Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 16, Issue 6

2024 June - 40 articles

Cover Story: The paper “Visual Data and Pattern Analysis for Smart Education: A Robust DRL-Based Early Warning System for Student Performance Prediction” presents a comprehensive framework to enhance student performance monitoring in e-learning. By leveraging Deep Reinforcement Learning (DRL), the study develops an early warning system that uses visual data and pattern analysis to predict student engagement and performance. The approach includes federated learning-based authentication, multi-objective clustering, and personalised recommendation generation, aiming to create a more responsive and adaptive educational environment. This system significantly improves prediction accuracy and personalises educational support, ensuring timely interventions for at-risk students. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (40)

  • Article
  • Open Access
25 Citations
11,672 Views
12 Pages

The increasing use of generative artificial intelligence (GenAI) has led to a rise in conversations about how teachers and students should adopt these tools to enhance the learning process. Self-regulated learning (SRL) research is important for addr...

  • Article
  • Open Access
2 Citations
1,742 Views
18 Pages

Sequence alignment is a critical factor in the variant analysis of genomic research. Since the FM (Ferrainas–Manzini) index was developed, it has proven to be a model in a compact format with efficient pattern matching and high-speed query sear...

  • Article
  • Open Access
1 Citations
1,487 Views
14 Pages

Discovery of Cloud Applications from Logs

  • Ashot Harutyunyan,
  • Arnak Poghosyan,
  • Tigran Bunarjyan,
  • Andranik Haroyan,
  • Marine Harutyunyan,
  • Lilit Harutyunyan and
  • Nelson Baloian

Continuous discovery and update of applications or their boundaries running in cloud environments in an automatic way is a highly required function of modern data center operation solutions. Prior attempts to address this problem within various produ...

  • Article
  • Open Access
4 Citations
2,264 Views
32 Pages

Development of a Theoretical Model for Digital Risks Arising from the Implementation of Industry 4.0 (TMR-I4.0)

  • Vitor Hugo dos Santos Filho,
  • Luis Maurício Martins de Resende and
  • Joseane Pontes

This study aims to develop a theoretical model for digital risks arising from implementing Industry 4.0 (represented by the acronym TMR-I4.0). A systematic literature review was initially conducted using the Methodi Ordinatio methodology to map the p...

  • Article
  • Open Access
5 Citations
2,345 Views
17 Pages

Data-based prognostic methods exploit sensor data to forecast the remaining useful life (RUL) of industrial settings to optimize the scheduling of maintenance actions. However, implementing sensors may not be cost-effective or practical for all compo...

  • Article
  • Open Access
4 Citations
5,319 Views
17 Pages

The primary challenge in Multimodal sentiment analysis (MSA) lies in developing robust joint representations that can effectively learn mutual information from diverse modalities. Previous research in this field tends to rely on feature concatenation...

  • Article
  • Open Access
3 Citations
2,220 Views
13 Pages

IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets

  • Umang Garg,
  • Santosh Kumar and
  • Aniket Mahanti

The tremendous growth of the Internet of Things (IoT) has gained a lot of attention in the global market. The massive deployment of IoT is also inherent in various security vulnerabilities, which become easy targets for hackers. IoT botnets are one t...

  • Article
  • Open Access
1 Citations
2,457 Views
14 Pages

Indoor position fingerprint-based location estimation methods have been widely used by applications on smartphones. In these localization estimation methods, it is very popular to use the RSSI (Received Signal Strength Indication) of signals to repre...

  • Article
  • Open Access
3 Citations
2,078 Views
14 Pages

The reversible data hiding scheme in the encrypted domain is a potential solution to the concerns regarding user privacy in cloud applications. The 3D mesh model is an emerging file format and is widely used in engineering modeling, special effects,...

  • Article
  • Open Access
13 Citations
3,751 Views
40 Pages

The Internet of Things (IoT) has revolutionized connected devices, with applications in healthcare, data analytics, and smart cities. For time-sensitive applications, 5G wireless networks provide ultra-reliable low-latency communication (URLLC) and f...

of 4

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903