Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 13, Issue 4

2021 April - 20 articles

Cover Story: The paper presents a two-layer overlay network caching system for content distribution in network edges. It is used to define some caching scenarios with increasing complexity which refer to real situations, including mobile 5G connectivity. For each scenario, the maximization of the hit ratio leads to the formulation of NP-complete optimization problems. The proposed heuristic solutions are based on the theory of the maximization of monotone submodular functions under matroid constraints. After determining the approximation ratio of the greedy heuristic algorithms, a numerical performance analysis is presented. This analysis includes a comparison with the LFU eviction strategy adapted to the analyzed systems. Results show very good performance under the hypotheses of either known or unknown popularity of contents. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (20)

  • Article
  • Open Access
6 Citations
3,456 Views
15 Pages

Pervasive Intelligent Models to Predict the Outcome of COVID-19 Patients

  • Ana Teresa Ferreira,
  • Carlos Fernandes,
  • José Vieira and
  • Filipe Portela

20 April 2021

Nowadays, there is an increasing need to understand the behavior of COVID-19. After the Directorate-General of Health of Portugal made available the infected patient’s data, it became possible to analyze it and gather some conclusions, obtaining a be...

  • Article
  • Open Access
10 Citations
6,257 Views
21 Pages

Coronary Centerline Extraction from CCTA Using 3D-UNet

  • Alexandru Dorobanțiu,
  • Valentin Ogrean and
  • Remus Brad

19 April 2021

The mesh-type coronary model, obtained from three-dimensional reconstruction using the sequence of images produced by computed tomography (CT), can be used to obtain useful diagnostic information, such as extracting the projection of the lumen (plana...

  • Article
  • Open Access
18 Citations
5,056 Views
16 Pages

14 April 2021

Phubbing, or using a phone to snub another person, has been investigated through social and personality frameworks. Phubbing involves attending to and performing competing tasks, implying the involvement of attentional abilities. Yet, past research h...

  • Article
  • Open Access
26 Citations
8,977 Views
15 Pages

Implementation of a Virtual Assistant for the Academic Management of a University with the Use of Artificial Intelligence

  • William Villegas-Ch,
  • Joselin García-Ortiz,
  • Karen Mullo-Ca,
  • Santiago Sánchez-Viteri and
  • Milton Roman-Cañizares

Currently, private universities, as a result of the pandemic that the world is facing, are going through very delicate moments in several areas, both academic and financial. Academically, there are learning problems and these are directly related to...

  • Article
  • Open Access
3 Citations
3,842 Views
19 Pages

Universities and high schools constantly research and develop educational methods to improve the student learning process. This paper presents a novel educational methodology for students to obtain better learning results in Spanish grammar through a...

  • Review
  • Open Access
16 Citations
6,426 Views
18 Pages

ICT in Rural Areas from the Perspective of Dairy Farming: A Systematic Review

  • Alba Vázquez-López,
  • Martín Barrasa-Rioja and
  • Manuel Marey-Perez

This study presents a systematic review of 169 papers concerning the ICT (Information and Communication Technologies) related to rural areas, specifically to dairy farms. The objective was to delve into the relationship between dairy farmers and the...

  • Review
  • Open Access
54 Citations
8,673 Views
22 Pages

Security Challenges of Location Privacy in VANETs and State-of-the-Art Solutions: A Survey

  • Shawal Khan,
  • Ishita Sharma,
  • Mazzamal Aslam,
  • Muhammad Zahid Khan and
  • Shahzad Khan

A Vehicular Ad-hoc Network (VANET) comprises a group of moving or stationary vehicles connected by a wireless network. VANETs play a vital role in providing safety and comfort to drivers in vehicular environments. They provide smart traffic control a...

  • Article
  • Open Access
343 Citations
28,328 Views
20 Pages

Privacy protection has been an important concern with the great success of machine learning. In this paper, it proposes a multi-party privacy preserving machine learning framework, named PFMLP, based on partially homomorphic encryption and federated...

  • Review
  • Open Access
67 Citations
10,172 Views
16 Pages

Blockchain Applications in Agribusiness: A Systematic Review

  • Geneci da Silva Ribeiro Rocha,
  • Letícia de Oliveira and
  • Edson Talamini

Blockchain is a technology that can be applied in different sectors to solve various problems. As a complex system, agribusiness presents many possibilities to take advantage of blockchain technology. The main goal of this paper is to identify the pu...

