Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 13, Issue 2

2021 February - 34 articles

Cover Story: The latest findings within the domain of Artificial Intelligence and Robotics have paved the way for the design of an increasing number of advanced robot-oriented applications. This led to the hypothesis that robotics and Artificial Intelligence will eventually beat humans in performing any kind of job. It is therefore the job of the developers to identify the features humans will need to trust and engage with robots. Following this direction, in this paper, we provide a general, flexible, and scalable architecture for enhanced learning through human–robot interaction where different modules tailored for the learning domain can be developed and whose priority of execution can be easily configured. We developed four modules using Zora (an extension of NAO) as the humanoid robotic platform. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (34)

  • Article
  • Open Access
19 Citations
3,586 Views
18 Pages

23 February 2021

Video captioning is a popular task which automatically generates a natural-language sentence to describe video content. Previous video captioning works mainly use the encoder–decoder framework and exploit special techniques such as attention mechanis...

  • Article
  • Open Access
14 Citations
4,563 Views
13 Pages

Load Balancing Oriented Predictive Routing Algorithm for Data Center Networks

  • Yazhi Liu,
  • Jiye Zhang,
  • Wei Li,
  • Qianqian Wu and
  • Pengmiao Li

22 February 2021

A data center undertakes increasing background services of various applications, and the data flows transmitted between the nodes in data center networks (DCNs) are consequently increased. At the same time, the traffic of each link in a DCN changes d...

  • Article
  • Open Access
3,312 Views
17 Pages

ARIBC: Online Reporting Based on Identity-Based Cryptography

  • Athanasios Goudosis and
  • Sokratis Katsikas

21 February 2021

The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents. Unfortunately, people involved in su...

  • Article
  • Open Access
167 Citations
20,852 Views
16 Pages

Assessing Digital Transformation in Universities

  • Guillermo Rodríguez-Abitia and
  • Graciela Bribiesca-Correa

20 February 2021

Industry 4.0 and Society 5.0 are reshaping the way organizations function and interact with the communities they serve. The massive penetration of computer and network applications forces organizations to digitalize their processes and provide innova...

  • Article
  • Open Access
3 Citations
5,797 Views
15 Pages

18 February 2021

Variational graph autoencoder, which can encode structural information and attribute information in the graph into low-dimensional representations, has become a powerful method for studying graph-structured data. However, most existing methods based...

  • Review
  • Open Access
43 Citations
8,637 Views
21 Pages

17 February 2021

Blockchain, a distributed ledger technology (DLT), refers to a list of records with consecutive time stamps. This decentralization technology has become a powerful model to establish trust among trustless entities, in a verifiable manner. Motivated b...

  • Article
  • Open Access
12 Citations
4,242 Views
19 Pages

Semantic Task Planning for Service Robots in Open Worlds

  • Guowei Cui,
  • Wei Shuai and
  • Xiaoping Chen

17 February 2021

This paper presents a planning system based on semantic reasoning for a general-purpose service robot, which is aimed at behaving more intelligently in domains that contain incomplete information, under-specified goals, and dynamic changes. First, Tw...

  • Article
  • Open Access
3 Citations
4,058 Views
16 Pages

17 February 2021

Content is a key influencing factor in Web Quality of Experience (QoE) estimation. A web user’s satisfaction can be influenced by how long it takes to render and visualize the visible parts of the web page in the browser. This is referred to as the A...

  • Article
  • Open Access
7 Citations
3,667 Views
13 Pages

An Accelerating Approach for Blockchain Information Transmission Based on NDN

  • Zhi-Peng Yang,
  • Lu Hua,
  • Ning-Jie Gao,
  • Ru Huo,
  • Jiang Liu and
  • Tao Huang

14 February 2021

Blockchain is becoming more and more popular in various fields. Since the information transmission mode of the blockchain is data broadcasting, the traditional TCP/IP network cannot support the blockchain system well, but the Named-Data Networking (N...

  • Article
  • Open Access
10 Citations
4,294 Views
17 Pages

12 February 2021

Due to its novelty, the recent pandemic of the coronavirus disease (COVID-19), which is associated with the spread of the new severe acute respiratory syndrome coronavirus (SARS-CoV-2), triggered the public’s interest in accessing information, demons...

