@Preamble{
"\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi" #
"\ifx \undefined \k \let \k = \c \fi" #
"\ifx \undefined \TM \def \TM {${}^{\sc TM}$} \fi" #
"\ifx \undefined \mathcal \def \mathcal #1{{\cal #1}} \fi"
}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|https://www.math.utah.edu/~beebe/|"}
@String{j-FUTURE-INTERNET = "Future Internet"}
@Article{Hudson-Smith:2009:FI,
author = "Andrew Hudson-Smith",
title = "The Future {Internet}",
journal = j-FUTURE-INTERNET,
volume = "1",
number = "1",
pages = "1--2",
day = "17",
month = jul,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi1010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:42 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/1/1/1",
abstract = "In 1995 technology analyst Gartner [1] developed a
hype cycle model for the adoption of technology. The
cycle comprises five stages from the initial technology
trigger through to a final plateau of productivity
along a with a peak of inflated expectations, a tough
of disillusionment and the slope of enlightenment. The
hype cycle is notable technique for plotting and
identifying waves of innovation and hype in technology
and digital communications. Yet, from where we stand,
we can see the waves of innovation becoming
increasingly shorter, the troughs less deep and the
peaks of expectations higher. The read-write
revolution, that is arguably known as Web 2.0, has
transformed our experience of using the Internet from a
source of information to a means of communication and
participation. It has introduced mirror worlds, the
cloud, wikitecture, social shaping, connected places,
folksonomies and many other terms that I am sure many
of us have used in recent grant applications and
papers. This is the here and now, all of these
technologies are past the technology trigger point and
rising up the peak of inflated expectations with a few
already heading towards the trough before becoming
mainstream and approaching mass adoption.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wheeler:2009:LSM,
author = "Steve Wheeler",
title = "Learning Space Mashups: Combining {Web 2.0} Tools to
Create Collaborative and Reflective Learning Spaces",
journal = j-FUTURE-INTERNET,
volume = "1",
number = "1",
pages = "3--13",
day = "13",
month = jul,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi1010003",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:42 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/1/1/3",
abstract = "In this paper, Web 2.0 open content mashups or
combinations are explored. Two case studies of recent
initial teacher training programmes are reviewed where
blogs and wikis were blended to create new virtual
learning spaces. In two separate studies, students
offer their views about using these tools, and reflect
on the strengths and weaknesses of this approach. There
is also discussion about aggregation of content and a
theorization of how community and personal spaces can
create tension and conflict. A new `learning spaces'
model will be presented which aids visualization of the
processes, domains and territories that are brought
into play when content and Web 2.0 tools are mashed up
within the same space.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Data Mashups.",
}
@Article{Fiaidhi:2009:IMM,
author = "Jinan Fiaidhi and Sabah Mohammed and Lyle Chamarette
and David Thomas",
title = "Identifying Middlewares for Mashup Personal Learning
Environments",
journal = j-FUTURE-INTERNET,
volume = "1",
number = "1",
pages = "14--27",
day = "05",
month = aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi1010014",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:42 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/1/1/14",
abstract = "The common understanding of e-learning has shifted
over the last decade from the traditional learning
objects portals to learning paradigms that enforces
constructivism, discovery learning and social
collaboration. Such type of learning takes place
outside the formal academic settings (e.g., seminars or
lectures) where a learning environment is created by
using some kind of web application mashup tools. The
use of these mashup tools moves the learning
environment further away from being a monolithic
platform towards providing an open set of learning
tools, an unrestricted number of actors, and an open
corpus of artifacts, either pre-existing or created by
the learning process - freely combinable and utilizable
by learners within their learning activities. However,
collaboration, mashup and contextualization can only be
supported through services, which can be created and
modified dynamically based on middlewares to suit the
current needs and situations of learners. This article
identifies middlewares suitable for creating effective
personal learning environment based on Web 2.0 mashup
tools. This article also proposed a general framework
for constructing such personal learning environments
based on Ambient Learning realized by learning agents
and the use of Enterprise Mashup servers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Data Mashups.",
}
@Article{Batcheller:2009:MAG,
author = "James K. Batcheller and Bruce M. Gittings and Robert
I. Dunfey",
title = "A Method for Automating Geospatial Dataset Metadata",
journal = j-FUTURE-INTERNET,
volume = "1",
number = "1",
pages = "28--46",
day = "10",
month = nov,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi1010028",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:42 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/1/1/28",
abstract = "Metadata have long been recognised as crucial to
geospatial asset management and discovery, and yet
undertaking their creation remains an unenviable task
often to be avoided. This paper proposes a practical
approach designed to address such concerns, decomposing
various data creation, management, update and
documentation process steps that are subsequently
leveraged to contribute towards metadata record
completion. Using a customised utility embedded within
a common GIS application, metadata elements are
computationally derived from an imposed feature
metadata standard, dataset geometry, an integrated
storage protocol and pre-prepared content, and
instantiated within a common geospatial discovery
convention. Yielding 27 out of a 32 total metadata
elements (or 15 out of 17 mandatory elements) the
approach demonstrably lessens the burden of metadata
authorship. It also encourages improved geospatial
asset management whilst outlining core requisites for
developing a more open metadata strategy not bound to
any particular application domain.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Metadata and Markup.",
}
@Article{Ebner:2009:CWM,
author = "Martin Ebner and Hermann Maurer",
title = "Can Weblogs and Microblogs Change Traditional
Scientific Writing?",
journal = j-FUTURE-INTERNET,
volume = "1",
number = "1",
pages = "47--58",
day = "18",
month = nov,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi1010047",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:42 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/1/1/47",
abstract = "This paper describes a follow-up Web 2.0 approach to a
technology enhanced master course for students of Graz
University of Technology. The lecture ``Social Aspects
of Information Technology'' has a long tradition for
using new didactical scenarios as well as modern
e-Learning technologies. After using a blogosphere one
year ago, this year microblog channels helped to expand
the traditional lecture. Students choose (on a
voluntary basis) whether they want to participate in a
blogging/microblogging group instead of using
conventional methods called Scientific
Writer/Scientific Reviewer. This study addresses the
question whether this method can change the learning
outcome into a more reflective one. Furthermore,
peer-reviewing groups judge the quality of essays and
blog contributions. In this paper we examine if
microblogging can be an appropriate technology for
assisting the process. This publication comes to the
conclusion that an amazing potential and a new way to
work with information is opened when using
microblogging. Students seem to be more engaged,
reflective and critical in as much as they presented
much more personal statements and opinions than years
before.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Beemer:2009:MLR,
author = "Brandon Beemer and Dawn Gregg",
title = "Mashups: a Literature Review and Classification
Framework",
journal = j-FUTURE-INTERNET,
volume = "1",
number = "1",
pages = "59--87",
day = "22",
month = dec,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi1010059",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:42 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/1/1/59",
abstract = "The evolution of the Web over the past few years has
fostered the growth of a handful of new technologies
(e.g. Blogs, Wiki's, Web Services). Recently web
mashups have emerged as the newest Web technology and
have gained lots of momentum and attention from both
academic and industry communities. Current mashup
literature focuses on a wide array of issues, which can
be partially explained by how new the topic is.
