Skip to Content

Future Internet, Volume 16, Issue 7

2024 July - 39 articles

Cover Story: Digital twins, virtual replicas of physical systems, have revolutionized smart manufacturing by enabling advanced simulation and early fault diagnosis. However, these models deteriorate over time due to dynamic data streams. To address this issue, Ragini Gupta and her fellow researchers from Prof. Klara Nahrstedt's lab at the University of Illinois at Urbana-Champaign introduced TWIN-ADAPT, a continuous learning framework for real-time anomaly classification in IoT-driven semiconductor labs, cleanrooms. TWIN-ADAPT uses dual-window strategies to detect and adapt to concept drift and Particle Swarm Optimization for hyperparameter tuning. Tested on cleanroom datasets, it demonstrates superior performance, handling both abrupt and gradual data changes. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (39)

  • Article
  • Open Access
5 Citations
2,430 Views
34 Pages

Microservice-Based Vehicular Network for Seamless and Ultra-Reliable Communications of Connected Vehicles

  • Mira M. Zarie,
  • Abdelhamied A. Ateya,
  • Mohammed S. Sayed,
  • Mohammed ElAffendi and
  • Mohammad Mahmoud Abdellatif

The fifth-generation (5G) cellular infrastructure is expected to bring about the widespread use of connected vehicles. This technological progress marks the beginning of a new era in vehicular networks, which includes a range of different types and s...

  • Article
  • Open Access
5 Citations
8,545 Views
22 Pages

Behind the Code: Identifying Zero-Day Exploits in WordPress

  • Mohamed Azarudheen Mohamed Mohideen,
  • Muhammad Shahroz Nadeem,
  • James Hardy,
  • Haider Ali,
  • Umair Ullah Tariq,
  • Fariza Sabrina,
  • Muhammad Waqar and
  • Salman Ahmed

The rising awareness of cybersecurity among governments and the public underscores the importance of effectively managing security incidents, especially zero-day attacks that exploit previously unknown software vulnerabilities. These zero-day attacks...

  • Article
  • Open Access
10 Citations
2,917 Views
15 Pages

Connected devices in IoT systems usually have low computing and storage capacity and lack uniform standards and protocols, making them easy targets for cyberattacks. Implementing security measures like cryptographic authentication, access control, an...

  • Review
  • Open Access
10 Citations
7,437 Views
32 Pages

Human–AI Collaboration for Remote Sighted Assistance: Perspectives from the LLM Era

  • Rui Yu,
  • Sooyeon Lee,
  • Jingyi Xie,
  • Syed Masum Billah and
  • John M. Carroll

Remote sighted assistance (RSA) has emerged as a conversational technology aiding people with visual impairments (VI) through real-time video chat communication with sighted agents. We conducted a literature review and interviewed 12 RSA users to und...

  • Article
  • Open Access
20 Citations
7,728 Views
29 Pages

A Novel Hybrid Unsupervised Learning Approach for Enhanced Cybersecurity in the IoT

  • Prabu Kaliyaperumal,
  • Sudhakar Periyasamy,
  • Manikandan Thirumalaisamy,
  • Balamurugan Balusamy and
  • Francesco Benedetto

The proliferation of IoT services has spurred a surge in network attacks, heightening cybersecurity concerns. Essential to network defense, intrusion detection and prevention systems (IDPSs) identify malicious activities, including denial of service...

  • Article
  • Open Access
9 Citations
6,759 Views
44 Pages

NFT Technology for Enhanced Global Digital Registers: A Novel Approach to Tokenization

  • Oleksandr Kuznetsov,
  • Emanuele Frontoni,
  • Kateryna Kuznetsova,
  • Ruslan Shevchuk and
  • Mikolaj Karpinski

In the rapidly evolving field of digital asset management, centralized and decentralized global registries have become essential tools for organizing, tracking, and distributing digital assets. However, existing systems often face challenges regardin...

  • Article
  • Open Access
1 Citations
1,829 Views
17 Pages

To mitigate the control overhead of Software-Defined Mobile Ad Hoc Networks (SD-MANETs), this paper proposes a novel approach, termed Software-Defined Greedy Perimeter Stateless Routing (SD-GPSR), which integrates geographical location information. S...

  • Review
  • Open Access
8 Citations
6,181 Views
23 Pages

In the rapidly evolving landscape of drone technology, securing unmanned aerial vehicles (UAVs) presents critical challenges and demands unique solutions. This paper offers a thorough examination of the security requirements, threat models, and solut...

  • Article
  • Open Access
2 Citations
2,061 Views
16 Pages

The Use of Virtual Reality in the Countries of the Central American Bank for Economic Integration (CABEI)

  • Álvaro Antón-Sancho,
  • Pablo Fernández-Arias,
  • Edwan Anderson Ariza and
  • Diego Vergara

In recent years, virtual reality (VR) technologies have become one of the teaching tools with the greatest training potential in higher education. Thus, the study of factors that influence the adoption and valuation of VR by the educational agents in...

