Skip to Content

Future Internet, Volume 16, Issue 8

2024 August - 45 articles

Cover Story: This paper introduces an innovative approach to developing a head-mounted fault display system that integrates predictive capabilities, including deep-learning long short-term memory neural networks model integration with anomaly explanations for efficient predictive maintenance tasks. Then, a 3D virtual model created from sampled and recorded data coupled with the deep neural diagnoser model is designed. By applying this methodology to a wind farm dataset provided by Energias De Portugal, we aim to support maintenance managers in making informed decisions about inspection, replacement, and repair tasks. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (45)

  • Article
  • Open Access
4 Citations
1,670 Views
22 Pages

22 August 2024

Directional sensor networks are a widely used architecture in the sensing layer of the Internet of Things (IoT), which has excellent data collection and transmission capabilities. The coverage hole caused by random deployment of sensors is the main f...

  • Article
  • Open Access
5 Citations
2,784 Views
27 Pages

Beat the Heat: Syscall Attack Detection via Thermal Side Channel

  • Teodora Vasilas,
  • Claudiu Bacila and
  • Remus Brad

21 August 2024

As the complexity and integration of electronic devices increase, understanding and mitigating side-channel vulnerabilities will remain a critical area of cybersecurity research. The new and intriguing software-based thermal side-channel attacks and...

  • Article
  • Open Access
3 Citations
5,282 Views
22 Pages

Wireless and Fiber-Based Post-Quantum-Cryptography-Secured IPsec Tunnel

  • Daniel Christian Lawo,
  • Rana Abu Bakar,
  • Abraham Cano Aguilera,
  • Filippo Cugini,
  • José Luis Imaña,
  • Idelfonso Tafur Monroy and
  • Juan Jose Vegas Olmos

21 August 2024

In the near future, commercially accessible quantum computers are anticipated to revolutionize the world as we know it. These advanced machines are predicted to render traditional cryptographic security measures, deeply ingrained in contemporary comm...

  • Article
  • Open Access
1 Citations
2,688 Views
18 Pages

Leveraging Internet News-Based Data for Rockfall Hazard Susceptibility Assessment on Highways

  • Kieu Anh Nguyen,
  • Yi-Jia Jiang,
  • Chiao-Shin Huang,
  • Meng-Hsun Kuo and
  • Walter Chen

21 August 2024

Over three-quarters of Taiwan’s landmass consists of mountainous slopes with steep gradients, leading to frequent rockfall hazards that obstruct traffic and cause injuries and fatalities. This study used Google Alerts to compile internet news o...

  • Review
  • Open Access
42 Citations
22,927 Views
29 Pages

A Survey on the Use of Large Language Models (LLMs) in Fake News

  • Eleftheria Papageorgiou,
  • Christos Chronis,
  • Iraklis Varlamis and
  • Yassine Himeur

19 August 2024

The proliferation of fake news and fake profiles on social media platforms poses significant threats to information integrity and societal trust. Traditional detection methods, including rule-based approaches, metadata analysis, and human fact-checki...

  • Article
  • Open Access
2 Citations
1,192 Views
19 Pages

An Innovative Recompression Scheme for VQ Index Tables

  • Yijie Lin,
  • Jui-Chuan Liu,
  • Ching-Chun Chang and
  • Chin-Chen Chang

19 August 2024

As we move into the digital era, the pace of technological advancement is accelerating rapidly. Network traffic often becomes congested during the transmission of large data volumes. To mitigate this, data compression plays a crucial role in minimizi...

  • Article
  • Open Access
9 Citations
3,508 Views
20 Pages

A Microservice-Based Smart Agriculture System to Detect Animal Intrusion at the Edge

  • Jinpeng Miao,
  • Dasari Rajasekhar,
  • Shivakant Mishra,
  • Sanjeet Kumar Nayak and
  • Ramanarayan Yadav

16 August 2024

Smart agriculture stands as a promising domain for IoT-enabled technologies, with the potential to elevate crop quality, quantity, and operational efficiency. However, implementing a smart agriculture system encounters challenges such as the high lat...

