Skip to Content

Future Internet, Volume 16, Issue 6

2024 June - 40 articles

Cover Story: The paper “Visual Data and Pattern Analysis for Smart Education: A Robust DRL-Based Early Warning System for Student Performance Prediction” presents a comprehensive framework to enhance student performance monitoring in e-learning. By leveraging Deep Reinforcement Learning (DRL), the study develops an early warning system that uses visual data and pattern analysis to predict student engagement and performance. The approach includes federated learning-based authentication, multi-objective clustering, and personalised recommendation generation, aiming to create a more responsive and adaptive educational environment. This system significantly improves prediction accuracy and personalises educational support, ensuring timely interventions for at-risk students. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (40)

  • Article
  • Open Access
31 Citations
12,047 Views
12 Pages

The increasing use of generative artificial intelligence (GenAI) has led to a rise in conversations about how teachers and students should adopt these tools to enhance the learning process. Self-regulated learning (SRL) research is important for addr...

  • Article
  • Open Access
2 Citations
1,811 Views
18 Pages

Sequence alignment is a critical factor in the variant analysis of genomic research. Since the FM (Ferrainas–Manzini) index was developed, it has proven to be a model in a compact format with efficient pattern matching and high-speed query sear...

  • Article
  • Open Access
1 Citations
1,529 Views
14 Pages

Discovery of Cloud Applications from Logs

  • Ashot Harutyunyan,
  • Arnak Poghosyan,
  • Tigran Bunarjyan,
  • Andranik Haroyan,
  • Marine Harutyunyan,
  • Lilit Harutyunyan and
  • Nelson Baloian

Continuous discovery and update of applications or their boundaries running in cloud environments in an automatic way is a highly required function of modern data center operation solutions. Prior attempts to address this problem within various produ...

  • Article
  • Open Access
4 Citations
2,351 Views
32 Pages

Development of a Theoretical Model for Digital Risks Arising from the Implementation of Industry 4.0 (TMR-I4.0)

  • Vitor Hugo dos Santos Filho,
  • Luis Maurício Martins de Resende and
  • Joseane Pontes

This study aims to develop a theoretical model for digital risks arising from implementing Industry 4.0 (represented by the acronym TMR-I4.0). A systematic literature review was initially conducted using the Methodi Ordinatio methodology to map the p...

  • Article
  • Open Access
6 Citations
2,431 Views
17 Pages

Data-based prognostic methods exploit sensor data to forecast the remaining useful life (RUL) of industrial settings to optimize the scheduling of maintenance actions. However, implementing sensors may not be cost-effective or practical for all compo...

  • Article
  • Open Access
4 Citations
5,407 Views
17 Pages

The primary challenge in Multimodal sentiment analysis (MSA) lies in developing robust joint representations that can effectively learn mutual information from diverse modalities. Previous research in this field tends to rely on feature concatenation...

  • Article
  • Open Access
4 Citations
2,338 Views
13 Pages

IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets

  • Umang Garg,
  • Santosh Kumar and
  • Aniket Mahanti

The tremendous growth of the Internet of Things (IoT) has gained a lot of attention in the global market. The massive deployment of IoT is also inherent in various security vulnerabilities, which become easy targets for hackers. IoT botnets are one t...

  • Article
  • Open Access
1 Citations
2,554 Views
14 Pages

Indoor position fingerprint-based location estimation methods have been widely used by applications on smartphones. In these localization estimation methods, it is very popular to use the RSSI (Received Signal Strength Indication) of signals to repre...

  • Article
  • Open Access
4 Citations
2,159 Views
14 Pages

The reversible data hiding scheme in the encrypted domain is a potential solution to the concerns regarding user privacy in cloud applications. The 3D mesh model is an emerging file format and is widely used in engineering modeling, special effects,...

  • Article
  • Open Access
14 Citations
3,889 Views
40 Pages

The Internet of Things (IoT) has revolutionized connected devices, with applications in healthcare, data analytics, and smart cities. For time-sensitive applications, 5G wireless networks provide ultra-reliable low-latency communication (URLLC) and f...

  • Article
  • Open Access
14 Citations
2,429 Views
16 Pages

End-User Development has been proposed over the years to allow end users to control and manage their Internet of Things-based environments, such as smart homes. With End-User Development, end users are able to create trigger-action rules or routines...

