You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 15, Issue 10

October 2023 - 29 articles

Cover Story: Machine learning has emerged as a significant influencer, revolutionizing various application domains, such as cybersecurity. Building machine learning solutions consist of multiple processes, including data pre-processing, model selection, and parameter optimization. Although several surveys have extensively discussed machine learning, there is a lack of surveys that describe its architecture and phases. This survey describes machine models that are classified into supervised, semi-supervised, unsupervised, and reinforcement learning. Additionally, the survey explores recent advancements in data pre-processing techniques and the fine-tuning of parameters. Furthermore, the survey discusses research gaps, challenges, and potential research directions to address them. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (29)

  • Communication
  • Open Access
6 Citations
4,703 Views
46 Pages

A Comprehensive Analysis and Investigation of the Public Discourse on Twitter about Exoskeletons from 2017 to 2023

  • Nirmalya Thakur,
  • Kesha A. Patel,
  • Audrey Poon,
  • Rishika Shah,
  • Nazif Azizi and
  • Changhee Han

22 October 2023

Exoskeletons have emerged as a vital technology in the last decade and a half, with diverse use cases in different domains. Even though several works related to the analysis of Tweets about emerging technologies exist, none of those works have focuse...

  • Article
  • Open Access
7 Citations
3,736 Views
28 Pages

A Graph DB-Based Solution for Semantic Technologies in the Future Internet

  • Stefano Ferilli,
  • Eleonora Bernasconi,
  • Davide Di Pierro and
  • Domenico Redavid

20 October 2023

With the progressive improvements in the power, effectiveness, and reliability of AI solutions, more and more critical human problems are being handled by automated AI-based tools and systems. For more complex or particularly critical applications, t...

  • Article
  • Open Access
26 Citations
4,836 Views
22 Pages

19 October 2023

Today, intelligent drone technology is rapidly expanding, particularly in the defense industry. A swarm of drones can communicate, share data, and make the best decisions on their own. Drone swarms can swiftly and effectively carry out missions like...

  • Article
  • Open Access
4 Citations
2,610 Views
31 Pages

19 October 2023

With the advent of 5G networks, the demand for improved mobile broadband, massive machine-type communication, and ultra-reliable, low-latency communication has surged, enabling a wide array of new applications. A key enabling technology in 5G network...

  • Article
  • Open Access
3 Citations
3,875 Views
12 Pages

18 October 2023

While network forensics has matured over the decades and even made progress in the last 10 years when deployed in virtual networks, network forensics in fog and edge computing is still not progressed to that level despite the now widespread use of th...

  • Article
  • Open Access
8 Citations
2,621 Views
22 Pages

kClusterHub: An AutoML-Driven Tool for Effortless Partition-Based Clustering over Varied Data Types

  • Konstantinos Gratsos ,
  • Stefanos Ougiaroglou  and
  • Dionisis Margaris 

18 October 2023

Partition-based clustering is widely applied over diverse domains. Researchers and practitioners from various scientific disciplines engage with partition-based algorithms relying on specialized software or programming libraries. Addressing the need...

  • Article
  • Open Access
1 Citations
2,810 Views
20 Pages

Flying Watchdog-Based Guard Patrol with Check Point Data Verification

  • Endrowednes Kuantama,
  • Avishkar Seth,
  • Alice James and
  • Yihao Zhang

16 October 2023

The effectiveness of human security-based guard patrol systems often faces challenges related to the consistency of perimeter checks regarding timing and patterns. Some solutions use autonomous drones for monitoring assistance but primarily optimize...

  • Article
  • Open Access
3 Citations
3,142 Views
15 Pages

Reinforcement Learning Approach for Adaptive C-V2X Resource Management

  • Teguh Indra Bayu,
  • Yung-Fa Huang and
  • Jeang-Kuo Chen

15 October 2023

The modulation coding scheme (MCS) index is the essential configuration parameter in cellular vehicle-to-everything (C-V2X) communication. As referenced by the 3rd Generation Partnership Project (3GPP), the MCS index will dictate the transport block...

  • Article
  • Open Access
3,020 Views
15 Pages

14 October 2023

With the rapid growth of customer data in financial institutions, such as trusts, issues of data quality have become increasingly prominent. The main challenge lies in constructing an effective evaluation method that ensures accurate and efficient as...

  • Article
  • Open Access
3 Citations
3,815 Views
21 Pages

14 October 2023

Existing elevator systems lack the ability to display the number of people waiting on each floor and inside the elevator. This causes an inconvenience as users cannot tell if they should wait or seek alternatives, leading to unnecessary time wastage....

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903