Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 16, Issue 10

2024 October - 37 articles

Cover Story: The study introduces a new model for defining and executing performance tests used during the IT system design and operation. By establishing clear objectives, test types, and implementation methods, the model streamlines the preparation, execution, and replication of performance tests. It divides the testing process into layers, allowing specialized teams to independently handle different test components, thereby accelerating test implementation and reducing costs. In addition, the proposed solution facilitates communication between developers and testers by introducing an unambiguous and precise test description. The model was validated in both laboratory and production environments, and was useful in identifying system bottlenecks and enabling rapid performance optimization. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (37)

  • Review
  • Open Access
5 Citations
4,027 Views
27 Pages

Internet of Things and Distributed Computing Systems in Business Models

  • Albérico Travassos Rosário and
  • Ricardo Raimundo

21 October 2024

The integration of the Internet of Things (IoT) and Distributed Computing Systems (DCS) is transforming business models across industries. IoT devices allow immediate monitoring of equipment and processes, mitigating lost time and enhancing efficienc...

  • Review
  • Open Access
18 Citations
18,866 Views
22 Pages

19 October 2024

This study highlights the necessity for efficient database management in continuous authentication systems, which rely on large-scale behavioral biometric data such as keystroke patterns. A benchmarking framework was developed to evaluate the Postgre...

  • Article
  • Open Access
4 Citations
2,623 Views
20 Pages

Securing the Edge: CatBoost Classifier Optimized by the Lyrebird Algorithm to Detect Denial of Service Attacks in Internet of Things-Based Wireless Sensor Networks

  • Sennanur Srinivasan Abinayaa,
  • Prakash Arumugam,
  • Divya Bhavani Mohan,
  • Anand Rajendran,
  • Abderezak Lashab,
  • Baoze Wei and
  • Josep M. Guerrero

19 October 2024

The security of Wireless Sensor Networks (WSNs) is of the utmost importance because of their widespread use in various applications. Protecting WSNs from harmful activity is a vital function of intrusion detection systems (IDSs). An innovative approa...

  • Article
  • Open Access
8 Citations
4,364 Views
19 Pages

Collision Avoidance Adaptive Data Rate Algorithm for LoRaWAN

  • Rachel Kufakunesu,
  • Gerhard P. Hancke and
  • Adnan M. Abu-Mahfouz

19 October 2024

Long-Range Wide-Area Network (LoRaWAN) technology offers efficient connectivity for numerous end devices over a wide coverage area in the Internet of Things (IoT) network, enabling the exchange of data over the Internet between even the most minor In...

  • Review
  • Open Access
65 Citations
13,928 Views
52 Pages

A Survey of the Real-Time Metaverse: Challenges and Opportunities

  • Mohsen Hatami,
  • Qian Qu,
  • Yu Chen,
  • Hisham Kholidy,
  • Erik Blasch and
  • Erika Ardiles-Cruz

18 October 2024

The metaverse concept has been evolving from static, pre-rendered virtual environments to a new frontier: the real-time metaverse. This survey paper explores the emerging field of real-time metaverse technologies, which enable the continuous integrat...

  • Systematic Review
  • Open Access
4 Citations
4,221 Views
21 Pages

18 October 2024

This study explores the applications and implications of blockchain technology in the Australian higher education system, focusing on its integration with artificial intelligence (AI). By addressing critical challenges in credential verification, adm...

  • Article
  • Open Access
5 Citations
8,876 Views
20 Pages

18 October 2024

Traffic lights play an important role in efficient traffic management, especially in crowded cities. Optimizing traffic helps to reduce crowding, save time, and ensure the smooth flow of traffic. Metaheuristic algorithms have a proven ability to opti...

  • Article
  • Open Access
6 Citations
2,969 Views
28 Pages

Internet of Things Adoption in Technology Ecosystems Within the Central African Region: The Case of Silicon Mountain

  • Godlove Suila Kuaban,
  • Valery Nkemeni,
  • Onyeka J. Nwobodo,
  • Piotr Czekalski and
  • Fabien Mieyeville

16 October 2024

The Internet of Things (IoT) has emerged as a transformative technology with the potential to revolutionize various sectors and industries worldwide. Despite its global significance, the adoption and implementation of IoT technologies in emerging tec...

  • Article
  • Open Access
3 Citations
1,778 Views
14 Pages

SPDepth: Enhancing Self-Supervised Indoor Monocular Depth Estimation via Self-Propagation

  • Xiaotong Guo,
  • Huijie Zhao,
  • Shuwei Shao,
  • Xudong Li,
  • Baochang Zhang and
  • Na Li

16 October 2024

Due to the existence of low-textured areas in indoor scenes, some self-supervised depth estimation methods have specifically designed sparse photometric consistency losses and geometry-based losses. However, some of the loss terms cannot supervise al...

  • Article
  • Open Access
25 Citations
14,252 Views
37 Pages

A Survey of Security Strategies in Federated Learning: Defending Models, Data, and Privacy

  • Habib Ullah Manzoor,
  • Attia Shabbir,
  • Ao Chen,
  • David Flynn and
  • Ahmed Zoha

15 October 2024

Federated Learning (FL) has emerged as a transformative paradigm in machine learning, enabling decentralized model training across multiple devices while preserving data privacy. However, the decentralized nature of FL introduces significant security...

