


default search action
Future Internet, Volume 15
Volume 15, Number 1, January 2023
- Bashar Igried
, Atalla Fahed Al-Serhan, Ayoub Alsarhan
, Mohammad Aljaidi
, Amjad Aldweesh
:
Machine Learning Failure-Aware Scheme for Profit Maximization in the Cloud Market. 1 - Adrian Sfichi, Eduard Zadobrischi
, Narcisa Sfichi, Marian Badelita, Mihai Medrihan:
Utility of Sharing Economy Principles in the Development of Applications Dedicated to Construction Cost Estimation. 2 - Yerlan Kistaubayev
, Galimkair Mutanov
, Madina Mansurova, Zhanna Saxenbayeva
, Yassynzhan Shakan:
Ethereum-Based Information System for Digital Higher Education Registry and Verification of Student Achievement Documents. 3 - Francisco M. Pereira
, Rute C. Sofia
:
An Analysis of ML-Based Outlier Detection from Mobile Phone Trajectories. 4 - Ben Hasselgren
, Christos Chrysoulas
, Nikolaos Pitropakis
, William J. Buchanan
:
Using Social Media & Sentiment Analysis to Make Investment Decisions. 5 - Qian Yang, Suoping Li
, Hongli Li, Weiru Chen:
Statistical Model of Accurately Estimating Service Delay Behavior in Saturated IEEE 802.11 Networks Based on 2-D Markov Chain. 6 - Haining Zhu, Na Li, Nitish K. Rai, John M. Carroll
:
SmartGroup: A Tool for Small-Group Learning Activities. 7 - Tihomir Orehovacki
, Luka Blaskovic
, Matej Kurevija:
Evaluating the Perceived Quality of Mobile Banking Applications in Croatia: An Empirical Study. 8 - Duc-Minh Ngo
, Dominic Lightbody
, Andriy Temko
, Cuong Pham-Quoc
, Ngoc-Thinh Tran
, Colin C. Murphy, Emanuel M. Popovici:
HH-NIDS: Heterogeneous Hardware-Based Network Intrusion Detection Framework for IoT Security. 9 - Eduardo Pina
, Filipe Sá
, Jorge Bernardino
:
NewSQL Databases Assessment: CockroachDB, MariaDB Xpand, and VoltDB. 10 - Konstantinos Kotis
, Stavros Stavrinos, Christos Kalloniatis
:
Review on Semantic Modeling and Simulation of Cybersecurity and Interoperability on the Internet of Underwater Things. 11 - Giuseppe Vizzari
, Thomas Cecconello
:
Pedestrian Simulation with Reinforcement Learning: A Curriculum-Based Approach. 12 - Jiaxu Zhao, Binting Su, Xuli Rao, Zhide Chen:
A Cross-Platform Personalized Recommender System for Connecting E-Commerce and Social Network. 13 - Roberto de Fazio
, Vincenzo Mariano Mastronardi
, Matteo Petruzzi, Massimo de Vittorio, Paolo Visconti
:
Human-Machine Interaction through Advanced Haptic Sensors: A Piezoelectric Sensory Glove with Edge Machine Learning for Gesture and Object Recognition. 14 - Moreno La Quatra
, Luca Cagliero
:
BART-IT: An Efficient Sequence-to-Sequence Model for Italian Text Summarization. 15 - Qadri Hamarsheh, Omar Rawhi Daoud
, Mohammed Baniyounis, Ahlam Damati
:
Narrowband Internet-of-Things to Enhance the Vehicular Communications Performance. 16 - Yunchuan Liu
, Amir Ghasemkhani
, Lei Yang
:
Drifting Streaming Peaks-Over-Threshold-Enhanced Self-Evolving Neural Networks for Short-Term Wind Farm Generation Forecast. 17 - Annalisa Liccardo
, Francesco Bonavolontà
:
VR, AR, and 3-D User Interfaces for Measurement and Control. 18 - Sarantis Kalafatidis
, Sotiris Skaperas
, Vassilis Demiroglou
, Lefteris Mamatas
, Vassilis Tsaoussidis
