Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 14, Issue 10

2022 October - 32 articles

Cover Story: Wi-Fi 6 promises to provide data rates of up to almost 10 Gb/s, lower energy consumption, and higher reliability. The Wi-Fi 6 standard includes OFDMA, Spatial Reuse, Target Wake Time, MU MIMO, more efficient modulations, and the new 6 GHz band. These features increase transmission capacity, allow for explicit resource assignment, facilitate resource sharing in dense networks, and improve power saving, which is of particular interest in the IoT. This paper provides a compact technological summary of Wi-Fi 5 and its predecessors, and also provides an overview of the novel features of Wi-Fi-6, including their targeted application domains. Subsequently, these features are explained in detail and related work is reviewed. Finally, performance evaluation tools for Wi-Fi 6 and future roadmaps are discussed. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (32)

  • Article
  • Open Access
28 Citations
3,719 Views
15 Pages

A Hybrid Deep Learning Model with Self-Improved Optimization Algorithm for Detection of Security Attacks in IoT Environment

  • Amit Sagu,
  • Nasib Singh Gill,
  • Preeti Gulia,
  • Jyotir Moy Chatterjee and
  • Ishaani Priyadarshini

19 October 2022

With the growth of the Internet of Things (IoT), security attacks are also rising gradually. Numerous centralized mechanisms have been introduced in the recent past for the detection of attacks in IoT, in which an attack recognition scheme is employe...

  • Article
  • Open Access
5 Citations
3,145 Views
23 Pages

Towards Reliable Baselines for Document-Level Sentiment Analysis in the Czech and Slovak Languages

  • Ján Mojžiš,
  • Peter Krammer,
  • Marcel Kvassay,
  • Lenka Skovajsová and
  • Ladislav Hluchý

19 October 2022

This article helps establish reliable baselines for document-level sentiment analysis in highly inflected languages like Czech and Slovak. We revisit an earlier study representing the first comprehensive formulation of such baselines in Czech and sho...

  • Article
  • Open Access
10 Citations
6,432 Views
16 Pages

18 October 2022

The Network Slicing (NS) technology, recognized as one of the key enabling features of Fifth Generation (5G) wireless systems, provides very flexible ways to efficiently accommodate common physical infrastructures, e.g., Base Station (BS), multiple l...

  • Article
  • Open Access
7 Citations
3,148 Views
12 Pages

A Unified PUF and Crypto Core Exploiting the Metastability in Latches

  • Ronaldo Serrano,
  • Ckristian Duran,
  • Marco Sarmiento,
  • Tuan-Kiet Dang,
  • Trong-Thuc Hoang and
  • Cong-Kha Pham

17 October 2022

Hardware acceleration of cryptography algorithms represents an emerging approach to obtain benefits in terms of speed and side-channel resistance compared to software implementations. In addition, a hardware implementation can provide the possibility...

  • Article
  • Open Access
3 Citations
3,006 Views
16 Pages

Improved Dragonfly Optimization Algorithm for Detecting IoT Outlier Sensors

  • Maytham N. Meqdad,
  • Seifedine Kadry and
  • Hafiz Tayyab Rauf

17 October 2022

Things receive digital intelligence by being connected to the Internet and by adding sensors. With the use of real-time data and this intelligence, things may communicate with one another autonomously. The environment surrounding us will become more...

  • Article
  • Open Access
8 Citations
3,464 Views
14 Pages

Smart Preliminary Channel Access to Support Real-Time Traffic in Wi-Fi Networks

  • Kirill Chemrov,
  • Dmitry Bankov,
  • Evgeny Khorov and
  • Andrey Lyakhov

16 October 2022

Real-time applications (RTA) are an important use case for IEEE 802.11be, a new amendment to the Wi-Fi standard. This amendment introduces new complicated mechanisms to provide low delay and high reliability for RTA, but many of them are not supporte...

  • Article
  • Open Access
21 Citations
5,061 Views
20 Pages

Study of the Organization and Implementation of E-Learning in Wartime Inside Ukraine

  • Liudmyla Matviichuk,
  • Stefano Ferilli and
  • Nataliia Hnedko

15 October 2022

The article provides a factual foundation for the possibility of organizing and implementing e-learning in Ukrainian higher educational institutions during the war. The current research topicality is supported by the urgent need for training experien...

  • Article
  • Open Access
30 Citations
9,748 Views
21 Pages

A Comparative Study on Traffic Modeling Techniques for Predicting and Simulating Traffic Behavior

  • Taghreed Alghamdi,
  • Sifatul Mostafi,
  • Ghadeer Abdelkader and
  • Khalid Elgazzar

15 October 2022

The significant advancements in intelligent transportation systems (ITS) have contributed to the increased development in traffic modeling. These advancements include prediction and simulation models that are used to simulate and predict traffic beha...

