An Agent-Based Platform for Ad-Hoc Social Networking

Author(s):  
Vedran Podobnik ◽  
Ignac Lovrek
Keyword(s):  
Ad Hoc ◽  
2021 ◽  
Vol 26 (6) ◽  
pp. 549-557
Author(s):  
Venkatasubramanian Srinivasan

Mobile Ad-Hoc Networks (MANETs) due to their reconfigurable nature are being integrated into new and futuristic knowledge such as Internet of Things (IoT), cloud, reconfigurable networks, etc. To attain such credibility of integration, the routing protocols associated with these mobile nodes have to connect, perform and facilitate routing that offers a high level of security and resistance to all possible threats and security issues that may emanate in the network. One of the solutions used to maintain network security is intrusion detection systems (IDSs). This article primarily emphasis on the network's susceptibility to a suction assault known as a black hole attack. The investigations about the employment of intelligent agents called Honeypot Agent-based detection scheme (HPAS) with Long-Short Term Memory (LSTM) in identifying such assaults. Hence, the proposed method is named HPAS-LSTM, where honeypots are roaming virtual software managers that create Route Request (RREQ) packets to attract and entrap black hole attackers. Extensive model results utilizing the ns-2 simulator are used to demonstrate the presence of the suggested detection technique. The simulation outcomes demonstrate that the suggested technique outperforms current black hole detection methods in terms of throughput (TH), packet loss rate (PLR), packet delivery ratio (PDR), and total network delay (TND).


2021 ◽  
Vol 12 ◽  
Author(s):  
Simona Sciara ◽  
Daniela Villani ◽  
Anna Flavia Di Natale ◽  
Camillo Regalia

Facebook and other social networking sites allow observation of others’ interactions that in normal, offline life would simply be undetectable (e.g., a two-voice conversation viewable on the Facebook wall, from the perspective of a real, silent witness). Drawing on this specific property, the theory of social learning, and the most direct implications of emotional contagion, our pilot experiment (N = 49) aimed to test whether the exposure to others’ grateful interactions on Facebook enhances (a) users’ felt gratitude, (b) expressed gratitude, and (c) their subjective well-being. For the threefold purpose, we created ad hoc Facebook groups in which the exposure to some accomplices’ exchange of grateful messages for 2 weeks was experimentally manipulated and users’ felt/expressed gratitude and well-being were consequently assessed. Results partially supported both hypotheses. Observing others’ exchange of grateful posts/comments on Facebook appeared to enhance participants’ in-person expression of gratitude (i.e., self-reported gratitude expression within face-to-face interactions), but not their direct and subjective experiences of gratitude. Similarly, exposure to others’ grateful messages improved some components of subjective well-being, such as satisfaction with life, but not negative and positive affect. Taken together, however, our preliminary findings suggest for the first time that social networking sites may actually amplify the spreading of gratitude and its benefits. Implications of our results for professionals and future research in the field of health, education, and social media communication are discussed.


Self-organized networks based on mobile devices (e.g., Mobile Ad Hoc Networks [MANET]) are becoming a practical platform for pervasive social networking. People, either familiar or strangers, communicate with each other via such a network for instant social activities. How to help mobile users to build up trust in pervasive social networking is becoming an important and interesting issue. Trust concerns not only security, but also privacy, as well as quality of social networking experiences. It relates to many properties that are essential for establishing a trust relationship in ephemeral and dynamically changed pervasive social environments. This chapter reviews the literature with regard to how to build up trust in pervasive social networking. The authors explore whether pervasive social networking is demanded, considering many existing popular Internet social networking services. Based on a need assessment survey, they propose a trust management framework that supports context-aware trust/reputation generation, trustworthy content recommendations, secure communications, unwanted traffic control, user privacy recommendations, and secure face-to-face pervasive social communications. Simulations, prototype implementation, and user experiments further prove the effectiveness of the proposed solutions.


Author(s):  
Demosthenes Akoumianakis ◽  
Giannis Milolidakis ◽  
George Vlachakis ◽  
Nikolas Karadimitriou ◽  
Giorgos Ktistakis

The present work rests and elaborates on the assumption that social technologies are increasingly turned into computer-mediated virtual settlements, thereby allowing the excavation of a variety of enacted cyber-phenomena such as ad hoc online ensembles, informal social networks and virtual communities, on the grounds of “digital” traces or remains. In this vein, the authors motivate and present a method for virtual excavations that is tightly coupled to a transformational technology such as knowledge visualization. The analytical and explanatory value of the method is assessed using two case studies addressing representative genres of social technologies, namely web sites augmented with social plug-ins and social networking services. Analysis reveals intrinsic aspects of “digital” traces and remains, the form they take in today’s social web and the means through which they can be excavated and transformed to useful information. It turns out that such virtual excavations, when organized and conducted carefully, can be of benefit to enterprises, service organizations and public sector institutions. In addition, their tight coupling with knowledge visualization eliminates extensive data analysis as much of this work can be done using the visualization. On the other hand, and depending on the size of digital trace data, the choice of visualizations and the underlying toolkit are of paramount importance.


Author(s):  
Mohamed Khedr ◽  
Ahmed Karmouch ◽  
Ramiro Liscano ◽  
Tom Gray
Keyword(s):  
Ad Hoc ◽  

Author(s):  
Mario E. Inchiosa ◽  
Bipin Chadha

This paper describes the need for understanding the role of financial markets in successful product development in the global context. Agent-based models distinguish themselves by their ability to generate many real world phenomena endogenously, rather than as a result of ad-hoc assumptions. We report on a model of global financial markets employing the following agents: countries, firms, stock traders, country banks, and a global bank. These agents interact with goods, credit, currency, and stock markets. The model endogenously generated quantitative and qualitative features of real economies, including skewed firm sizes, skewed country GNP’s, skewed stock trader portfolio values, and heavy-tailed non-Gaussian firm growth rate, exchange rate fluctuation, and stock return distributions. Multiple runs were performed with different random number generator seeds to investigate the stability or instability of the economies grown by the model. Both stable and unstable country economies were detected. The multiple runs also verified conclusions drawn from analyzing individual runs showing how small countries could be buffeted by fluctuations in larger countries. Such a model can be used by product development organizations to understand the impacts of their product development decisions in the context of dynamic and unpredictable financial markets.


Sign in / Sign up

Export Citation Format

Share Document