Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 14, Issue 7

2022 July - 27 articles

Cover Story: Unmanned aerial vehicles (UAVs), commonly known as drones, are an emerging facilitator of several smart city services, such as observing weather phenomena, aerial photography, product delivery and surveillance. However, drones can be compromised by an adversary, causing altered flight routes and possible sabotage. In this article, a systematic framework for identifying malicious drone behavior through the use of a deep analysis of routine (normal) drone operations is presented. Normal drone flight behavior is reverse-engineered and malicious drone behavior is synthesized for hijacking, GPS signal jamming and DoS attacks. Subsequently, machine learning techniques are adopted to identify malicious drone activity for the study. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (27)

  • Review
  • Open Access
64 Citations
8,034 Views
48 Pages

Internet of Things and Blockchain Integration: Security, Privacy, Technical, and Design Challenges

  • Yehia Ibrahim Alzoubi,
  • Ahmad Al-Ahmad,
  • Hasan Kahtan and
  • Ashraf Jaradat

The Internet of things model enables a world in which all of our everyday devices can be integrated and communicate with each other and their surroundings to gather and share data and simplify task implementation. Such an Internet of things environme...

  • Article
  • Open Access
27 Citations
5,786 Views
15 Pages

Unlike price fluctuations, the temporal structure of cryptocurrency trading has seldom been a subject of systematic study. In order to fill this gap, we analyse detrended correlations of the price returns, the average number of trades in time unit, a...

  • Article
  • Open Access
2 Citations
3,011 Views
24 Pages

Opportunistic ad hoc networks are characterized by intermittent and infrastructure-less connectivity among mobile nodes. Because of the lack of up-to-date network topology information and frequent link failures, geographic routing utilizes location i...

  • Article
  • Open Access
13 Citations
2,929 Views
26 Pages

A Survey on Monitoring Quality Assessment for Wireless Visual Sensor Networks

  • Thiago C. Jesus,
  • Daniel G. Costa,
  • Paulo Portugal and
  • Francisco Vasques

Wireless visual sensor networks have been adopted in different contexts to provide visual information in a more flexible and distributed way, supporting the development of different innovative applications. Although visual data may be central for a c...

  • Article
  • Open Access
2 Citations
3,539 Views
21 Pages

In recent years, artworks have been increasingly digitized and built into databases, and such databases have become convenient tools for researchers. Researchers who retrieve artwork are not only researchers of humanities, but also researchers of mat...

  • Article
  • Open Access
6 Citations
2,931 Views
11 Pages

Due to the expansion of the internet, we encounter various types of big data such as web documents or sensing data. Compared to traditional small data such as experimental samples, big data provide more chances to find hidden and novel patterns with...

  • Article
  • Open Access
11 Citations
4,362 Views
24 Pages

Blockchain for Doping Control Applications in Sports: A Conceptual Approach

  • Flavio Pinto,
  • Yogachandran Rahulamathavan and
  • James Skinner

Doping is a well-known problem in competitive sports. Along the years, several cases have come to public, evidencing corrupt practices from within the sports environment. To guarantee fair play and prevent public health issues, anti-doping organizati...

  • Article
  • Open Access
11 Citations
3,760 Views
15 Pages

N-Trans: Parallel Detection Algorithm for DGA Domain Names

  • Cheng Yang,
  • Tianliang Lu,
  • Shangyi Yan,
  • Jianling Zhang and
  • Xingzhan Yu

Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals. Accurate detection of malicious domains can effectively defend against...

  • Article
  • Open Access
2 Citations
10,520 Views
23 Pages

Analytical Modeling and Empirical Analysis of Binary Options Strategies

  • Gurdal Ertek,
  • Aysha Al-Kaabi and
  • Aktham Issa Maghyereh

This study analyzes binary option investment strategies by developing mathematical formalism and formulating analytical models. The binary outcome of binary options represents either an increase or a decrease in a parameter, typically an asset or der...