  • Article
  • Open Access
1,905 Views
17 Pages

Dynamic Graph Representation Learning for Passenger Behavior Prediction

  • Mingxuan Xie,
  • Tao Zou,
  • Junchen Ye,
  • Bowen Du and
  • Runhe Huang

15 August 2024

Passenger behavior prediction aims to track passenger travel patterns through historical boarding and alighting data, enabling the analysis of urban station passenger flow and timely risk management. This is crucial for smart city development and pub...

  • Article
  • Open Access
4 Citations
3,554 Views
12 Pages

Establishing a Model for the User Acceptance of Cybersecurity Training

  • Wesam Fallatah,
  • Joakim Kävrestad and
  • Steven Furnell

15 August 2024

Cybersecurity is established as fundamental for organisations and individuals engaging with digital technology. A central topic in cybersecurity is user behaviour, which has been shown to be the root cause or enabler in a majority of all cyber incide...

  • Article
  • Open Access
1,566 Views
16 Pages

14 August 2024

The closed architecture of modern control systems impedes them from further development in the environment of the industrial IoT. The open control system is proposed to tackle this issue. Numerous open control prototypes have been proposed, but they...

  • Article
  • Open Access
1 Citations
2,763 Views
16 Pages

Multi-Agent Deep-Q Network-Based Cache Replacement Policy for Content Delivery Networks

  • Janith K. Dassanayake,
  • Minxiao Wang,
  • Muhammad Z. Hameed and
  • Ning Yang

14 August 2024

In today’s digital landscape, content delivery networks (CDNs) play a pivotal role in ensuring rapid and seamless access to online content across the globe. By strategically deploying a network of edge servers in close proximity to users, CDNs...

  • Article
  • Open Access
6 Citations
5,933 Views
37 Pages

Early Ransomware Detection with Deep Learning Models

  • Matan Davidian,
  • Michael Kiperberg and
  • Natalia Vanetik

11 August 2024

Ransomware is a growing-in-popularity type of malware that restricts access to the victim’s system or data until a ransom is paid. Traditional detection methods rely on analyzing the malware’s content, but these methods are ineffective ag...

  • Review
  • Open Access
10 Citations
5,088 Views
22 Pages

9 August 2024

In the last few years, blockchain has emerged as a cutting-edge technology whose main advantages are transparency, traceability, immutability, enhanced efficiency, and trust, thanks to its decentralized nature. Although many people still identify blo...

  • Article
  • Open Access
1 Citations
2,402 Views
24 Pages

9 August 2024

This study investigates the ability of transformer-based models (TBMs) to form stimulus equivalence (SE) classes. We employ BERT and GPT as TBM agents in SE tasks, evaluating their performance across training structures (linear series, one-to-many an...

  • Article
  • Open Access
3 Citations
2,605 Views
28 Pages

FIVADMI: A Framework for In-Vehicle Anomaly Detection by Monitoring and Isolation

  • Khaled Mahbub,
  • Antonio Nehme,
  • Mohammad Patwary,
  • Marc Lacoste and
  • Sylvain Allio

8 August 2024

Self-driving vehicles have attracted significant attention in the automotive industry that is heavily investing to reach the level of reliability needed from these safety critical systems. Security of in-vehicle communications is mandatory to achieve...

  • Article
  • Open Access
3 Citations
2,666 Views
21 Pages

Dynamic Fashion Video Synthesis from Static Imagery

  • Tasin Islam,
  • Alina Miron,
  • Xiaohui Liu and
  • Yongmin Li

8 August 2024

Online shopping for clothing has become increasingly popular among many people. However, this trend comes with its own set of challenges. For example, it can be difficult for customers to make informed purchase decisions without trying on the clothes...

  • Article
  • Open Access
6 Citations
4,052 Views
16 Pages

Cross-Domain Fake News Detection Using a Prompt-Based Approach

  • Jawaher Alghamdi,
  • Yuqing Lin and
  • Suhuai Luo

8 August 2024

The proliferation of fake news poses a significant challenge in today’s information landscape, spanning diverse domains and topics and undermining traditional detection methods confined to specific domains. In response, there is a growing inter...

