You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 17, Issue 4

April 2025 - 53 articles

Cover Story: This study employs secrecy energy efficiency (SEE) as a key performance metric to evaluate the trade-off between power consumption and secure communication efficiency. Additionally, a multi-objective improved biogeography-based optimization (MOIBBO) algorithm is utilized to optimize hyperparameters, ensuring an improved balance between convergence speed and model performance. Extensive simulation results demonstrate that the proposed MOIBBO-CNN–LSTM framework achieves superior SEE performance compared to benchmark schemes. These findings confirm that MOIBBO-CNN–LSTM offers an effective solution for optimizing SEE in CF m-MIMO-based IoT networks, paving the way for more energy-efficient and secure IoT communications. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (53)

  • Article
  • Open Access
2,508 Views
21 Pages

21 April 2025

Modern large language models (LLMs) achieve state-of-the-art performance through architectural advancements but require high computational costs for inference. Post-training quantization is a widely adopted approach to reduce these costs by quantizin...

  • Article
  • Open Access
1 Citations
719 Views
27 Pages

21 April 2025

Phase wraparound due to large inter-sensor spacings in multi-channel demixing renders the DUET and AdRess source separation algorithms—known for their low computational complexity and effective speech demixing performance—unsuitable for h...

  • Systematic Review
  • Open Access
3 Citations
5,666 Views
41 Pages

Securing Decentralized Ecosystems: A Comprehensive Systematic Review of Blockchain Vulnerabilities, Attacks, and Countermeasures and Mitigation Strategies

  • Md Kamrul Siam,
  • Bilash Saha,
  • Md Mehedi Hasan,
  • Md Jobair Hossain Faruk,
  • Nafisa Anjum,
  • Sharaban Tahora,
  • Aiasha Siddika and
  • Hossain Shahriar

21 April 2025

Blockchain technology has emerged as a transformative innovation, providing a transparent, immutable, and decentralized platform that underpins critical applications across industries such as cryptocurrencies, supply chain management, healthcare, and...

  • Article
  • Open Access
2 Citations
1,583 Views
24 Pages

21 April 2025

Ultra-reliable and low-latency communication (URLLC) in 6G networks is characterized by very high reliability and very low latency to enable mission-critical applications. The ability of a coding scheme to support diverse use cases requires flexibili...

  • Article
  • Open Access
3 Citations
1,339 Views
31 Pages

Cybersecurity Intelligence Through Textual Data Analysis: A Framework Using Machine Learning and Terrorism Datasets

  • Mohammed Salem Atoum,
  • Ala Abdulsalam Alarood,
  • Eesa Alsolami,
  • Adamu Abubakar,
  • Ahmad K. Al Hwaitat and
  • Izzat Alsmadi

21 April 2025

This study examines multi-lexical data sources, utilizing an extracted dataset from an open-source corpus and the Global Terrorism Datasets (GTDs), to predict lexical patterns that are directly linked to terrorism. This is essential as specific patte...

  • Article
  • Open Access
1 Citations
2,812 Views
34 Pages

20 April 2025

E-commerce applications have emerged as key drivers of digital transformation, reshaping consumer behavior and driving demand for seamless online transactions. Despite the growth of smart mobile technologies, existing methods rely on fixed UI content...

  • Article
  • Open Access
8 Citations
9,176 Views
26 Pages

Edge AI for Real-Time Anomaly Detection in Smart Homes

  • Manuel J. C. S. Reis and
  • Carlos Serôdio

18 April 2025

The increasing adoption of smart home technologies has intensified the demand for real-time anomaly detection to improve security, energy efficiency, and device reliability. Traditional cloud-based approaches introduce latency, privacy concerns, and...

  • Article
  • Open Access
1,139 Views
27 Pages

Detecting Disinformation in Croatian Social Media Comments

  • Igor Ljubi,
  • Zdravko Grgić,
  • Marin Vuković and
  • Gordan Gledec

17 April 2025

The frequency with which fake news or misinformation is published on social networks is constantly increasing. Users of social networks are confronted with many different posts every day, often with sensationalist titles and content of dubious veraci...

  • Systematic Review
  • Open Access
1 Citations
1,569 Views
47 Pages

17 April 2025

eHealth has transformed transplantation care by enhancing communication between patients and clinics, supporting self-management, and improving adherence to medical advice. However, existing research on eHealth in transplantation remains fragmented,...

  • Article
  • Open Access
1 Citations
1,522 Views
25 Pages

17 April 2025

Moroccan Law 55.19 aims to streamline administrative procedures, fostering trust between citizens and public administrations. To implement this law effectively and enhance public service quality, it is essential to use the Moroccan dialect to involve...

of 6

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903