You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 15, Issue 5

May 2023 - 35 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Cover Story: Industry 5.0 has sparked a transformative era of unprecedented collaboration between humans and machines. This partnership is revolutionizing industries, driving innovation, and reshaping traditional processes. Artificial Intelligence (AI) technologies have significantly transformed the competitive industrial landscape. This shift emphasizes the emergence of a super-smart society or Society 5.0. Thus, this topic explores the concept of Humachine, which envisions a future where humans and machines coexist, leveraging the strengths of both. Thus, the objective is to examine and differentiate the capabilities and unique qualities of humans and machines, with the goal of establishing a foundation for enhancing the interaction between them, known as Human–Machine Interaction (HMI). View this paper

Articles (35)

  • Article
  • Open Access
13 Citations
5,686 Views
27 Pages

Attacks on IoT: Side-Channel Power Acquisition Framework for Intrusion Detection

  • Dominic Lightbody,
  • Duc-Minh Ngo,
  • Andriy Temko,
  • Colin C. Murphy and
  • Emanuel Popovici

This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices—a Raspberry Pi 3 model B an...

  • Article
  • Open Access
6 Citations
7,485 Views
20 Pages

The security of Internet of Things (IoTs) devices in recent years has created interest in developing implementations of lightweight cryptographic algorithms for such systems. Additionally, open-source hardware and field-programable gate arrays (FPGAs...

  • Article
  • Open Access
5 Citations
2,231 Views
16 Pages

Advanced Driver Assistance Systems (ADASs) are crucial components of intelligent vehicles, equipped with a vast code base. To enhance the security of ADASs, it is essential to mine their vulnerabilities and corresponding exploitation methods. However...

  • Article
  • Open Access
12 Citations
2,523 Views
19 Pages

With the proliferation of video surveillance system deployment and related applications, real-time video analysis is very critical to achieving intelligent monitoring, autonomous driving, etc. Analyzing video stream with high accuracy and low latency...

  • Article
  • Open Access
2,942 Views
24 Pages

Consensus-based data aggregation in d-regular bipartite graphs poses a challenging task for the scientific community since some of these algorithms diverge in this critical graph topology. Nevertheless, one can see a lack of scientific studies dealin...

  • Article
  • Open Access
17 Citations
2,780 Views
17 Pages

Wireless sensor networks (W.S.N.s) are a critical research area with numerous practical applications. W.S.N.s are utilized in real-life scenarios, including environmental monitoring, healthcare, industrial automation, smart homes, and agriculture. As...

  • Article
  • Open Access
1 Citations
2,893 Views
14 Pages

In the two-stage open-domain question answering (OpenQA) systems, the retriever identifies a subset of relevant passages, which the reader then uses to extract or generate answers. However, the performance of OpenQA systems is often hindered by issue...

  • Article
  • Open Access
7 Citations
3,776 Views
35 Pages

Optimizing the Quality of Service of Mobile Broadband Networks for a Dense Urban Environment

  • Agbotiname Lucky Imoize,
  • Friday Udeji,
  • Joseph Isabona and
  • Cheng-Chi Lee

Mobile broadband (MBB) services in Lagos, Nigeria are marred with poor signal quality and inconsistent user experience, which can result in frustrated end-users and lost revenue for service providers. With the introduction of 5G, it is becoming more...

  • Review
  • Open Access
50 Citations
24,461 Views
47 Pages

A Review on Deep-Learning-Based Cyberbullying Detection

  • Md. Tarek Hasan,
  • Md. Al Emran Hossain,
  • Md. Saddam Hossain Mukta,
  • Arifa Akter,
  • Mohiuddin Ahmed and
  • Salekul Islam

Bullying is described as an undesirable behavior by others that harms an individual physically, mentally, or socially. Cyberbullying is a virtual form (e.g., textual or image) of bullying or harassment, also known as online bullying. Cyberbullying de...

  • Article
  • Open Access
32 Citations
4,597 Views
28 Pages

The Internet of Things (IoT) continues to attract attention in the context of computational resource growth. Various disciplines and fields have begun to employ IoT integration technologies in order to enable smart applications. The main difficulty i...

of 4

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903Creative Common CC BY license