:
Logically-Centralized SDN-Based NDN Strategies for Wireless Mesh Smart-City Networks. 19 - Maria A. Perifanou
, Anastasios A. Economides
, Stavros A. Nikou
:
Teachers' Views on Integrating Augmented Reality in Education: Needs, Opportunities, Challenges and Recommendations. 20 - Khando Khando, M. Sirajul Islam
, Shang Gao
:
The Emerging Technologies of Digital Payments and Associated Challenges: A Systematic Literature Review. 21 - Songtao Huang, Jun Shen
, Qingquan Lv, Qingguo Zhou, Binbin Yong:
A Novel NODE Approach Combined with LSTM for Short-Term Electricity Load Forecasting. 22 - Barbara Cardone
, Ferdinando Di Martino
, Vittorio Miraglia
:
A GIS-Based Hot and Cold Spots Detection Method by Extracting Emotions from Social Streams. 23 - Jinze Du
, Chengtai Gao
, Tao Feng
:
Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service. 24 - Qiang Li:
A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph. 25 - Teresa Gonçalves
, Rute Veladas, Hua Yang
, Renata Vieira
, Paulo Quaresma
, Paulo Infante
, Cátia Sousa Pinto, João Oliveira, Maria Cortes Ferreira, Jéssica Morais, Ana Raquel Pereira, Nuno Fernandes, Carolina Gonçalves:
Clinical Screening Prediction in the Portuguese National Health Service: Data Analysis, Machine Learning Models, Explainability and Meta-Evaluation. 26 - Emilio Matricciani
, Carlo Riva
:
Transfer Functions and Linear Distortions in Ultra-Wideband Channels Faded by Rain in GeoSurf Satellite Constellations. 27 - Katerina Kabassi
, Anastasia Papadaki, Athanasios Botonis:
Adapting Recommendations on Environmental Education Programs. 28 - Brent Pethers, Abubakar Bello:
Role of Attention and Design Cues for Influencing Cyber-Sextortion Using Social Engineering and Phishing Attacks. 29 - Ke Zhao, Rui Han, Xu Wang:
Time Segmentation-Based Hybrid Caching in 5G-ICN Bearer Network. 30 - Qingyan Zhou
, Hao Li, Youhua Zhang
, Junhong Zheng:
Product Evaluation Prediction Model Based on Multi-Level Deep Feature Fusion. 31 - Sandulika Abesinghe
, Nayomi Kankanamge
, Tan Yigitcanlar
, Surabhi Pancholi
:
Image of a City through Big Data Analytics: Colombo from the Lens of Geo-Coded Social Media Data. 32 - Leny Vinceslas
, Safak Dogan
, Srikumar Sundareshwar, Ahmet M. Kondoz:
Abstracting Data in Distributed Ledger Systems for Higher Level Analytics and Visualizations. 33 - Siyuan Yang
, Mondher Bouazizi
, Tomoaki Ohtsuki
, Yohei Shibata
, Wataru Takabatake, Kenji Hoshino, Atsushi Nagate:
Deep Reinforcement Learning Evolution Algorithm for Dynamic Antenna Control in Multi-Cell Configuration HAPS System. 34 - Shams Mhmood Abd Ali
, Mohd Najwadi Yusoff, Hasan Falah Hasan
:
Redactable Blockchain: Comprehensive Review, Mechanisms, Challenges, Open Issues and Future Research Directions. 35 - Sean Grimes
, David E. Breen
:
A Multi-Agent Approach to Binary Classification Using Swarm Intelligence. 36 - Sjouke de Vries, Frank J. Blaauw
, Vasilios Andrikopoulos
:
Cost-Profiling Microservice Applications Using an APM Stack. 37 - Geneci da Silva Ribeiro Rocha
, Diego Durante Mühl
, Hermenegildo Almeida Chingamba
, Leticia de Oliveira
, Edson Talamini
:
Blockchain, Quo Vadis? Recent Changes in Perspectives on the Application of Technology in Agribusiness. 38 - Neamah S. Radam
, Sufyan T. Faraj Al-Janabi
, Khalid Shaker:
Using Metaheuristics (SA-MCSDN) Optimized for Multi-Controller Placement in Software-Defined Networking. 39
Volume 15, Number 2, February 2023
- Future Internet Editorial Office:
Acknowledgment to the Reviewers of Future Internet in 2022. 40 - Wellington Lobato
, Paulo Mendes
, Denis Rosário
, Eduardo Cerqueira
, Leandro A. Villas
:
Redundancy Mitigation Mechanism for Collective Perception in Connected and Autonomous Vehicles. 41 - Paolo Bellavista
, Mattia Fogli
, Carlo Giannelli
, Cesare Stefanelli
:
Application-Aware Network Traffic Management in MEC-Integrated Industrial Environments. 42 - Theofanis P. Raptis
, Claudio Cicconetti
, Manolis Falelakis
, Grigorios Kalogiannis, Tassos Kanellos, Tomás Pariente Lobo
:
Engineering Resource-Efficient Data Management for Smart Cities with Apache Kafka. 43 - Husam M. Alawadh, Amerah A. Alabrah
, Talha Meraj
, Hafiz Tayyab Rauf
:
Attention-Enriched Mini-BERT Fake News Analyzer Using the Arabic Language. 44 - A. M. Sakura R. H. Attanayake
, R. M. Chandima Ratnayake
:
Digitalization of Distribution Transformer Failure Probability Using Weibull Approach towards Digital Transformation of Power Distribution Systems. 45 - Ganapathy Ramesh, Jaganathan Logeshwaran
, Thangavel Kiruthiga, Jaime Lloret
:
Prediction of Energy Production Level in Large PV Plants through AUTO-Encoder Based Neural-Network (AUTO-NN) with Restricted Boltzmann Feature Extraction. 46 - Zhaohui Huang, Vasilis Friderikos:
Optimal Mobility-Aware Wireless Edge Cloud Support for the Metaverse. 47 - Paolo Bocciarelli
, Andrea D'Ambrogio
:
A TOSCA-Based Conceptual Architecture to Support the Federation of Heterogeneous MSaaS Infrastructures. 48 - Mateusz Malarczyk
, Mateusz Zychlewicz
, Radoslaw Stanislawski
, Marcin Kaminski
:
Electric Drive with an Adaptive Controller and Wireless Communication System. 49 - Paolo Bocciarelli
, Andrea D'Ambrogio
, Tommaso Panetti:
A Model Based Framework for IoT-Aware Business Process Management. 50 - Pin Wu
, Lulu Ji
, Wenyan Yuan, Zhitao Liu, Tiantian Tang:
A Digital Twin Framework Embedded with POD and Neural Network for Flow Field Monitoring of Push-Plate Kiln. 51 - Pedro F. Durães, Mário P. Véstias
:
Smart Embedded System for Skin Cancer Classification. 52 - Eman AbuKhousa
, Mohamed Sami El-Tahawy
, Yacine Atif
:
Envisioning Architecture of Metaverse Intensive Learning Experience (MiLEx): Career Readiness in the 21st Century and Collective Intelligence Development Scenario. 53 - Mohammed El-hajj
, Hussien Mousawi, Ahmad Fadlallah
:
Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform. 54 - Leonardo Militano, Adriana Arteaga, Giovanni Toffetti
, Nathalie Mitton
:
The Cloud-to-Edge-to-IoT Continuum as an Enabler for Search and Rescue Operations. 55 - Yonghong Chen, Lei Xun, Shibing Zhang:
The Energy Efficiency of Heterogeneous Cellular Networks Based on the Poisson Hole Process. 56 - Maziar M. Nekovee
, Ferheen Ayaz
:
Vision, Enabling Technologies, and Scenarios for a 6G-Enabled Internet of Verticals (6G-IoV). 57 - Eduardo Ferreira