However, to date, mashup literature lacks an
articulation of the different subtopics of web mashup
research. This study presents a broad review of mashup
literature to help frame the 1subtopics in mashup
research.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Data Mashups.",
}
@Article{Beall:2010:MND,
author = "Jeffrey Beall",
title = "Metadata for Name Disambiguation and Collocation",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "1",
pages = "1--15",
day = "05",
month = jan,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/1/1",
abstract = "Searching names of persons, families, and
organizations is often difficult in online databases
because different persons or organizations frequently
share the same name and because a single person's or
organization's name may appear in different forms in
various online documents. Databases and search engines
can use metadata as a tool to solve the problem of name
ambiguity and name variation in online databases. This
article describes the challenges names pose in
information retrieval and some emerging name metadata
databases that can help ameliorate the problems.
Effective name disambiguation and collocation increase
search precision and recall and can improve assessment
of scholarly work.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Metadata and Markup.",
}
@Article{Priscoli:2010:FCA,
author = "Francesco Delli Priscoli",
title = "A Fully Cognitive Approach for Future {Internet}",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "1",
pages = "16--29",
day = "22",
month = jan,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2010016",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/1/16",
abstract = "This paper deals with an autonomous cognitive network
management architecture which aims at achieving
inter-network (horizontal) and inter-layer (vertical)
cross-optimization. The proposed architecture is based
on the so-called Cognitive Managers transparently
embedded in properly selected network nodes. The core
of each Cognitive Manager are the so-called thinking
modules, which are in charge of taking consistent and
coordinated decisions according to a fully cognitive
approach. The thinking modules potentially avail of
information coming from both the transport and the
service/content layers of all networks and, based on
all this inter-layer and inter-network information,
take consistent and coordinated decisions impacting the
different layers, aiming at the overall inter-layer,
inter-network optimization.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Network Architectures.",
}
@Article{Fiore:2010:SRR,
author = "Ugo Fiore",
title = "Selective Redundancy Removal: a Framework for Data
Hiding",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "1",
pages = "30--40",
day = "15",
month = feb,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2010030",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/1/30",
abstract = "Data hiding techniques have so far concentrated on
adding or modifying irrelevant information in order to
hide a message. However, files in widespread use, such
as HTML documents, usually exhibit high redundancy
levels, caused by code-generation programs. Such
redundancy may be removed by means of optimization
software. Redundancy removal, if applied selectively,
enables information hiding. This work introduces
Selective Redundancy Removal (SRR) as a framework for
hiding data. An example application of the framework is
given in terms of hiding information in HTML documents.
Non-uniformity across documents may raise alarms.
Nevertheless, selective application of optimization
techniques might be due to the legitimate use of
optimization software not supporting all the
optimization methods, or configured to not use all of
them.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security for Next Generation Wireless
and Decentralized Systems.",
}
@Article{Fuchs:2010:TFW,
author = "Christian Fuchs and Wolfgang Hofkirchner and Matthias
Schafranek and Celina Raffl and Marisol Sandoval and
Robert Bichler",
title = "Theoretical Foundations of the {Web}: Cognition,
Communication, and Co-Operation. Towards an
Understanding of {Web 1.0, 2.0, 3.0}",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "1",
pages = "41--59",
day = "19",
month = feb,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2010041",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/1/41",
abstract = "Currently, there is much talk of Web 2.0 and Social
Software. A common understanding of these notions is
not yet in existence. The question of what makes Social
Software social has thus far also remained
unacknowledged. In this paper we provide a theoretical
understanding of these notions by outlining a model of
the Web as a techno-social system that enhances human
cognition towards communication and co-operation.