  • Review
  • Open Access
9 Citations
4,324 Views
19 Pages

8 August 2024

The adoption of blockchain platforms to bolster the security of Internet of Things (IoT) systems has attracted significant attention in recent years. Currently, there is a lack of comprehensive and systematic survey papers in the literature addressin...

  • Article
  • Open Access
51 Citations
16,892 Views
25 Pages

8 August 2024

This study uses deep learning methods to explore the Internet of Things (IoT) network intrusion detection method based on the CIC-IoT-2023 dataset. This dataset contains extensive data on real-life IoT environments. Based on this, this study proposes...

  • Article
  • Open Access
8 Citations
5,120 Views
25 Pages

7 August 2024

Nowadays, some of the most well-deployed infrastructures are Virtual Private Networks (VPNs) and Overlay Networks (ONs). They consist of hardware and software components designed to build private/secure channels, typically over the Internet. They are...

  • Article
  • Open Access
1 Citations
2,272 Views
20 Pages

6 August 2024

To fully harness the potential of wind turbine systems and meet high power demands while maintaining top-notch power quality, wind farm managers run their systems 24 h a day/7 days a week. However, due to the system’s large size and the complex...

  • Article
  • Open Access
5 Citations
2,464 Views
16 Pages

Masketeer: An Ensemble-Based Pseudonymization Tool with Entity Recognition for German Unstructured Medical Free Text

  • Martin Baumgartner,
  • Karl Kreiner,
  • Fabian Wiesmüller,
  • Dieter Hayn,
  • Christian Puelacher and
  • Günter Schreier

6 August 2024

Background: The recent rise of large language models has triggered renewed interest in medical free text data, which holds critical information about patients and diseases. However, medical free text is also highly sensitive. Therefore, de-identifica...

  • Article
  • Open Access
7 Citations
3,393 Views
15 Pages

Advanced Denoising and Meta-Learning Techniques for Enhancing Smart Health Monitoring Using Wearable Sensors

  • Minyechil Alehegn Tefera,
  • Amare Mulatie Dehnaw,
  • Yibeltal Chanie Manie,
  • Cheng-Kai Yao,
  • Shegaw Demessie Bogale and
  • Peng-Chun Peng

5 August 2024

This study introduces a novel meta-learning method to enhance diabetes detection using wearable sensor systems in smart health applications. Wearable sensor technology often needs to operate accurately across a wide range of users, each characterized...

  • Article
  • Open Access
9 Citations
4,098 Views
23 Pages

Virtual Reality in the Classroom: Transforming the Teaching of Electrical Circuits in the Digital Age

  • Diego Alejandro Albarracin-Acero,
  • Fidel Alfonso Romero-Toledo,
  • Claudia Esperanza Saavedra-Bautista and
  • Edwan Anderson Ariza-Echeverri

5 August 2024

In response to the digital transformation in education, this study explores the efficacy of virtual reality (VR) video games in teaching direct current electrical circuits at a public university in Colombia. Using a mixed-method action research appro...

  • Article
  • Open Access
4 Citations
2,710 Views
19 Pages

TRUST-ME: Trust-Based Resource Allocation and Server Selection in Multi-Access Edge Computing

  • Sean Tsikteris,
  • Aisha B Rahman,
  • Md. Sadman Siraj and
  • Eirini Eleni Tsiropoulou

4 August 2024

Multi-access edge computing (MEC) has attracted the interest of the research and industrial community to support Internet of things (IoT) applications by enabling efficient data processing and minimizing latency. This paper presents significant contr...

  • Article
  • Open Access
1 Citations
2,812 Views
24 Pages

Machine Learning-Assisted Dynamic Proximity-Driven Sorting Algorithm for Supermarket Navigation Optimization: A Simulation-Based Validation

  • Vincent Abella,
  • Johnfil Initan,
  • Jake Mark Perez,
  • Philip Virgil Astillo,
  • Luis Gerardo Cañete and
  • Gaurav Choudhary

2 August 2024

In-store grocery shopping is still widely preferred by consumers despite the rising popularity of online grocery shopping. Moreover, hardware-based in-store navigation systems and shopping list applications such as Walmart’s Store Map, Kroger&r...

