


Остановите войну!
for scientists:


default search action
Future Internet, Volume 15
Volume 15, Number 1, January 2023
- Bashar Igried, Atalla Fahed Al-Serhan, Ayoub Alsarhan
, Mohammad Aljaidi
, Amjad Aldweesh
:
Machine Learning Failure-Aware Scheme for Profit Maximization in the Cloud Market. 1 - Adrian Sfichi, Eduard Zadobrischi
, Narcisa Sfichi, Marian Badelita, Mihai Medrihan:
Utility of Sharing Economy Principles in the Development of Applications Dedicated to Construction Cost Estimation. 2 - Yerlan Kistaubayev
, Galimkair Mutanov, Madina Mansurova, Zhanna Saxenbayeva
, Yassynzhan Shakan:
Ethereum-Based Information System for Digital Higher Education Registry and Verification of Student Achievement Documents. 3 - Francisco M. Pereira
, Rute C. Sofia
:
An Analysis of ML-Based Outlier Detection from Mobile Phone Trajectories. 4 - Ben Hasselgren
, Christos Chrysoulas
, Nikolaos Pitropakis
, William J. Buchanan
:
Using Social Media & Sentiment Analysis to Make Investment Decisions. 5 - Qian Yang, Suoping Li
, Hongli Li, Weiru Chen:
Statistical Model of Accurately Estimating Service Delay Behavior in Saturated IEEE 802.11 Networks Based on 2-D Markov Chain. 6 - Haining Zhu, Na Li, Nitish K. Rai, John M. Carroll
:
SmartGroup: A Tool for Small-Group Learning Activities. 7 - Tihomir Orehovacki
, Luka Blaskovic
, Matej Kurevija:
Evaluating the Perceived Quality of Mobile Banking Applications in Croatia: An Empirical Study. 8 - Duc-Minh Ngo
, Dominic Lightbody, Andriy Temko
, Cuong Pham-Quoc
, Ngoc-Thinh Tran
, Colin C. Murphy, Emanuel M. Popovici:
HH-NIDS: Heterogeneous Hardware-Based Network Intrusion Detection Framework for IoT Security. 9 - Eduardo Pina
, Filipe Sá, Jorge Bernardino
:
NewSQL Databases Assessment: CockroachDB, MariaDB Xpand, and VoltDB. 10 - Konstantinos Kotis
, Stavros Stavrinos, Christos Kalloniatis
:
Review on Semantic Modeling and Simulation of Cybersecurity and Interoperability on the Internet of Underwater Things. 11 - Giuseppe Vizzari
, Thomas Cecconello
:
Pedestrian Simulation with Reinforcement Learning: A Curriculum-Based Approach. 12 - Jiaxu Zhao, Binting Su, Xuli Rao, Zhide Chen:
A Cross-Platform Personalized Recommender System for Connecting E-Commerce and Social Network. 13 - Roberto de Fazio
, Vincenzo Mariano Mastronardi
, Matteo Petruzzi, Massimo de Vittorio, Paolo Visconti
:
Human-Machine Interaction through Advanced Haptic Sensors: A Piezoelectric Sensory Glove with Edge Machine Learning for Gesture and Object Recognition. 14 - Moreno La Quatra
, Luca Cagliero
:
BART-IT: An Efficient Sequence-to-Sequence Model for Italian Text Summarization. 15 - Qadri Hamarsheh, Omar R. Daoud
, Mohammed Baniyounis, Ahlam Damati
:
Narrowband Internet-of-Things to Enhance the Vehicular Communications Performance. 16 - Yunchuan Liu
, Amir Ghasemkhani
, Lei Yang
:
Drifting Streaming Peaks-Over-Threshold-Enhanced Self-Evolving Neural Networks for Short-Term Wind Farm Generation Forecast. 17 - Annalisa Liccardo
, Francesco Bonavolontà
:
VR, AR, and 3-D User Interfaces for Measurement and Control. 18 - Sarantis Kalafatidis
, Sotiris Skaperas
, Vassilis Demiroglou, Lefteris Mamatas
, Vassilis Tsaoussidis
:
Logically-Centralized SDN-Based NDN Strategies for Wireless Mesh Smart-City Networks. 19 - Maria A. Perifanou
, Anastasios A. Economides
, Stavros A. Nikou
:
Teachers' Views on Integrating Augmented Reality in Education: Needs, Opportunities, Challenges and Recommendations. 20 - Khando Khando, M. Sirajul Islam