  • Article
  • Open Access
1 Citations
4,609 Views
18 Pages

Streaming platforms have revolutionized the digital entertainment industry, but challenges and research opportunities remain to be addressed. One current concern is the lack of transparency in the business model of video streaming platforms, which ma...

  • Article
  • Open Access
14 Citations
3,036 Views
25 Pages

Artificial Intelligence (AI) and Deep Reinforcement Learning (DRL) have revolutionised e-learning by creating personalised, adaptive, and secure environments. However, challenges such as privacy, bias, and data limitations persist. E-FedCloud aims to...

  • Article
  • Open Access
17 Citations
2,048 Views
29 Pages

Private Set Intersection Cardinality (PSI-CA) is a cryptographic method in secure multi-party computation that allows entities to identify the cardinality of the intersection without revealing their private data. Traditional approaches assume similar...

  • Article
  • Open Access
6 Citations
6,467 Views
23 Pages

The mobile and wearable nature of smartwatches poses challenges in evaluating their usability. This paper presents a study employing customized heuristic evaluation and use of the system usability scale (SUS) on four smartwatches, along with their mo...

  • Article
  • Open Access
1 Citations
2,957 Views
19 Pages

Evaluation of Radio Access Protocols for V2X in 6G Scenario-Based Models

  • Héctor Orrillo,
  • André Sabino and
  • Mário Marques da Silva

The expansion of mobile connectivity with the arrival of 6G paves the way for the new Internet of Verticals (6G-IoV), benefiting autonomous driving. This article highlights the importance of vehicle-to-everything (V2X) and vehicle-to-vehicle (V2V) co...

  • Article
  • Open Access
2 Citations
1,676 Views
29 Pages

Large-scale computer platforms that process users’ online requests must be capable of handling unexpected spikes in arrival rates. These platforms, which are composed of distributed components, can be configured with parameters to ensure both t...

  • Article
  • Open Access
19 Citations
12,455 Views
32 Pages

Impact, Compliance, and Countermeasures in Relation to Data Breaches in Publicly Traded U.S. Companies

  • Gabriel Arquelau Pimenta Rodrigues,
  • André Luiz Marques Serrano,
  • Guilherme Fay Vergara,
  • Robson de Oliveira Albuquerque and
  • Georges Daniel Amvame Nze

A data breach is the unauthorized disclosure of sensitive personal data, and it impacts millions of individuals annually in the United States, as reported by Privacy Rights Clearinghouse. These breaches jeopardize the physical safety of the individua...

  • Article
  • Open Access
27 Citations
8,576 Views
22 Pages

Implementation of Lightweight Machine Learning-Based Intrusion Detection System on IoT Devices of Smart Homes

  • Abbas Javed,
  • Amna Ehtsham,
  • Muhammad Jawad,
  • Muhammad Naeem Awais,
  • Ayyaz-ul-Haq Qureshi and
  • Hadi Larijani

Smart home devices, also known as IoT devices, provide significant convenience; however, they also present opportunities for attackers to jeopardize homeowners’ security and privacy. Securing these IoT devices is a formidable challenge because...

  • Article
  • Open Access
4 Citations
3,525 Views
15 Pages

Metaverse and Fashion: An Analysis of Consumer Online Interest

  • Carmen Ruiz Viñals,
  • Marta Gil Ibáñez and
  • José Luis Del Olmo Arriaga

Recent studies have demonstrated the value that the Internet and web applications bring to businesses. Among other tools are those that enable the analysis and monitoring of searches, such as Google Trends, which is currently used by the fashion indu...

  • Systematic Review
  • Open Access
4 Citations
3,045 Views
17 Pages

The Use of Artificial Intelligence in eParticipation: Mapping Current Research

  • Zisis Vasilakopoulos,
  • Theocharis Tavantzis,
  • Rafail Promikyridis and
  • Efthimios Tambouris

Electronic Participation (eParticipation) enables citizens to engage in political and decision-making processes using information and communication technologies. As in many other fields, Artificial Intelligence (AI) has recently started to dictate so...

