Skip to Content

Future Internet, Volume 11, Issue 7

2019 July - 23 articles

Cover Story: Various reference models and guidelines have been created in order to define the Industrial Internet of Things. As a result, gaining a sufficient overview has become a significant challenge for both beginners and experts in the field. To this end, we present a structured knowledge graph and interactive views illustrating the respective relations and depicting the different scopes and alignments of the most relevant reference models and frameworks. A comprehensive collection of important standards and norms and a machine-readable provision of all information enables the automated processing of the supplied content. Furthermore, an in-depth analysis of regarded concerns, promoted technologies and best practices leads to a detailed landscape of the current state of the industrial internet. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (23)

  • Article
  • Open Access
25 Citations
9,111 Views
15 Pages

Improving Forensic Triage Efficiency through Cyber Threat Intelligence

  • Nikolaos Serketzis,
  • Vasilios Katos,
  • Christos Ilioudis,
  • Dimitrios Baltatzis and
  • Georgios Pangalos

The complication of information technology and the proliferation of heterogeneous security devices that produce increased volumes of data coupled with the ever-changing threat landscape challenges have an adverse impact on the efficiency of informati...

  • Feature Paper
  • Article
  • Open Access
15 Citations
7,505 Views
17 Pages

Platform Economy and Techno-Regulation—Experimenting with Reputation and Nudge

  • Nicola Lettieri,
  • Alfonso Guarino,
  • Delfina Malandrino and
  • Rocco Zaccagnino

In the cloud-based society, where the vast majority of social, economic and personal interactions is mediated by information communication technology (ICT), technology is no longer simply a subject of regulation but is becoming an integral part of th...

  • Article
  • Open Access
412 Citations
42,634 Views
22 Pages

Modern supply chains have evolved into highly complex value networks and turned into a vital source of competitive advantage. However, it has become increasingly challenging to verify the source of raw materials and maintain visibility of products an...

  • Article
  • Open Access
24 Citations
4,688 Views
14 Pages

Distributed Uniform Streaming Framework: An Elastic Fog Computing Platform for Event Stream Processing and Platform Transparency

  • Simon Vanneste,
  • Jens de Hoog,
  • Thomas Huybrechts,
  • Stig Bosmans,
  • Reinout Eyckerman,
  • Muddsair Sharif,
  • Siegfried Mercelis and
  • Peter Hellinckx

The increase of Internet of Things devices and the rise of more computationally intense applications presents challenges for future Internet of Things architectures. We envision a future in which edge, fog, and cloud devices work together to execute...

  • Article
  • Open Access
13 Citations
4,966 Views
12 Pages

Implementation and Evaluation of Activity-Based Congestion Management Using P4 (P4-ABC)

  • Michael Menth,
  • Habib Mostafaei,
  • Daniel Merling and
  • Marco Häberle

Activity-Based Congestion management (ABC) is a novel domain-based QoS mechanism providing more fairness among customers on bottleneck links. It avoids per-flow or per-customer states in the core network and is suitable for application in future 5G n...

  • Article
  • Open Access
3 Citations
5,173 Views
15 Pages

Crossing the Borders: Re-Use of Smart Learning Objects in Advanced Content Access Systems

  • Hamza Manzoor,
  • Kamil Akhuseyinoglu,
  • Jackson Wonderly,
  • Peter Brusilovsky and
  • Clifford A. Shaffer

Researchers in many disciplines are developing novel interactive smart learning objects like exercises and visualizations. Meanwhile, Learning Management Systems (LMS) and eTextbook systems are also becoming more sophisticated in their ability to use...

  • Article
  • Open Access
5 Citations
3,738 Views
14 Pages

Several emerging mobile applications and services (e.g., autonomous cars) require higher wireless throughput than ever before. This demand stresses the need for investigating novel methods that have the potential to dramatically increase the spectral...

  • Article
  • Open Access
17 Citations
4,559 Views
13 Pages

Aspect-level sentiment analysis (ASA) aims at determining the sentiment polarity of specific aspect term with a given sentence. Recent advances in attention mechanisms suggest that attention models are useful in ASA tasks and can help identify focus...

  • Review
  • Open Access
32 Citations
7,198 Views
30 Pages

Context—Internet of Thing (IoT) based systems support any-time/place computations by interconnecting humans, systems, services, devices, and things that enabling autonomous systems to shape-up digitized societies. Software architecture, as the...

  • Feature Paper
  • Article
  • Open Access
61 Citations
9,814 Views
18 Pages

Signatures of the Crypto-Currency Market Decoupling from the Forex

  • Stanisław Drożdż,
  • Ludovico Minati,
  • Paweł Oświȩcimka,
  • Marek Stanuszek and
  • Marcin Wa̧torek

Based on the high-frequency recordings from Kraken, a cryptocurrency exchange and professional trading platform that aims to bring Bitcoin and other cryptocurrencies into the mainstream, the multiscale cross-correlations involving the Bitcoin (BTC),...

  • Article
  • Open Access
21 Citations
5,208 Views
12 Pages

Stacking-Based Ensemble Learning of Self-Media Data for Marketing Intention Detection

  • Yufeng Wang,
  • Shuangrong Liu,
  • Songqian Li,
  • Jidong Duan,
  • Zhihao Hou,
  • Jia Yu and
  • Kun Ma

Social network services for self-media, such as Weibo, Blog, and WeChat Public, constitute a powerful medium that allows users to publish posts every day. Due to insufficient information transparency, malicious marketing of the Internet from self-med...

