Skip to Content

Future Internet, Volume 9, Issue 4

2017 December - 42 articles

Cover Story: The screenshots are of a Virtual Aquarium and a toothbrush-embedded wireless sensor device that can detect the movement of tooth brushing. When the toothbrushing starts, the fishes dance and the cleaner icon removes stains from the aquarium. When sufficient brushing has taken place, the cleaner icon moves and the fishes dance more elegantly. The fishes’ health is affected by the cleanliness of the aquarium. If the user does not brush his/her teeth sufficiently, then the fishes may become ill or die. However, continuous brushing leads to eggs being laid by the fishes in the aquarium.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (42)

  • Article
  • Open Access
2 Citations
5,962 Views
18 Pages

13 December 2017

Energy-efficient clustering and routing are well known optimization problems in the study of Wireless Sensor Network (WSN) lifetime extension. In this paper, we propose an intelligent hybrid optimization algorithm based on a Set Cover approach to cre...

  • Feature Paper
  • Article
  • Open Access
2 Citations
8,968 Views
23 Pages

Approximate Networking for Universal Internet Access

  • Junaid Qadir,
  • Arjuna Sathiaseelan,
  • Umar Bin Farooq,
  • Muhammad Usama,
  • Muhammad Ali Imran and
  • Muhammad Shafique

11 December 2017

Despite the best efforts of networking researchers and practitioners, an ideal Internet experience is inaccessible to an overwhelming majority of people the world over, mainly due to the lack of cost-efficient ways of provisioning high-performance, g...

  • Feature Paper
  • Article
  • Open Access
184 Citations
25,263 Views
24 Pages

How 5G Wireless (and Concomitant Technologies) Will Revolutionize Healthcare?

  • Siddique Latif,
  • Junaid Qadir,
  • Shahzad Farooq and
  • Muhammad Ali Imran

11 December 2017

The need to have equitable access to quality healthcare is enshrined in the United Nations (UN) Sustainable Development Goals (SDGs), which defines the developmental agenda of the UN for the next 15 years. In particular, the third SDG focuses on the...

  • Article
  • Open Access
12 Citations
6,988 Views
13 Pages

4 December 2017

The increasing use of social networks such as Facebook, Twitter, and Instagram to share photos, video streaming, and music among friends has generated a huge increase in the amount of data traffic over wireless networks. This social behavior has trig...

  • Article
  • Open Access
5 Citations
6,131 Views
13 Pages

28 November 2017

Containerized data centers can improve the computational density of IaaS layers. This intensive high-concurrency environment has high requirements for message scheduling and container processing. In the paper, an elastically scalable strategy for clo...

  • Conference Report
  • Open Access
16 Citations
7,146 Views
29 Pages

25 November 2017

Several applications, from the Internet of Things for smart cities to those for vehicular networks, need fast and reliable proximity-based broadcast communications, i.e., the ability to reach all peers in a geographical neighborhood around the origin...

  • Article
  • Open Access
1 Citations
5,116 Views
15 Pages

25 November 2017

The link failure due to the secondary users exiting the licensed channels when primary users reoccupy the licensed channels is very important in cognitive wireless mesh networks (CWMNs). A multipath routing and spectrum allocation algorithm based on...

  • Feature Paper
  • Article
  • Open Access
55 Citations
10,679 Views
23 Pages

24 November 2017

There is no doubt that the rapid development in robotics technology has dramatically changed the interaction model between the Industrial Robot (IR) and the worker. As the current robotic technology has afforded very reliable means to guarantee the p...

  • Article
  • Open Access
8 Citations
6,967 Views
23 Pages

20 November 2017

Service commissions, which are claimed by Ad-Networks and Publishers, are susceptible to forgery as non-human operators are able to artificially create fictitious traffic on digital platforms for the purpose of committing financial fraud. This places...

  • Feature Paper
  • Article
  • Open Access
28 Citations
9,697 Views
21 Pages

17 November 2017

Device-to-device (D2D) communication is becoming an increasingly important technology in future networks with the climbing demand for local services. For instance, resource sharing in the D2D network features ubiquitous availability, flexibility, low...

  • Feature Paper
  • Article
  • Open Access
4 Citations
6,151 Views
15 Pages

17 November 2017

In recent years, mobility support has become an important requirement in various wireless sensor network (WSN) applications. However, due to the strict resource constraints of power, memory, and processing resources in WSNs, routing protocols are mai...