  • Article
  • Open Access
3 Citations
3,012 Views
18 Pages

In-Home Evaluation of the Neo Care Artificial Intelligence Sound-Based Fall Detection System

  • Carol Maher,
  • Kylie A. Dankiw,
  • Ben Singh,
  • Svetlana Bogomolova and
  • Rachel G. Curtis

The Neo Care home monitoring system aims to detect falls and other events using artificial intelligence. This study evaluated Neo Care’s accuracy and explored user perceptions through a 12-week in-home trial with 18 households of adults aged 65...

  • Article
  • Open Access
24 Citations
4,903 Views
22 Pages

Increasing global credit card usage has elevated it to a preferred payment method for daily transactions, underscoring its significance in global financial cybersecurity. This paper introduces a credit card fraud detection (CCFD) system that integrat...

  • Article
  • Open Access
9 Citations
7,250 Views
19 Pages

GreenLab, an IoT-Based Small-Scale Smart Greenhouse

  • Cristian Volosciuc,
  • Răzvan Bogdan,
  • Bianca Blajovan,
  • Cristina Stângaciu and
  • Marius Marcu

In an era of connectivity, the Internet of Things introduces smart solutions for smart and sustainable agriculture, bringing alternatives to overcome the food crisis. Among these solutions, smart greenhouses support crop and vegetable agriculture reg...

  • Article
  • Open Access
2 Citations
2,078 Views
14 Pages

In the realm of intelligent transportation, pedestrian detection has witnessed significant advancements. However, it continues to grapple with challenging issues, notably the detection of pedestrians in complex lighting scenarios. Conventional visibl...

  • Article
  • Open Access
4 Citations
2,377 Views
16 Pages

Prophet–CEEMDAN–ARBiLSTM-Based Model for Short-Term Load Forecasting

  • Jindong Yang,
  • Xiran Zhang,
  • Wenhao Chen and
  • Fei Rong

Accurate short-term load forecasting (STLF) plays an essential role in sustainable energy development. Specifically, energy companies can efficiently plan and manage their generation capacity, lessening resource wastage and promoting the overall effi...

  • Article
  • Open Access
1 Citations
1,457 Views
16 Pages

Enhancing Sensor Data Imputation: OWA-Based Model Aggregation for Missing Values

  • Muthana Al-Amidie,
  • Laith Alzubaidi,
  • Muhammad Aminul Islam and
  • Derek T. Anderson

Due to some limitations in the data collection process caused either by human-related errors or by collection electronics, sensors, and network connectivity-related errors, the important values at some points could be lost. However, a complete datase...

  • Article
  • Open Access
5 Citations
3,481 Views
22 Pages

Harnessing the Cloud: A Novel Approach to Smart Solar Plant Monitoring

  • Mohammad Imran Ali,
  • Shahi Dost,
  • Khurram Shehzad Khattak,
  • Muhammad Imran Khan and
  • Riaz Muhammad

Renewable Energy Sources (RESs) such as hydro, wind, and solar are merging as preferred alternatives to fossil fuels. Among these RESs, solar energy is the most ideal solution; it is gaining extensive interest around the globe. However, due to solar...

  • Article
  • Open Access
7 Citations
3,222 Views
15 Pages

Tracing Student Activity Patterns in E-Learning Environments: Insights into Academic Performance

  • Evgenia Paxinou,
  • Georgios Feretzakis,
  • Rozita Tsoni,
  • Dimitrios Karapiperis,
  • Dimitrios Kalles and
  • Vassilios S. Verykios

In distance learning educational environments like Moodle, students interact with their tutors, their peers, and the provided educational material through various means. Due to advancements in learning analytics, students’ transitions within Mo...

  • Article
  • Open Access
4 Citations
2,936 Views
20 Pages

Traffic flow prediction is considered to be one of the fundamental technologies in intelligent transportation systems (ITSs) with a tremendous application prospect. Unlike traditional time series analysis tasks, the key challenge in traffic flow pred...

  • Article
  • Open Access
16 Citations
9,363 Views
19 Pages

The advent of Generative Artificial Intelligence is opening essential questions about whether and when AI will replace human abilities in accomplishing everyday tasks. This issue is particularly true in the domain of software development, where gener...

