Skip to Content

Future Internet, Volume 17, Issue 3

2025 March - 37 articles

Cover Story: The integration of deep learning (DL) with the Internet of Medical Things (IoMT) is transforming healthcare, enhancing diagnostics, treatment, and patient management. However, challenges such as data quality, privacy, interoperability, and computational limits hinder implementation. This survey presents an IoMT framework, reviews solutions addressing DL challenges, and analyzes limitations and future directions. Best practices like data preprocessing, legacy system integration, and human-centric design are highlighted as well. Finally, we propose future research on scalable, transparent, and privacy-preserving DL models to maximize IoMT’s potential. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (37)

  • Article
  • Open Access
711 Views
22 Pages

20 March 2025

The federated recommender system (FRS) employs federated learning methodologies to create a recommendation model in a distributed environment, where clients share locally updated data with the server without exposing raw data and achieving privacy pr...

  • Article
  • Open Access
2 Citations
1,390 Views
21 Pages

19 March 2025

Abnormal traffic flow prediction is crucial for reducing traffic congestion. Most recent studies utilized machine learning models in traffic flow detection systems. However, these detection systems do not support real-time analysis. Centralized machi...

  • Article
  • Open Access
1 Citations
1,658 Views
15 Pages

19 March 2025

In real-world scenarios, ECG data are collected from a diverse range of heterogeneous devices, including high-end medical equipment and consumer-grade wearable devices, each with varying computational capabilities and constraints. This heterogeneity...

  • Review
  • Open Access
2 Citations
3,542 Views
50 Pages

Health Misinformation in Social Networks: A Survey of Information Technology Approaches

  • Vasiliki Papanikou,
  • Panagiotis Papadakos,
  • Theodora Karamanidou,
  • Thanos G. Stavropoulos,
  • Evaggelia Pitoura and
  • Panayiotis Tsaparas

15 March 2025

In this paper, we present a comprehensive survey on the pervasive issue of medical misinformation in social networks from the perspective of information technology. The survey aims at providing a systematic review of related research and helping rese...

  • Article
  • Open Access
958 Views
16 Pages

GHEFL: Grouping Based on Homomorphic Encryption Validates Federated Learning

  • Yulin Kang,
  • Wuzheng Tan,
  • Linlin Fan,
  • Yinuo Chen,
  • Xinbin Lai and
  • Jian Weng

15 March 2025

Federated learning is a powerful tool for securing participants’ private data due to its ability to make data “available but not visible”. In recent years, federated learning has been enhanced by the emergence of multi-weight aggreg...

  • Article
  • Open Access
1 Citations
1,277 Views
15 Pages

13 March 2025

Improving the performance of human–computer interaction systems is an essential indicator of aircraft intelligence. To address the limitations of single-modal interaction methods, a multimodal interaction model based on gaze and EEG target sele...

  • Article
  • Open Access
1 Citations
6,369 Views
22 Pages

12 March 2025

This study investigated whether young adults’ social media use and subjective well-being (SWB) changed during the COVID-19 pandemic. It examined the possible relationships between social media use, SWB, and personality traits. It included gener...

  • Article
  • Open Access
2,983 Views
30 Pages

11 March 2025

NASA’s Juno mission, involving a pioneering spacecraft the size of a basketball court, has been instrumental in observing Jupiter’s atmosphere and surface from orbit since it reached the intended orbit. Over its first decade of operation,...

  • Article
  • Open Access
1,405 Views
27 Pages

11 March 2025

In the digital age, sharing moments through photos has become a daily habit. However, every face captured in these photos is vulnerable to unauthorized identification and potential misuse through AI-powered synthetic content generation. Previously, w...

  • Article
  • Open Access
3 Citations
3,220 Views
20 Pages

11 March 2025

In recent years, the rapid advancement of digital technologies and the growing demand for sustainability have driven unprecedented transformations in the automotive industry, particularly toward electric vehicles (EVs) and renewable energy. The EV su...

  • Review
  • Open Access
8 Citations
4,477 Views
20 Pages

11 March 2025

With the emergence of artificial intelligence and advancements in network technologies, the imminent arrival of 6G is not very far away. The 6G technology will introduce unique and innovative applications of the Tactile Internet in the near future. T...

  • Article
  • Open Access
1 Citations
2,123 Views
20 Pages

CommC: A Multi-Purpose COMModity Hardware Cluster

  • Agorakis Bompotas,
  • Nikitas-Rigas Kalogeropoulos and
  • Christos Makris

11 March 2025

The high costs of acquiring and maintaining high-performance computing (HPC) resources pose significant barriers for medium-sized enterprises and educational institutions, often forcing them to rely on expensive cloud-based solutions with recurring c...

  • Article
  • Open Access
5 Citations
2,774 Views
20 Pages

Malicious domains are part of the landscape of the internet but are becoming more prevalent and more dangerous both to companies and to individuals. They can be hosted on various technologies and serve an array of content, including malware, command...