  • Article
  • Open Access
2 Citations
2,034 Views
25 Pages

Multi-Agent Dynamic Fog Service Placement Approach

  • Nerijus Šatkauskas and
  • Algimantas Venčkauskas

Fog computing as a paradigm was offered more than a decade ago to solve Cloud Computing issues. Long transmission distances, higher data flow, data loss, latency, and energy consumption lead to providing services at the edge of the network. But, fog...

  • Article
  • Open Access
10 Citations
7,020 Views
17 Pages

The diffusion of Multimodal Large Language Models (MLLMs) has opened new research directions in the context of video content understanding and classification. Emotion recognition from videos aims to automatically detect human emotions such as anxiety...

  • Article
  • Open Access
6 Citations
1,541 Views
24 Pages

Ensuring accountability and integrity in MQTT communications is important for enabling several IoT applications. This paper presents a novel approach that combines blockchain technology and the interplanetary file system (IPFS) to achieve non-repudia...

  • Article
  • Open Access
3 Citations
2,778 Views
18 Pages

For a communication control system in a disaster area where drones (also called unmanned aerial vehicles (UAVs)) are used as aerial base stations (ABSs), the reliability of communication is a key challenge for drones to provide emergency communicatio...

  • Article
  • Open Access
21 Citations
10,846 Views
36 Pages

The complexity and interconnection within the financial ecosystem demand innovative solutions to improve transparency, security, and efficiency in financial reporting and liquidity management, while also reducing accounting fraud. This paper presents...

  • Article
  • Open Access
4 Citations
2,957 Views
21 Pages

Towards an Optimized Blockchain-Based Secure Medical Prescription-Management System

  • Imen Ahmed,
  • Mariem Turki,
  • Mouna Baklouti,
  • Bouthaina Dammak and
  • Amnah Alshahrani

This work introduces a blockchain-based secure medical prescription-management system seamlessly integrated with a dynamic Internet of Things (IoT) framework. Notably, this integration constitutes a pivotal challenge in the arena of resource-constrai...

  • Article
  • Open Access
4 Citations
3,295 Views
17 Pages

Crying is a newborn’s main way of communicating. Despite their apparent similarity, newborn cries are physically generated and have distinct characteristics. Experienced medical professionals, nurses, and parents are able to recognize these var...

  • Article
  • Open Access
4 Citations
4,651 Views
15 Pages

Digital deliberation has been steadily growing in recent years, enabling citizens from different geographical locations and diverse opinions and expertise to participate in policy-making processes. Software platforms aiming to support digital deliber...

  • Article
  • Open Access
2 Citations
6,166 Views
20 Pages

Dynamic SNR, Spectral Efficiency, and Rate Characterization in 5G/6G mmWave/sub-THz Systems with Macro- and Micro-Mobilities

  • Darya Ostrikova,
  • Elizaveta Golos,
  • Vitalii Beschastnyi,
  • Egor Machnev,
  • Yuliya Gaidamaka and
  • Konstantin Samouylov

The performance of 5G/6G cellular systems operating in millimeter wave (mmWave, 30–100 GHz) and sub-terahertz (sub-THz, 100–300 GHz) bands is conventionally assessed by utilizing the static distributions of user locations. The rationale i...

  • Article
  • Open Access
15 Citations
4,350 Views
35 Pages

In the rapidly evolving landscape of scientific semiconductor laboratories (commonly known as, cleanrooms), integrated with Internet of Things (IoT) technology and Cyber-Physical Systems (CPSs), several factors including operational changes, sensor a...

  • Article
  • Open Access
12 Citations
4,094 Views
16 Pages

Enhancing Autonomous Driving Navigation Using Soft Actor-Critic

  • Badr Ben Elallid,
  • Nabil Benamar,
  • Miloud Bagaa and
  • Yassine Hadjadj-Aoul

Autonomous vehicles have gained extensive attention in recent years, both in academia and industry. For these self-driving vehicles, decision-making in urban environments poses significant challenges due to the unpredictable behavior of traffic parti...

  • Article
  • Open Access
1,694 Views
16 Pages

The Internet of Things (IoT) has become ubiquitous. IoT devices are applied in a multitude of applications, e.g., in smart home scenarios, building automation, smart energy and smart cities, healthcare, and industrial environments. Fast and efficient...

  • Systematic Review
  • Open Access
2 Citations
2,018 Views
27 Pages

In recent years, the attention paid to the metaverse in the scientific world has increased; the hottest topics include system architecture and enabling technologies, as well as business, privacy, ethical, and security issues. On the other side, at th...

  • Article
  • Open Access
1 Citations
3,771 Views
18 Pages

In recent years, various Remote Code Execution vulnerabilities on the Internet have been exposed frequently; thus, more and more security researchers have begun to pay attention to the detection of Remote Code Execution attacks. In this paper, we foc...

  • Review
  • Open Access
26 Citations
7,069 Views
23 Pages

Irrigation refers to supplying water to soil through pipes, pumps, and spraying systems to ensure even distribution across the field. In traditional farming or gardening, the setup and usage of an agricultural irrigation system solely rely on the per...

