Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 17, Issue 9

2025 September - 53 articles

Cover Story: This study presents a framework to enhance large-scale group decision-making using large language models. Unlike traditional methods, it captures how preferences are expressed, emphasizing clarity and trust. Experts are grouped into behavioural profiles with representative preferences and weighted influence. A sentiment-informed consensus mechanism integrates these profiles into a collective decision. This approach improves scalability, fairness, and interpretability, fostering balanced outcomes in digital platforms. Our case study shows that behavioural signals enhance decision quality, highlighting LLMs’ potential for next-generation decision support. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (53)

  • Review
  • Open Access
1 Citations
1,886 Views
20 Pages

21 September 2025

Accurate livestock monitoring is critical for precision agriculture, supporting effective farm management, disease prevention, and sustainable resource allocation. Deep learning and remote sensing are recent technological advancements that have creat...

  • Article
  • Open Access
5 Citations
2,412 Views
22 Pages

AI-Driven Transformations in Manufacturing: Bridging Industry 4.0, 5.0, and 6.0 in Sustainable Value Chains

  • Andrés Fernández-Miguel,
  • Fernando Enrique García-Muiña,
  • Susana Ortíz-Marcos,
  • Mariano Jiménez-Calzado,
  • Alfonso P. Fernández del Hoyo and
  • Davide Settembre-Blundo

21 September 2025

This study investigates how AI-driven innovations are reshaping manufacturing value chains through the transition from Industry 4.0 to Industry 6.0, particularly in resource-intensive sectors such as ceramics. Addressing a gap in the literature, the...

  • Article
  • Open Access
874 Views
18 Pages

A Behavior-Aware Caching Architecture for Web Applications Using Static, Dynamic, and Burst Segmentation

  • Carlos Gómez-Pantoja,
  • Daniela Baeza-Rocha and
  • Alonso Inostrosa-Psijas

20 September 2025

This work proposes a behavior-aware caching architecture that improves cache hit rates by up to 10.8% over LRU and 36% over LFU in large-scale web applications, reducing redundant traffic and alleviating backend server load. The architecture partitio...

  • Systematic Review
  • Open Access
1 Citations
3,660 Views
29 Pages

19 September 2025

This study examines the evolution and impact of Big Data technologies across sectors, emphasizing key algorithms, emerging trends, and organizational challenges in their adoption. Special attention is given to ethical concerns related to data privacy...

  • Article
  • Open Access
2 Citations
729 Views
13 Pages

Collaborative Fusion Attention Mechanism for Vehicle Fault Prediction

  • Hong Jia,
  • Dalin Qian,
  • Fanghua Chen and
  • Wei Zhou

19 September 2025

In this study, we investigate a deep learning-based vehicle fault prediction model aimed at achieving accurate prediction of vehicle faults by analyzing the correlations among different faults and the impact of critical faults on future fault develop...

  • Article
  • Open Access
1 Citations
715 Views
29 Pages

19 September 2025

Real-time media streaming over publish–subscribe platforms is increasingly vital in scenarios that demand the scalability of event-driven architectures while ensuring timely media delivery. This is especially true in multi-modal and resource-co...

  • Article
  • Open Access
1 Citations
975 Views
32 Pages

Design and Evaluation of a Research-Oriented Open-Source Platform for Smart Grid Metering: A Comprehensive Review and Experimental Intercomparison of Smart Meter Technologies

  • Nikolaos S. Korakianitis,
  • Panagiotis Papageorgas,
  • Georgios A. Vokas,
  • Dimitrios D. Piromalis,
  • Stavros D. Kaminaris,
  • George Ch. Ioannidis and
  • Ander Ochoa de Zuazola

19 September 2025

Smart meters (SMs) are essential components of modern smart grids, enabling real-time and accurate monitoring of electricity consumption. However, their evaluation is often hindered by proprietary communication protocols and the high cost of commerci...

  • Editorial
  • Open Access
578 Views
3 Pages

18 September 2025

The rapid expansion of cyber-physical systems (CPSs) and networked environments—including the Internet of Things (IoT), Industrial IoT (IIoT), and the Internet of Vehicles (IoV)—has transformed modern infrastructures, enabling unprecedent...