  • Article
  • Open Access
1 Citations
2,669 Views
18 Pages

Research on Routing Equalization Algorithm of Inter-Satellite Partition for Low-Orbit Micro-Satellites

  • Hengfei Cheng,
  • Zhaobin Xu,
  • Xiaoxu Guo,
  • Jia Yang,
  • Kedi Xu,
  • Shuqin Liu,
  • Zhonghe Jin and
  • Xiaojun Jin

Low-orbit micro-satellite technology has developed rapidly in recent years due to its advantages of low time delay, low cost and short research period. However, among the existing inter-satellite routing algorithms, the classical flooding and greedy...

  • Review
  • Open Access
4 Citations
4,335 Views
15 Pages

Mapping Art to a Knowledge Graph: Using Data for Exploring the Relations among Visual Objects in Renaissance Art

  • Alexandros Kouretsis,
  • Iraklis Varlamis,
  • Laida Limniati,
  • Minas Pergantis and
  • Andreas Giannakoulopoulos

Graph-like structures, which are increasingly popular in data representation, stand out since they enable the integration of information from multiple sources. At the same time, clustering algorithms applied on graphs allow for group entities based o...

  • Article
  • Open Access
1 Citations
3,107 Views
21 Pages

Aesthetic Trends and Semantic Web Adoption of Media Outlets Identified through Automated Archival Data Extraction

  • Aristeidis Lamprogeorgos,
  • Minas Pergantis,
  • Michail Panagopoulos and
  • Andreas Giannakoulopoulos

The last decade has been a time of great progress in the World Wide Web and this progress has manifested in multiple ways, including both the diffusion and expansion of Semantic Web technologies and the advancement of the aesthetics and usability of...

  • Article
  • Open Access
47 Citations
5,949 Views
19 Pages

Drones are increasingly adopted to serve a smart city through their ability to render quick and adaptive services. They are also known as unmanned aerial vehicles (UAVs) and are deployed to conduct area surveillance, monitor road networks for traffic...

  • Article
  • Open Access
12 Citations
4,045 Views
21 Pages

Towards Strengthening the Resilience of IoV Networks—A Trust Management Perspective

  • Yingxun Wang,
  • Hushairi Zen,
  • Mohamad Faizrizwan Mohd Sabri,
  • Xiang Wang and
  • Lee Chin Kho

Over the past decade or so, considerable and rapid advancements in the state of the art within the promising paradigms of the Internet of Things (IoT) and Artificial Intelligence (AI) have accelerated the development of conventional Vehicular Ad Hoc...

  • Article
  • Open Access
2,502 Views
13 Pages

In this paper, we propose a method for extracting emotional factors through audiovisual quantitative feature analysis from images of the surrounding environment. Nine features were extracted such as time complexity, spatial complexity (horizontal and...

  • Article
  • Open Access
4 Citations
2,483 Views
17 Pages

Network Function Virtualization (NFV) is a virtual network model, the goal of which is a cost-efficient transition of the hardware infrastructure into a flexible and reliable software platform. However, this transition comes at the cost of more secur...

  • Communication
  • Open Access
2 Citations
2,974 Views
12 Pages

The novelty of this work lies in examining how 5G, blockchain-based public key infrastructure (PKI), near field communication (NFC), and zero trust architecture securely provide not only a trusted digital identity for telework but also a trusted digi...

  • Article
  • Open Access
13 Citations
4,427 Views
16 Pages

Real-Time Detection of Vine Trunk for Robot Localization Using Deep Learning Models Developed for Edge TPU Devices

  • Khadijeh Alibabaei,
  • Eduardo Assunção,
  • Pedro D. Gaspar,
  • Vasco N. G. J. Soares and
  • João M. L. P. Caldeira

The concept of the Internet of Things (IoT) in agriculture is associated with the use of high-tech devices such as robots and sensors that are interconnected to assess or monitor conditions on a particular plot of land and then deploy the various fac...