  • Article
  • Open Access
3 Citations
5,654 Views
14 Pages

14 November 2017

Nodes in Mobile Opportunistic Network (MON) have to cache packets to deal with the intermittent connection. The buffer management strategy obviously impacts the performance of MON, and it attracts more attention recently. Due to the limited storage c...

  • Article
  • Open Access
8 Citations
6,624 Views
12 Pages

14 November 2017

In this paper, we present an energy-efficient resource allocation and power control scheme for D2D (Device-to-Device) multicasting transmission. The objective is to maximize the overall energy-efficiency of D2D multicast clusters through effective re...

  • Article
  • Open Access
4 Citations
5,970 Views
15 Pages

14 November 2017

Since the content delivery unit over Information-Centric Networking (ICN) has shifted from files to the segments of a file named chunks, solely either file-level or chunk-level request probability is insufficient for ICN cache management. In this pap...

  • Article
  • Open Access
35 Citations
10,020 Views
15 Pages

Network Intrusion Detection through Discriminative Feature Selection by Using Sparse Logistic Regression

  • Reehan Ali Shah,
  • Yuntao Qian,
  • Dileep Kumar,
  • Munwar Ali and
  • Muhammad Bux Alvi

10 November 2017

Intrusion detection system (IDS) is a well-known and effective component of network security that provides transactions upon the network systems with security and safety. Most of earlier research has addressed difficulties such as overfitting, featur...

  • Feature Paper
  • Article
  • Open Access
23 Citations
10,206 Views
26 Pages

9 November 2017

Despite significant efforts to initiate electronic government projects, developing countries are still struggling to reap the benefits of using e-government services. An effective implementation of e-government infrastructure is necessary to increase...

  • Article
  • Open Access
12 Citations
5,926 Views
13 Pages

8 November 2017

Collaborative spectral sensing can fuse the perceived results of multiple cognitive users, and thus will improve the accuracy of perceived results. However, the multi-source features of the perceived results result in security problems in the system....

  • Feature Paper
  • Article
  • Open Access
20 Citations
7,494 Views
23 Pages

Proposed Fuzzy-NN Algorithm with LoRaCommunication Protocol for Clustered Irrigation Systems

  • Sotirios Kontogiannis,
  • George Kokkonis,
  • Soultana Ellinidou and
  • Stavros Valsamidis

7 November 2017

Modern irrigation systems utilize sensors and actuators, interconnected together as a single entity. In such entities, A.I. algorithms are implemented, which are responsible for the irrigation process. In this paper, the authors present an irrigation...

  • Review
  • Open Access
175 Citations
18,219 Views
22 Pages

A Comprehensive Survey on Real-Time Applications of WSN

  • Ahmad Ali,
  • Yu Ming,
  • Sagnik Chakraborty and
  • Saima Iram

7 November 2017

Nowadays, the investigation of the Wireless Sensor Network (WSN) has materialized its functional area ubiquitously such as environmental engineering, industrial and business applications, military, feedstock and habitat, agriculture sector, seismic d...

  • Feature Paper
  • Review
  • Open Access
148 Citations
74,966 Views
13 Pages

Understanding the Digital Marketing Environment with KPIs and Web Analytics

  • José Ramón Saura,
  • Pedro Palos-Sánchez and
  • Luis Manuel Cerdá Suárez

4 November 2017

In the practice of Digital Marketing (DM), Web Analytics (WA) and Key Performance Indicators (KPIs) can and should play an important role in marketing strategy formulation. It is the aim of this article to survey the various DM metrics to determine a...

  • Article
  • Open Access
16 Citations
9,728 Views
17 Pages

Creation and Staging of Android Theatre “Sayonara”towards Developing Highly Human-Like Robots

  • Takenobu Chikaraishi,
  • Yuichiro Yoshikawa,
  • Kohei Ogawa,
  • Oriza Hirata and
  • Hiroshi Ishiguro

2 November 2017

Even after long-term exposures, androids with a strikingly human-like appearance evoke unnatural feelings. The behavior that would induce human-like feelings after long exposures is difficult to determine, and it often depends on the cultural backgro...