  • Article
  • Open Access
1 Citations
499 Views
24 Pages

18 September 2025

Content caching and exchange through device-to-device (D2D) communications can offload data from the centralized base station and improve the quality of users’ experience. However, existing studies often overlook the selfish nature of user equi...

  • Article
  • Open Access
1 Citations
1,475 Views
32 Pages

Intercepting and Monitoring Potentially Malicious Payloads with Web Honeypots

  • Rareș-Mihail Visalom,
  • Maria-Elena Mihăilescu,
  • Răzvan Rughiniș and
  • Dinu Țurcanu

17 September 2025

The rapid development of an increasing volume of web apps and the improper testing of the resulting code invariably provide more attack surfaces to potentially exploit. This leads to higher chances of facing cybersecurity breaches that can negatively...

  • Review
  • Open Access
3 Citations
2,952 Views
16 Pages

15 September 2025

Meeting global forest restoration targets by 2030 requires a transition from labor-intensive and opaque practices to scalable, intelligent, and verifiable systems. This paper introduces a cyber–physical digital twin architecture for forest rest...

  • Article
  • Open Access
809 Views
22 Pages

Dynamic Channel Selection for Rendezvous in Cognitive Radio Networks

  • Mohammed Hawa,
  • Ramzi Saifan,
  • Talal A. Edwan and
  • Oswa M. Amro

15 September 2025

In an attempt to improve utilization of the frequency spectrum left vacant by license holders, cognitive radio networks (CRNs) permit secondary users (SUs) to utilize such spectrum when the license holders, known as primary users (PUs), are inactive....

  • Article
  • Open Access
896 Views
30 Pages

15 September 2025

The rapid adoption of Metaverse technologies in healthcare, particularly for elder safety monitoring, has introduced new security challenges related to the authenticity of virtual representations. As healthcare providers increasingly rely on avatars...

  • Article
  • Open Access
1 Citations
1,782 Views
27 Pages

Refactoring Loops in the Era of LLMs: A Comprehensive Study

  • Alessandro Midolo and
  • Emiliano Tramontana

12 September 2025

Java 8 brought functional programming to the Java language and library, enabling more expressive and concise code to replace loops by using streams. Despite such advantages, for-loops remain prevalent in current codebases as the transition to the fun...

  • Review
  • Open Access
6 Citations
8,514 Views
40 Pages

Intelligent Edge Computing and Machine Learning: A Survey of Optimization and Applications

  • Sebastián A. Cajas Ordóñez,
  • Jaydeep Samanta,
  • Andrés L. Suárez-Cetrulo and
  • Ricardo Simón Carbajo

11 September 2025

Intelligent edge machine learning has emerged as a paradigm for deploying smart applications across resource-constrained devices in next-generation network infrastructures. This survey addresses the critical challenges of implementing machine learnin...

  • Article
  • Open Access
999 Views
28 Pages

11 September 2025

As smart cities evolve, the demand for real-time, secure, and adaptive network monitoring, continues to grow. Software-Defined Networking (SDN) offers a centralized approach to managing network flows; However, anomaly detection within SDN environment...

  • Article
  • Open Access
927 Views
19 Pages

11 September 2025

Background: Container orchestration systems like Kubernetes rely heavily on declarative manifest files, which serve as orchestration blueprints. However, managing these manifest files is often complex and requires substantial DevOps expertise. Method...

  • Article
  • Open Access
1,126 Views
22 Pages

10 September 2025

The proliferation of sensor technology has led to an explosion in data volume, making the retrieval of specific information from large repositories increasingly challenging. While Retrieval-Augmented Generation (RAG) can enhance Large Language Models...

  • Article
  • Open Access
788 Views
19 Pages

10 September 2025

This study presents a deep generative model designed to predict intermediate stages in the drawing process of character illustrations. To enhance generalization and robustness, the model integrates a variational bottleneck based on the Variational Au...

  • Article
  • Open Access
1,356 Views
28 Pages

GPT-4.1 Sets the Standard in Automated Experiment Design Using Novel Python Libraries

  • Nuno Fachada,
  • Daniel Fernandes,
  • Carlos M. Fernandes,
  • Bruno D. Ferreira-Saraiva and
  • João P. Matos-Carvalho

8 September 2025

Large language models (LLMs) have advanced rapidly as tools for automating code generation in scientific research, yet their ability to interpret and use unfamiliar Python APIs for complex computational experiments remains poorly characterized. This...

