Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 11, Issue 9

2019 September - 22 articles

Cover Story: In this study, we present an RFID-based food management system. Our system represents a novel cataloging approach in which users have real-time information of all the food they have both in their refrigerator and storeroom. Food information—such as the nutritional information or expiration date—is automatically read using RFID technology. This information can later be consulted using the multiplatform web application RFM App. We believe this tool will be very useful for users to comprehensively monitor the food products available at their home. The application notifies the user when a product is about to expire and suggests recipes that might be prepared with the available foods, in order to reduce the waste of food in our daily life, which represents our overall goal. We also aim help users control the quantity of consumed calories, thus enabling them to lead a healthy lifestyle. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (22)

  • Article
  • Open Access
60 Citations
16,769 Views
21 Pages

Ranking by Relevance and Citation Counts, a Comparative Study: Google Scholar, Microsoft Academic, WoS and Scopus

  • Cristòfol Rovira,
  • Lluís Codina,
  • Frederic Guerrero-Solé and
  • Carlos Lopezosa

19 September 2019

Search engine optimization (SEO) constitutes the set of methods designed to increase the visibility of, and the number of visits to, a web page by means of its ranking on the search engine results pages. Recently, SEO has also been applied to academi...

  • Article
  • Open Access
2 Citations
3,587 Views
13 Pages

19 September 2019

The rapid growth of the ITS (intelligent transport system) development requires us to realize new kinds of applications, such as the winter road surveillance system. However, it is still necessary to consider the network difficulty areas for LTE (lon...

  • Article
  • Open Access
7 Citations
3,656 Views
13 Pages

19 September 2019

Based on Web 2.0 technology, more and more people tend to express their attitude or opinions on the Internet. Radical ideas, rumors, terrorism, or violent contents are also propagated on the Internet, causing several incidents of social panic every y...

  • Article
  • Open Access
5 Citations
4,436 Views
21 Pages

19 September 2019

Role-based access control (RBAC), which has been regarded as one of the most popular access-control mechanisms, is featured by the separation-of-duty constraints, mutually exclusive constraints, and the least-privileges principle. Role mining, a bott...

  • Article
  • Open Access
27 Citations
6,882 Views
19 Pages

Enhancing the 3GPP V2X Architecture with Information-Centric Networking

  • Marica Amadeo,
  • Claudia Campolo,
  • Antonella Molinaro,
  • Jerome Harri,
  • Christian Esteve Rothenberg and
  • Alexey Vinel

18 September 2019

Vehicle-to-everything (V2X) communications allow a vehicle to interact with other vehicles and with communication parties in its vicinity (e.g., road-side units, pedestrian users, etc.) with the primary goal of making the driving and traveling experi...

  • Article
  • Open Access
13 Citations
4,287 Views
15 Pages

Dynamic Group Recommendation Based on the Attention Mechanism

  • Haiyan Xu,
  • Yanhui Ding,
  • Jing Sun,
  • Kun Zhao and
  • Yuanjian Chen

17 September 2019

Group recommendation has attracted significant research efforts for its importance in benefiting group members. The purpose of group recommendation is to provide recommendations to group users, such as recommending a movie to several friends. Group r...

  • Article
  • Open Access
16 Citations
6,047 Views
25 Pages

MU R-CNN: A Two-Dimensional Code Instance Segmentation Network Based on Deep Learning

  • Baoxi Yuan,
  • Yang Li,
  • Fan Jiang,
  • Xiaojie Xu,
  • Yingxia Guo,
  • Jianhua Zhao,
  • Deyue Zhang,
  • Jianxin Guo and
  • Xiaoli Shen

13 September 2019

In the context of Industry 4.0, the most popular way to identify and track objects is to add tags, and currently most companies still use cheap quick response (QR) tags, which can be positioned by computer vision (CV) technology. In CV, instance segm...

  • Article
  • Open Access
12 Citations
5,597 Views
21 Pages

Evaluating the Degree of Uncertainty of Research Activities in Industry 4.0

  • Sirio Cividino,
  • Gianluca Egidi,
  • Ilaria Zambon and
  • Andrea Colantoni

11 September 2019

Research and development (R&D) are always oriented towards new discoveries, based on original terms or hypotheses, and their concluding outcomes are often uncertain. The present work focused on the degree of uncertainty for R&D activities. In...

  • Article
  • Open Access
13 Citations
14,725 Views
21 Pages

10 September 2019

Many companies are adapting cloud computing technology because moving to the cloud has an array of benefits. During decision-making, having processed for adopting cloud computing, the importance of risk management is progressively recognized. However...

  • Feature Paper
  • Article
  • Open Access
60 Citations
20,004 Views
24 Pages

25 Years of Bluetooth Technology

  • Sherali Zeadally,
  • Farhan Siddiqui and
  • Zubair Baig

9 September 2019

Bluetooth technology started off as a wireless, short-range cable replacement technology but it has undergone significant developments over the last two decades. Bluetooth radios are currently embedded in almost all computing devices including person...