  • Review
  • Open Access
45 Citations
11,008 Views
41 Pages

Edge and Cloud Computing in Smart Cities

  • Maria Trigka and
  • Elias Dritsas

The evolution of smart cities is intrinsically linked to advancements in computing paradigms that support real-time data processing, intelligent decision-making, and efficient resource utilization. Edge and cloud computing have emerged as fundamental...

  • Article
  • Open Access
2 Citations
2,031 Views
39 Pages

Dynamic Workload Management System in the Public Sector: A Comparative Analysis

  • Konstantinos C. Giotopoulos,
  • Dimitrios Michalopoulos,
  • Gerasimos Vonitsanos,
  • Dimitris Papadopoulos,
  • Ioanna Giannoukou and
  • Spyros Sioutas

Efficient human resource management is critical to public sector performance, particularly in dynamic environments where traditional systems struggle to adapt to fluctuating workloads. The increasing complexity of public sector operations and the nee...

  • Article
  • Open Access
1,093 Views
25 Pages

Emergency Messaging System for Urban Vehicular Networks Inspired by Social Insects’ Stigmergic Communication

  • Ojilvie Avila-Cortés,
  • Saúl E. Pomares Hernández,
  • Julio César Pérez-Sansalvador and
  • Lil María Xibai Rodríguez-Henríquez

For occupant safety in vehicular networks, emergency messages derived from vehicular incidents should be exchanged only during their validity period and in zones containing involved entities. Problems arise for mobile entities in vehicular networks t...

  • Article
  • Open Access
1 Citations
1,108 Views
19 Pages

A Neural-Symbolic Approach to Extract Trust Patterns in IoT Scenarios

  • Fabrizio Messina,
  • Domenico Rosaci and
  • Giuseppe M. L. Sarnè

Trust and reputation relationships among objects represent key aspects of smart IoT object communities with social characteristics. In this context, several trustworthiness models have been presented in the literature that could be applied to IoT sce...

  • Article
  • Open Access
3 Citations
3,635 Views
36 Pages

CityBuildAR: Enhancing Community Engagement in Placemaking Through Mobile Augmented Reality

  • Daneesha Ranasinghe,
  • Nayomi Kankanamge,
  • Chathura De Silva,
  • Nuwani Kangana,
  • Rifat Mahamood and
  • Tan Yigitcanlar

Mostly, public places are planned and designed by professionals rather engaging the community in the design process. Even if the community engaged, the engagement process was limited to hand drawings, manual mappings, or public discussions, which lim...

  • Article
  • Open Access
1 Citations
1,367 Views
20 Pages

SwiftSession: A Novel Incremental and Adaptive Approach to Rapid Traffic Classification by Leveraging Local Features

  • Tieqi Xi,
  • Qiuhua Zheng,
  • Chuanhui Cheng,
  • Ting Wu,
  • Guojie Xie,
  • Xuebiao Qian,
  • Haochen Ye and
  • Zhenyu Sun

Network traffic classification is crucial for effective security management. However, the increasing prevalence of encrypted traffic and the confidentiality of protocol details have made this task more challenging. To address this issue, we propose a...

  • Article
  • Open Access
5 Citations
8,557 Views
28 Pages

A CIA Triad-Based Taxonomy of Prompt Attacks on Large Language Models

  • Nicholas Jones,
  • Md Whaiduzzaman,
  • Tony Jan,
  • Amr Adel,
  • Ammar Alazab and
  • Afnan Alkreisat

The rapid proliferation of Large Language Models (LLMs) across industries such as healthcare, finance, and legal services has revolutionized modern applications. However, their increasing adoption exposes critical vulnerabilities, particularly throug...

  • Article
  • Open Access
1 Citations
1,820 Views
28 Pages

A Regional Multi-Agent Air Monitoring Platform

  • Stanimir Stoyanov,
  • Emil Doychev,
  • Asya Stoyanova-Doycheva,
  • Veneta Tabakova-Komsalova,
  • Ivan Stoyanov and
  • Iliya Nedelchev

Plovdiv faces significant air pollution challenges due to geographic, climatic, and industrial factors, making accurate air quality assessment critical. This study presents a hybrid multi-agent platform that integrates symbolic and sub-symbolic artif...

  • Article
  • Open Access
1,672 Views
18 Pages

This paper proposes a frame aggregation with a simple block acknowledgement (FASBA) mechanism to provide a strict QoS guarantee to life-saving emergency traffic in wireless local area networks. This work builds on our previous work on a multi-preempt...

  • Article
  • Open Access
4 Citations
2,263 Views
20 Pages

This paper presents the Mobility-Aware Client Selection (MACS) strategy, developed to address the challenges associated with client mobility in Federated Learning (FL). FL enables decentralized machine learning by allowing collaborative model trainin...

  • Article
  • Open Access
5 Citations
3,468 Views
24 Pages

Developing an Urban Digital Twin for Environmental and Risk Assessment: A Case Study on Public Lighting and Hydrogeological Risk

  • Vincenzo Barrile,
  • Emanuela Genovese,
  • Clemente Maesano,
  • Sonia Calluso and
  • Maurizio Pasquale Manti

Improvements in immersive technology are opening up new opportunities for land management and urban planning, enabling the creation of detailed virtual models for examining and simulating real-world short-, medium-, and long-term scenarios. The goal...

