Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 15, Issue 3

2023 March - 32 articles

Cover Story: The Internet of Things (IoT) has been shown to be valuable for business process management (BPM), for example, to better track and control process executions. While IoT actuators can automatically trigger actions, IoT sensors can monitor changes in environments and humans involved in processes. These sensors produce large amounts of data, which holds the key to understanding the quality of executed processes. To achieve this level of understanding, data from the process engine and IoT sensor data must have a uniform representation. The DataStream XES extension presented in this work enables the connection of IoT data to process events, preserving the full contexts required for data analysis. It is evaluated by creating two datasets from real-world scenarios, i.e., the logistics and manufacturing domains. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (32)

  • Article
  • Open Access
6 Citations
3,131 Views
18 Pages

Artificial-Intelligence-Based Charger Deployment in Wireless Rechargeable Sensor Networks

  • Hsin-Hung Cho,
  • Wei-Che Chien,
  • Fan-Hsun Tseng and
  • Han-Chieh Chao

22 March 2023

To extend a network’s lifetime, wireless rechargeable sensor networks are promising solutions. Chargers can be deployed to replenish energy for the sensors. However, deployment cost will increase when the number of chargers increases. Many metr...

  • Review
  • Open Access
5 Citations
3,396 Views
20 Pages

22 March 2023

In the past decade, different sensing mechanisms and algorithms have been developed to detect or estimate indoor occupancy. One of the most recent advancements is using networked sensor nodes to create a more comprehensive occupancy detection system...

  • Article
  • Open Access
2 Citations
2,533 Views
26 Pages

21 March 2023

Quality of service (QoS) is a crucial requirement in distributed applications. Internet of Things architectures have become a widely used approach in many application domains, from Industry 4.0 to smart agriculture; thus, it is crucial to develop app...

  • Article
  • Open Access
4 Citations
2,312 Views
17 Pages

Research on Spaceborne Target Detection Based on Yolov5 and Image Compression

  • Qi Shi,
  • Daheng Wang,
  • Wen Chen,
  • Jinpei Yu,
  • Weiting Zhou,
  • Jun Zou and
  • Guangzu Liu

19 March 2023

Satellite image compression technology plays an important role in the development of space science. As optical sensors on satellites become more sophisticated, high-resolution and high-fidelity satellite images will occupy more storage. This raises t...

  • Article
  • Open Access
16 Citations
2,371 Views
22 Pages

CvAMoS—Event Abstraction Using Contextual Information

  • Gemma Di Federico and
  • Andrea Burattin

18 March 2023

Process mining analyzes events that are logged during the execution of a process, with the aim of gathering useful information and knowledge. Process discovery algorithms derive process models that represent these processes. The level of abstraction...

  • Article
  • Open Access
1 Citations
2,174 Views
13 Pages

17 March 2023

In the United States, there are laws and standards guiding how people should be informed about the use of their private data. However, the challenge of communicating these guidelines to the naïve user is still at its peak. Research has shown tha...

  • Article
  • Open Access
9 Citations
6,781 Views
15 Pages

17 March 2023

Computational analysis and integration of smartwatch data with Electronic Medical Records (EMR) present potential uses in preventing, diagnosing, and managing chronic diseases. One of the key requirements for the successful clinical application of sm...

  • Article
  • Open Access
25 Citations
6,292 Views
26 Pages

Creation, Analysis and Evaluation of AnnoMI, a Dataset of Expert-Annotated Counselling Dialogues

  • Zixiu Wu,
  • Simone Balloccu,
  • Vivek Kumar,
  • Rim Helaoui,
  • Diego Reforgiato Recupero and
  • Daniele Riboni

14 March 2023

Research on the analysis of counselling conversations through natural language processing methods has seen remarkable growth in recent years. However, the potential of this field is still greatly limited by the lack of access to publicly available th...

  • Article
  • Open Access
36 Citations
5,036 Views
21 Pages

DataStream XES Extension: Embedding IoT Sensor Data into Extensible Event Stream Logs

  • Juergen Mangler,
  • Joscha Grüger,
  • Lukas Malburg,
  • Matthias Ehrendorfer,
  • Yannis Bertrand,
  • Janik-Vasily Benzin,
  • Stefanie Rinderle-Ma,
  • Estefania Serral Asensio and
  • Ralph Bergmann

14 March 2023

The Internet of Things (IoT) has been shown to be very valuable for Business Process Management (BPM), for example, to better track and control process executions. While IoT actuators can automatically trigger actions, IoT sensors can monitor the cha...

  • Article
  • Open Access
20 Citations
5,544 Views
22 Pages

A Novel Hybrid Edge Detection and LBP Code-Based Robust Image Steganography Method

  • Habiba Sultana,
  • A. H. M. Kamal,
  • Gahangir Hossain and
  • Muhammad Ashad Kabir

10 March 2023

In digital image processing and steganography, images are often described using edges and local binary pattern (LBP) codes. By combining these two properties, a novel hybrid image steganography method of secret embedding is proposed in this paper. Th...