  • Article
  • Open Access
19 Citations
4,452 Views
17 Pages

14 October 2024

Federated learning offers a framework for developing local models across institutions while safeguarding sensitive data. This paper introduces a novel approach for heart disease prediction using the TabNet model, which combines the strengths of tree-...

  • Article
  • Open Access
1 Citations
1,851 Views
15 Pages

14 October 2024

Smart environments exploit rising technologies like Internet of Things (IoT) and edge intelligence (EI) to achieve unseen effectiveness and efficiency in every tasks, including air sanitization. The latter represents a key preventative measure–...

  • Article
  • Open Access
4 Citations
2,345 Views
18 Pages

Multi-Source Data Fusion for Vehicle Maintenance Project Prediction

  • Fanghua Chen,
  • Deguang Shang,
  • Gang Zhou,
  • Ke Ye and
  • Guofang Wu

14 October 2024

Ensuring road safety is heavily reliant on the effective maintenance of vehicles. Accurate predictions of maintenance requirements can substantially reduce ownership costs for vehicle owners. Consequently, this field has attracted increasing attentio...

  • Article
  • Open Access
12 Citations
7,031 Views
31 Pages

Advanced Optimization Techniques for Federated Learning on Non-IID Data

  • Filippos Efthymiadis,
  • Aristeidis Karras,
  • Christos Karras and
  • Spyros Sioutas

13 October 2024

Federated learning enables model training on multiple clients locally, without the need to transfer their data to a central server, thus ensuring data privacy. In this paper, we investigate the impact of Non-Independent and Identically Distributed (n...

  • Article
  • Open Access
14 Citations
7,837 Views
29 Pages

Malware Detection Based on API Call Sequence Analysis: A Gated Recurrent Unit–Generative Adversarial Network Model Approach

  • Nsikak Owoh,
  • John Adejoh,
  • Salaheddin Hosseinzadeh,
  • Moses Ashawa,
  • Jude Osamor and
  • Ayyaz Qureshi

13 October 2024

Malware remains a major threat to computer systems, with a vast number of new samples being identified and documented regularly. Windows systems are particularly vulnerable to malicious programs like viruses, worms, and trojans. Dynamic analysis, whi...

  • Review
  • Open Access
12 Citations
3,816 Views
38 Pages

Towards Ensemble Feature Selection for Lightweight Intrusion Detection in Resource-Constrained IoT Devices

  • Mahawish Fatima,
  • Osama Rehman,
  • Ibrahim M. H. Rahman,
  • Aisha Ajmal and
  • Simon Jigwan Park

12 October 2024

The emergence of smart technologies and the wide adoption of the Internet of Things (IoT) have revolutionized various sectors, yet they have also introduced significant security challenges due to the extensive attack surface they present. In recent y...

  • Article
  • Open Access
13 Citations
8,794 Views
22 Pages

Countering Social Media Cybercrime Using Deep Learning: Instagram Fake Accounts Detection

  • Najla Alharbi,
  • Bashayer Alkalifah,
  • Ghaida Alqarawi and
  • Murad A. Rassam

11 October 2024

An online social media platform such as Instagram has become a popular communication channel that millions of people are using today. However, this media also becomes an avenue where fake accounts are used to inflate the number of followers on a targ...

  • Article
  • Open Access
1 Citations
2,870 Views
27 Pages

New Model for Defining and Implementing Performance Tests

  • Marek Bolanowski,
  • Michał Ćmil and
  • Adrian Starzec

10 October 2024

The article proposes a new model for defining and implementing performance tests used in the process of designing and operating IT systems. By defining the objectives, types, topological patterns, and methods of implementation, a coherent description...

  • Review
  • Open Access
39 Citations
20,496 Views
29 Pages

Large Language Models Meet Next-Generation Networking Technologies: A Review

  • Ching-Nam Hang,
  • Pei-Duo Yu,
  • Roberto Morabito and
  • Chee-Wei Tan

7 October 2024

The evolution of network technologies has significantly transformed global communication, information sharing, and connectivity. Traditional networks, relying on static configurations and manual interventions, face substantial challenges such as comp...

  • Article
  • Open Access
4 Citations
3,908 Views
16 Pages

Stance Detection in the Context of Fake News—A New Approach

  • Izzat Alsmadi,
  • Iyad Alazzam,
  • Mohammad Al-Ramahi and
  • Mohammad Zarour

6 October 2024

Online social networks (OSNs) are inundated with an enormous daily influx of news shared by users worldwide. Information can originate from any OSN user and quickly spread, making the task of fact-checking news both time-consuming and resource-intens...

  • Article
  • Open Access
7 Citations
15,397 Views
23 Pages

5 October 2024

Behind everyday websites, a hidden shadow world tracks the behavior of Internet users. Web tracking analyzes online activity based on collected data and delivers content tailored to users’ interests. It gathers vast amounts of information for v...