  • Article
  • Open Access
25 Citations
8,285 Views
17 Pages

Satellite Integration into 5G: Accent on First Over-The-Air Tests of an Edge Node Concept with Integrated Satellite Backhaul

  • Florian Völk,
  • Konstantinos Liolis,
  • Marius Corici,
  • Joe Cahill,
  • Robert T. Schwarz,
  • Thomas Schlichter,
  • Eric Troudt and
  • Andreas Knopp

5 September 2019

The 5G vision embraces a broad range of applications including the connectivity in underserved and remote areas. In particular, for these applications, satellites are going to play a role in future 5G networks to provide capacity on trains, vessels,...

  • Comment
  • Open Access
1 Citations
3,459 Views
3 Pages

4 September 2019

In light of the recent work by Kim and colleagues about Social Network Service (SNS), examining the individual and SNS characteristics as predictors of SNS fatigue, we hypothesize to enlarge their model to the job context. SNS is a relevant issue in...

  • Article
  • Open Access
13 Citations
4,721 Views
19 Pages

A Framework for the Detection of Search and Rescue Patterns Using Shapelet Classification

  • Konstantinos Kapadais,
  • Iraklis Varlamis,
  • Christos Sardianos and
  • Konstantinos Tserpes

4 September 2019

The problem of unmanned supervision of maritime areas has attracted the interest of researchers for the last few years, mainly thanks to the advances in vessel monitoring that the Automatic Identification System (AIS) has brought. Several frameworks...

  • Article
  • Open Access
17 Citations
5,711 Views
13 Pages

2 September 2019

Emotions detection in social media is very effective to measure the mood of people about a specific topic, news, or product. It has a wide range of applications, including identifying psychological conditions such as anxiety or depression in users. H...

  • Article
  • Open Access
4 Citations
5,972 Views
16 Pages

RFID Based Embedded System for Sustainable Food Management in an IoT Network Paradigm

  • Raúl Parada,
  • Alfonso Palazón,
  • Carlos Monzo and
  • Joan Melià-Seguí

1 September 2019

A third of the food produced in the world ends up in the rubbish, enough to put an end to world hunger. On the other hand, society is increasingly concerned to bring healthy eating habits. A RFID (radio frequency identification) food management syste...

  • Feature Paper
  • Article
  • Open Access
18 Citations
8,510 Views
13 Pages

SEO Practices: A Study about the Way News Websites Allow the Users to Comment on Their News Articles

  • Minos-Athanasios Karyotakis,
  • Evangelos Lamprou,
  • Matina Kiourexidou and
  • Nikos Antonopoulos

30 August 2019

In the current media world, there is a huge debate about the importance of the visibility of a news website in order to secure its existence. Thus, search engine optimization (SEO) practices have emerged in the news media systems around the world. Th...

  • Article
  • Open Access
2 Citations
4,417 Views
18 Pages

Research on SWIM Services Dynamic Migration Method

  • Zhijun Wu,
  • Shengyan Zhou,
  • Liang Liu and
  • Jin Lei

27 August 2019

Air traffic management (ATM) plays an important role in maintaining and promoting air traffic safety, maintaining air traffic order and ensuring smooth air traffic. As the core of air traffic management, it is essential to ensure the safe and stable...

  • Article
  • Open Access
5 Citations
3,991 Views
15 Pages

26 August 2019

Named Entity Recognition (NER) on Clinical Electronic Medical Records (CEMR) is a fundamental step in extracting disease knowledge by identifying specific entity terms such as diseases, symptoms, etc. However, the state-of-the-art NER methods based o...

  • Article
  • Open Access
4 Citations
4,774 Views
14 Pages

26 August 2019

The need for smart and sustainable communication systems has led to the development of mobile communication networks. In turn, the vast functionalities of the global system of mobile communication (GSM) have resulted in a growing number of subscriber...

  • Article
  • Open Access
10 Citations
5,397 Views
17 Pages

Mobility-Enabled Edge Server Selection for Multi-User Composite Services

  • Wenming Zhang,
  • Yiwen Zhang,
  • Qilin Wu and
  • Kai Peng

25 August 2019

In mobile edge computing, a set of edge servers is geographically deployed near the mobile users such that accessible computing capacities and services can be provided to users with low latency. Due to user’s mobility, one fundamental and criti...

  • Article
  • Open Access
4 Citations
4,395 Views
21 Pages

A Proof-of-Concept Demonstration of Isolated and Encrypted Service Function Chains

  • Håkon Gunleifsen,
  • Thomas Kemmerich and
  • Vasileios Gkioulos

24 August 2019

Contemporary Service Function Chaining (SFC), and the requirements arising from privacy concerns, call for the increasing integration of security features such as encryption and isolation across Network Function Virtualisation (NFV) domains. Therefor...

  • Article
  • Open Access
13 Citations
5,594 Views
23 Pages

An Ontology-Based Recommender System with an Application to the Star Trek Television Franchise

  • Paul Sheridan,
  • Mikael Onsjö,
  • Claudia Becerra,
  • Sergio Jimenez and
  • George Dueñas

22 August 2019

Collaborative filtering based recommender systems have proven to be extremely successful in settings where user preference data on items is abundant. However, collaborative filtering algorithms are hindered by their weakness against the item cold-sta...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903