  • Article
  • Open Access
8 Citations
3,348 Views
14 Pages

Developing a smart classroom can make the modern classroom more efficient and intelligent. Much research has been conducted pertaining to smart classrooms for hearing-impaired college students. However, there have been few significant breakthroughs i...

  • Article
  • Open Access
2 Citations
2,876 Views
24 Pages

The Internet of Things (IoT) brings internet connectivity to everyday devices. These devices generate a large volume of information that needs to be transmitted to the nodes running the IoT applications, where they are processed and used to make some...

  • Article
  • Open Access
2 Citations
3,187 Views
18 Pages

The Information-Centric Network (ICN) paradigm has been touted as one of the candidates for the Internet of the future, where the Named Data Network (NDN) architecture is the one leading the way. Despite the large amount of works published in the lit...

  • Article
  • Open Access
4 Citations
2,644 Views
16 Pages

Cooperative D-GNSS Aided with Multi Attribute Decision Making Module: A Rigorous Comparative Analysis

  • Thanassis Mpimis,
  • Theodore T. Kapsis,
  • Athanasios D. Panagopoulos and
  • Vassilis Gikas

Satellite positioning lies within the very core of numerous Intelligent Transportation Systems (ITS) and Future Internet applications. With the emergence of connected vehicles, the performance requirements of Global Navigation Satellite Systems (GNSS...

  • Article
  • Open Access
28 Citations
4,709 Views
18 Pages

A Novel Text Classification Technique Using Improved Particle Swarm Optimization: A Case Study of Arabic Language

  • Yousif A. Alhaj,
  • Abdelghani Dahou,
  • Mohammed A. A. Al-qaness,
  • Laith Abualigah,
  • Aaqif Afzaal Abbasi,
  • Nasser Ahmed Obad Almaweri,
  • Mohamed Abd Elaziz and
  • Robertas  Damaševičius

We propose a novel text classification model, which aims to improve the performance of Arabic text classification using machine learning techniques. One of the effective solutions in Arabic text classification is to find the suitable feature selectio...

  • Article
  • Open Access
8 Citations
3,151 Views
18 Pages

Characterization of Dynamic Blockage Probability in Industrial Millimeter Wave 5G Deployments

  • Anastasia Kondratyeva,
  • Daria Ivanova,
  • Vyacheslav Begishev,
  • Ekaterina Markova,
  • Evgeni Mokrov,
  • Yuliya Gaidamaka and
  • Konstantin Samouylov

5G New Radio (NR) systems promise to expand offered services to enable industrial automation scenarios. To enable ultra-low latency at the air interface and to exploit spatial redundancy for applications such as synchronization and motion control, us...

  • Review
  • Open Access
21 Citations
7,021 Views
31 Pages

Convergence of Information-Centric Networks and Edge Intelligence for IoV: Challenges and Future Directions

  • Salahadin Seid Musa,
  • Marco Zennaro,
  • Mulugeta Libsie and
  • Ermanno Pietrosemoli

Recently the Internet of Vehicles (IoV) has become a promising research area in the field of the Internet of Things (IoT), which enables vehicles to communicate and exchange real-time information with each other, as well as with infrastructure, peopl...

  • Article
  • Open Access
4 Citations
3,929 Views
13 Pages

First Steps of Asthma Management with a Personalized Ontology Model

  • Hicham Ajami,
  • Hamid Mcheick and
  • Catherine Laprise

Asthma is a chronic respiratory disease characterized by severe inflammation of the bronchial mucosa. Allergic asthma is the most common form of this health issue. Asthma is classified into allergic and non-allergic asthma, and it can be triggered by...

  • Article
  • Open Access
23 Citations
4,148 Views
10 Pages

Polarity and Subjectivity Detection with Multitask Learning and BERT Embedding

  • Ranjan Satapathy,
  • Shweta Rajesh Pardeshi and
  • Erik Cambria

In recent years, deep learning-based sentiment analysis has received attention mainly because of the rise of social media and e-commerce. In this paper, we showcase the fact that the polarity detection and subjectivity detection subtasks of sentiment...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903