  • Article
  • Open Access
5 Citations
6,196 Views
19 Pages

Log files are essential assets for IT engineers engaged in the security of server and computer systems. They provide crucial information for identifying malicious events, conducting cybersecurity incident analyses, performing audits, system maintenan...

  • Review
  • Open Access
13 Citations
3,970 Views
48 Pages

Navigating Challenges and Harnessing Opportunities: Deep Learning Applications in Internet of Medical Things

  • John Mulo,
  • Hengshuo Liang,
  • Mian Qian,
  • Milon Biswas,
  • Bharat Rawal,
  • Yifan Guo and
  • Wei Yu

Integrating deep learning (DL) with the Internet of Medical Things (IoMT) is a paradigm shift in modern healthcare, offering enormous opportunities for patient care, diagnostics, and treatment. Implementing DL with IoMT has the potential to deliver b...

  • Article
  • Open Access
2 Citations
2,551 Views
32 Pages

Federated Learning System for Dynamic Radio/MEC Resource Allocation and Slicing Control in Open Radio Access Network

  • Mario Martínez-Morfa,
  • Carlos Ruiz de Mendoza,
  • Cristina Cervelló-Pastor and
  • Sebastia Sallent-Ribes

26 February 2025

The evolution of cellular networks from fifth-generation (5G) architectures to beyond 5G (B5G) and sixth-generation (6G) systems necessitates innovative solutions to overcome the limitations of traditional Radio Access Network (RAN) infrastructures....

  • Article
  • Open Access
3 Citations
10,846 Views
21 Pages

25 February 2025

In an increasingly technological society, online social networks are essential to support consumer purchasing decisions, primarily through User Generated Content (UGC). In this research, we look at the influence of UGC on purchase intent applied to t...

  • Article
  • Open Access
2 Citations
4,398 Views
15 Pages

Assessing Browser Security: A Detailed Study Based on CVE Metrics

  • Oleksii Chalyi,
  • Kęstutis Driaunys and
  • Vytautas Rudžionis

25 February 2025

This study systematically evaluates the vulnerabilities of modern web browsers using developed indices derived from the CVE database, including ICVE, ICVSS, IR and IT. These indices incorporate metrics such as vulnerability severity and risks, along...

  • Article
  • Open Access
1 Citations
1,391 Views
15 Pages

24 February 2025

The widespread availability of mobile devices has led to the emergence of multiple gamified web and mobile applications for online assessment of students during classes. Their common weak side is that they focus mostly on positive reinforcement, with...

  • Article
  • Open Access
1 Citations
1,277 Views
19 Pages

23 February 2025

Classification of neurocognitive states from Electroencephalography (EEG) data is complex due to inherent challenges such as noise, non-stationarity, non-linearity, and the high-dimensional and sparse nature of connectivity patterns. Graph-theoretica...

  • Article
  • Open Access
4 Citations
4,541 Views
34 Pages

22 February 2025

Regulatory technologies (RegTechs) are a set of electronic and digital technologies applied to check compliance in industrial processes. Such applications also aim to simplify the process of data collection and exchange according to the expected form...

  • Article
  • Open Access
4 Citations
1,877 Views
23 Pages

IoV and Blockchain for Traffic Optimization in Ro-Ro Terminals: A Case Study in the Spanish Port System

  • Nicoletta González-Cancelas,
  • Javier Vaca-Cabrero and
  • Alberto Camarero-Orive

22 February 2025

This study examines the integration of the Internet of Vehicles (IoV) and blockchain as tools to optimize traffic management in Roll-on/Roll-off (Ro-Ro) terminals within the Spanish port system. Faced with increasing operational complexity, these tec...

  • Article
  • Open Access
2 Citations
1,138 Views
15 Pages

21 February 2025

Traditional authentication systems with an authentication server that handles authentication requests from many clients have a major weakness, i.e., a single point of failure. This study presents an authentication paradigm based on blockchain, which...

  • Article
  • Open Access
8 Citations
3,433 Views
19 Pages

20 February 2025

Route planning for electric vehicles (EVs) is a critical challenge in sustainable transportation, as it directly addresses concerns about greenhouse gas emissions and energy efficiency. This study presents a novel approach that combines K-means clust...

  • Article
  • Open Access
6 Citations
2,800 Views
28 Pages

An Institutional Theory Framework for Leveraging Large Language Models for Policy Analysis and Intervention Design

  • J. de Curtò,
  • I. de Zarzà,
  • Leandro Sebastián Fervier,
  • Victoria Sanagustín-Fons and
  • Carlos T. Calafate

20 February 2025

This study proposes a comprehensive framework for integrating data-driven approaches into policy analysis and intervention strategies. The methodology is structured around five critical components: data collection, historical analysis, policy impact...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903