According to this understanding, we identify three
qualities of the Web, namely Web 1.0 as a Web of
cognition, Web 2.0 as a Web of human communication, and
Web 3.0 as a Web of co-operation. We use the terms Web
1.0, Web 2.0, Web 3.0 not in a technical sense, but for
describing and characterizing the social dynamics and
information processes that are part of the Internet.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Benedetto:2010:DQE,
author = "Francesco Benedetto and Alberto Curcio and Gaetano
Giunta",
title = "Dynamic {QoS} Evaluation of Multimedia Contents in
Wireless Networks by {``Double-Boomerang''}
Watermarking",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "1",
pages = "60--73",
day = "08",
month = mar,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2010060",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/1/60",
abstract = "This work presents a cooperative network-aware
processing of multimedia content for dynamic quality of
service management in wireless IP networks. Our
technique can be also used for quality control in UMTS
environments, exploiting the tracing watermarking
recently introduced in literature. In this work, we use
the transmitted video-sequences to monitor the QoS in a
videoconference call. The video-sequence of every
active user travels on the communication link, one time
as video (transparent mode), one time as watermark
(hidden mode) describing a boomerang trajectory. The
results obtained through our simulation trials confirm
the validity of such approach. In fact, the advantages
of distributing the management process are (i) an
easier and more precise localization of the cause of
QoS problems, (ii) a better knowledge of local
situations, (iii) a lower complexity for a single QoS
agent and (iv) an increase in possible actions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue QoS in Wired and Wireless IP Networks.",
}
@Article{Ding:2010:MED,
author = "Lian Ding and Shaofeng Liu",
title = "Markup in Engineering Design: a Discourse",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "1",
pages = "74--95",
day = "11",
month = mar,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2010074",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/1/74",
abstract = "Today's engineering companies are facing unprecedented
competition in a global market place. There is now a
knowledge intensive shift towards whole product
lifecycle support, and collaborative environments. It
has become particularly important to capture
information, knowledge and experiences about previous
design and following stages during their product
lifecycle, so as to retrieve and reuse such information
in new and follow-on designs activities. Recently, with
the rapid development and adoption of digital
technologies, annotation and markup are becoming
important tools for information communication,
retrieval and management. Such techniques are being
increasingly applied to an array of applications and
different digital items, such as text documents, 2D
images and 3D models. This paper presents a
state-of-the-art review of recent research in markup
for engineering design, including a number of core
markup languages and main markup strategies. Their
applications and future utilization in engineering
design, including multi-viewpoint of product models,
capture of information and rationale across the whole
product lifecycle, integration of engineering design
processes, and engineering document management, are
comprehensively discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Metadata and Markup.",
}
@Article{Christin:2010:SWS,
author = "Delphine Christin and Parag S. Mogre and Matthias
Hollick",
title = "Survey on Wireless Sensor Network Technologies for
Industrial Automation: The Security and Quality of
Service Perspectives",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "2",
pages = "96--125",
day = "08",
month = apr,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2020096",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/2/96",
abstract = "Wireless Sensor Networks (WSNs) are gradually adopted
in the industrial world due to their advantages over
wired networks. In addition to saving cabling costs,
WSNs widen the realm of environments feasible for
monitoring. They thus add sensing and acting
capabilities to objects in the physical world and allow
for communication among these objects or with services
in the future Internet. However, the acceptance of WSNs
by the industrial automation community is impeded by
open issues, such as security guarantees and provision
of Quality of Service (QoS). To examine both of these
perspectives, we select and survey relevant WSN
technologies dedicated to industrial automation. We
determine QoS requirements and carry out a threat
analysis, which act as basis of our evaluation of the
current state-of-the-art. According to the results of
this evaluation, we identify and discuss open research
issues.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security for Next Generation Wireless
and Decentralized Systems.",
}
@Article{Maier:2010:QPT,
author = "Martin Maier and Navid Ghazisaidi",
title = "{QoS} Provisioning Techniques for Future
Fiber-Wireless {(FiWi)} Access Networks",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "2",
pages = "126--155",
day = "29",
month = apr,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2020126",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/2/126",
abstract = "A plethora of enabling optical and wireless
access-metro network technologies have been emerging
that can be used to build future-proof bimodal
fiber-wireless (FiWi) networks. Hybrid FiWi networks
aim at providing wired and wireless quad-play services
over the same infrastructure simultaneously and hold
great promise to mitigate the digital divide and change
the way we live and work by replacing commuting with
teleworking. After overviewing enabling optical and
wireless network technologies and their QoS
provisioning techniques, we elaborate on enabling
radio-over-fiber (RoF) and radio-and-fiber (R\&F)
technologies. We describe and investigate new QoS
provisioning techniques for future FiWi networks,
ranging from traffic class mapping, scheduling, and
resource management to advanced aggregation techniques,
congestion control, and layer-2 path selection
algorithms.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue QoS in Wired and Wireless IP Networks.",
}
@Article{Taswell:2010:DIM,
author = "Carl Taswell",
title = "A Distributed Infrastructure for Metadata about
Metadata: The {HDMM} Architectural Style and
{PORTAL-DOORS} System",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "2",
pages = "156--189",
day = "01",
month = jun,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2020156",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/2/156",
abstract = "Both the IRIS-DNS System and the PORTAL-DOORS System
share a common architectural style for pervasive
metadata networks that operate as distributed metadata
management systems with hierarchical authorities for
entity registering and attribute publishing.