  • Article
  • Open Access
78 Citations
33,330 Views
52 Pages

A Survey of Wi-Fi 6: Technologies, Advances, and Challenges

  • Erfan Mozaffariahrar,
  • Fabrice Theoleyre and
  • Michael Menth

14 October 2022

Wi-Fi is a popular wireless technology and is continuously extended to keep pace with requirements such as high throughput, real-time communication, dense networks, or resource and energy efficiency. The IEEE 802.11ax standard, also known as Wi-Fi 6,...

  • Article
  • Open Access
7 Citations
4,112 Views
28 Pages

Experimenting with Routing Protocols in the Data Center: An ns-3 Simulation Approach

  • Leonardo Alberro,
  • Felipe Velázquez,
  • Sara Azpiroz,
  • Eduardo Grampin and
  • Matías Richart

14 October 2022

Massive scale data centers (MSDC) have become a key component of current content-centric Internet architecture. With scales of up to hundreds of thousands servers, conveying traffic inside these infrastructures requires much greater connectivity reso...

  • Article
  • Open Access
10 Citations
3,898 Views
18 Pages

12 October 2022

The ability to spot key ideas, trends, and relationships between them in documents is key to financial services, such as banks and insurers. Identifying patterns across vast amounts of domain-specific reports is crucial for devising efficient and tar...

  • Article
  • Open Access
2 Citations
4,077 Views
34 Pages

12 October 2022

Decentralized networks bring us many benefits, but as networks evolve, many nodes either actively or passively become unreachable behind an NAT or a firewall. This has become a hindrance to the development of decentralized networks, where peer-to-pee...

  • Article
  • Open Access
12 Citations
3,747 Views
16 Pages

10 October 2022

The identification of Internet protocols provides a significant basis for keeping Internet security and improving Internet Quality of Service (QoS). However, the overwhelming developments and updating of Internet technologies and protocols have led t...

  • Article
  • Open Access
3,120 Views
13 Pages

Playful Meaning-Making as Prosocial Fun

  • John M. Carroll,
  • Fanlu Gui,
  • Srishti Gupta and
  • Tiffany Knearem

30 September 2022

Smart city infrastructures enable the routine interleaving and integration of diverse activities, including new ways to play, to be playful, and to participate. We discuss three examples: (1) citizen-based water quality monitoring, which combines out...

  • Article
  • Open Access
5 Citations
3,965 Views
20 Pages

Complex Cases of Source Code Authorship Identification Using a Hybrid Deep Neural Network

  • Anna Kurtukova,
  • Aleksandr Romanov,
  • Alexander Shelupanov and
  • Anastasia Fedotova

30 September 2022

This paper is a continuation of our previous work on solving source code authorship identification problems. The analysis of heterogeneous source code is a relevant issue for copyright protection in commercial software development. This is related to...

  • Article
  • Open Access
1 Citations
1,965 Views
11 Pages

Minimization of nth Order Rate Matching in Satellite Networks with One to Many Pairings

  • Anargyros J. Roumeliotis,
  • Christos N. Efrem and
  • Athanasios D. Panagopoulos

30 September 2022

This paper studies the minimization of nth (positive integer) order rate matching in high-throughput multi-beam satellite systems, based on one-to-many capacity allocation pairings, for the first time in the literature. The offered and requested capa...

  • Article
  • Open Access
6 Citations
3,993 Views
12 Pages

An Efficient Location-Based Forwarding Strategy for Named Data Networking and LEO Satellite Communications

  • Pablo Iglesias-Sanuy,
  • José Carlos López-Ardao,
  • Miguel Rodríguez-Pérez,
  • Sergio Herrería-Alonso,
  • Andrés Suárez-González and
  • Raúl F. Rodríguez-Rubio

29 September 2022

Low Earth orbit (LEO) satellite constellations are increasingly gaining attention as future global Internet providers. At the same time, named data networking (NDN) is a new data-centric architecture that has been recently proposed to replace the cla...

  • Article
  • Open Access
8 Citations
4,537 Views
21 Pages

29 September 2022

News recommending systems (NRSs) are algorithmic tools that filter incoming streams of information according to the users’ preferences or point them to additional items of interest. In today’s high-choice media environment, attention shif...

  • Article
  • Open Access
8 Citations
4,861 Views
24 Pages

29 September 2022

Misinformation posting and spreading in social media is ignited by personal decisions on the truthfulness of news that may cause wide and deep cascades at a large scale in a fraction of minutes. When individuals are exposed to information, they usual...

  • Article
  • Open Access
10 Citations
4,454 Views
13 Pages

Latency Analysis of Blockchain-Based SSI Applications

  • Tamas Pflanzner,
  • Hamza Baniata and
  • Attila Kertesz

29 September 2022

Several revolutionary applications have been built on the distributed ledgers of blockchain (BC) technology. Besides cryptocurrencies, many other application fields can be found in smart systems exploiting smart contracts and Self Sovereign Identity...