, Shang Gao
:
The Emerging Technologies of Digital Payments and Associated Challenges: A Systematic Literature Review. 21 - Songtao Huang, Jun Shen
, Qingquan Lv, Qingguo Zhou, Binbin Yong:
A Novel NODE Approach Combined with LSTM for Short-Term Electricity Load Forecasting. 22 - Barbara Cardone, Ferdinando Di Martino
, Vittorio Miraglia:
A GIS-Based Hot and Cold Spots Detection Method by Extracting Emotions from Social Streams. 23 - Jinze Du
, Chengtai Gao
, Tao Feng
:
Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service. 24 - Qiang Li:
A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph. 25 - Teresa Gonçalves
, Rute Veladas, Hua Yang
, Renata Vieira
, Paulo Quaresma
, Paulo Infante
, Cátia Sousa Pinto, João Oliveira, Maria Cortes Ferreira, Jéssica Morais, Ana Raquel Pereira, Nuno Fernandes, Carolina Gonçalves:
Clinical Screening Prediction in the Portuguese National Health Service: Data Analysis, Machine Learning Models, Explainability and Meta-Evaluation. 26 - Emilio Matricciani
, Carlo Riva
:
Transfer Functions and Linear Distortions in Ultra-Wideband Channels Faded by Rain in GeoSurf Satellite Constellations. 27 - Katerina Kabassi
, Anastasia Papadaki, Athanasios Botonis:
Adapting Recommendations on Environmental Education Programs. 28 - Brent Pethers, Abubakar Bello:
Role of Attention and Design Cues for Influencing Cyber-Sextortion Using Social Engineering and Phishing Attacks. 29 - Ke Zhao, Rui Han, Xu Wang:
Time Segmentation-Based Hybrid Caching in 5G-ICN Bearer Network. 30 - Qingyan Zhou
, Hao Li, Youhua Zhang
, Junhong Zheng:
Product Evaluation Prediction Model Based on Multi-Level Deep Feature Fusion. 31 - Sandulika Abesinghe
, Nayomi Kankanamge, Tan Yigitcanlar
, Surabhi Pancholi:
Image of a City through Big Data Analytics: Colombo from the Lens of Geo-Coded Social Media Data. 32 - Leny Vinceslas
, Safak Dogan
, Srikumar Sundareshwar, Ahmet M. Kondoz:
Abstracting Data in Distributed Ledger Systems for Higher Level Analytics and Visualizations. 33 - Siyuan Yang
, Mondher Bouazizi
, Tomoaki Ohtsuki
, Yohei Shibata
, Wataru Takabatake, Kenji Hoshino, Atsushi Nagate:
Deep Reinforcement Learning Evolution Algorithm for Dynamic Antenna Control in Multi-Cell Configuration HAPS System. 34 - Shams Mhmood Abd Ali
, Mohd Najwadi Yusoff, Hasan Falah Hasan
:
Redactable Blockchain: Comprehensive Review, Mechanisms, Challenges, Open Issues and Future Research Directions. 35 - Sean Grimes
, David E. Breen
:
A Multi-Agent Approach to Binary Classification Using Swarm Intelligence. 36 - Sjouke de Vries, Frank J. Blaauw
, Vasilios Andrikopoulos
:
Cost-Profiling Microservice Applications Using an APM Stack. 37 - Geneci da Silva Ribeiro Rocha
, Diego Durante Mühl
, Hermenegildo Almeida Chingamba
, Leticia de Oliveira
, Edson Talamini
:
Blockchain, Quo Vadis? Recent Changes in Perspectives on the Application of Technology in Agribusiness. 38 - Neamah S. Radam
, Sufyan T. Faraj Al-Janabi
, Khalid Shaker:
Using Metaheuristics (SA-MCSDN) Optimized for Multi-Controller Placement in Software-Defined Networking. 39
Volume 15, Number 2, February 2023
- Future Internet Editorial Office:
Acknowledgment to the Reviewers of Future Internet in 2022. 40 - Wellington Lobato
, Paulo Mendes
, Denis Rosário, Eduardo Cerqueira
, Leandro A. Villas
:
Redundancy Mitigation Mechanism for Collective Perception in Connected and Autonomous Vehicles. 41 - Paolo Bellavista
, Mattia Fogli
, Carlo Giannelli
, Cesare Stefanelli
:
Application-Aware Network Traffic Management in MEC-Integrated Industrial Environments. 42 - Theofanis P. Raptis
, Claudio Cicconetti
, Manolis Falelakis
, Grigorios Kalogiannis, Tassos Kanellos, Tomás Pariente Lobo:
Engineering Resource-Efficient Data Management for Smart Cities with Apache Kafka. 43 - Husam M. Alawadh, Amerah Alabrah
, Talha Meraj
, Hafiz Tayyab Rauf
:
Attention-Enriched Mini-BERT Fake News Analyzer Using the Arabic Language. 44 - A. M. Sakura R. H. Attanayake, R. M. Chandima Ratnayake
:
Digitalization of Distribution Transformer Failure Probability Using Weibull Approach towards Digital Transformation of Power Distribution Systems. 45 - Ganapathy Ramesh, Jaganathan Logeshwaran
, Thangavel Kiruthiga, Jaime Lloret
:
Prediction of Energy Production Level in Large PV Plants through AUTO-Encoder Based Neural-Network (AUTO-NN) with Restricted Boltzmann Feature Extraction. 46 - Zhaohui Huang, Vasilis Friderikos:
Optimal Mobility-Aware Wireless Edge Cloud Support for the Metaverse. 47 - Paolo Bocciarelli
, Andrea D'Ambrogio
:
A TOSCA-Based Conceptual Architecture to Support the Federation of Heterogeneous MSaaS Infrastructures. 48 - Mateusz Malarczyk
, Mateusz Zychlewicz
, Radoslaw Stanislawski
, Marcin Kaminski
:
Electric Drive with an Adaptive Controller and Wireless Communication System. 49 - Paolo Bocciarelli
, Andrea D'Ambrogio
, Tommaso Panetti:
A Model Based Framework for IoT-Aware Business Process Management. 50 - Pin Wu
, Lulu Ji, Wenyan Yuan, Zhitao Liu, Tiantian Tang:
A Digital Twin Framework Embedded with POD and Neural Network for Flow Field Monitoring of Push-Plate Kiln. 51 - Pedro F. Durães, Mário P. Véstias
:
Smart Embedded System for Skin Cancer Classification. 52 - Eman AbuKhousa, Mohamed Sami El-Tahawy
, Yacine Atif
:
Envisioning Architecture of Metaverse Intensive Learning Experience (MiLEx): Career Readiness in the 21st Century and Collective Intelligence Development Scenario. 53 - Mohammed El-hajj
, Hussien Mousawi, Ahmad Fadlallah
:
Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform. 54 - Leonardo Militano, Adriana Arteaga, Giovanni Toffetti
, Nathalie Mitton
:
The Cloud-to-Edge-to-IoT Continuum as an Enabler for Search and Rescue Operations. 55 - Yonghong Chen, Lei Xun, Shibing Zhang:
The Energy Efficiency of Heterogeneous Cellular Networks Based on the Poisson Hole Process. 56 - Maziar Nekovee, Ferheen Ayaz
:
Vision, Enabling Technologies, and Scenarios for a 6G-Enabled Internet of Verticals (6G-IoV). 57 - Eduardo Ferreira
, Pedro Sebastião
, Francisco Cercas
, Carlos Sá Costa, Américo Correia:
An Optimized Planning Tool for Microwave Terrestrial and Satellite Link Design. 58 - Abderrahmane Maaradji
, Hakim Hacid, Assia Soukane:
From Service Composition to Mashup Editor: A Multiperspective Taxonomy. 59 - Evgeniy Mokrov
, Konstantin E. Samouylov
:
Performance Assessment and Comparison of Deployment Options for 5G Millimeter Wave Systems. 60 - Kuldoshbay Avazov, An Eui Hyun, Alabdulwahab Abrar Sami S
, Azizbek Khaitov, Akmalbek Bobomirzaevich Abdusalomov
, Young Im Cho
:
Forest Fire Detection and Notification Method Based on AI and IoT Approaches. 61 - Afnan Alotaibi, Murad A. Rassam
:
Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense. 62 - Eddy Truyen
, Hongjie Xie, Wouter Joosen:
Vendor-Agnostic Reconfiguration of Kubernetes Clusters in Cloud Federations. 63 - Nafi Ahmad
, Abdul Wahab
, John A. Schormans, Ali Adib Arnab:
Significance of Cross-Correlated QoS Configurations for Validating the Subjective and Objective QoE of Cloud Gaming Applications. 64 - Fan Liu
, Jiandong Fang
:
Multi-Scale Audio Spectrogram Transformer for Classroom Teaching Interaction Recognition. 65 - Dimitris Koryzis, Dionisis Margaris
, Costas Vassilakis
, Konstantinos Kotis
, Dimitris Spiliotopoulos
:
Disruptive Technologies for Parliaments: A Literature Review. 66 - Franco Bagnoli
, Guido de Bonfioli Cavalcabo'
:
A Simple Model of Knowledge Scaffolding Applied to Wikipedia Growth. 67 - Lu Han, Xiaohong Huang, Dandan Li, Yong Zhang:
RingFFL: A Ring-Architecture-Based Fair Federated Learning Framework. 68 - Marina Ricci
, Alessandra Scarcelli
, Michele Fiorentino
:
Designing for the Metaverse: A Multidisciplinary Laboratory in the Industrial Design Program. 69 - Swarnendu Ghosh
, Teresa Gonçalves, Nibaran Das:
Im2Graph: A Weakly Supervised Approach for Generating Holistic Scene Graphs from Regional Dependencies. 70 - Christoph Stach
:
Data Is the New Oil-Sort of: A View on Why This Comparison Is Misleading and Its Implications for Modern Data Administration. 71 - Álvaro Antón-Sancho, Pablo Fernández-Arias, Diego Vergara
:
Perception of the Use of Virtual Reality Didactic Tools among Faculty in Mexico. 72 - Vitória Francesca Biasibetti Zilli, César David Paredes Crovato
, Rodrigo da Rosa Righi
, Rodrigo Ivan Goytia Mejia
, Giovani Pesenti
, Dhananjay Singh
:
I4.0I: A New Way to Rank How Involved a Company Is in the Industry 4.0 Era. 73 - Yanxia Li, Yang Li:
Collaborative Storage and Resolution Method between Layers in Hierarchical ICN Name Resolution Systems. 74 - Soukaina Bouarourou
, Abderrahim Zannou, El Habib Nfaoui
, Abdelhak Boulaalam
:
An Efficient Model-Based Clustering via Joint Multiple Sink Placement for WSNs. 75 - Sheeraz Ahmed, Zahoor Ali Khan
, Syed Muhammad Mohsin
, Shahid Latif, Sheraz Aslam
, Hana Mujlid
, Muhammad Adil, Zeeshan Najam:
Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer Perceptron. 76 - Ronny Seiger
, Marco Franceschetti
, Barbara Weber
:
An Interactive Method for Detection of Process Activity Executions from IoT Data. 77 - Sachin Sharma
, Avishek Nag
:
Cognitive Software Defined Networking and Network Function Virtualization and Applications. 78 - Tahir Mehmood, Ivan Serina
, Alberto Lavelli
, Luca Putelli, Alfonso Gerevini:
On the Use of Knowledge Transfer Techniques for Biomedical Named Entity Recognition. 79 - Yong Xu, Hong Ni, Xiaoyong Zhu:
A Novel Multipath Transmission Scheme for Information-Centric Networking. 80 - Atik Kulakli
, Cenk Lacin Arikan
:
Research Trends of the Internet of Things in Relation to Business Model Innovation: Results from Co-Word and Content Analyses. 81 - Marta Flamini, Maurizio Naldi
:
Optimal Pricing in a Rented 5G Infrastructure Scenario with Sticky Customers. 82 - Tehseen Mazhar
, Hafiz Muhammad Irfan, Sunawar Khan, Inayatul Haq
, Inam Ullah, Muhammad Iqbal, Habib Hamam
:
Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods. 83 - Shadi AlZu'bi
, Mohammad W. Elbes, Ala Mughaid
, Noor Bdair, Laith Abualigah
, Agostino Forestiero
, Raed Abu Zitar:
Diabetes Monitoring System in Smart Health Cities Based on Big Data Intelligence. 85

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.