  • Article
  • Open Access
2 Citations
843 Views
25 Pages

8 September 2025

Distributed denial-of-service (DDoS) attacks are a prevalent threat to resource-constrained IoT deployments. We present an edge-based detection and mitigation system integrated with the oneM2M architecture. By using a Raspberry Pi 4 client and five R...

  • Article
  • Open Access
670 Views
23 Pages

8 September 2025

As the demand for high-quality video streaming applications continues to rise, multi-access edge computing (MEC)-assisted streaming schemes have emerged as a viable solution within the context of HTTP adaptive streaming (HAS). These schemes aim to en...

  • Review
  • Open Access
1 Citations
2,581 Views
25 Pages

Survey of Federated Learning for Cyber Threat Intelligence in Industrial IoT: Techniques, Applications and Deployment Models

  • Abin Kumbalapalliyil Tom,
  • Ansam Khraisat,
  • Tony Jan,
  • Md Whaiduzzaman,
  • Thien D. Nguyen and
  • Ammar Alazab

8 September 2025

The Industrial Internet of Things (IIoT) is transforming industrial operations through connected devices and real-time automation but also introduces significant cybersecurity risks. Cyber threat intelligence (CTI) is critical for detecting and mitig...

  • Article
  • Open Access
658 Views
38 Pages

A GHZ-Based Protocol for the Dining Information Brokers Problem

  • Theodore Andronikos,
  • Constantinos Bitsakos,
  • Konstantinos Nikas,
  • Georgios I. Goumas and
  • Nectarios Koziris

6 September 2025

This article introduces the innovative Quantum Dining Information Brokers Problem, presenting a novel entanglement-based quantum protocol to address it. The scenario involves n information brokers, all located in distinct geographical regions, engagi...

  • Article
  • Open Access
1,141 Views
20 Pages

6 September 2025

Achieving consensus in group decision-making often involves overcoming significant challenges, particularly reconciling diverse perspectives and mitigating biases hindering agreement. Traditional methods relying on human facilitators are usually cons...

  • Article
  • Open Access
2 Citations
857 Views
21 Pages

5 September 2025

Three-dimensional path planning is critical for the successful operation of unmanned aerial vehicles (UAVs), automated guided vehicles (AGVs), and robots in industrial Internet of Things (IIoT) applications. In 3D path planning, the standard Particle...

  • Article
  • Open Access
705 Views
28 Pages

5 September 2025

To foster the performance of wireless communication while saving energy, the integration of Intelligent Reflecting Surfaces (IRS) into autonomous vehicle (AV) communication networks is considered a powerful technique. This paper proposes a novel IRS-...

  • Review
  • Open Access
12 Citations
24,507 Views
50 Pages

The Rise of Agentic AI: A Review of Definitions, Frameworks, Architectures, Applications, Evaluation Metrics, and Challenges

  • Ajay Bandi,
  • Bhavani Kongari,
  • Roshini Naguru,
  • Sahitya Pasnoor and
  • Sri Vidya Vilipala

4 September 2025

Agentic AI systems are a recently emerged and important approach that goes beyond traditional AI, generative AI, and autonomous systems by focusing on autonomy, adaptability, and goal-driven reasoning. This study provides a clear review of agentic AI...

  • Article
  • Open Access
2,535 Views
26 Pages

Cell-Sequence-Based Covert Signal for Tor De-Anonymization Attacks

  • Ran Xin,
  • Yapeng Wang,
  • Xiaohong Huang,
  • Xu Yang and
  • Sio Kei Im

4 September 2025

This research introduces a novel de-anonymization technique targeting the Tor network, addressing limitations in prior attack models, particularly concerning router positioning following the introduction of bridge relays. Our method exploits two spec...

  • Article
  • Open Access
955 Views
21 Pages

Dynamic Resource Management in 5G-Enabled Smart Elderly Care Using Deep Reinforcement Learning

  • Krishnapriya V. Shaji,
  • Srilakshmi S. Rethy,
  • Simi Surendran,
  • Livya George,
  • Namita Suresh and
  • Hrishika Dayan

2 September 2025

The increasing elderly population presents major challenges to traditional healthcare due to the need for continuous care, a shortage of skilled professionals, and increasing medical costs. To address this, smart elderly care homes where multiple res...