Hierarchical control of metadata redistribution
throughout the registry-directory networks constitutes
an essential characteristic of this architectural style
called Hierarchically Distributed Mobile Metadata
(HDMM) with its focus on moving the metadata for who
what where as fast as possible from servers in response
to requests from clients. The novel concept of
multilevel metadata about metadata has also been
defined for the PORTAL-DOORS System with the use of
entity, record, infoset, representation and message
metadata. Other new features implemented include the
use of aliases, priorities and metaresources.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Metadata and Markup.",
}
@Article{Ramstetter:2010:ASN,
author = "Jerry Rick Ramstetter and Yaling Yang and Danfeng
Yao",
title = "Applications and Security of Next-Generation,
User-Centric Wireless Systems",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "190--211",
day = "28",
month = jul,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030190",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/190",
abstract = "Pervasive wireless systems have significantly improved
end-users' quality of life. As manufacturing costs
decrease, communications bandwidth increases, and
contextual information is made more readily available,
the role of next generation wireless systems in
facilitating users' daily activities will grow. Unique
security and privacy issues exist in these wireless,
context-aware, often decentralized systems. For
example, the pervasive nature of such systems allows
adversaries to launch stealthy attacks against them. In
this review paper, we survey several emergent personal
wireless systems and their applications. These systems
include mobile social networks, active implantable
medical devices, and consumer products. We explore each
system's usage of contextual information and provide
insight into its security vulnerabilities. Where
possible, we describe existing solutions for
defendingagainst these vulnerabilities. Finally, we
point out promising future research directions for
improving these systems' robustness and security",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security for Next Generation Wireless
and Decentralized Systems.",
}
@Article{Arkoulis:2010:MSC,
author = "Stamatios Arkoulis and Giannis F. Marias and Pantelis
A. Frangoudis and Jens Oberender and Alexandru Popescu
and Markus Fiedler and Hermann de Meer and George C.
Polyzos",
title = "Misbehavior Scenarios in Cognitive Radio Networks",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "212--237",
day = "29",
month = jul,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030212",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/212",
abstract = "Recent advances in the fields of Cognitive Radio and
the proliferation of open spectrum access promise that
spectrum-agile wireless communication will be
widespread in the near future, and will bring
significant flexibility and potential utility
improvements for end users. With spectrum efficiency
being a key objective, most relevant research focuses
on smart coexistence mechanisms. However, wireless
nodes may behave selfishly and should be considered as
rational autonomous entities. Selfishness, pure malice
or even faulty equipment can lead to behavior that does
not conform to sharing protocols and etiquette. Thus,
there is a need to secure spectrum sharing mechanisms
against attacks in the various phases of the sharing
process. Identifying these attacks and possible
countermeasures is the focus of this work.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security for Next Generation Wireless
and Decentralized Systems.",
}
@Article{Granitzer:2010:OAS,
author = "Michael Granitzer and Vedran Sabol and Kow Weng Onn
and Dickson Lukose and Klaus Tochtermann",
title = "Ontology Alignment --- a Survey with Focus on Visually
Supported Semi-Automatic Techniques",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "238--258",
day = "04",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030238",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/238",
abstract = "Semantic technologies are of paramount importance to
the future Internet. The reuse and integration of
semantically described resources, such as data or
services, necessitates the bringing of ontologies into
mutual agreement. Ontology alignment deals with the
discovery of correspondences between concepts and
relations from different ontologies. Alignment provides
the key ingredient to semantic interoperability. This
paper gives an overview on the state of the art in the
field of visually supported semi-automatic alignment
techniques and presents recent trends and developments.
Particular attention is given to user interfaces and
visualization techniques supporting involvement of
humans in the alignment process. We derive and
summarize requirements for visual semi-automatic
alignment systems, provide an overview of existing
approaches, and discuss the possibilities for further
improvements and future research.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Metadata and Markup.",
}
@Article{Xie:2010:TFS,
author = "Iris Xie and Soohyung Joo",
title = "Tales from the Field: Search Strategies Applied in
{Web} Searching",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "259--281",
day = "06",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030259",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/259",
abstract = "In their web search processes users apply multiple
types of search strategies, which consist of different
search tactics. This paper identifies eight types of
information search strategies with associated cases
based on sequences of search tactics during the
information search process. Thirty-one participants
representing the general public were recruited for this
study. Search logs and verbal protocols offered rich
data for the identification of different types of
search strategies. Based on the findings, the authors
further discuss how to enhance web-based information
retrieval (IR) systems to support each type of search
strategy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Information Behavior.",
}
@Article{Ho:2010:IVA,
author = "Yeh-Chin Ho and Yi-Bing Lin and Ren-Huang Liou and
Yuan-Kuang Tu",
title = "Implementing Value Added Applications in Next
Generation Networks",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "282--294",
day = "06",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030282",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/282",
abstract = "One of the major issues in the future Internet is the
integration of telecom networks with the Internet. In
many countries, large Internet Service Providers (ISPs)
are also telecom operators that have been focusing on
providing Internet services through their telecom
networks with telecom-grade mechanisms. In this
article, we show that IP Multimedia Subsystem (IMS) is
a telecom-grade mechanism that addresses this important
issue. In Next Generation Network (NGN), IMS supports
IP-based multimedia services that can be accessed from
various wireless and wired access technologies through
fixed-mobile convergence. We show how to integrate
Internet Protocol Television (IPTV) with NGN/IMS to
offer enhanced IPTV services for subscribers with
set-top boxes or mobile phones. We specifically
describe the implementations of three services: weather
forecasts, short messages on TV screens and TV
shopping/food ordering for mobile users. Although these
services can be directly implemented in the Internet,
our commercial operation experiences indicate that the
NGN/IMS implementation has advantages in terms of
telecom-grade security, Quality of Service (QoS), and
flexible service creation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Network vs. Application Based Solutions
for NGN.",
}
@Article{Urushidani:2010:DRA,
author = "Shigeo Urushidani and Kensuke Fukuda and Michihiro
Koibuchi and Motonori Nakamura and Shunji Abe and
Yusheng Ji and Michihiro Aoki and Shigeki Yamada",
title = "Dynamic Resource Allocation and {QoS} Control
Capabilities of the {Japanese} Academic Backbone
Network",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "295--307",
day = "09",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030295",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/295",
abstract = "Dynamic resource control capabilities have become
increasingly important for academic networks that must
support big scientific research projects at the same
time as less data intensive research and educational
activities. This paper describes the dynamic resource
allocation and QoS control capabilities of the Japanese
academic backbone network, called SINET3, which
supports a variety of academic applications with a wide
range of network services. The article describes the
network architecture, networking technologies, resource
allocation, QoS control, and layer-1 bandwidth
on-demand services. It also details typical services
developed for scientific research, including the user
interface, resource control, and management functions,
and includes performance evaluations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue QoS in Wired and Wireless IP Networks.",
}
@Article{Mahfoudh:2010:EER,
author = "Saoucene Mahfoudh and Pascale Minet and Ichrak
Amdouni",
title = "Energy Efficient Routing and Node Activity Scheduling
in the {OCARI} Wireless Sensor Network",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "308--340",
day = "17",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030308",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/308",
abstract = "Sensor nodes are characterized by a small size, a low
cost, an advanced communication technology, but also a
limited amount of energy. Energy efficient strategies
are required in such networks to maximize network
lifetime. In this paper, we focus on a solution
integrating energy efficient routing and node activity
scheduling. The energy efficient routing we propose,
called EOLSR, selects the route and minimizes the
energy consumed by an end-to-end transmission, while
avoiding nodes with low residual energy. Simulation
results show that EOLSR outperforms the solution
selecting the route of minimum energy as well as the
solution based on node residual energy. Cross-layering
allows EOLSR to use information from the application
layer or the MAC layer to reduce its overhead and
increase network lifetime. Node activity scheduling is
based on the following observation: the sleep state is
the least power consuming state. So, to schedule node
active and sleeping periods, we propose SERENA that
colors all network nodes using a small number of
colors, such that two nodes with the same color can
transmit without interfering. The node color is mapped
into a time slot during which the node can transmit.