  • Article
  • Open Access
4 Citations
4,776 Views
30 Pages

5 October 2024

The rapid urbanization trend underscores the need for effective management of city resources and services, making the concept of smart cities increasingly important. This study leverages the IMD Smart City Index (SCI) dataset to analyze and rank smar...

  • Article
  • Open Access
8 Citations
9,233 Views
29 Pages

4 October 2024

This article explores how decentralized Web3 is reshaping Internet governance by enabling the emergence of new forms of nation-statehood and redefining traditional concepts of state sovereignty. Based on fieldwork conducted in Silicon Valley since Au...

  • Article
  • Open Access
1 Citations
2,082 Views
15 Pages

4 October 2024

In this study, improvements are made to Inter-SubNet, a state-of-the-art speech enhancement method. Inter-SubNet is a single-channel speech enhancement framework that enhances the sub-band spectral model by integrating global spectral information, su...

  • Article
  • Open Access
3 Citations
2,600 Views
22 Pages

3 October 2024

The advent of 5G heralds unprecedented connectivity with high throughput and low latency for network users. Software-defined networking (SDN) plays a significant role in fulfilling these requirements. However, it poses substantial security challenges...

  • Article
  • Open Access
6 Citations
2,736 Views
25 Pages

A Secure Key Exchange and Authentication Scheme for Securing Communications in the Internet of Things Environment

  • Ali Peivandizadeh,
  • Haitham Y. Adarbah,
  • Behzad Molavi,
  • Amirhossein Mohajerzadeh and
  • Ali H. Al-Badi

30 September 2024

In today’s advanced network and digital age, the Internet of Things network is experiencing a significant growing trend and, due to its wide range of services and network coverage, has been able to take a special place in today’s technolo...

  • Article
  • Open Access
1 Citations
3,375 Views
35 Pages

30 September 2024

This article presents a Blockchain-based solution for the management of multipolicies in insurance companies, introducing a standardized policy model to facilitate streamlined operations and enhance collaboration between entities. The model ensures u...

  • Article
  • Open Access
1 Citations
4,359 Views
23 Pages

Multi-User Optimal Load Scheduling of Different Objectives Combined with Multi-Criteria Decision Making for Smart Grid

  • Yaarob Al-Nidawi,
  • Haider Tarish Haider,
  • Dhiaa Halboot Muhsen and
  • Ghadeer Ghazi Shayea

29 September 2024

Load balancing between required power demand and the available generation capacity is the main task of demand response for a smart grid. Matching between the objectives of users and utilities is the main gap that should be addressed in the demand res...

  • Article
  • Open Access
21 Citations
21,243 Views
19 Pages

28 September 2024

Generative AI has drawn significant attention from stakeholders in higher education. As it introduces new opportunities for personalized learning and tutoring support, it simultaneously poses challenges to academic integrity and leads to ethical issu...

  • Article
  • Open Access
4 Citations
2,085 Views
23 Pages

27 September 2024

This paper presents a comprehensive literature review, focusing on the emerging intersection of chatbot technology and the generation of process models. As an evolving field of study, the integration of interactive chatbots into process model generat...

  • Article
  • Open Access
4 Citations
4,682 Views
24 Pages

Automated Detection of Misinformation: A Hybrid Approach for Fake News Detection

  • Fadi Mohsen,
  • Bedir Chaushi,
  • Hamed Abdelhaq,
  • Dimka Karastoyanova and
  • Kevin Wang

27 September 2024

The rise of social media has transformed the landscape of news dissemination, presenting new challenges in combating the spread of fake news. This study addresses the automated detection of misinformation within written content, a task that has promp...

  • Article
  • Open Access
1 Citations
4,138 Views
19 Pages

27 September 2024

Survey data play a crucial role in various research fields, including economics, education, and healthcare, by providing insights into human behavior and opinions. However, item non-response, where respondents fail to answer specific questions, prese...

  • Article
  • Open Access
10 Citations
6,081 Views
27 Pages

27 September 2024

As the digital paradigm stimulates changes in various areas, seaports, which are fundamental to logistics and the global supply chain, are also undergoing a digital revolution, evolving into smart ports. Smart gates are essential components in this t...

  • Article
  • Open Access
1,712 Views
17 Pages

Context-Driven Service Deployment Using Likelihood-Based Approach for Internet of Things Scenarios

  • Nandan Banerji,
  • Chayan Paul,
  • Bikash Debnath,
  • Biplab Das,
  • Gurpreet Singh Chhabra,
  • Bhabendu Kumar Mohanta and
  • Ali Ismail Awad

25 September 2024

In a context-aware Internet of Things (IoT) environment, the functional contexts of devices and users will change over time depending on their service consumption. Each iteration of an IoT middleware algorithm will also encounter changes occurring in...

  • Article
  • Open Access
1,501 Views
13 Pages

24 September 2024

While driving, stress and frustration can affect safe driving and pose the risk of causing traffic accidents. Therefore, it is important to control the driver’s anxiety level in order to improve the driving experience. In this paper, we propose...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903