  • Article
  • Open Access
3 Citations
14,332 Views
25 Pages

A Next-Generation Core Network Architecture for Mobile Networks

  • Andrea G. Forte,
  • Wei Wang,
  • Luca Veltri and
  • Gianluigi Ferrari

Over the years, the cellular mobile network has evolved from a wireless plain telephone system to a very complex system providing telephone service, Internet connectivity and many interworking capabilities with other networks. Its air interface perfo...

  • Article
  • Open Access
59 Citations
7,380 Views
23 Pages

Structuring Reference Architectures for the Industrial Internet of Things

  • Sebastian R. Bader,
  • Maria Maleshkova and
  • Steffen Lohmann

The ongoing digital transformation has the potential to revolutionize nearly all industrial manufacturing processes. However, its concrete requirements and implications are still not sufficiently investigated. In order to establish a common understan...

  • Article
  • Open Access
3 Citations
5,164 Views
17 Pages

Town-Watching Workshop Using Disaster Information Tweeting and Mapping System

  • Keisuke Utsu,
  • Shun Ueta,
  • Sachi Tajima,
  • Yoshitaka Kajita,
  • Yuji Murakami and
  • Osamu Uchida

Self- and mutual-help by citizens are important as well as social-help from the local governments, for disaster prevention and mitigation. Then, town watching and disaster prevention map-making workshops are held to review the town and promote self-...

  • Article
  • Open Access
6 Citations
7,859 Views
10 Pages

The Effects of the Floating Action Button on Quality of Experience

  • Jesenka Pibernik,
  • Jurica Dolic,
  • Hrvoje Abraham Milicevic and
  • Bojan Kanizaj

Google’s Material Design, created in 2014, led to the extended application of floating action buttons (FAB) in user interfaces of web pages and mobile applications. FAB’s roll is to trigger an activity either on the present screen, or it...

  • Article
  • Open Access
44 Citations
8,138 Views
18 Pages

An Image Authentication Scheme Using Merkle Tree Mechanisms

  • Yi-Cheng Chen,
  • Yueh-Peng Chou and
  • Yung-Chen Chou

Research on digital image processing has become quite popular and rapid in recent years, and scholars have proposed various image verification mechanisms. Similarly , blockchain technology has also become very popular in recent years. This paper prop...

  • Feature Paper
  • Article
  • Open Access
8 Citations
5,840 Views
20 Pages

A Sidecar Object for the Optimized Communication Between Edge and Cloud in Internet of Things Applications

  • Stefano Busanelli,
  • Simone Cirani,
  • Lorenzo Melegari,
  • Marco Picone,
  • Mirco Rosa and
  • Luca Veltri

The internet of things (IoT) is one of the most disrupting revolutions that is characterizing the technology ecosystem. In the near future, the IoT will have a significant impact on people’s lives and on the design and developments of new parad...

  • Tutorial
  • Open Access
30 Citations
10,075 Views
25 Pages

Ever-increasing human activities in oceans require handy, reliable and cost-effective high-speed network access similar to terrestrial Internet services to be available on and under water. However, terrestrial Internet cannot be extended to oceans se...

  • Article
  • Open Access
6 Citations
4,092 Views
11 Pages

Web Browser Network Based on a BA Model for a Web-Based Virtual World

  • Masaki Kohana,
  • Shinji Sakamoto and
  • Shusuke Okamoto

Real-time web applications such as a virtual world require considerable computing resources. However, as the number of servers increases, so does the maintenance and financial cost. To share tasks among web browsers, the browsers must share data. The...

  • Article
  • Open Access
3,261 Views
34 Pages

We focus on the problem of adding fault-tolerance to an existing concurrent protocol in the presence of unchangeable environment actions. Such unchangeable actions occur in cases where a subset of components/processes cannot be modified since they re...

  • Article
  • Open Access
4 Citations
4,474 Views
17 Pages

Maintaining the Sense of Agency in Semi-Autonomous Robot Conferencing

  • Kazuaki Tanaka,
  • Kota Takenouchi,
  • Kohei Ogawa,
  • Yuichiro Yoshikawa,
  • Shuichi Nishio and
  • Hiroshi Ishiguro

In semi-autonomous robot conferencing, not only the operator controls the robot, but the robot itself also moves autonomously. Thus, it can modify the operator’s movement (e.g., adding social behaviors). However, the sense of agency, that is, t...

  • Article
  • Open Access
15 Citations
4,457 Views
26 Pages

Service Level Agreements are employed to set availability commitments in cloud services. When a violation occurs as in an outage, cloud providers may be called to compensate customers for the losses incurred. Such compensation may be so large as to e...

  • Article
  • Open Access
9 Citations
4,695 Views
16 Pages

A Dynamic Application-Partitioning Algorithm with Improved Offloading Mechanism for Fog Cloud Networks

  • Adeel Abro,
  • Zhongliang Deng,
  • Kamran Ali Memon,
  • Asif Ali Laghari,
  • Khalid Hussain Mohammadani and
  • Noor ul Ain

This paper aims to propose a new fog cloud architecture that performs a joint energy-efficient task assignment (JEETA). The proposed JEETA architecture utilizes the dynamic application-partitioning algorithm (DAPTS), a novel algorithm that efficientl...

XFacebookLinkedIn
Future Internet - ISSN 1999-5903