You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 11, Issue 2

February 2019 - 28 articles

Cover Story: Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), and Vehicle-to-Everything (V2X) technologies strive to give communication models that can be employed by vehicles in different application contexts. The main aim of this review is to examine and assess the most relevant systems, applications, and communication protocols for determining the future road infrastructures used by vehicles. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (28)

  • Article
  • Open Access
18 Citations
5,709 Views
14 Pages

21 February 2019

To facilitate product developers capturing the varying requirements from users to support their feature evolution process, requirements evolution prediction from massive review texts is in fact of great importance. The proposed framework combines a s...

  • Article
  • Open Access
41 Citations
6,835 Views
12 Pages

Embedded Deep Learning for Ship Detection and Recognition

  • Hongwei Zhao,
  • Weishan Zhang,
  • Haoyun Sun and
  • Bing Xue

21 February 2019

Ship detection and recognition are important for smart monitoring of ships in order to manage port resources effectively. However, this is challenging due to complex ship profiles, ship background, object occlusion, variations of weather and light co...

  • Article
  • Open Access
17 Citations
4,482 Views
13 Pages

19 February 2019

In order to achieve more efficient energy consumption, it is crucial that accurate detailed information is given on how power is consumed. Electricity details benefit both market utilities and also power consumers. Non-intrusive load monitoring (NILM...

  • Article
  • Open Access
24 Citations
5,973 Views
12 Pages

A Multi-Agent Architecture for Data Analysis

  • Gianfranco Lombardo,
  • Paolo Fornacciari,
  • Monica Mordonini,
  • Michele Tomaiuolo and
  • Agostino Poggi

18 February 2019

ActoDatA (Actor Data Analysis) is an actor-based software library for the development of distributed data mining applications. It provides a multi-agent architecture with a set of predefined and configurable agents performing the typical tasks of dat...

  • Article
  • Open Access
22 Citations
7,814 Views
21 Pages

Minimum Viable Products for Internet of Things Applications: Common Pitfalls and Practices

  • Anh Nguyen-Duc,
  • Khan Khalid,
  • Sohaib Shahid Bajwa and
  • Tor Lønnestad

18 February 2019

Internet of Things applications are not only the new opportunity for digital businesses but also a major driving force for the modification and creation of software systems in all industries and businesses. Compared to other types of software-intensi...

  • Article
  • Open Access
15 Citations
5,914 Views
10 Pages

Vehicle Politeness in Driving Situations

  • Jae-Gil Lee,
  • Kwan Min Lee and
  • Seoung-Ho Ryu

16 February 2019

Future vehicles are becoming more like driving partners instead of mere machines. With the application of advanced information and communication technologies (ICTs), vehicles perform driving tasks while drivers monitor the functioning states of vehic...

  • Article
  • Open Access
4 Citations
6,174 Views
20 Pages

BlackWatch: Increasing Attack Awareness within Web Applications

  • Calum C. Hall,
  • Lynsay A. Shepherd and
  • Natalie Coull

15 February 2019

Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents. Currently, web applications focus resources towards the preventative side...

  • Article
  • Open Access
29 Citations
8,009 Views
12 Pages

Tooth-Marked Tongue Recognition Using Gradient-Weighted Class Activation Maps

  • Yue Sun,
  • Songmin Dai,
  • Jide Li,
  • Yin Zhang and
  • Xiaoqiang Li

15 February 2019

The tooth-marked tongue is an important indicator in traditional Chinese medicinal diagnosis. However, the clinical competence of tongue diagnosis is determined by the experience and knowledge of the practitioners. Due to the characteristics of diffe...

  • Article
  • Open Access
4,176 Views
12 Pages

15 February 2019

Radio-frequency (RF) tomographic imaging is a promising technique for inferring multi-dimensional physical space by processing RF signals traversed across a region of interest. Tensor-based approaches for tomographic imaging are superior at detecting...

  • Article
  • Open Access
6 Citations
4,296 Views
12 Pages

15 February 2019

In this paper, we propose a joint power allocation, time switching (TS) factor and relay selection scheme for an energy harvesting two-way relaying communication network (TWRN), where two transceivers exchange information with the help of a wireless-...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903