  • Article
  • Open Access
71 Citations
18,315 Views
24 Pages

Use of Social Media Data in Disaster Management: A Survey

  • Jedsada Phengsuwan,
  • Tejal Shah,
  • Nipun Balan Thekkummal,
  • Zhenyu Wen,
  • Rui Sun,
  • Divya Pullarkatt,
  • Hemalatha Thirugnanam,
  • Maneesha Vinodini Ramesh,
  • Graham Morgan and
  • Rajiv Ranjan
  • + 1 author

12 February 2021

Social media has played a significant role in disaster management, as it enables the general public to contribute to the monitoring of disasters by reporting incidents related to disaster events. However, the vast volume and wide variety of generated...

  • Article
  • Open Access
10 Citations
4,646 Views
28 Pages

10 February 2021

Digital regulation implies the quantified measuring and the network infrastructure allowing managers to control the processes of value creation. Digital regulation needs to take into account tacit elements of the value creation process, including unc...

  • Review
  • Open Access
32 Citations
5,855 Views
20 Pages

5 February 2021

Cloud-native network design, which leverages network virtualization and softwarization together with the service-oriented architectural principle, is transforming communication networks to a versatile platform for converged network-cloud/edge service...

  • Article
  • Open Access
34 Citations
11,392 Views
22 Pages

Digital Communication Tools and Knowledge Creation Processes for Enriched Intellectual Outcome—Experience of Short-Term E-Learning Courses during Pandemic

  • Nadezhda N. Pokrovskaia,
  • Veronika L. Leontyeva,
  • Marianna Yu. Ababkova,
  • Lucio Cappelli and
  • Fabrizio D’Ascenzo

5 February 2021

Social isolation during the pandemic contributed to the transition of educational processes to e-learning. A short-term e-marketing education program for a variety of students was introduced in May 2020 and is taught entirely online. A survey was con...

  • Article
  • Open Access
7 Citations
4,482 Views
14 Pages

Research Professors’ Self-Assessment of Competencies

  • Gabriela Torres Delgado and
  • Neil Hernández-Gress

4 February 2021

Research professors develop scientific products that impact and benefit society, but their competencies in doing so are rarely evaluated. Therefore, by employing a mixed two-stage sequential design, this study developed a self-assessment model of res...

  • Article
  • Open Access
5 Citations
3,748 Views
16 Pages

2 February 2021

Great achievements have been made in pedestrian detection through deep learning. For detectors based on deep learning, making better use of features has become the key to their detection effect. While current pedestrian detectors have made efforts in...

  • Review
  • Open Access
140 Citations
53,543 Views
40 Pages

2 February 2021

The demands for information security in higher education will continue to increase. Serious data breaches have occurred already and are likely to happen again without proper risk management. This paper applies the Comprehensive Literature Review (CLR...

  • Article
  • Open Access
34 Citations
5,844 Views
19 Pages

2 February 2021

With the progressive deterioration of cyber threats, collecting cyber threat intelligence (CTI) from open-source threat intelligence publishing platforms (OSTIPs) can help information security personnel grasp public opinions with specific pertinence,...

  • Article
  • Open Access
5 Citations
4,051 Views
11 Pages

1 February 2021

Collaborative filtering (CF) is a widely used method in recommendation systems. Linear models are still the mainstream of collaborative filtering research methods, but non-linear probabilistic models are beyond the limit of linear model capacity. For...

  • Article
  • Open Access
3 Citations
2,908 Views
17 Pages

31 January 2021

In real applications, massive data with graph structures are often incomplete due to various restrictions. Therefore, graph data imputation algorithms have been widely used in the fields of social networks, sensor networks, and MRI to solve the graph...

  • Article
  • Open Access
7 Citations
3,640 Views
17 Pages

Council Press Offices as Sources of Political Information: Between Journalism for Accountability and Propaganda

  • Vanessa Rodríguez-Breijo,
  • Núria Simelio and
  • Pedro Molina-Rodríguez-Navas

29 January 2021

This study uses a qualitative approach to examine what political and technical leaders of municipalities understand transparency and public information to mean, and what role they believe the different subjects involved (government, opposition, and t...

  • Article
  • Open Access
32 Citations
7,233 Views
24 Pages

29 January 2021

The COVID-19 pandemic has modified and diversified the ways that students receive education. During confinements, complex courses integrating previous knowledge must be carefully designed and implemented to effectively replace the elements present in...

  • Article
  • Open Access
44 Citations
6,668 Views
32 Pages

27 January 2021

The COVID-19 outbreak impacted almost all the aspects of ordinary life. In this context, social networks quickly started playing the role of a sounding board for the content produced by people. Studying how dramatic events affect the way people inter...