Consequently, each node is awake during its slot and
the slots of its one-hop neighbors, and sleeps in the
remaining time. We evaluate SERENA benefits obtained in
terms of bandwidth, delay and energy. We also show how
cross-layering with the application layer can improve
the end-to-end delays for data gathering
applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Networked Sensors and Actuators.",
}
@Article{Lux:2010:CGV,
author = "Mathias Lux and Arthur Pitman and Oge Marques",
title = "Can Global Visual Features Improve Tag Recommendation
for Image Annotation?",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "341--362",
day = "27",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030341",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/341",
abstract = "Recent advances in the fields of digital photography,
networking and computing, have made it easier than ever
for users to store and share photographs. However
without sufficient metadata, e.g., in the form of tags,
photos are difficult to find and organize. In this
paper, we describe a system that recommends tags for
image annotation. We postulate that the use of
low-level global visual features can improve the
quality of the tag recommendation process when compared
to a baseline statistical method based on tag
co-occurrence. We present results from experiments
conducted using photos and metadata sourced from the
Flickr photo website that suggest that the use of
visual features improves the mean average precision
(MAP) of the system and increases the system's ability
to suggest different tags, therefore justifying the
associated increase in complexity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Topal:2010:TRA,
author = "Sebahattin Topal and Ismet Erkmen and Aydan M.
Erkmen",
title = "Towards the Robotic {``Avatar''}: An Extensive Survey
of the Cooperation between and within Networked Mobile
Sensors",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "363--387",
day = "14",
month = sep,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030363",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/363",
abstract = "Cooperation between networked mobile sensors, wearable
and sycophant sensor networks with parasitically
sticking agents, and also having human beings involved
in the loop is the ``Avatarization'' within the robotic
research community, where all networks are connected
and where you can connect/disconnect at any time to
acquire data from a vast unstructured world. This paper
extensively surveys the networked robotic foundations
of this robotic biological ``Avatar'' that awaits us in
the future. Cooperation between networked mobile
sensors as well as cooperation of nodes within a
network are becoming more robust, fault tolerant and
enable adaptation of the networks to changing
environment conditions. In this paper, we survey and
comparatively discuss the current state of networked
robotics via their critical application areas and their
design characteristics. We conclude by discussing
future challenges.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Networked Sensors and Actuators.",
}
@Article{Do:2010:SQM,
author = "Viet Thi Minh Do and Lars Landmark and {\O}ivind
Kure",
title = "A Survey of {QoS} Multicast in Ad Hoc Networks",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "388--416",
day = "14",
month = sep,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030388",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/388",
abstract = "This survey on Quality of Service (QoS) in multicast
ad hoc networks uses a framework based on the
mechanisms in three important elements: resource
estimations, multicast tree/mesh administration, and
multicast routing. Our contribution is an exploration
of the design space and an identification of areas that
have not been fully explored. We discuss the design
space of central mechanisms and classify proposed QoS
multicast schemes according to the mechanisms they
used. In addition, we summarize the scenarios used for
evaluating their performance. Furthermore, we identify
issues, mechanisms, and scenarios that have not been
fully investigated in existing works. The paper
provides a coherent understanding of design principles,
conceptual operation, and evaluated scenarios of
schemes designed for QoS multicast application in
mobile ad hoc networks (MANETs). It also outlines new
areas for future research in this field.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue QoS in Wired and Wireless IP Networks.",
}
@Article{Pinart:2010:ATD,
author = "Carolina Pinart",
title = "Anticipation of Traffic Demands to Guarantee {QoS} in
{IP}\slash Optical Networks",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "3",
pages = "417--430",
day = "21",
month = sep,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2030417",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/3/417",
abstract = "Traffic in the Internet backbone is expected to grow
above a few Tbit/s in 2020. To cope with this,
operators are moving to IP/optical network
architectures, where IP is the convergence layer for
all services. On the other hand, the quality of service
(QoS) requirements of future applications encompasses
the individualization of services and the assurance of
stricter quality parameters such as latency, jitter or
capacity. In other words, future optical networks will
not only transport more IP data, but they will also
have to offer differentiated QoS requirements to
services. Finally, some emerging applications, e.g.,
grid computing, need greater flexibility in the usage
of network resources, which involves establishing and
releasing connections as if they were virtualized
resources controlled by other elements or layers. In
this context, traffic-driven lightpath provisioning and
service-plane approaches arise as very interesting
candidate solutions to solve the main challenges
described above. This work reviews the concepts of
service-oriented and self-managed networks and relates
them to propose an integrated approach to assure QoS by
offering flow-aware networking in the sense that
traffic demands will be anticipated in a suitable way,
lightpaths will be established taking into account QoS
information (i.e., impairments) and complex services
will be decomposed into optical connections so that the
above techniques can be employed to assure QoS for any
service.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue QoS in Wired and Wireless IP Networks.",
}
@Article{Kulatunga:2010:ENC,
author = "Chamil Kulatunga and Jesse Kielthy and Dmitri Botvich
and William Donnelly",
title = "Exploiting the In-Network Capabilities of Multicast to
Discover Proximate {IPTV} Channels",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "431--445",
day = "29",
month = sep,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040431",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/431",