  • Article
  • Open Access
24 Citations
9,592 Views
33 Pages

2 August 2024

The integration of artificial intelligence of things (AIoT) is transforming aviation health monitoring systems by combining extensive data collection with advanced analytical capabilities. This study proposes a framework that enhances predictive accu...

  • Article
  • Open Access
7 Citations
8,355 Views
22 Pages

Estimating Interception Density in the BB84 Protocol: A Study with a Noisy Quantum Simulator

  • Francesco Fiorini,
  • Michele Pagano,
  • Rosario Giuseppe Garroppo and
  • Antonio Osele

2 August 2024

Quantum computers have the potential to break the public-key cryptosystems widely used in key exchange and digital signature applications. To address this issue, quantum key distribution (QKD) offers a robust countermeasure against quantum computer a...

  • Article
  • Open Access
3 Citations
3,190 Views
13 Pages

Dynamic Storage Optimization for Communication between AI Agents

  • Andrei Tara,
  • Hjalmar K. Turesson and
  • Nicolae Natea

1 August 2024

Today, AI is primarily narrow, meaning that each model or agent can only perform one task or a narrow range of tasks. However, systems with broad capabilities can be built by connecting multiple narrow AIs. Connecting various AI agents in an open, mu...

  • Article
  • Open Access
3 Citations
2,325 Views
18 Pages

Modeling Trust in IoT Systems for Drinking-Water Management

  • Aicha Aiche,
  • Pierre-Martin Tardif and
  • Mohammed Erritali

This study focuses on trust within water-treatment IoT plants, examining the collaboration between IoT devices, control systems, and skilled personnel. The main aim is to assess the levels of trust between these different critical elements based on s...

  • Article
  • Open Access
3 Citations
2,205 Views
15 Pages

A Low-Complexity Solution for Optimizing Binary Intelligent Reflecting Surfaces towards Wireless Communication

  • Santosh A. Janawade ,
  • Prabu Krishnan ,
  • Krishnamoorthy Kandasamy ,
  • Shashank S. Holla ,
  • Karthik Rao  and
  • Aditya Chandrasekar 

Intelligent Reflecting Surfaces (IRSs) enable us to have a reconfigurable reflecting surface that can efficiently deflect the transmitted signal toward the receiver. The initial step in the IRS usually involves estimating the channel between a fixed...

  • Article
  • Open Access
1 Citations
3,094 Views
17 Pages

A Risk Assessment Framework for Mobile Apps in Mobile Cloud Computing Environments

  • Noah Oghenefego Ogwara,
  • Krassie Petrova,
  • Mee Loong Yang and
  • Stephen G. MacDonell

Mobile devices (MDs) are used by mobile cloud computing (MCC) customers and by other users because of their portability, robust connectivity, and ability to house and operate third-party applications (apps). However, the apps installed on an MD may p...

  • Article
  • Open Access
1 Citations
5,977 Views
20 Pages

MIMA: Multi-Feature Interaction Meta-Path Aggregation Heterogeneous Graph Neural Network for Recommendations

  • Yang Li,
  • Shichao Yan,
  • Fangtao Zhao,
  • Yi Jiang,
  • Shuai Chen,
  • Lei Wang and
  • Li Ma

Meta-path-based heterogeneous graph neural networks have received widespread attention for better mining the similarities between heterogeneous nodes and for discovering new recommendation rules. Most existing models depend solely on node IDs for lea...

  • Article
  • Open Access
1 Citations
3,820 Views
17 Pages

Enhancing Recognition of Human–Object Interaction from Visual Data Using Egocentric Wearable Camera

  • Danish Hamid,
  • Muhammad Ehatisham Ul Haq,
  • Amanullah Yasin,
  • Fiza Murtaza and
  • Muhammad Awais Azam

Object detection and human action recognition have great significance in many real-world applications. Understanding how a human being interacts with different objects, i.e., human–object interaction, is also crucial in this regard since it ena...