  • Feature Paper
  • Article
  • Open Access
17 Citations
6,175 Views
14 Pages

Quality of Service Based NOMA Group D2D Communications

  • Asim Anwar,
  • Boon-Chong Seet and
  • Xue Jun Li

1 November 2017

Non-orthogonal multiple access (NOMA) provides superior spectral efficiency and is considered as a promising multiple access scheme for fifth generation (5G) wireless systems. The spectrum efficiency can be further enhanced by enabling device-to-devi...

  • Article
  • Open Access
28 Citations
6,917 Views
17 Pages

1 November 2017

Device-to-device (D2D) communication is an essential feature for the future cellular networks as it increases spectrum efficiency by reusing resources between cellular and D2D users. However, the performance of the overall system can degrade if there...

  • Article
  • Open Access
3 Citations
6,088 Views
12 Pages

Efficient Traffic Engineering Strategies for Improving the Performance of TCP Friendly Rate Control Protocol

  • Nalavala Ramanjaneya Reddy,
  • Pakanati Chenna Reddy and
  • Mokkala Padmavathamma

1 November 2017

Multimedia services will play a prominent role in the next generation of internet. With increasing real time requirements, internet technology has to provide Quality of Service (QoS) for various kinds of real time streaming services. When the bandwid...

  • Feature Paper
  • Article
  • Open Access
15 Citations
7,161 Views
21 Pages

27 October 2017

One distinctive feature of the next 5G systems is the presence of a dense/ultra-dense wireless access network with a large number of access points (or nodes) at short distances from each other. Dense/ultra-dense access networks allow for providing ve...

  • Article
  • Open Access
8 Citations
8,762 Views
14 Pages

Challenges When Using Jurimetrics in Brazil—A Survey of Courts

  • Bruna Armonas Colombo,
  • Pedro Buck and
  • Vinicius Miana Bezerra

25 October 2017

Jurimetrics is the application of quantitative methods, usually statistics, to law. An important step to implement a jurimetric analysis is to extract raw data from courts and organize that data in a way that can be processed. Most of the raw data is...

  • Article
  • Open Access
5 Citations
8,836 Views
17 Pages

Exploring Data Model Relations in OpenStreetMap

  • Hippolyte Pruvost and
  • Peter Mooney

24 October 2017

The OpenStreetMap (OSM) geographic data model has three principal object types: nodes (points), ways (polygons and polylines), and relations (logical grouping of all three object types to express real-world geographical relationships). While there ha...

  • Article
  • Open Access
1 Citations
5,798 Views
10 Pages

Signal Consensus in TSP of the Same Grid in Road Network

  • Dongyuan Li,
  • Chengshuai Li,
  • Zidong Wang,
  • Deqiang Wang,
  • Jianping Xing and
  • Bo Zhang

24 October 2017

In this paper, we propose a consensus algorithm with input constraints for traffic light signals in transit signal priority (TSP). TSP ensures control strategy of traffic light signals can be adjusted and applied according to the real-time traffic st...

  • Feature Paper
  • Article
  • Open Access
21 Citations
7,114 Views
11 Pages

Deep Classifiers-Based License Plate Detection, Localization and Recognition on GPU-Powered Mobile Platform

  • Syed Tahir Hussain Rizvi,
  • Denis Patti,
  • Tomas Björklund,
  • Gianpiero Cabodi and
  • Gianluca Francini

21 October 2017

The realization of a deep neural architecture on a mobile platform is challenging, but can open up a number of possibilities for visual analysis applications. A neural network can be realized on a mobile platform by exploiting the computational power...

  • Article
  • Open Access
3 Citations
6,420 Views
13 Pages

SDMw: Secure Dynamic Middleware for Defeating Port and OS Scanning

  • Dalal Hanna,
  • Prakash Veeraraghavan and
  • Ben Soh

21 October 2017

Fingerprinting is a process of identifying the remote network devices and services running on the devices, including operating systems (OS) of the devices, and hosts running different OSs. Several research proposals and commercial products are availa...

  • Article
  • Open Access
15 Citations
6,146 Views
18 Pages

18 October 2017

Bike sharing programs are eco-friendly transportation systems that are widespread in smart city environments. In this paper, we study the problem of privacy-preserving bike sharing microdata publishing. Bike sharing systems collect visiting informati...

