Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 15, Issue 4

2023 April - 35 articles

Cover Story: Internet of Things (IoT) architectures and knowledge generation out of streams of events are the primary elements concerning the creation of user-centric IoT services. On this basis, the paper presents (i) a generic, symmetrical IoT architecture that enables bidirectional communication between things and users, (ii) a Complex Event Processing model for provisioning parametric transformations of primitive events to meaningful business events, and (iii) a library of composite transformations that each reflect a common business need (e.g., ingestion, measurements’ averaging). The appropriateness and integrability of the implementation in an IoT environment are demonstrated by four scenarios in a smart farming application domain. Further, the quality properties of each scenario are discussed. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (35)

  • Article
  • Open Access
3 Citations
2,537 Views
19 Pages

21 April 2023

With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs. In outsourcin...

  • Editorial
  • Open Access
1 Citations
3,359 Views
2 Pages

20 April 2023

In recent years, the new computing paradigms such as serverless computing, edge computing and blockchain-based computing have attracted much attention in both academia and industrial communities. Distributed systems and applications play fundamental...

  • Article
  • Open Access
20 Citations
4,141 Views
21 Pages

19 April 2023

Social media have been a valuable data source for studying people’s opinions, intentions, and behaviours. Such a data source incorporating advanced big data analysis methods, such as machine-operated emotion and sentiment analysis, will open un...

  • Article
  • Open Access
1 Citations
3,127 Views
13 Pages

Applying Patient Segmentation Using Primary Care Electronic Medical Records to Develop a Virtual Peer-to-Peer Intervention for Patients with Type 2 Diabetes

  • Alessia Paglialonga,
  • Rebecca Theal,
  • Bruce Knox,
  • Robert Kyba,
  • David Barber,
  • Aziz Guergachi and
  • Karim Keshavjee

14 April 2023

The aim of this study was to design a virtual peer-to-peer intervention for patients with type 2 diabetes (T2D) by grouping patients from specific segments using data from primary care electronic medical records (EMRs). Two opposing segments were ide...

  • Article
  • Open Access
2 Citations
3,022 Views
18 Pages

11 April 2023

Information-Centric Networking (ICN) has revolutionized the manner of content acquisition by shifting the communication mode from host-centric to information-centric. Considering the existing, large amount of IP infrastructure in current networks, th...

  • Article
  • Open Access
7 Citations
3,747 Views
24 Pages

A Multiverse Graph to Help Scientific Reasoning from Web Usage: Interpretable Patterns of Assessor Shifts in GRAPHYP

  • Renaud Fabre,
  • Otmane Azeroual,
  • Joachim Schöpfel,
  • Patrice Bellot and
  • Daniel Egret

10 April 2023

The digital support for scientific reasoning presents contrasting results. Bibliometric services are improving, but not academic assessment; no service for scholars relies on logs of web usage to base query strategies for relevance judgments (or asse...

  • Article
  • Open Access
30 Citations
14,059 Views
20 Pages

A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure

  • Soumya Prakash Otta,
  • Subhrakanta Panda,
  • Maanak Gupta and
  • Chittaranjan Hota

10 April 2023

The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest...

  • Article
  • Open Access
3 Citations
8,420 Views
19 Pages

Consumer’s Attitude towards Display Google Ads

  • Mohammad Al Khasawneh,
  • Abdel-Aziz Ahmad Sharabati,
  • Shafig Al-Haddad,
  • Rania Al-Daher,
  • Sarah Hammouri and
  • Sima Shaqman

The context of Display Google ads and its components has significant importance to previous studies. However, the full understanding of the variables that influence both Display Google ads avoidance and intention to click has not been thoroughly ackn...

  • Review
  • Open Access
40 Citations
8,178 Views
18 Pages

Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems, which control critical infrastructure such as power plants and water treatment facilities, have unique characteristics that make them vulnerable to ransomw...

  • Article
  • Open Access
12 Citations
4,328 Views
17 Pages

Implementing GDPR-Compliant Surveys Using Blockchain

  • Ricardo Martins Gonçalves,
  • Miguel Mira da Silva and
  • Paulo Rupino da Cunha

The immutability of data stored in a blockchain is a crucial pillar of trust in this technology, which has led to its increasing adoption in various use cases. However, there are situations where the inability to change or delete data may be illegal....

  • Article
  • Open Access
24 Citations
6,256 Views
15 Pages

Future of Drug Discovery: The Synergy of Edge Computing, Internet of Medical Things, and Deep Learning

  • Mohammad (Behdad) Jamshidi,
  • Omid Moztarzadeh,
  • Alireza Jamshidi,
  • Ahmed Abdelgawad,
  • Ayman S. El-Baz and
  • Lukas Hauer

The global spread of COVID-19 highlights the urgency of quickly finding drugs and vaccines and suggests that similar challenges will arise in the future. This underscores the need for ongoing efforts to overcome the obstacles involved in the developm...