  • Article
  • Open Access
5 Citations
6,707 Views
25 Pages

Automated Manufacturing Systems (AMS) consisting of many cooperating devices incorporated into multiple cooperating production lines, sharing common resources, represent industrial Multi-Agent Systems (MAS). Deadlocks may occur during operation of su...

  • Article
  • Open Access
2 Citations
2,058 Views
20 Pages

Complex Queries for Querying Linked Data

  • Hasna Boumechaal and
  • Zizette Boufaida

Querying Linked Data is one of the most important issues for the semantic web community today because it requires the user to understand the structure and vocabularies used in various data sources. Furthermore, users must be familiar with the syntax...

  • Article
  • Open Access
1 Citations
3,553 Views
15 Pages

Beamforming Based on a SSS Angle Estimation Algorithm for 5G NR Networks

  • Daniel Andrade,
  • Roberto Magueta,
  • Adão Silva and
  • Paulo Marques

The current 5G-NR standard includes the transmission of multiple synchronization signal blocks (SSBs) in different directions to be exploited in beamforming techniques. However, choosing a pair of these beams leads to performance degradation, mainly...

  • Article
  • Open Access
10 Citations
8,503 Views
14 Pages

Optimizing Task Execution: The Impact of Dynamic Time Quantum and Priorities on Round Robin Scheduling

  • Mansoor Iqbal,
  • Zahid Ullah,
  • Izaz Ahmad Khan,
  • Sheraz Aslam,
  • Haris Shaheer,
  • Mujtaba Humayon,
  • Muhammad Asjad Salahuddin and
  • Adeel Mehmood

Task scheduling algorithms are crucial for optimizing the utilization of computing resources. This work proposes a unique approach for improving task execution in real-time systems using an enhanced Round Robin scheduling algorithm variant incorporat...

  • Article
  • Open Access
17 Citations
4,770 Views
16 Pages

Utilizing Random Forest with iForest-Based Outlier Detection and SMOTE to Detect Movement and Direction of RFID Tags

  • Ganjar Alfian,
  • Muhammad Syafrudin,
  • Norma Latif Fitriyani,
  • Sahirul Alam,
  • Dinar Nugroho Pratomo,
  • Lukman Subekti,
  • Muhammad Qois Huzyan Octava,
  • Ninis Dyah Yulianingsih,
  • Fransiskus Tatas Dwi Atmaji and
  • Filip Benes

In recent years, radio frequency identification (RFID) technology has been utilized to monitor product movements within a supply chain in real time. By utilizing RFID technology, the products can be tracked automatically in real-time. However, the RF...

  • Article
  • Open Access
13 Citations
3,531 Views
18 Pages

With the development of IoT, IoT devices have proliferated. With the increasing demands of network management and security evaluation, automatic identification of IoT devices becomes necessary. However, existing works require a lot of manual effort a...

  • Article
  • Open Access
2,372 Views
16 Pages

Relational Action Bank with Semantic–Visual Attention for Few-Shot Action Recognition

  • Haoming Liang,
  • Jinze Du,
  • Hongchen Zhang,
  • Bing Han and
  • Yan Ma

Recently, few-shot learning has attracted significant attention in the field of video action recognition, owing to its data-efficient learning paradigm. Despite the encouraging progress, identifying ways to further improve the few-shot learning perfo...

  • Article
  • Open Access
8 Citations
3,807 Views
23 Pages

A Vulnerability Assessment Approach for Transportation Networks Subjected to Cyber–Physical Attacks

  • Konstantinos Ntafloukas,
  • Liliana Pasquale,
  • Beatriz Martinez-Pastor and
  • Daniel P. McCrum

28 February 2023

Transportation networks are fundamental to the efficient and safe functioning of modern societies. In the past, physical and cyber space were treated as isolated environments, resulting in transportation network being considered vulnerable only to th...

  • Article
  • Open Access
31 Citations
2,984 Views
33 Pages

Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme

  • Oluwakemi Christiana Abikoye,
  • Esau Taiwo Oladipupo,
  • Agbotiname Lucky Imoize,
  • Joseph Bamidele Awotunde,
  • Cheng-Chi Lee and
  • Chun-Ta Li

28 February 2023

The application of the Internet of Medical Things (IoMT) in medical systems has brought much ease in discharging healthcare services by medical practitioners. However, the security and privacy preservation of critical user data remain the reason the...

  • Article
  • Open Access
11 Citations
8,509 Views
20 Pages

Towards an Integrated Methodology and Toolchain for Machine Learning-Based Intrusion Detection in Urban IoT Networks and Platforms

  • Denis Rangelov,
  • Philipp Lämmel,
  • Lisa Brunzel,
  • Stephan Borgert,
  • Paul Darius,
  • Nikolay Tcholtchev and
  • Michell Boerger

28 February 2023

The constant increase in volume and wide variety of available Internet of Things (IoT) devices leads to highly diverse software and hardware stacks, which opens new avenues for exploiting previously unknown vulnerabilities. The ensuing risks are ampl...