  • Article
  • Open Access
30 Citations
8,305 Views
16 Pages

IAACaaS: IoT Application-Scoped Access Control as a Service

  • Álvaro Alonso,
  • Federico Fernández,
  • Lourdes Marco and
  • Joaquín Salvachúa

17 October 2017

access control is a key element when guaranteeing the security of online services. However, devices that make the Internet of Things have some special requirements that foster new approaches to access control mechanisms. Their low computing capabilit...

  • Article
  • Open Access
2 Citations
4,858 Views
12 Pages

13 October 2017

In this paper, we investigate a resource management scheme for cellular underlaid device-to-device (D2D) communications, which are an integral part of mobile caching networks. D2D communications are allowed to share radio resources with cellular comm...

  • Article
  • Open Access
13 Citations
4,985 Views
12 Pages

13 October 2017

With the increasing application of web services in varying fields, the demand of effective Web service discovery approaches is becoming unprecedentedly strong. To improve the performance of service discovery, this paper proposes a collaborative Web s...

  • Feature Paper
  • Article
  • Open Access
39 Citations
6,613 Views
25 Pages

An Integrated Dictionary-Learning Entropy-Based Medical Image Fusion Framework

  • Guanqiu Qi,
  • Jinchuan Wang,
  • Qiong Zhang,
  • Fancheng Zeng and
  • Zhiqin Zhu

6 October 2017

Image fusion is widely used in different areas and can integrate complementary and relevant information of source images captured by multiple sensors into a unitary synthetic image. Medical image fusion, as an important image fusion application, can...

  • Article
  • Open Access
9 Citations
8,557 Views
20 Pages

2 October 2017

Augmented reality (AR) and virtual reality (VR) technologies have been dramatically expanded in recent years. In the near future, we expect that diverse digital services that employ Internet of Things (IoT) technologies enhanced with AR and VR will b...

  • Article
  • Open Access
5 Citations
6,285 Views
20 Pages

Extensions and Enhancements to “the Secure Remote Update Protocol”

  • Andrew John Poulter,
  • Steven J. Johnson and
  • Simon J. Cox

30 September 2017

This paper builds on previous work introducing the Secure Remote Update Protocol (SRUP), a secure communications protocol for Command and Control applications in the Internet of Things, built on top of MQTT. This paper builds on the original protocol...

  • Article
  • Open Access
18 Citations
10,670 Views
21 Pages

30 September 2017

Microservices offer a compelling competitive advantage for building data flow systems as a choreography of self-contained data endpoints that each implement a specific data processing functionality. Such a ‘single responsibility principle’ design mak...

  • Feature Paper
  • Article
  • Open Access
1 Citations
7,326 Views
22 Pages

TSKT-ORAM: A Two-Server k-ary Tree Oblivious RAM without Homomorphic Encryption

  • Jinsheng Zhang,
  • Qiumao Ma,
  • Wensheng Zhang and
  • Daji Qiao

27 September 2017

This paper proposes TSKT-oblivious RAM (ORAM), an efficient multi-server ORAM construction, to protect a client’s access pattern to outsourced data. TSKT-ORAM organizes each of the server storages as a k-ary tree and adopts XOR-based private informat...

  • Article
  • Open Access
30 Citations
9,466 Views
12 Pages

Botnet Detection Technology Based on DNS

  • Xingguo Li,
  • Junfeng Wang and
  • Xiaosong Zhang

25 September 2017

With the help of botnets, intruders can implement a remote control on infected machines and perform various malicious actions. Domain Name System (DNS) is very famous for botnets to locate command and control (C and C) servers, which enormously stren...

  • Review
  • Open Access
40 Citations
9,236 Views
17 Pages

25 September 2017

With the popularity of network and the continuous development of multimedia technology, saving of network bandwidth and copyright protection of multimedia content have gradually attracted people’s attention. The fragile watermark for integrity authen...

  • Article
  • Open Access
26 Citations
6,792 Views
21 Pages

Energy-Aware Adaptive Weighted Grid Clustering Algorithm for Renewable Wireless Sensor Networks

  • Nelofar Aslam,
  • Kewen Xia,
  • Muhammad Tafseer Haider and
  • Muhammad Usman Hadi

23 September 2017

Wireless sensor networks (WSNs), built from many battery-operated sensor nodes are distributed in the environment for monitoring and data acquisition. Subsequent to the deployment of sensor nodes, the most challenging and daunting task is to enhance...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903