, Pedro Sebastião
, Francisco Cercas
, Carlos Sá Costa
, Américo Correia
:
An Optimized Planning Tool for Microwave Terrestrial and Satellite Link Design. 58 - Abderrahmane Maaradji
, Hakim Hacid, Assia Soukane:
From Service Composition to Mashup Editor: A Multiperspective Taxonomy. 59 - Evgeniy Mokrov
, Konstantin E. Samouylov
:
Performance Assessment and Comparison of Deployment Options for 5G Millimeter Wave Systems. 60 - Kuldoshbay Avazov, An Eui Hyun, Alabdulwahab Abrar Sami S
, Azizbek Khaitov, Akmalbek Bobomirzaevich Abdusalomov
, Young Im Cho
:
Forest Fire Detection and Notification Method Based on AI and IoT Approaches. 61 - Afnan Alotaibi, Murad A. Rassam
:
Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense. 62 - Eddy Truyen
, Hongjie Xie, Wouter Joosen:
Vendor-Agnostic Reconfiguration of Kubernetes Clusters in Cloud Federations. 63 - Nafi Ahmad
, Abdul Wahab
, John A. Schormans, Ali Adib Arnab:
Significance of Cross-Correlated QoS Configurations for Validating the Subjective and Objective QoE of Cloud Gaming Applications. 64 - Fan Liu
, Jiandong Fang
:
Multi-Scale Audio Spectrogram Transformer for Classroom Teaching Interaction Recognition. 65 - Dimitris Koryzis, Dionisis Margaris
, Costas Vassilakis
, Konstantinos Kotis
, Dimitris Spiliotopoulos
:
Disruptive Technologies for Parliaments: A Literature Review. 66 - Franco Bagnoli
, Guido de Bonfioli Cavalcabo'
:
A Simple Model of Knowledge Scaffolding Applied to Wikipedia Growth. 67 - Lu Han, Xiaohong Huang, Dandan Li, Yong Zhang:
RingFFL: A Ring-Architecture-Based Fair Federated Learning Framework. 68 - Marina Ricci
, Alessandra Scarcelli
, Michele Fiorentino
:
Designing for the Metaverse: A Multidisciplinary Laboratory in the Industrial Design Program. 69 - Swarnendu Ghosh
, Teresa Gonçalves
, Nibaran Das:
Im2Graph: A Weakly Supervised Approach for Generating Holistic Scene Graphs from Regional Dependencies. 70 - Christoph Stach
:
Data Is the New Oil-Sort of: A View on Why This Comparison Is Misleading and Its Implications for Modern Data Administration. 71 - Álvaro Antón-Sancho
, Pablo Fernández-Arias
, Diego Vergara
:
Perception of the Use of Virtual Reality Didactic Tools among Faculty in Mexico. 72 - Vitória Francesca Biasibetti Zilli
, César David Paredes Crovato
, Rodrigo da Rosa Righi
, Rodrigo Ivan Goytia Mejia
, Giovani Pesenti
, Dhananjay Singh
:
I4.0I: A New Way to Rank How Involved a Company Is in the Industry 4.0 Era. 73 - Yanxia Li, Yang Li:
Collaborative Storage and Resolution Method between Layers in Hierarchical ICN Name Resolution Systems. 74 - Soukaina Bouarourou
, Abderrahim Zannou, El Habib Nfaoui
, Abdelhak Boulaalam
:
An Efficient Model-Based Clustering via Joint Multiple Sink Placement for WSNs. 75 - Sheeraz Ahmed, Zahoor Ali Khan
, Syed Muhammad Mohsin
, Shahid Latif, Sheraz Aslam
, Hana Mujlid
, Muhammad Adil, Zeeshan Najam:
Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer Perceptron. 76 - Ronny Seiger
, Marco Franceschetti
, Barbara Weber
:
An Interactive Method for Detection of Process Activity Executions from IoT Data. 77 - Sachin Sharma
, Avishek Nag
:
Cognitive Software Defined Networking and Network Function Virtualization and Applications. 78 - Tahir Mehmood, Ivan Serina
, Alberto Lavelli
, Luca Putelli
, Alfonso Gerevini
:
On the Use of Knowledge Transfer Techniques for Biomedical Named Entity Recognition. 79 - Yong Xu, Hong Ni, Xiaoyong Zhu:
A Novel Multipath Transmission Scheme for Information-Centric Networking. 80 - Atik Kulakli
, Cenk Lacin Arikan
:
Research Trends of the Internet of Things in Relation to Business Model Innovation: Results from Co-Word and Content Analyses. 81 - Marta Flamini, Maurizio Naldi
:
Optimal Pricing in a Rented 5G Infrastructure Scenario with Sticky Customers. 82 - Tehseen Mazhar
, Hafiz Muhammad Irfan, Sunawar Khan, Inayatul Haq
, Inam Ullah, Muhammad Iqbal, Habib Hamam
:
Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods. 83 - Shadi AlZu'bi
, Mohammad W. Elbes, Ala Mughaid
, Noor Bdair, Laith Abualigah
, Agostino Forestiero
, Raed Abu Zitar
:
Diabetes Monitoring System in Smart Health Cities Based on Big Data Intelligence. 85
Volume 15, Number 3, March 2023
- Waheed Ali H. M. Ghanem, Waseem Akram
, Saif ul Islam
, Abdul Hadi, Jalil Boudjadar
, Noureen Zafar
:
A Mobile-Based System for Detecting Ginger Leaf Disorders Using Deep Learning. 86 - Leina Abdelgalil
, Mohamed Mejri
:
HealthBlock: A Framework for a Collaborative Sharing of Electronic Health Records Based on Blockchain. 87 - Yibrah Gebreyesus, Damian Dalton, Sebastian Nixon, Davide De Chiara, Marta Chinnici
:
Machine Learning for Data Center Optimizations: Feature Selection Using Shapley Additive exPlanation (SHAP). 88 - Sheng-Ming Wang, Wei-Min Cheng:
Fast Way to Predict Parking Lots Availability: For Shared Parking Lots Based on Dynamic Parking Fee System. 89 - Yusuf Kirikkayis
, Florian Gallik
, Michael Winter
, Manfred Reichert
:
BPMNE4IoT: A Framework for Modeling, Executing and Monitoring IoT-Driven Processes. 90 - Gerhard Hasslinger, Konstantinos Ntougias, Frank Hasslinger, Oliver Hohlfeld:
Scope and Accuracy of Analytic and Approximate Results for FIFO, Clock-Based and LRU Caching Performance. 91 - Jingsha He
, Yue Li, Nafei Zhu:
A Game Theory-Based Model for the Dissemination of Privacy Information in Online Social Networks. 92 - Lili Jiang
, Vicenç Torra
:
Data Protection and Multi-Database Data-Driven Models. 93 - Raihan Ur Rasool
, Hafiz Farooq Ahmad
, Wajid Rafique
, Adnan Qayyum, Junaid Qadir
, Zahid Anwar
:
Quantum Computing for Healthcare: A Review. 94 - Davide Berardi
, Franco Callegati
, Andrea Giovine
, Andrea Melis
, Marco Prandini
, Lorenzo Rinieri
:
When Operation Technology Meets Information Technology: Challenges and Opportunities. 95 - Raman Singh
, Sean Sturley
, Hitesh Tewari
:
Blockchain-Enabled Chebyshev Polynomial-Based Group Authentication for Secure Communication in an Internet of Things Network. 96 - Rameez Asif
, Syed Raheel Hassan
, Gerard Parr:
Integrating a Blockchain-Based Governance Framework for Responsible AI. 97 - Denis Rangelov, Philipp Lämmel
, Lisa Brunzel, Stephan Borgert, Paul L. Darius, Nikolay Tcholtchev
, Michell Boerger
:
