clustering.In case of a large number of friends and exceeds certainr.It simply refuses the incoming request.A minimum of mutual friends were selected using Eq.(5).

        Figure 4:Social network reference model

        In this example;we examine thatNchas minimum mutual friends or zero degrees hence this step results in the elimination ofNcfrom the list and the creation of a new link withNr.IfNchas zero degrees,in that case,Ncwill be recommended to one of the friends or friendsNb.In this example,a friendship circle has been established betweenNrandNb.In Step 2;Nbdecides the oldest friend has minimum degrees.In this case,the candidates areNa,andNq.We examine thatNphas no friends.Hence,it results in the removal of the link betweenNpandNb.In Step 3,the search for the eldest friend in neighbors ofNbhas been performed.In this step,if the search in the 1sthop is failed it is shifted to the 2ndand 3rdhop.A new link is established betweenNpandNr.In Step 4,Nbneighbors were selected based on the frequency of communication and trustworthiness priorities[40].

        4.4 Experimental Results

        We have divided this section into two subsections.We first,explain the graph visualization and in the second subsection,we explain the results based on the service processing time,giant component,network diameter,and path length.The overall framework is implemented using Network X to generate and process the graphs(which abstracts the relation among the data)in near real-time[32].Network X [32] is a package for the Python programming language and is used to create and study the structure,manipulation,dynamics,and functions.The network information is received based on the objects profile and movement.it is noteable that until now the SIoT is not completely deployed.Therfore,the most experimention is performed by using IoT simulation tools.For instance,in this research,we have used‘Network X’.The experiments parameters were listed in Table 1.In this table,one could examine that the nodes and edges were given for the Facebook,Brig kite for proposed model and the BA model.

        Table 1:Parameters for experiments

        4.4.1 Graph Visualization

        Fig.5 illustrates the graph visualization of our proposed system using small nodes and edges.Initially,we deploy our few objects and later we increased them.It is noted that If the number of objects were large it is difficult to visualize.Therefore,for better visualization,we prefer to deploy a few nods or objects in the network for the easiness of readers.

        Figure 5:Graph visualization

        4.4.2 Giant Component Experiment

        Fig.6 shows the giant component experiment.The Giant component presents a large fraction of objects in the network.It is a measure that represents whether a graph is fully or completely connected or not.In this experiment,we check whether proposed the graph of our proposed system is completely connected or not.Generally,the access of the objects to others using short paths.It means the giant component completely depends upon the number of objects.If we have many objects it means that we have a larger giant component.If a graph shows 100%,It means that the proposed model is efficient and most of the objects can be accessed by using small paths.In this experiment,we presented the probability of connected objects as a percentage.From Fig.6,one could observe that we were achieving the 100%giant component.We examine that the giant component is increased slightly by increasing the number of connections.In this figure,the graph initially starts from 0 and slightly increased with many connections and finally reaches 100%.As mentioned earlier that if the giant component is 100%it means that the proposed system is highly efficient and objects were fully connected.Hence the objects can easily access others by using these short paths.In this step,we achieved efficient results.Therefore,we proceed to other experiments to measure the efficiency of our proposed system.

        Figure 6:Giant component experiment

        4.4.3 Degree Distribution Experiment

        The objective of this experiment is to verify whether the proposed system follows power law or not.For readers of this study,the algorithm is considered highly efficient if the system follows a power law.We have used three datasets,for instance,Facebook,SIoT,and Bright kite.Fig.7 illustrates the degree distribution using Facebook and Bright kite datasets.In the Facebook and bright kite datasets,the vertical red line indicates the occurrence of power law[41].On the other hand,the blue line indicates the deployment of objects using our system.In this figure,one could easily examine that the blue line is very close to the red line and hence it makes a 90-degree angle.The algorithm is considered as efficient if the system flows power law.In this figure,we can see that our proposed system behaves the same as a power law.We have repeated the same experiment for the Bright Kite dataset and can see the same behavior as shown in Fig.7(Right side).In this figure,we examine that the objects were very high and the distribution has many curves.As compared to the previous ones,the blue line is very close to the red line and also makes a 90-degree angle.These results again prove that our proposed system completely follows a power law,no matter which dataset we were using.We have again changed the dataset and repeated the same experiment for SIoT dataset shown in Fig.8.In this figure,we surprisingly see that it behaves similarly to the previous datasets.Hence,by examining these results we proved that our proposed system is highly efficient and completely follows power law no matter which dataset was used in the experiment.

        Figure 7:Degree distribution using different datasets

        4.4.4 Network Diameter

        In Fig.9,we have experimented with the network diameter.If we look carefully at this figure,we could examine that except for the beginning period,the diameter of the proposed system is lower.The network diameter decreases significantly.In the connected graph,all objects are connected directly or indirectly.By using analysis we derived a conclusion that by reducing the network diameter,the network users contact more tightly.Hence,the service search process becomes efficient especially when it is initiated between the friends in the network.We derived a conclusion from this experiment that our proposed system is highly efficient.