  • Review
  • Open Access
20 Citations
6,685 Views
21 Pages

Integrating a Blockchain-Based Governance Framework for Responsible AI

  • Rameez Asif,
  • Syed Raheel Hassan and
  • Gerard Parr

28 February 2023

This research paper reviews the potential of smart contracts for responsible AI with a focus on frameworks, hardware, energy efficiency, and cyberattacks. Smart contracts are digital agreements that are executed by a blockchain, and they have the pot...

  • Article
  • Open Access
2 Citations
2,799 Views
15 Pages

28 February 2023

The utilization of Internet of Things (IoT) devices in various smart city and industrial applications is growing rapidly. Within a trusted authority (TA), such as an industry or smart city, all IoT devices are closely monitored in a controlled infras...

  • Article
  • Open Access
28 Citations
4,387 Views
16 Pages

When Operation Technology Meets Information Technology: Challenges and Opportunities

  • Davide Berardi,
  • Franco Callegati,
  • Andrea Giovine,
  • Andrea Melis,
  • Marco Prandini and
  • Lorenzo Rinieri

27 February 2023

Industry 4.0 has revolutionized process innovation while facilitating and encouraging many new possibilities. The objective of Industry 4.0 is the radical enhancement of productivity, a goal that presupposes the integration of Operational Technology...

  • Review
  • Open Access
172 Citations
47,804 Views
36 Pages

Quantum Computing for Healthcare: A Review

  • Raihan Ur Rasool,
  • Hafiz Farooq Ahmad,
  • Wajid Rafique,
  • Adnan Qayyum,
  • Junaid Qadir and
  • Zahid Anwar

27 February 2023

In recent years, the interdisciplinary field of quantum computing has rapidly developed and garnered substantial interest from both academia and industry due to its ability to process information in fundamentally different ways, leading to hitherto u...

  • Article
  • Open Access
4 Citations
2,463 Views
13 Pages

27 February 2023

Anonymization and data masking have effects on data-driven models. Different anonymization methods have been developed to provide a good trade-off between privacy guarantees and data utility. Nevertheless, the effects of data protection (e.g., data m...

  • Article
  • Open Access
5 Citations
3,050 Views
17 Pages

27 February 2023

Online social networks (OSNs) have experienced rapid growth in recent years, and an increasing number of people now use OSNs, such as Facebook and Twitter, to share and spread information on a daily basis. As a special type of information, user perso...

  • Article
  • Open Access
8 Citations
2,745 Views
17 Pages

Scope and Accuracy of Analytic and Approximate Results for FIFO, Clock-Based and LRU Caching Performance

  • Gerhard Hasslinger,
  • Konstantinos Ntougias,
  • Frank Hasslinger and
  • Oliver Hohlfeld

24 February 2023

We evaluate analysis results and approximations for the performance of basic caching methods, assuming independent requests. Compared with simulative evaluations, the analysis results are accurate, but their computation is tractable only within a lim...

  • Article
  • Open Access
22 Citations
7,709 Views
34 Pages

BPMNE4IoT: A Framework for Modeling, Executing and Monitoring IoT-Driven Processes

  • Yusuf Kirikkayis,
  • Florian Gallik,
  • Michael Winter and
  • Manfred Reichert

22 February 2023

The Internet of Things (IoT) enables a variety of smart applications, including smart home, smart manufacturing, and smart city. By enhancing Business Process Management Systems with IoT capabilities, the execution and monitoring of business processe...

  • Article
  • Open Access
1 Citations
3,924 Views
22 Pages

22 February 2023

This study mainly focuses on the estimation calculation of urban parking space. Urban parking has always been a problem that plagues governments worldwide. Due to limited parking space, if the parking space is not controlled correctly, with the city&...

  • Article
  • Open Access
84 Citations
11,266 Views
17 Pages

Machine Learning for Data Center Optimizations: Feature Selection Using Shapley Additive exPlanation (SHAP)

  • Yibrah Gebreyesus,
  • Damian Dalton,
  • Sebastian Nixon,
  • Davide De Chiara and
  • Marta Chinnici

21 February 2023

The need for artificial intelligence (AI) and machine learning (ML) models to optimize data center (DC) operations increases as the volume of operations management data upsurges tremendously. These strategies can assist operators in better understand...

  • Article
  • Open Access
30 Citations
6,595 Views
23 Pages

21 February 2023

Electronic health records (EHRs) play an important role in our life. However, most of the time, they are scattered and saved on different databases belonging to distinct institutions (hospitals, laboratories, clinics, etc.) geographically distributed...

  • Article
  • Open Access
11 Citations
6,369 Views
23 Pages

A Mobile-Based System for Detecting Ginger Leaf Disorders Using Deep Learning

  • Hamna Waheed,
  • Waseem Akram,
  • Saif ul Islam,
  • Abdul Hadi,
  • Jalil Boudjadar and
  • Noureen Zafar

21 February 2023

The agriculture sector plays a crucial role in supplying nutritious and high-quality food. Plant disorders significantly impact crop productivity, resulting in an annual loss of 33%. The early and accurate detection of plant disorders is a difficult...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903