You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 15, Issue 4

April 2023 - 35 articles

Cover Story: Internet of Things (IoT) architectures and knowledge generation out of streams of events are the primary elements concerning the creation of user-centric IoT services. On this basis, the paper presents (i) a generic, symmetrical IoT architecture that enables bidirectional communication between things and users, (ii) a Complex Event Processing model for provisioning parametric transformations of primitive events to meaningful business events, and (iii) a library of composite transformations that each reflect a common business need (e.g., ingestion, measurements’ averaging). The appropriateness and integrability of the implementation in an IoT environment are demonstrated by four scenarios in a smart farming application domain. Further, the quality properties of each scenario are discussed. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (35)

  • Article
  • Open Access
2 Citations
2,483 Views
19 Pages

21 April 2023

With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs. In outsourcin...

  • Editorial
  • Open Access
1 Citations
3,220 Views
2 Pages

20 April 2023

In recent years, the new computing paradigms such as serverless computing, edge computing and blockchain-based computing have attracted much attention in both academia and industrial communities. Distributed systems and applications play fundamental...

  • Article
  • Open Access
20 Citations
3,955 Views
21 Pages

19 April 2023

Social media have been a valuable data source for studying people’s opinions, intentions, and behaviours. Such a data source incorporating advanced big data analysis methods, such as machine-operated emotion and sentiment analysis, will open un...

  • Article
  • Open Access
1 Citations
3,052 Views
13 Pages

Applying Patient Segmentation Using Primary Care Electronic Medical Records to Develop a Virtual Peer-to-Peer Intervention for Patients with Type 2 Diabetes

  • Alessia Paglialonga,
  • Rebecca Theal,
  • Bruce Knox,
  • Robert Kyba,
  • David Barber,
  • Aziz Guergachi and
  • Karim Keshavjee

14 April 2023

The aim of this study was to design a virtual peer-to-peer intervention for patients with type 2 diabetes (T2D) by grouping patients from specific segments using data from primary care electronic medical records (EMRs). Two opposing segments were ide...

  • Article
  • Open Access
2 Citations
2,913 Views
18 Pages

11 April 2023

Information-Centric Networking (ICN) has revolutionized the manner of content acquisition by shifting the communication mode from host-centric to information-centric. Considering the existing, large amount of IP infrastructure in current networks, th...

  • Article
  • Open Access
6 Citations
3,672 Views
24 Pages

A Multiverse Graph to Help Scientific Reasoning from Web Usage: Interpretable Patterns of Assessor Shifts in GRAPHYP

  • Renaud Fabre,
  • Otmane Azeroual,
  • Joachim Schöpfel,
  • Patrice Bellot and
  • Daniel Egret

10 April 2023

The digital support for scientific reasoning presents contrasting results. Bibliometric services are improving, but not academic assessment; no service for scholars relies on logs of web usage to base query strategies for relevance judgments (or asse...

  • Article
  • Open Access
27 Citations
13,680 Views
20 Pages

A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure

  • Soumya Prakash Otta,
  • Subhrakanta Panda,
  • Maanak Gupta and
  • Chittaranjan Hota

10 April 2023

The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest...

  • Article
  • Open Access
3 Citations
8,104 Views
19 Pages

Consumer’s Attitude towards Display Google Ads

  • Mohammad Al Khasawneh,
  • Abdel-Aziz Ahmad Sharabati,
  • Shafig Al-Haddad,
  • Rania Al-Daher,
  • Sarah Hammouri and
  • Sima Shaqman

The context of Display Google ads and its components has significant importance to previous studies. However, the full understanding of the variables that influence both Display Google ads avoidance and intention to click has not been thoroughly ackn...

  • Review
  • Open Access
38 Citations
7,955 Views
18 Pages

Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems, which control critical infrastructure such as power plants and water treatment facilities, have unique characteristics that make them vulnerable to ransomw...

  • Article
  • Open Access
11 Citations
4,121 Views
17 Pages

Implementing GDPR-Compliant Surveys Using Blockchain

  • Ricardo Martins Gonçalves,
  • Miguel Mira da Silva and
  • Paulo Rupino da Cunha

The immutability of data stored in a blockchain is a crucial pillar of trust in this technology, which has led to its increasing adoption in various use cases. However, there are situations where the inability to change or delete data may be illegal....

of 4

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903