You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 12, Issue 6

June 2020 - 15 articles

Cover Story: Soft sensors (SSs) are inferential models used in many industrial fields. They allow real-time estimation of hard-to-measure variables as a function of easy-to-measure variables obtained from on-line sensors. SSs are generally built from industries’ historical databases through data-driven approaches. A critical issue in SSs design concerns the selection of input variables, among those available in a candidate dataset, that can reach great numbers in an industrial environment. Such numbers of inputs would make the design computationally demanding and lead to poorly performing models. An input selection procedure is necessary. Most input selection approaches for SS design are addressed and classified in the paper, with their benefits and drawbacks outlined, to guide the designer through this step. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (15)

  • Article
  • Open Access
49 Citations
10,711 Views
23 Pages

A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence

  • Alessandra de Melo e Silva,
  • João José Costa Gondim,
  • Robson de Oliveira Albuquerque and
  • Luis Javier García Villalba

The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions. Sophisticated threats with mul...

  • Article
  • Open Access
19 Citations
4,633 Views
17 Pages

Emerging technologies such as Internet of Things (IoT) and blockchain have affected the digital transformation. Blockchain, on the one hand, was initially developed for the purpose of financial trading due to its robustness especially for fault toler...

  • Article
  • Open Access
2 Citations
3,692 Views
20 Pages

In this study, we focus on models of civic debate suitable for use in Polish-Ukrainian internet projects, as well as methods of researching collective intelligence that can help to monitor particular aspects of such debates and consequently create so...

  • Article
  • Open Access
13 Citations
5,530 Views
30 Pages

The digital revolution affects every aspect of society and economy. In particular, the manufacturing industry faces a new age of production processes and connected collaboration. The underlying ideas and concepts, often also framed as a new “In...

  • Article
  • Open Access
5 Citations
4,458 Views
31 Pages

Improvements of the xAAL Home Automation System

  • Christophe Lohr and
  • Jérôme Kerdreux

The xAAL home automation system has been designed on the basis of distributed systems principles with messages passing and home network communications over IP. The proposal makes extensive use of standards and provides a clear separation of roles alo...

  • Review
  • Open Access
34 Citations
9,061 Views
24 Pages

Risk-Based Access Control Model: A Systematic Literature Review

  • Hany F. Atlam,
  • Muhammad Ajmal Azad,
  • Madini O. Alassafi,
  • Abdulrahman A. Alshdadi and
  • Ahmed Alenezi

Most current access control models are rigid, as they are designed using static policies that always give the same outcome in different circumstances. In addition, they cannot adapt to environmental changes and unpredicted situations. With dynamic sy...

  • Article
  • Open Access
11 Citations
4,589 Views
15 Pages

The life-long monitoring and analysis for complex industrial equipment demands a continuously evolvable machine-learning platform. The machine-learning model must be quickly regenerated and updated. This demands the careful orchestration of trainers...

  • Article
  • Open Access
11 Citations
5,115 Views
17 Pages

Performance Analysis of a Novel TCP Protocol Algorithm Adapted to Wireless Networks

  • Gonzalo Olmedo,
  • Román Lara-Cueva,
  • Diego Martínez and
  • Celso de Almeida

As telecommunication systems evolve towards new-generation architectures, likewise, new protocols are created in order to improve efficiency. One of these protocols is Transmission Control Protocol (TCP), which controls the transmission bit rate in f...

  • Article
  • Open Access
2 Citations
3,895 Views
21 Pages

Performance Model for Video Service in 5G Networks

  • Jiao Wang,
  • Jay Weitzen,
  • Oguz Bayat,
  • Volkan Sevindik and
  • Mingzhe Li

Network slicing allows operators to sell customized slices to various tenants at different prices. To provide better-performing and cost-efficient services, network slicing is looking to intelligent resource management approaches to be aligned to use...

  • Article
  • Open Access
14 Citations
5,512 Views
20 Pages

Hospital critical infrastructures have a distinct threat vector, due to (i) a dependence on legacy software; (ii) the vast levels of interconnected medical devices; (iii) the use of multiple bespoke software and that (iv) electronic devices (e.g., la...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903Creative Common CC BY license