abstract = "IPTV has become the next generation of television due,
in part, to its ability to support features that have
been lacking in conventional broadcasting-for example,
end-user interactivity, personalisation and
localisation. Providers are also searching for the most
efficient delivery methods to provide the greatest
amount of contents at the lowest cost. At present IPTV
uses IP multicast to deliver live TV channels in an
over-provisioned walled-garden network due to issues of
deploying multicast and QoS challenges in the public
Internet. However, IPTV is likely to shift into some
parts of the public Internet in the future as a managed
service. Multicast routing is performed on a
per-session destination-address basis so each router
maintains a table of all of the multicast addresses to
which the content is being forwarded. We exploit this
information to discover and join the in-progress
channels of geographically proximate users and to
create a new incentivised premium service in future
IPTV networks called ProxyTV. This approach is expected
to minimise network bandwidth requirements as it
enables ISPs to optimise bandwidth on their edge
networks. This becomes increasingly significant as TV
content consumes more and more bandwidth, especially
with the onset of HD and 3D capabilities. In this
paper, we have presented in detail the concept with the
results of a survey and an analysis of network traffic
to justify the proposed approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Network vs. Application Based Solutions
for NGN.",
}
@Article{So-In:2010:DRR,
author = "Chakchai So-In and Raj Jain and Abdel-Karim {Al
Tamimi}",
title = "Deficit Round {Robin} with Fragmentation Scheduling to
Achieve Generalized Weighted Fairness for Resource
Allocation in {IEEE 802.16e} Mobile {WiMAX} Networks",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "446--468",
day = "12",
month = oct,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040446",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/446",
abstract = "Deficit Round Robin (DRR) is a fair packet-based
scheduling discipline commonly used in wired networks
where link capacities do not change with time. However,
in wireless networks, especially wireless broadband
networks, i.e., IEEE 802.16e Mobile WiMAX, there are
two main considerations violate the packet-based
service concept for DRR. First, the resources are
allocated per Mobile WiMAX frame. To achieve full frame
utilization, Mobile WiMAX allows packets to be
fragmented. Second, due to a high variation in wireless
channel conditions, the link/channel capacity can
change over time and location. Therefore, we introduce
a Deficit Round Robin with Fragmentation (DRRF) to
allocate resources per Mobile WiMAX frame in a fair
manner by allowing for varying link capacity and for
transmitting fragmented packets. Similar to DRR and
Generalized Processor Sharing (GPS), DRRF achieves
perfect fairness. DRRF results in a higher throughput
than DRR (80\% improvement) while causing less overhead
than GPS (8 times less than GPS). In addition, in
Mobile WiMAX, the quality of service (QoS) offered by
service providers is associated with the price paid.
This is similar to a cellular phone system; the users
may be required to pay air-time charges. Hence, we have
also formalized a Generalized Weighted Fairness (GWF)
criterion which equalizes a weighted sum of service
time units or slots, called temporal fairness, and
transmitted bytes, called throughput fairness, for
customers who are located in a poor channel condition
or at a further distance versus for those who are near
the base stations, or have a good channel condition. We
use DRRF to demonstrate the application of GWF. These
fairness criteria are used to satisfy basic
requirements for resource allocation, especially for
non real-time traffic. Therefore, we also extend DRRF
to support other QoS requirements, such as minimum
reserved traffic rate, maximum sustained traffic rate,
and traffic priority. For real-time traffic, i.e.,
video traffic, we compare the performance of DRRF with
deadline enforcement to that of Earliest Deadline First
(EDF). The results show that DRRF outperforms EDF
(higher achievable throughput under the promised delay
latency) and maintains fairness under an overload
scenario.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue QoS in Wired and Wireless IP Networks.",
}
@Article{Mahfoudh:2010:NCC,
author = "Saoucene Mahfoudh and Gerard Chalhoub and Pascale
Minet and Michel Misson and Ichrak Amdouni",
title = "Node Coloring and Color Conflict Detection in Wireless
Sensor Networks",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "469--504",
day = "13",
month = oct,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040469",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/469",
abstract = "In wireless sensor networks, energy efficiency is
mainly achieved by making nodes sleep. In this paper,
we present the combination of SERENA, a new node
activity scheduling algorithm based on node coloring,
with TDMA/CA, a collision avoidance MAC protocol. We
show that the combination of these two protocols
enables substantial bandwidth and energy benefits for
both general and data gathering applications. As a
first contribution, we prove that the three-hop node
coloring problem is NP-complete. As a second
contribution, the overhead induced by SERENA during
network coloring is reduced, making possible the use of
these protocols even in dense networks with limited
bandwidth. The third contribution of this paper is to
show that applying any slot assignment algorithm with
spatial reuse based on node neighborhood without taking
into account link quality can lead to poor performances
because of collisions. The use of good quality links
will prevent this phenomenon. The fourth contribution
consists of optimizing end-to-end delays for data
gathering applications, by means of cross-layering with
the application. However, color conflicts resulting
from topology changes, mobility and late node arrivals
can give rise to collisions. As a fifth contribution,
we show how the MAC layer can detect color conflicts,
and cope with them at the cost of a slightly reduced
throughput. Then, we discuss the tradeoff between
requesting SERENA to solve the color conflicts and
dealing with them at the MAC layer, our third
contribution. The combination of SERENA and TDMA/CA is
evaluated through simulations on realistic
topologies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Networked Sensors and Actuators.",
}
@Article{Gottron:2010:SSM,
author = "Christian Gottron and Andr{\'e} K{\"o}nig and Ralf
Steinmetz",
title = "A Survey on Security in Mobile Peer-to-Peer
Architectures-Overlay-Based vs. Underlay-Based
Approaches",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "505--532",
day = "13",
month = oct,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040505",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/505",
