You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 10, Issue 8

August 2018 - 14 articles

Cover Story: This invited paper is an overview of current and future issues for the Internet of Things (IoT), Internet of Everything (IoE), Internet of Nano-Things (IoNT) and Internet of Bio-Nano-Things (IoBNT). Clear distinctions are drawn between these concepts and also the Industrial Internet of Things (IIoT) and Consumer Internet of Things (CIoT). Future trends are discussed and 21 significant challenges are identified, including their possible developments, concluding with specific priority issues for further research. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (14)

  • Article
  • Open Access
4,550 Views
14 Pages

17 August 2018

Convolutional neural networks (CNN for short) have made great progress in face detection. They mostly take computation intensive networks as the backbone in order to obtain high precision, and they cannot get a good detection speed without the suppor...

  • Article
  • Open Access
17 Citations
8,078 Views
30 Pages

Interactive 3D Exploration of RDF Graphs through Semantic Planes

  • Fabio Viola,
  • Luca Roffia,
  • Francesco Antoniazzi,
  • Alfredo D’Elia,
  • Cristiano Aguzzi and
  • Tullio Salmon Cinotti

17 August 2018

This article presents Tarsier, a tool for the interactive 3D visualization of RDF graphs. Tarsier is mainly intended to support teachers introducing students to Semantic Web data representation formalisms and developers in the debugging of applicatio...

  • Article
  • Open Access
11 Citations
5,496 Views
15 Pages

Queue Spillover Management in a Connected Vehicle Environment

  • Chuanxiang Ren,
  • Wenbo Zhang,
  • Lingqiao Qin and
  • Bo Sun

10 August 2018

To alleviate the queue spillovers at intersections of urban roads during rush hours, a solution to the cross-spill problem based on vehicle networking technologies is proposed. This involves using connected vehicle technology, to realize the interact...

  • Article
  • Open Access
154 Citations
12,700 Views
15 Pages

SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach

  • Marcio Andrey Teixeira,
  • Tara Salman,
  • Maede Zolanvari,
  • Raj Jain,
  • Nader Meskin and
  • Mohammed Samaka

This paper presents the development of a Supervisory Control and Data Acquisition (SCADA) system testbed used for cybersecurity research. The testbed consists of a water storage tank’s control system, which is a stage in the process of water treatmen...

  • Article
  • Open Access
121 Citations
48,282 Views
12 Pages

Instagram is currently the most popular social media app among young people around the world. More than 70% of people between the ages of 12 and 24 are Instagram users. The research framework of this study was constructed based on smartphone addictio...

  • Article
  • Open Access
6 Citations
4,520 Views
18 Pages

Smart Collection of Real-Time Vehicular Mobility Traces

  • Nisrine Ibadah,
  • Khalid Minaoui,
  • Mohammed Rziza,
  • Mohammed Oumsis and
  • César Benavente-Peces

Mobility trace techniques makes possible drawing the behaviors of real-life movement which shape wireless networks mobility whereabouts. In our investigation, several trace mobility models have been collected after the devices’ deployment. The...

  • Article
  • Open Access
3,877 Views
16 Pages

Overloading of IP address semantics appeals for a new network architecture based on Identifier (ID)/Locator separation. The challenge of Identifier (ID)/Locator separation is how to solve the scalability and efficiency challenges of identity-to-locat...

  • Article
  • Open Access
2 Citations
3,944 Views
15 Pages

Regarding access point (AP) overload and performance anomaly which is caused by mobile terminals with different bitrates, a joint AP association and bandwidth allocation optimization algorithm is presented in this paper. Meanwhile, load balancing and...

  • Article
  • Open Access
24 Citations
4,758 Views
19 Pages

In the social scene of opportunistic networks, message applications find suitable relay nodes or certain transmission destinations from the surrounding neighbors through specific network addresses of users. However, at the dawn of big data and 5G net...

  • Article
  • Open Access
5 Citations
5,972 Views
27 Pages

Context Analysis of Cloud Computing Systems Using a Pattern-Based Approach

  • Ludger Goeke,
  • Nazila Gol Mohammadi and
  • Maritta Heisel

Cloud computing services bring new capabilities for hosting and offering complex collaborative business operations. However, these advances might bring undesirable side-effects, e.g., introducing new vulnerabilities and threats caused by collaboratio...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903