  • Article
  • Open Access
10 Citations
2,987 Views
13 Pages

29 September 2022

The Internet of things (IoT) points to billions of devices located worldwide which are connected and share their data based on the Internet. Due to the new technologies that provide cheap computer chips and universal wireless networks, it is feasible...

  • Article
  • Open Access
7 Citations
2,946 Views
17 Pages

Information Technologies for Real-Time Mapping of Human Well-Being Indicators in an Urban Historical Garden

  • Francesco Pirotti,
  • Marco Piragnolo,
  • Marika D’Agostini and
  • Raffaele Cavalli

29 September 2022

The post-pandemic era has raised awareness on the importance of physical and psychological well-being for decreasing the vulnerability of both individuals and populations. Citizens in urban areas are subject to numerous stress factors which can be mi...

  • Article
  • Open Access
6 Citations
3,221 Views
20 Pages

ReFuse: Generating Imperviousness Maps from Multi-Spectral Sentinel-2 Satellite Imagery

  • Giovanni Giacco,
  • Stefano Marrone,
  • Giuliano Langella and
  • Carlo Sansone

28 September 2022

Continual mapping and monitoring of impervious surfaces are crucial activities to support sustainable urban management strategies and to plan effective actions for environmental changes. In this context, impervious surface coverage is increasingly be...

  • Article
  • Open Access
1 Citations
2,734 Views
16 Pages

28 September 2022

To solve the conflict when multi-user packets are transmitted in a shared wireless link, a novel frameless slotted-ALOHA protocol is proposed. Signature codes are used to help the receiver identify the set of transmitting users, and successive interf...

  • Article
  • Open Access
3 Citations
3,658 Views
14 Pages

Deep Learning Based Semantic Image Segmentation Methods for Classification of Web Page Imagery

  • Ramya Krishna Manugunta,
  • Rytis Maskeliūnas and
  • Robertas Damaševičius

27 September 2022

Semantic segmentation is the task of clustering together parts of an image that belong to the same object class. Semantic segmentation of webpages is important for inferring contextual information from the webpage. This study examines and compares de...

  • Article
  • Open Access
19 Citations
3,791 Views
20 Pages

27 September 2022

In this study, we used images obtained by Unmanned Aerial Vehicles (UAV) and an instance segmentation model based on deep learning (Mask R-CNN) to evaluate the ability to detect and delineate canopies in high density orange plantations. The main obje...

  • Article
  • Open Access
41 Citations
11,102 Views
18 Pages

Automated Penetration Testing Framework for Smart-Home-Based IoT Devices

  • Rohit Akhilesh,
  • Oliver Bills,
  • Naveen Chilamkurti and
  • Mohammad Jabed Morshed Chowdhury

27 September 2022

Security testing is fundamental to identifying security vulnerabilities on smart home-based IoT devices. For this, penetration testing is the most prominent and effective solution. However, testing the IoT manually is cumbersome and time-consuming. I...

  • Article
  • Open Access
15 Citations
6,791 Views
23 Pages

26 September 2022

Background: Cloud-native software systems often have a much more decentralized structure and many independently deployable and (horizontally) scalable components, making it more complicated to create a shared and consolidated picture of the overall d...

  • Article
  • Open Access
1 Citations
3,040 Views
13 Pages

24 September 2022

The biomedical field entered the era of “big data” years ago, and a lot of software is being developed to tackle the analysis problems brought on by big data. However, very few programs focus on providing a solid foundation for file syste...

  • Article
  • Open Access
5 Citations
3,733 Views
20 Pages

Author Identification from Literary Articles with Visual Features: A Case Study with Bangla Documents

  • Ankita Dhar,
  • Himadri Mukherjee,
  • Shibaprasad Sen,
  • Md Obaidullah Sk,
  • Amitabha Biswas,
  • Teresa Gonçalves and
  • Kaushik Roy

23 September 2022

Author identification is an important aspect of literary analysis, studied in natural language processing (NLP). It aids identify the most probable author of articles, news texts or social media comments and tweets, for example. It can be applied to...

  • Article
  • Open Access
1 Citations
2,535 Views
36 Pages

21 September 2022

The high number of ontologies available on the web to date makes it increasingly difficult to select appropriate ontologies for reuse. Many studies have attempted to provide support for ontology selection and ranking; however, the existing studies pr...

  • Article
  • Open Access
1 Citations
2,705 Views
27 Pages

Analysis and Correlation between a Non-Invasive Sensor Network System in the Room and the Improvement of Sleep Quality

  • Eduardo Morales-Vizcarra,
  • Carolina Del-Valle-Soto,
  • Paolo Visconti and
  • Fabiola Cortes-Chavez

20 September 2022

Good sleep quality is essential in human life due to its impact on health. Currently, technology has focused on providing specific features for quality sleep monitoring in people. This work represents a contribution to state of the art on non-invasiv...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903