  • Article
  • Open Access
59 Citations
21,408 Views
19 Pages

iCaps-Dfake: An Integrated Capsule-Based Model for Deepfake Image and Video Detection

  • Samar Samir Khalil,
  • Sherin M. Youssef and
  • Sherine Nagy Saleh

Fake media is spreading like wildfire all over the internet as a result of the great advancement in deepfake creation tools and the huge interest researchers and corporations are showing to explore its limits. Now anyone can create manipulated unethi...

  • Review
  • Open Access
20 Citations
4,835 Views
23 Pages

This paper deals with innovative fruition modalities of cultural heritage sites. Based on two ongoing experiments, four pillars are considered, that is, User Localization, Multimodal Interaction, User Understanding and Gamification. A survey of the e...

  • Article
  • Open Access
83 Citations
11,596 Views
17 Pages

Characterization of the Teaching Profile within the Framework of Education 4.0

  • María Soledad Ramírez-Montoya,
  • María Isabel Loaiza-Aguirre,
  • Alexandra Zúñiga-Ojeda and
  • May Portuguez-Castro

The authors of the Education 4.0 concept postulated a flexible combination of digital literacy, critical thinking, and problem-solving in educational environments linked to real-world scenarios. Therefore, teachers have been challenged to develop new...

  • Article
  • Open Access
6 Citations
3,991 Views
21 Pages

Community detection plays an essential role in understanding network topology and mining underlying information. A bipartite network is a complex network with more important authenticity and applicability than a one-mode network in the real world. Th...

  • Article
  • Open Access
32 Citations
4,937 Views
18 Pages

A Parallelized Database Damage Assessment Approach after Cyberattack for Healthcare Systems

  • Sanaa Kaddoura,
  • Ramzi A. Haraty,
  • Karam Al Kontar and
  • Omar Alfandi

In the current Internet of things era, all companies shifted from paper-based data to the electronic format. Although this shift increased the efficiency of data processing, it has security drawbacks. Healthcare databases are a precious target for at...

  • Article
  • Open Access
11 Citations
3,673 Views
17 Pages

Research on the Impacts of Generalized Preceding Vehicle Information on Traffic Flow in V2X Environment

  • Xiaoyuan Wang,
  • Junyan Han,
  • Chenglin Bai,
  • Huili Shi,
  • Jinglei Zhang and
  • Gang Wang

With the application of vehicles to everything (V2X) technologies, drivers can obtain massive traffic information and adjust their car-following behavior according to the information. The macro-characteristics of traffic flow are essentially the over...

  • Article
  • Open Access
53 Citations
12,440 Views
26 Pages

Existing product anti-counterfeiting and traceability solutions across today’s internationally spanning supply chain networks are indeed developed and implemented with centralized system architecture relying on centralized authorities or intermediari...

  • Article
  • Open Access
11 Citations
3,159 Views
13 Pages

Performance Analysis of Internet of Things Interactions via Simulation-Based Queueing Models

  • Georgios Bouloukakis,
  • Ioannis Moscholios,
  • Nikolaos Georgantas and
  • Valérie Issarny

Numerous middleware application programming interfaces (APIs) and protocols were introduced in the literature in order to facilitate the application development of the Internet of Things (IoT). Such applications are built on reliable or even unreliab...

  • Article
  • Open Access
5 Citations
3,573 Views
31 Pages

Network caching is a technique used to speed-up user access to frequently requested contents in complex data networks. This paper presents a two-layer overlay network caching system for content distribution. It is used to define some caching scenario...

  • Article
  • Open Access
41 Citations
10,006 Views
33 Pages

An interesting research problem in the supply chain industry is evaluating and determining the provenance of physical goods—demonstrating the authenticity of luxury goods such as bottled wine. However, many supply chain systems and networks have been...

  • Article
  • Open Access
7 Citations
3,961 Views
12 Pages

Simulating and Evaluating a Real-World ElasticSearch System Using the RECAP DES Simulator

  • Malika Bendechache,
  • Sergej Svorobej,
  • Patricia Takako Endo,
  • Adrian Mihai and
  • Theo Lynn

Simulation has become an indispensable technique for modelling and evaluating the performance of large-scale systems efficiently and at a relatively low cost. ElasticSearch (ES) is one of the most popular open source large-scale distributed data inde...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903