Towards an Integrated Methodology and Toolchain for Machine Learning-Based Intrusion Detection in Urban IoT Networks and Platforms. 98 - Oluwakemi Christiana Abikoye
, Esau Taiwo Oladipupo, Agbotiname Lucky Imoize
, Joseph Bamidele Awotunde
, Cheng-Chi Lee
, Chun-Ta Li
:
Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme. 99 - Konstantinos Ntafloukas
, Liliana Pasquale, Beatriz Martinez-Pastor, Daniel P. McCrum
:
A Vulnerability Assessment Approach for Transportation Networks Subjected to Cyber-Physical Attacks. 100 - Haoming Liang
, Jinze Du, Hongchen Zhang, Bing Han, Yan Ma:
Relational Action Bank with Semantic-Visual Attention for Few-Shot Action Recognition. 101 - Juan Wang, Jing Zhong
, Jiangqi Li:
IoT-Portrait: Automatically Identifying IoT Devices via Transformer with Incremental Learning. 102 - Ganjar Alfian
, Muhammad Syafrudin
, Norma Latif Fitriyani
, Sahirul Alam, Dinar Nugroho Pratomo, Lukman Subekti, Muhammad Qois Huzyan Octava
, Ninis Dyah Yulianingsih, Fransiskus Tatas Dwi Atmaji
, Filip Benes
:
Utilizing Random Forest with iForest-Based Outlier Detection and SMOTE to Detect Movement and Direction of RFID Tags. 103 - Mansoor Iqbal, Zahid Ullah
, Izaz Ahmad Khan
, Sheraz Aslam
, Haris Shaheer, Mujtaba Humayon, Muhammad Asjad Salahuddin, Adeel Mehmood:
Optimizing Task Execution: The Impact of Dynamic Time Quantum and Priorities on Round Robin Scheduling. 104 - Daniel Andrade, Roberto Magueta, Adão Silva
, Paulo Marques:
Beamforming Based on a SSS Angle Estimation Algorithm for 5G NR Networks. 105 - Hasna Boumechaal, Zizette Boufaïda:
Complex Queries for Querying Linked Data. 106 - Frantisek Capkovic:
Dealing with Deadlocks in Industrial Multi Agent Systems. 107 - Habiba Sultana
, A. H. M. Kamal, Gahangir Hossain
, Muhammad Ashad Kabir
:
A Novel Hybrid Edge Detection and LBP Code-Based Robust Image Steganography Method. 108 - Juergen Mangler
, Joscha Grüger
, Lukas Malburg
, Matthias Ehrendorfer
, Yannis Bertrand
, Janik-Vasily Benzin
, Stefanie Rinderle-Ma
, Estefanía Serral Asensio
, Ralph Bergmann
:
DataStream XES Extension: Embedding IoT Sensor Data into Extensible Event Stream Logs. 109 - Zixiu Wu
, Simone Balloccu
, Vivek Kumar
, Rim Helaoui
, Diego Reforgiato Recupero
, Daniele Riboni
:
Creation, Analysis and Evaluation of AnnoMI, a Dataset of Expert-Annotated Counselling Dialogues. 110 - Ruhi Bajaj
, Rebecca Meiring
, Fernando Beltrán:
Co-Design, Development, and Evaluation of a Health Monitoring Tool Using Smartwatch Data: A Proof-of-Concept Study. 111 - Karen Schnell, Kaushik Roy, Madhuri Siddula
:
A Descriptive Study of Webpage Designs for Posting Privacy Policies for Different-Sized US Hospitals to Create an Assessment Framework. 112 - Gemma Di Federico
, Andrea Burattin
:
CvAMoS - Event Abstraction Using Contextual Information. 113 - Qi Shi
, Daheng Wang, Wen Chen, Jinpei Yu, Weiting Zhou, Jun Zou
, Guangzu Liu:
Research on Spaceborne Target Detection Based on Yolov5 and Image Compression. 114 - Salvatore Serrano
, Marco Scarpa
:
A Petri Net Model for Cognitive Radio Internet of Things Networks Exploiting GSM Bands. 115 - Muhammad Emad-Ud-Din
, Ya Wang:
Indoor Occupancy Sensing via Networked Nodes (2012-2022): A Review. 116