  • Article
  • Open Access
655 Views
19 Pages

2 September 2025

In this paper, we introduce an Unmanned Aerial Vehicle (UAV) deployment design with a connectivity constraint for UAV-assisted communication networks. In such networks, multiple UAVs are collaboratively deployed in the air to form a network that real...

  • Article
  • Open Access
3 Citations
2,644 Views
32 Pages

1 September 2025

The recent worldwide turbulence of events from the pandemic lockdown through increased industrial digitization to geopolitical unease shifted towards new primary targets for the latest generation of DDoS threats. Although certain characteristics of c...

  • Article
  • Open Access
1,238 Views
21 Pages

SwiftKV: A Metadata Indexing Scheme Integrating LSM-Tree and Learned Index for Distributed KV Stores

  • Zhenfei Wang,
  • Jianxun Feng,
  • Longxiang Dun,
  • Ziliang Bao and
  • Chunfeng Du

30 August 2025

Optimizing metadata indexing remains critical for enhancing distributed file system performance. The Traditional Log-Structured Merge-Trees (LSM-Trees) architecture, while effective for write-intensive operations, exhibits significant limitations whe...

  • Article
  • Open Access
1 Citations
1,213 Views
28 Pages

Identifying Literary Microgenres and Writing Style Differences in Romanian Novels with ReaderBench and Large Language Models

  • Aura Cristina Udrea,
  • Stefan Ruseti,
  • Vlad Pojoga,
  • Stefan Baghiu,
  • Andrei Terian and
  • Mihai Dascalu

30 August 2025

Recent developments in natural language processing, particularly large language models (LLMs), create new opportunities for literary analysis in underexplored languages like Romanian. This study investigates stylistic heterogeneity and genre blending...

  • Review
  • Open Access
3,034 Views
28 Pages

Reinforcement Learning in Medical Imaging: Taxonomy, LLMs, and Clinical Challenges

  • A. B. M. Kamrul Islam Riad,
  • Md. Abdul Barek,
  • Hossain Shahriar,
  • Guillermo Francia and
  • Sheikh Iqbal Ahamed

30 August 2025

Reinforcement learning (RL) is being used more in medical imaging for segmentation, detection, registration, and classification. This survey provides a comprehensive overview of RL techniques applied in this domain, categorizing the literature based...

  • Article
  • Open Access
1,432 Views
23 Pages

From CSI to Coordinates: An IoT-Driven Testbed for Individual Indoor Localization

  • Diana Macedo,
  • Miguel Loureiro,
  • Óscar G. Martins,
  • Joana Coutinho Sousa,
  • David Belo and
  • Marco Gomes

30 August 2025

Indoor wireless networks face increasing challenges in maintaining stable coverage and performance, particularly with the widespread use of high-frequency Wi-Fi and growing demands from smart home devices. Traditional methods to improve signal qualit...

  • Article
  • Open Access
2,037 Views
27 Pages

29 August 2025

Malicious actors often exploit persistence mechanisms, such as unauthorized modifications to Windows startup directories or registry keys, to achieve privilege escalation and maintain access on compromised systems. While information technology (IT) t...

  • Article
  • Open Access
1,008 Views
20 Pages

RS-MADDPG: Routing Strategy Based on Multi-Agent Deep Deterministic Policy Gradient for Differentiated QoS Services

  • Shi Kuang,
  • Jinyu Zheng,
  • Shilin Liang,
  • Yingying Li,
  • Siyuan Liang and
  • Wanwei Huang

29 August 2025

As network environments become increasingly dynamic and users’ Quality of Service (QoS) demands grow more diverse, efficient and adaptive routing strategies are urgently needed. However, traditional routing strategies suffer from limitations su...

  • Article
  • Open Access
1 Citations
1,284 Views
28 Pages

Hybrid B5G-DTN Architecture with Federated Learning for Contextual Communication Offloading

  • Manuel Jesús-Azabal,
  • Meichun Zheng and
  • Vasco N. G. J. Soares

29 August 2025

In dense urban environments and large-scale events, Internet infrastructure often becomes overloaded due to high communication demand. Many of these communications are local and short-lived, exchanged between users in close proximity but still relyin...