        Figure 8:SIoT datasets

        Figure 9:Network diameter

        4.4.5 Path Length Experiment

        Fig.10 illustrates the average path length experiment.In this figure,a reader can see that we have compared our proposed system(red color)with the BA(green color)and the Random Network model(blue color).The X-axis is the hop distance and the Y-axis is the computed averaged path length.If the objects are located around 3,9,and 12 meters away from the target objects it shows the shortest path length.The average path length of the proposed model is smaller than the current state-of-the-art random Network[42]and the Barabasi and Albert model[41].The reason is that our proposed system has local knowledge of the network and therefore,each object is capable of routing to select the best route to reach the target object.

        Figure 10:Average path length

        4.4.6 Service Processing Time

        Fig.11 presents the processing time of our proposed system.The X-axis presents the Dataset size and the Y-axis is the processing time.The efficiency is measured by using datasets (mentioned previously) and the processing time is measured in milliseconds.We can see in this figure that the increase in data size results in a decrease in the processing time.Initially,it starts slowly,and later it grows quickly.For the large dataset,the processing time is decussated.It means that our proposed system is highly efficient.We analyze the overall throughput to correspond to the data size.The throughput is directly proportional to data size it is due to the nature of our proposed system.Hence,it means that our proposed system is highly efficient.

        Figure 11:Service processing time

        In Table 1,we compare our proposed model and the state-of-the-art model.We examine that the Giant component of our proposed model archives 100%.The path length and the diameter also demonstrate efficacy as compared to the others and based on this compassion we could say that our proposed system is efficient as compared to the others.The clustering coefficient and the network diameter results are also satisfactory.Based on these results we could say that our proposed system is highly efficient as compared to the art of the state model.

        5 Conclusion

        We herein proposed a method for building a combined CPSS and SIoT-based model for efficient service search and object discovery.Our proposed system first converts the large-scale social network data into a graph and then applies the degree centrality,clustering,and scale-free emergence structure.These metrics are helpful to find the central or most influential objects in the network.In addition,the potential service search and the object discovery are performed using the right selection of friends in the network.The key objective of the right friend selection is to achieve higher network navigability.The efficiency of our proposed system is verified using real-world datasets based on service processing time,path length,giant component,and also network diameter.From experimental results,it is proved that the proposed system is highly efficient,robust,and scalable.In addition,we prove that the degree distribution follows the power law,the average distance and network diameter shrink and also the network density is greater and has a large giant component in our proposed system.But some issues such as the number of friends and trust are not discussed therefore,they will be addressed in future studies.

        Acknowledgement:We thank our families and colleagues who provided us with moral support.

        Funding Statement:This work was supported in part by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2019R1A2C1006159)and(NRF-2021R1A6A1A03039493).

        Author Contributions:The authors’contributions to this work are as follows: conceptualization,F.Amin;methodology,F.Amin;software,F.Amin;validation,G.S.Choi;draft preparation,F.Amin and G.S.Choi;review and editing,G.S.Choi;visualization,F.Amin;supervision,G.S.Choi;funding acquisition,G.S.Choi.All authors have read and agreed to the published version of the manuscript.

        Availability of Data and Materials:The authors confirm that the data supporting the findings of this study are available within the paper.

        Conflicts of Interest:The authors declare that they have no conflicts of interest regarding the present study.

        不卡国产视频| 69精品人人人人| 青草视频在线播放| 久久免费区一区二区三波多野在| 国产不卡一区在线视频| 午夜国产精品视频在线观看| 中文字幕乱码无码人妻系列蜜桃 | 久热香蕉视频| 国产91精品丝袜美腿在线| av成人一区二区三区| 国产无遮挡又爽又刺激的视频老师| japanesehd中国产在线看| 亚洲免费视频一区二区三区| 国产精品亚洲二区在线看| 国产精品网站在线观看免费传媒 | 91精选视频在线观看| 国产亚洲精品成人av在线| 亚洲麻豆视频免费观看| 少妇人妻陈艳和黑人教练| 无码中文av有码中文av| 亚洲精品中文字幕熟女| 亚洲日韩精品a∨片无码加勒比| 亚洲av无码专区在线电影| 国产日韩三级| 亚洲国产精品国自产拍性色| 国产l精品国产亚洲区久久| 亚洲 成人 无码 在线观看| 久久精品亚洲成在人线av| 97在线视频人妻无码| 免费无码国产v片在线观看| 激情综合五月天开心久久| 一区二区视频在线观看地址| 久久久日韩精品一区二区三区| 亚洲另在线日韩综合色| 国产亚洲专区一区二区| 国产农村熟妇videos| 特黄aa级毛片免费视频播放| 亚洲av日韩av天堂久久不卡| 亚洲成a人v欧美综合天堂| 亚洲一区二区三区日本久久九| 国产成人色污在线观看|