abstract = "Mobile Ad hoc networks (MANET) and Peer-to-Peer (P2P)
networks share central characteristics such as their
distributed and decentralized nature. Combining both
networking paradigms results in a Mobile Peer-to-Peer
(MP2P) system that operates independently from a
preexisting infrastructure. Securing MP2P networks in
terms of availability and robustness as basic demands
in envisioned application scenarios like first
responder operations is a challenging task. In this
article, we present a survey of selected threats and of
state of the art countermeasures for MANETs and P2P
networks. Further, we discuss the efficiency of MANET
and P2P security mechanisms when applied in MP2P
networks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Network vs. Application Based Solutions
for NGN.",
}
@Article{Calegari:2010:OBI,
author = "Silvia Calegari and Gabriella Pasi",
title = "Ontology-Based Information Behaviour to Improve {Web}
Search",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "533--558",
day = "18",
month = oct,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040533",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/533",
abstract = "Web Search Engines provide a huge number of answers in
response to a user query, many of which are not
relevant, whereas some of the most relevant ones may
not be found. In the literature several approaches have
been proposed in order to help a user to find the
information relevant to his/her real needs on the Web.
To achieve this goal the individual Information
Behavior can been analyzed to 'keep' track of the
user's interests. Keeping information is a type of
Information Behavior, and in several works researchers
have referred to it as the study on what people do
during a search on the Web. Generally, the user's
actions (e.g., how the user moves from one Web page to
another, or her/his download of a document, etc.) are
recorded in Web logs. This paper reports on research
activities which aim to exploit the information
extracted from Web logs (or query logs) in personalized
user ontologies, with the objective to support the user
in the process of discovering Web information relevant
to her/his information needs. Personalized ontologies
are used to improve the quality of Web search by
applying two main techniques: query reformulation and
re-ranking of query evaluation results. In this paper
we analyze various methodologies presented in the
literature aimed at using personalized ontologies,
defined on the basis of the observation of Information
Behaviour to help the user in finding relevant
information.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Barradas:2010:ITA,
author = "Alvaro L. Barradas and Maria do Carmo R. Medeiros",
title = "An Intrinsic {TE} Approach for End-to-End {QoS}
Provisioning in {OBS} Networks Using Static
Load-Balanced Routing Strategies",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "559--586",
day = "22",
month = oct,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040559",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/559",
abstract = "Optical burst switching provides a feasible paradigm
for the next IP over optical backbones. However its
burst loss performance can be highly affected by burst
contention. In this paper we discuss traffic
engineering approaches for path selection with the
objective tominimize contention using only topological
information. The discussed strategies are based on
balancing the traffic across the network in order to
reduce congestion without incurring into link state
protocol penalties. The routing strategies are
evaluated by simulation on an optical burst switching
model specifically developed for the purpose with
OMNeT++. Results show that our strategies outperform
the traditionally used shortest path routing to an
extent that depends on the network connectivity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue QoS in Wired and Wireless IP Networks.",
}
@Article{Kolios:2010:LAS,
author = "Panayiotis Kolios and Vasilis Friderikos and Katerina
Papadaki",
title = "Look-Ahead Strategies Based on Store-Carry and Forward
Relaying for Energy Efficient Cellular Communications",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "587--602",
day = "04",
month = nov,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040587",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/587",
abstract = "With the increasing availability of Internet type
services on mobile devices and the attractive flat rate
all-you-can-eat billing system, cellular
telecommunication networks are experiencing a
tremendous growth in data usage demand. However, there
are increasing concerns that current network deployment
trends (including more efficient radio access
techniques and increased spectrum allocation
strategies), will be unable to support the increased
Internet traffic in a sustainable way. The delay
tolerant nature of mobile Internet traffic allows for a
large degree of flexibility in optimizing network
performance to meet different design objectives and
it's a feature that has mostly gone unexplored by the
research community. In this paper, we introduce a novel
message forwarding mechanism in cellular networks that
benefits from the inherent delay tolerance of Internet
type services to provide flexible and adjustable
forwarding strategies for efficient network operation
while guaranteeing timely deliveries. By capitalizing
on the elasticity of message delivery deadlines and the
actual mobility of nodes inside the cell, considerable
performance gains can be achieved by physically
propagating information messages within the network.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Network vs. Application Based Solutions
for NGN.",
}
@Article{Islam:2010:NEI,
author = "Salekul Islam and Jean-Charles Gr{\'e}goire",
title = "Network Edge Intelligence for the Emerging
Next-Generation {Internet}",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "603--623",
day = "05",
month = nov,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040603",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/603",
abstract = "The success of the Content Delivery Networks (CDN) in
the recent years has demonstrated the increased
benefits of the deployment of some form of
``intelligence'' within the network. Cloud computing,
on the other hand, has shown the benefits of economies
of scale and the use of a generic infrastructure to
support a variety of services. Following that trend, we
propose to move away from the smart terminal-dumb
network dichotomy to a model where some degree of
intelligence is put back into the network, specifically
at the edge, with the support of Cloud technology. In
this paper, we propose the deployment of an Edge Cloud,
which integrates a variety of user-side and server-side
services. On the user side, surrogate, an application
running on top of the Cloud, supports a virtual client.