  • Review
  • Open Access
9 Citations
3,541 Views
19 Pages

In the context of the constant evolution and proliferation of AI technology, hybrid intelligence is gaining popularity in reference to a balanced coexistence between human and artificial intelligence. The term has been extensively used over the past...

  • Article
  • Open Access
4 Citations
2,551 Views
23 Pages

Collaborative edge intelligence, a distributed computing paradigm, refers to a system where multiple edge devices work together to process data and perform distributed machine learning (DML) tasks locally. Decentralized Internet of Things (IoT) devic...

  • Article
  • Open Access
2 Citations
2,484 Views
18 Pages

Power-Efficient Resource Allocation for Active STAR-RIS-Aided SWIPT Communication Systems

  • Chuanzhe Gao,
  • Shidang Li,
  • Yixuan Wu,
  • Siyi Duan,
  • Mingsheng Wei and
  • Bencheng Yu

Simultaneous wireless information and power transfer (SWIPT) has emerged as a pivotal technology in 6G, offering an efficient means of delivering energy to a large quantity of low-power devices while transmitting data concurrently. To address the cha...

  • Article
  • Open Access
3 Citations
4,382 Views
37 Pages

Bufferbloat is one of the leading causes of high data transmission latency and jitter on the Internet, which severely impacts the performance of low-latency interactive applications such as online streaming, cloud-based gaming/applications, Internet...

  • Article
  • Open Access
4 Citations
3,698 Views
21 Pages

Empowering Clinical Engineering and Evidence-Based Maintenance with IoT and Indoor Navigation

  • Alessio Luschi,
  • Giovanni Luca Daino,
  • Gianpaolo Ghisalberti,
  • Vincenzo Mezzatesta and
  • Ernesto Iadanza

The OHIO (Odin Hospital Indoor cOmpass) project received funding from the European Union’s Horizon 2020 research and innovation action program, via ODIN–Open Call, which is issued and executed under the ODIN project and focuses on enhanci...

  • Article
  • Open Access
6 Citations
3,906 Views
31 Pages

A Novel Deep Learning Framework for Intrusion Detection Systems in Wireless Network

  • Khoa Dinh Nguyen Dang,
  • Peppino Fazio and
  • Miroslav Voznak

In modern network security setups, Intrusion Detection Systems (IDS) are crucial elements that play a key role in protecting against unauthorized access, malicious actions, and policy breaches. Despite significant progress in IDS technology, two of t...

  • Article
  • Open Access
6 Citations
4,895 Views
19 Pages

This research endeavors to advance energy efficiency (EE) within heterogeneous networks (HetNets) through a comprehensive approach. Initially, we establish a foundational framework by implementing a two-tier network architecture based on Poisson proc...

  • Article
  • Open Access
1 Citations
2,318 Views
15 Pages

In resource-intensive Internet of Things applications, Lightweight Stream Ciphers (LWSCs) play a vital role in influencing both the security and performance of the system. Numerous LWSCs have been proposed, each offering certain properties and trade-...

  • Article
  • Open Access
5 Citations
4,810 Views
16 Pages

The accurate diagnosis and effective treatment of mental health disorders such as depression remain challenging owing to the complex underlying causes and varied symptomatology. Traditional information extraction methods struggle to adapt to evolving...

  • Article
  • Open Access
1 Citations
2,612 Views
16 Pages

Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar

  • Naonobu Okazaki,
  • Shotaro Usuzaki,
  • Tsubasa Waki,
  • Hyoga Kawagoe,
  • Mirang Park,
  • Hisaaki Yamaba and
  • Kentaro Aburada

We propose a detection system incorporating a weighted voting mechanism that reflects the vote’s reliability based on the accuracy of each detector’s examination, which overcomes the problem of cooperative detection. Collaborative malware...

  • Review
  • Open Access
3 Citations
4,470 Views
19 Pages

This paper presents an in-depth review of software-defined named data networking (SD-NDN), a transformative approach in network architectures poised to deliver substantial benefits. By addressing the limitations inherent in traditional host-centric n...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903