  • Article
  • Open Access
1 Citations
1,288 Views
24 Pages

Safeguarding Brand and Platform Credibility Through AI-Based Multi-Model Fake Profile Detection

  • Vishwas Chakranarayan,
  • Fadheela Hussain,
  • Fayzeh Abdulkareem Jaber,
  • Redha J. Shaker and
  • Ali Rizwan

29 August 2025

The proliferation of fake profiles on social media presents critical cybersecurity and misinformation challenges, necessitating robust and scalable detection mechanisms. Such profiles weaken consumer trust, reduce user engagement, and ultimately harm...

  • Article
  • Open Access
1 Citations
861 Views
21 Pages

A Framework for Data Lifecycle Model Selection

  • Mauro Iacono,
  • Michele Mastroianni,
  • Christian Riccio and
  • Bruna Viscardi

28 August 2025

The selection of Data Lifecycle Models (DLMs) in complex data management scenarios necessitates finding a balance between quantitative and qualitative characteristics to ensure regulation, improve performance, and maintain governance requirements. In...

  • Article
  • Open Access
4 Citations
6,037 Views
33 Pages

28 August 2025

This study aims to conduct a comprehensive comparative evaluation of three transformer-based models, PEGASUS, BART, and T5 variants (SMALL and BASE), for the task of abstractive text summarization. The evaluation spans across three benchmark datasets...

  • Article
  • Open Access
1 Citations
1,472 Views
34 Pages

28 August 2025

Air pollution threatens human and environmental health worldwide. A Harvard study in partnership with UK institutions found that fossil fuel pollution killed over 8 million people in 2018, accounting for 1 in 5 fatalities worldwide. Iraq, including t...

  • Article
  • Open Access
1,200 Views
23 Pages

Ensemble Learning for Software Requirement-Risk Assessment: A Comparative Study of Bagging and Boosting Approaches

  • Chandan Kumar,
  • Pathan Shaheen Khan,
  • Medandrao Srinivas,
  • Sudhanshu Kumar Jha,
  • Shiv Prakash and
  • Rajkumar Singh Rathore

27 August 2025

In software development, software requirement engineering (SRE) is an essential stage that guarantees requirements are clear and unambiguous. However, incomplete inconsistency, and ambiguity in requirement documents often occur, which can cause proje...

  • Review
  • Open Access
1 Citations
2,856 Views
29 Pages

Is the Healthcare Industry Ready for Digital Twins? Examining the Opportunities and Challenges

  • Srinivasini Sasitharasarma,
  • Noor H. S. Alani and
  • Zazli Lily Wisker

27 August 2025

Recent advancements in the healthcare sector have reached a pivotal juncture, catalysed by the emergence of Digital Twin (DT) technologies. These innovations facilitate the development of virtual replicas that accurately simulate real-world condition...

  • Review
  • Open Access
4 Citations
2,156 Views
35 Pages

Blockchain for Security in Digital Twins

  • Rahanatu Suleiman,
  • Akshita Maradapu Vera Venkata Sai,
  • Wei Yu and
  • Chenyu Wang

27 August 2025

Digital Twins (DTs) have become essential tools for improving efficiency, security, and decision-making across various industries. DTs enable deeper insight and more informed decision-making through the creation of virtual replicas of physical entiti...

  • Article
  • Open Access
847 Views
30 Pages

26 August 2025

The graded management of structured sensitive data has become a key challenge in data security governance, particularly amid digital transformation in sectors such as government, finance, and healthcare. The existing methods suffer from limited gener...

  • Review
  • Open Access
4 Citations
4,120 Views
28 Pages

Technical Review: Architecting an AI-Driven Decision Support System for Enhanced Online Learning and Assessment

  • Saipunidzam Mahamad,
  • Yi Han Chin,
  • Nur Izzah Nasuha Zulmuksah,
  • Md Mominul Haque,
  • Muhammad Shaheen and
  • Kanwal Nisar

26 August 2025

The rapid expansion of online learning platforms has necessitated advanced systems to address scalability, personalization, and assessment challenges. This paper presents a comprehensive review of artificial intelligence (AI)-based decision support s...

  • Article
  • Open Access
1 Citations
1,606 Views
25 Pages

26 August 2025

Current IoT systems are structured around Edge, Fog, and Cloud layers to manage data and resource constraints more effectively. Although several studies have examined IoT simulators from a functional angle, few have combined technical comparisons wit...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903