  • Article
  • Open Access
2 Citations
4,831 Views
29 Pages

Post-Digital Learning for Rural Development: A Case Study of Open Biotec MOOCs in Colombia

  • Carlos Ocampo-López,
  • Oscar Muñoz-Blandón,
  • Leidy Rendón-Castrillón and
  • Margarita Ramírez-Carmona

This research presents an experience of post-digital learning of biotechnology in rural areas in Colombia by implementing a massive open online course (MOOC) for biotechnology education called Open Biotec. The objective was to improve Colombian rural...

  • Article
  • Open Access
7 Citations
3,825 Views
12 Pages

Emerging Technologies and Their Link to Digital Competence in Teaching

  • Miguel Ángel García-Delgado,
  • Sonia Rodríguez-Cano,
  • Vanesa Delgado-Benito and
  • María Lozano-Álvarez

The new educational reality requires teachers to have a series of skills and competences that allow them to improve the teaching–learning process and therefore the quality of teaching, integrating technology and emerging technologies. In order...

  • Article
  • Open Access
4 Citations
5,128 Views
32 Pages

Towards a Reference Architecture for Cargo Ports

  • Virginia M. Romero and
  • Eduardo B. Fernandez

Cyber-Physical Systems (CPS) are physical systems whose operations are coordinated, monitored, and controlled by computing and communication functions. These systems are typically heterogeneous, including Internet of Things and information technology...

  • Article
  • Open Access
2 Citations
3,253 Views
14 Pages

31 March 2023

In recent years, dense retrieval has emerged as the primary method for open-domain question-answering (OpenQA). However, previous research often focused on the query side, neglecting the importance of the passage side. We believe that both the query...

  • Article
  • Open Access
3 Citations
4,221 Views
18 Pages

31 March 2023

This paper is designed to explicate and analyze data acquired from experimental field tests of a Tesla Model 3 lane correction module within the vehicle’s Autopilot Suite, a component of Tesla OS. The initial problem was discovered during a nominal d...

  • Article
  • Open Access
9 Citations
4,068 Views
14 Pages

Effective IoT Congestion Control Algorithm

  • Husam H. Hasan and
  • Zainab T. Alisa

31 March 2023

The Internet of Things (IoT) connects devices via the Internet. Network congestion is one of the key problems that has been identified by researchers in the IoT field. When there is a huge number of IoT devices connected to the internet, this creates...

  • Article
  • Open Access
4 Citations
2,678 Views
23 Pages

Transforming IoT Events to Meaningful Business Events on the Edge: Implementation for Smart Farming Application

  • Dimitris Gkoulis,
  • Cleopatra Bardaki,
  • George Kousiouris and
  • Mara Nikolaidou

31 March 2023

This paper focuses on Internet of Things (IoT) architectures and knowledge generation out of streams of events as the primary elements concerning the creation of user-centric IoT services. We provide a general, symmetrical IoT architecture, which ena...

  • Article
  • Open Access
1 Citations
2,824 Views
17 Pages

A Comparative Study of Single and Multi-Stage Forecasting Algorithms for the Prediction of Electricity Consumption Using a UK-National Health Service (NHS) Hospital Dataset

  • Ahmad Taha,
  • Basel Barakat,
  • Mohammad M. A. Taha,
  • Mahmoud A. Shawky,
  • Chun Sing Lai,
  • Sajjad Hussain,
  • Muhammad Zainul Abideen and
  • Qammer H. Abbasi

31 March 2023

Accurately looking into the future was a significantly major challenge prior to the era of big data, but with rapid advancements in the Internet of Things (IoT), Artificial Intelligence (AI), and the data availability around us, this has become relat...

  • Article
  • Open Access
20 Citations
6,815 Views
18 Pages

30 March 2023

SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL i...

  • Article
  • Open Access
2 Citations
2,671 Views
18 Pages

30 March 2023

In this paper, we study via simulation the performance of irregular repetition slotted ALOHA under multi-packet detection and different patterns of the load process. On the one hand, we model the arrival process with a version of the M/G/ proc...

  • Review
  • Open Access
24 Citations
7,673 Views
18 Pages

30 March 2023

This paper summarizes the work of many different authors, industries, and countries by introducing important and influential factors that will help in the development, successful adoption, and sustainable use of the Web3/metaverse and its application...

  • Article
  • Open Access
10 Citations
4,862 Views
24 Pages

Resampling Imbalanced Network Intrusion Datasets to Identify Rare Attacks

  • Sikha Bagui,
  • Dustin Mink,
  • Subhash Bagui,
  • Sakthivel Subramaniam and
  • Daniel Wallace

29 March 2023

This study, focusing on identifying rare attacks in imbalanced network intrusion datasets, explored the effect of using different ratios of oversampled to undersampled data for binary classification. Two designs were compared: random undersampling be...