  • Article
  • Open Access
11 Citations
5,747 Views
34 Pages

A Perfect Match: Converging and Automating Privacy and Security Impact Assessment On-the-Fly

  • Dimitrios Papamartzivanos,
  • Sofia Anna Menesidou,
  • Panagiotis Gouvas and
  • Thanassis Giannetsos

27 January 2021

As the upsurge of information and communication technologies has become the foundation of all modern application domains, fueled by the unprecedented amount of data being processed and exchanged, besides security concerns, there are also pressing pri...

  • Article
  • Open Access
45 Citations
16,363 Views
17 Pages

Language Bias in the Google Scholar Ranking Algorithm

  • Cristòfol Rovira,
  • Lluís Codina and
  • Carlos Lopezosa

27 January 2021

The visibility of academic articles or conference papers depends on their being easily found in academic search engines, above all in Google Scholar. To enhance this visibility, search engine optimization (SEO) has been applied in recent years to aca...

  • Article
  • Open Access
5 Citations
3,724 Views
17 Pages

27 January 2021

In this paper we present a mixture of technologies tailored for e-learning related to the Deep Learning, Sentiment Analysis, and Semantic Web domains, which we have employed to show four different use cases that we have validated in the field of Huma...

  • Article
  • Open Access
5 Citations
3,501 Views
27 Pages

27 January 2021

The combination of complex networks and game theory is one of the most suitable ways to describe the evolutionary laws of various complex systems. In order to explore the evolution of group cooperation in multiple social dilemmas, a model of a group...

  • Article
  • Open Access
15 Citations
6,384 Views
27 Pages

Integrative Factors of E-Health Laboratory Adoption: A Case of Indonesia

  • Dwiza Riana,
  • Achmad Nizar Hidayanto,
  • Sri Hadianti and
  • Darmawan Napitupulu

24 January 2021

Around the world, the adoption of digital health applications is growing very fast. The use of e-health laboratory systems is increasing while research on the factors that impact users to use e-health laboratory systems in Indonesia has not been done...

  • Article
  • Open Access
33 Citations
7,919 Views
19 Pages

Experiment Information System Based on an Online Virtual Laboratory

  • Chuanyan Hao,
  • Anqi Zheng,
  • Yuqi Wang and
  • Bo Jiang

24 January 2021

In the information age, MOOCs (Massive Open Online Courses), micro-classes, flipping classroom, and other blended teaching scenes have improved students learning outcomes. However, incorporating technologies into experimental courses, especially elec...

  • Article
  • Open Access
10 Citations
5,492 Views
19 Pages

The Learning to Learn Competence in Early Childhood Preservice Teachers: An Outdoor and e/m-Learning Experience in the Museum

  • Daniel Abril-López,
  • Hortensia Morón-Monge,
  • María del Carmen Morón-Monge and
  • María Dolores López Carrillo

23 January 2021

This study was developed with Early Childhood Preservice Teachers within the framework of the Teaching and Learning of Social Sciences over three academic years (2017–2018, 2018–2019, and 2019–2020) at the University of Alcalá...

  • Article
  • Open Access
89 Citations
9,168 Views
14 Pages

A Lightweight Blockchain-Based IoT Identity Management Approach

  • Mohammed Amine Bouras,
  • Qinghua Lu,
  • Sahraoui Dhelim and
  • Huansheng Ning

22 January 2021

Identity management is a fundamental feature of Internet of Things (IoT) ecosystem, particularly for IoT data access control. However, most of the actual works adopt centralized approaches, which could lead to a single point of failure and privacy is...

  • Article
  • Open Access
6 Citations
4,707 Views
25 Pages

21 January 2021

Social Networks (SNs) bring new types of privacy risks threats for users; which developers should be aware of when designing respective services. Aiming at safeguarding users’ privacy more effectively within SNs, self-adaptive privacy preserving sche...

  • Article
  • Open Access
1 Citations
3,426 Views
21 Pages

A Middleware-Based Approach for Multi-Scale Mobility Simulation

  • Xavier Boulet,
  • Mahdi Zargayouna,
  • Gérard Scemama and
  • Fabien Leurent

20 January 2021

Modeling and simulation play an important role in transportation networks analysis. In the literature, authors have proposed many traffic and mobility simulations, with different features and corresponding to different contexts and objectives. They n...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903