  • Article
  • Open Access
4 Citations
2,742 Views
20 Pages

Performance Impact of Nested Congestion Control on Transport-Layer Multipath Tunneling

  • Marcus Pieska,
  • Andreas Kassler,
  • Anna Brunstrom,
  • Veselin Rakocevic and
  • Markus Amend

Multipath wireless access aims to seamlessly aggregate multiple access networks to increase data rates and decrease latency. It is currently being standardized through the ATSSS architectural framework as part of the fifth-generation (5G) cellular ne...

  • Article
  • Open Access
6 Citations
2,360 Views
14 Pages

This article presents a model built for deep digitalization in the construction industry and for making building information modeling achieve a greater level of transparency, verifiability and effectiveness for the benefit of all stakeholders. Thanks...

  • Systematic Review
  • Open Access
3 Citations
3,319 Views
16 Pages

Exploring the Architectural Composition of Cyber Ranges: A Systematic Review

  • Dionysios Stamatopoulos,
  • Menelaos Katsantonis,
  • Panagiotis Fouliras and
  • Ioannis Mavridis

In light of the ever-increasing complexity of cyber–physical systems (CPSs) and information technology networking systems (ITNs), cyber ranges (CRs) have emerged as a promising solution by providing theoretical and practical cybersecurity knowl...

  • Article
  • Open Access
1 Citations
1,701 Views
18 Pages

The Internet of Medical Things (IoMT) represents a specialized domain within the Internet of Things, focusing on medical devices that require regulatory approval to ensure patient safety. Trusted composition of IoMT systems aims to ensure high assura...

  • Article
  • Open Access
2 Citations
4,174 Views
23 Pages

Understanding household energy-consumption patterns is essential for developing effective energy-conservation strategies. This study aims to identify ‘out-profiled’ consumers—households that exhibit atypical energy-usage behaviors&m...

  • Article
  • Open Access
3 Citations
6,751 Views
19 Pages

Today, more than ever before, technological progress is evolving rapidly, and in the absence of adequate regulatory frameworks, the big players in the digital market (the so-called Big Techs) are exploiting personal data (name, address, telephone num...

  • Article
  • Open Access
37 Citations
9,614 Views
36 Pages

Enhancing Network Slicing Security: Machine Learning, Software-Defined Networking, and Network Functions Virtualization-Driven Strategies

  • José Cunha,
  • Pedro Ferreira,
  • Eva M. Castro,
  • Paula Cristina Oliveira,
  • Maria João Nicolau,
  • Iván Núñez,
  • Xosé Ramon Sousa and
  • Carlos Serôdio

The rapid development of 5G networks and the anticipation of 6G technologies have ushered in an era of highly customizable network environments facilitated by the innovative concept of network slicing. This technology allows the creation of multiple...

  • Review
  • Open Access
14 Citations
4,380 Views
27 Pages

Modern building automation systems implement plenty of advanced control and monitoring functions that consider various parameters like users’ activity, lighting, temperature changes, etc. Moreover, novel solutions based on the Internet of Thing...

  • Article
  • Open Access
5 Citations
4,066 Views
17 Pages

Quantized large language models are large language models (LLMs) optimized for model size while preserving their efficacy. They can be executed on consumer-grade computers without the powerful features of dedicated servers needed to execute regular (...

  • Article
  • Open Access
3 Citations
2,271 Views
21 Pages

The Internet architecture has recently shifted towards a framework characterized by multiple interconnected cloud sites, all linked via an L3 IP network. With this shift, managing networking controls among multiple cloud sites is becoming a significa...

  • Article
  • Open Access
7 Citations
2,481 Views
16 Pages

INFLUTRUST: Trust-Based Influencer Marketing Campaigns in Online Social Networks

  • Adedamola Adesokan,
  • Aisha B Rahman and
  • Eirini Eleni Tsiropoulou

This paper introduces the INFLUTRUST framework that is designed to address challenges in trust-based influencer marketing campaigns on Online Social Networks (OSNs). The INFLUTRUST framework enables the influencers to autonomously select products acr...

  • Review
  • Open Access
5 Citations
4,268 Views
33 Pages

Mapping How Artificial Intelligence Blends with Healthcare: Insights from a Bibliometric Analysis

  • Loukas Triantafyllopoulos,
  • Evgenia Paxinou,
  • Georgios Feretzakis,
  • Dimitris Kalles and
  • Vassilios S. Verykios

The integration of artificial intelligence (AI) into medical practice has become a critical focus in contemporary medical research. This bibliometric analysis examined the scope of AI utilization across the healthcare spectrum by analyzing a signific...

  • Article
  • Open Access
2 Citations
1,827 Views
20 Pages

Public administration frequently deals with geographically scattered personal data between multiple government locations and organizations. As digital technologies advance, public administration is increasingly relying on collaborative intelligence w...

  • Review
  • Open Access
48 Citations
16,074 Views
23 Pages

AI chatbots have emerged as powerful tools for providing text-based solutions to a wide range of everyday challenges. Selecting the appropriate chatbot is crucial for optimising outcomes. This paper presents a comprehensive comparative analysis of fi...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903