  • Article
  • Open Access
9 Citations
3,038 Views
21 Pages

Addressing ZSM Security Issues with Blockchain Technology

  • Michael Xevgenis,
  • Dimitrios G. Kogias,
  • Panagiotis A. Karkazis and
  • Helen C. Leligou

28 March 2023

Undoubtedly, we are witnessing a new era of computer networks that aspire to support modern demanding applications by providing the highest Quality of Experience (QoE) to the end user. Next Generations Networks (NGNs) ensure that characteristics such...

  • Article
  • Open Access
4 Citations
3,688 Views
14 Pages

28 March 2023

For the current stage of complex and changing network environments and correlated and synchronized vulnerability attacks, this study first fuses attack graph technology and Bayesian networks and constructs Bayesian attack graphs toportray the correla...

  • Article
  • Open Access
2 Citations
3,184 Views
13 Pages

View Synthesis with Scene Recognition for Cross-View Image Localization

  • Uddom Lee,
  • Peng Jiang,
  • Hongyi Wu and
  • Chunsheng Xin

28 March 2023

Image-based localization has been widely used for autonomous vehicles, robotics, augmented reality, etc., and this is carried out by matching a query image taken from a cell phone or vehicle dashcam to a large scale of geo-tagged reference images, su...

  • Article
  • Open Access
22 Citations
17,510 Views
31 Pages

A Highly Interactive Honeypot-Based Approach to Network Threat Management

  • Xingyuan Yang,
  • Jie Yuan,
  • Hao Yang,
  • Ya Kong,
  • Hao Zhang and
  • Jinyu Zhao

28 March 2023

In this paper, considering the problem that the common defensive means in the current cyber confrontation often fall into disadvantage, honeypot technology is adopted to turn reactive into proactive to deal with the increasingly serious cyberspace se...

  • Article
  • Open Access
2 Citations
2,594 Views
17 Pages

Banging Interaction: A Ubimus-Design Strategy for the Musical Internet

  • Damián Keller,
  • Azeema Yaseen,
  • Joseph Timoney,
  • Sutirtha Chakraborty and
  • Victor Lazzarini

27 March 2023

We introduce a new perspective for musical interaction tailored to a specific class of sonic resources: impact sounds. Our work is informed by the field of ubiquitous music (ubimus) and engages with the demands of artistic practices. Through a series...

  • Article
  • Open Access
11 Citations
3,959 Views
23 Pages

Developing a Virtual World for an Open-House Event: A Metaverse Approach

  • Keattikorn Samarnggoon,
  • Supara Grudpan,
  • Noppon Wongta and
  • Konlawat Klaynak

27 March 2023

The concept of a metaverse, a virtual world that offers immersive experiences, has gained widespread interest in recent years. Despite the hype, there is still a gap in its practical application, especially in the realm of education. This study prese...

  • Article
  • Open Access
2 Citations
8,037 Views
18 Pages

26 March 2023

Social media usage is a direct result of Internet connectivity and is gaining increased prominence in business-to-consumer (B2C), business-to-business (B2B), and consumer-to-business (C2B) relationship building, which is allowing marketers to devise...

  • Article
  • Open Access
12 Citations
2,492 Views
20 Pages

26 March 2023

Nowdays, DNNs (Deep Neural Networks) are widely used in the field of DDoS attack detection. However, designing a good DNN architecture relies on the designer’s experience and requires considerable work. In this paper, a GA (genetic algorithm) i...

  • Article
  • Open Access
19 Citations
3,723 Views
27 Pages

25 March 2023

Privacy and verifiability are crucial security requirements in e-voting systems and combining them is considered to be a challenge given that they seem to be contradictory. On one hand, privacy means that cast votes cannot be traced to the correspond...

  • Article
  • Open Access
1,913 Views
18 Pages

25 March 2023

As the Internet communication model changes from host-centric to content-centric, information-centric networking (ICN) as a new network architecture has received increasing attention. There are often multiple replicas of content in ICN, and how to re...

  • Article
  • Open Access
18 Citations
2,412 Views
16 Pages

A Deep Learning Approach to Detect Failures in Bridges Based on the Coherence of Signals

  • Francesco Morgan Bono,
  • Luca Radicioni,
  • Simone Cinquemani,
  • Lorenzo Benedetti,
  • Gabriele Cazzulani,
  • Claudio Somaschini and
  • Marco Belloli

25 March 2023

Structural health monitoring of civil infrastructure, such as bridges and buildings, has become a trending topic in the last few years. The key factor is the technological push given by new technologies that permit the acquisition, storage, processin...

  • Article
  • Open Access
1 Citations
2,372 Views
14 Pages

A Novel Multi-Cell Interference-Aware Cooperative QoS-Based NOMA Group D2D System

  • Muhammad Amish Hasan,
  • Tanveer Ahmad,
  • Asim Anwar,
  • Salman Siddiq,
  • Abdul Malik,
  • Waseem Nazar and
  • Imran Razzaq

24 March 2023

Nonorthogonal multiple access (NOMA), one of the favorable candidates of next-generation wireless networks combined with group device-to-device (D2D) networks, can sufficiently increase a system’s spectral efficiency. In fact, in a cooperative...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903