  • Article
  • Open Access
3 Citations
4,549 Views
17 Pages

Enhanced Beacons Dynamic Transmission over TSCH

  • Erik Ortiz Guerra,
  • Mario Martínez Morfa,
  • Carlos Manuel García Algora,
  • Hector Cruz-Enriquez,
  • Kris Steenhaut and
  • Samuel Montejo-Sánchez

Time slotted channel hopping (TSCH) has become the standard multichannel MAC protocol for low-power lossy networks. The procedure for associating nodes in a TSCH-based network is not included in the standard and has been defined in the minimal 6TiSCH...

  • Article
  • Open Access
7 Citations
2,426 Views
19 Pages

Data Collection in Areas without Infrastructure Using LoRa Technology and a Quadrotor

  • Josué I. Rojo-García,
  • Sergio A. Vera-Chavarría,
  • Yair Lozano-Hernández,
  • Victor G. Sánchez-Meza,
  • Jaime González-Sierra and
  • Luz N. Oliva-Moreno

The use of sensor networks in monitoring applications has increased; they are useful in security, environmental, and health applications, among others. These networks usually transmit data through short-range stations, which makes them attractive for...

  • Article
  • Open Access
5 Citations
2,362 Views
21 Pages

Connected and autonomous vehicles (CAVs) are advancing at a fast speed with the improvement of the automotive industry, which opens up new possibilities for different attacks. A Distributed Denial-of-Service (DDoS) attacker floods the in-vehicle netw...

  • Article
  • Open Access
25 Citations
4,231 Views
19 Pages

Exploiting Autoencoder-Based Anomaly Detection to Enhance Cybersecurity in Power Grids

  • Fouzi Harrou,
  • Benamar Bouyeddou,
  • Abdelkader Dairi and
  • Ying Sun

The evolution of smart grids has led to technological advances and a demand for more efficient and sustainable energy systems. However, the deployment of communication systems in smart grids has increased the threat of cyberattacks, which can result...

  • Article
  • Open Access
5 Citations
2,759 Views
21 Pages

Opportunistic networks, an evolution of mobile Ad Hoc networks (MANETs), offer decentralized communication without relying on preinstalled infrastructure, enabling nodes to route packets through different mobile nodes dynamically. However, due to the...

  • Systematic Review
  • Open Access
11 Citations
5,616 Views
16 Pages

Urban Green Spaces and Mental Well-Being: A Systematic Review of Studies Comparing Virtual Reality versus Real Nature

  • Liyuan Liang,
  • Like Gobeawan,
  • Siu-Kit Lau,
  • Ervine Shengwei Lin and
  • Kai Keng Ang

Increasingly, urban planners are adopting virtual reality (VR) in designing urban green spaces (UGS) to visualize landscape designs in immersive 3D. However, the psychological effect of green spaces from the experience in VR may differ from the actua...

  • Article
  • Open Access
5 Citations
3,136 Views
20 Pages

MADDPG-Based Offloading Strategy for Timing-Dependent Tasks in Edge Computing

  • Yuchen Wang,
  • Zishan Huang,
  • Zhongcheng Wei and
  • Jijun Zhao

With the increasing popularity of the Internet of Things (IoT), the proliferation of computation-intensive and timing-dependent applications has brought serious load pressure on terrestrial networks. In order to solve the problem of computing resourc...

  • Review
  • Open Access
73 Citations
18,224 Views
21 Pages

Using ChatGPT in Software Requirements Engineering: A Comprehensive Review

  • Nuno Marques,
  • Rodrigo Rocha Silva and
  • Jorge Bernardino

Large language models (LLMs) have had a significant impact on several domains, including software engineering. However, a comprehensive understanding of LLMs’ use, impact, and potential limitations in software engineering is still emerging and...

  • Article
  • Open Access
2 Citations
3,034 Views
14 Pages

Object and Event Detection Pipeline for Rink Hockey Games

  • Jorge Miguel Lopes,
  • Luis Paulo Mota,
  • Samuel Marques Mota,
  • José Manuel Torres,
  • Rui Silva Moreira,
  • Christophe Soares,
  • Ivo Pereira,
  • Feliz Ribeiro Gouveia and
  • Pedro Sobral

All types of sports are potential application scenarios for automatic and real-time visual object and event detection. In rink hockey, the popular roller skate variant of team hockey, it is of great interest to automatically track player movements, p...

XFacebookLinkedIn
Future Internet - ISSN 1999-5903