The surrogate hides the underlying network
infrastructure from the user, thus allowing for
simpler, more easily managed terminals. Network side
services supporting delivery of and exploiting content
are also deployed on this infrastructure, giving the
Internet Service Providers (ISP) many opportunities to
become directly involved in content and service
delivery.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Graham:2010:BMM,
author = "Jim Graham and Greg Newman and Sunil Kumar and
Catherine Jarnevich and Nick Young and Alycia Crall and
Thomas J. Stohlgren and Paul Evangelista",
title = "Bringing Modeling to the Masses: a {Web} Based System
to Predict Potential Species Distributions",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "624--634",
day = "11",
month = nov,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040624",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/624",
abstract = "Predicting current and potential species distributions
and abundance is critical for managing invasive
species, preserving threatened and endangered species,
and conserving native species and habitats. Accurate
predictive models are needed at local, regional, and
national scales to guide field surveys, improve
monitoring, and set priorities for conservation and
restoration. Modeling capabilities, however, are often
limited by access to software and environmental data
required for predictions. To address these needs, we
built a comprehensive web-based system that: (1)
maintains a large database of field data; (2) provides
access to field data and a wealth of environmental
data; (3) accesses values in rasters representing
environmental characteristics; (4) runs statistical
spatial models; and (5) creates maps that predict the
potential species distribution. The system is available
online at www.niiss.org, and provides web-based tools
for stakeholders to create potential species
distribution models and maps under current and future
climate scenarios.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kos:2010:CGS,
author = "Alexander Kos and Hans-J{\"u}rgen Himmler",
title = "{CWM Global Search} --- The {Internet} Search Engine
for Chemists and Biologists",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "635--644",
day = "03",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040635",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/635",
abstract = "CWM Global Search is a meta-search engine allowing
chemists and biologists to search the major chemical
and biological databases on the Internet, by structure,
synonyms, CAS Registry Numbers and free text. A
meta-search engine is a search tool that sends user
requests to several other search engines and/or
databases and aggregates the results into a single list
or displays them according to their source [1]. CWM
Global Search is a web application that has many of the
characteristics of desktop applications (also known as
Rich Internet Application, RIA), and it runs on both
Windows and Macintosh platforms. The application is one
of the first RIA for scientists. The application can be
started using the URL
http://cwmglobalsearch.com/gsweb.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Eichler:2010:SSW,
author = "Frederik Eichler and Wolfgang Reinhardt",
title = "Simplifying the Scientific Writing and Review Process
with {SciFlow}",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "645--661",
day = "06",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040645",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/645",
abstract = "Scientific writing is an essential part of a student's
and researcher's everyday life. In this paper we
investigate the particularities of scientific writing
and explore the features and limitations of existing
tools for scientific writing. Deriving from this
analysis and an online survey of the scientific writing
processes of students and researchers at the University
of Paderborn, we identify key principles to simplify
scientific writing and reviewing. Finally, we introduce
a novel approach to support scientific writing with a
tool called SciFlow that builds on these principles and
state of the art technologies like cloud computing.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Guthle:2010:IAD,
author = "Martin G{\"u}thle and Jochen K{\"o}gel and Stefan Wahl
and Matthias Kaschub and Christian M. Mueller",
title = "Improving Anomaly Detection for Text-Based Protocols
by Exploiting Message Structures",
journal = j-FUTURE-INTERNET,
volume = "2",
number = "4",
pages = "662--669",
day = "21",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi2040662",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:45 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/2/4/662",
abstract = "Service platforms using text-based protocols need to
be protected against attacks. Machine-learning
algorithms with pattern matching can be used to detect
even previously unknown attacks. In this paper, we
present an extension to known Support Vector Machine
(SVM) based anomaly detection algorithms for the
Session Initiation Protocol (SIP). Our contribution is
to extend the amount of different features used for
classification (feature space) by exploiting the
structure of SIP messages, which reduces the false
positive rate. Additionally, we show how combining our
approach with attribute reduction significantly
improves throughput.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantics in the Future Internet.",
}
@Article{Kinkelin:2011:UTS,
author = "Holger Kinkelin and Ralph Holz and Heiko Niedermayer
and Simon Mittelberger and Georg Carle",
title = "On Using {TPM} for Secure Identities in Future Home
Networks",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "1",
pages = "1--13",
day = "07",
month = jan,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:46 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/1/1",
abstract = "Security should be integrated into future networks
from the beginning, not as an extension. Secure
identities and authentication schemes are an important
step to fulfill this quest. In this article, we argue
that home networks are a natural trust anchor for such
schemes. We describe our concept of home networks as a
universal point of reference for authentication, trust
and access control, and show that our scheme can be
applied to any next generation network. As home
networks are no safe place, we apply Trusted Computing
technology to prevent the abuse of identities, i.e.,
identity theft.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantics in the Future Internet.",
}
@Article{Hanka:2011:DPK,
author = "Oliver Hanka and Michael Eichhorn and Martin
Pfannenstein and J{\"o}rg Ebersp{\"a}cher and Eckehard
Steinbach",
title = "A Distributed Public Key Infrastructure Based on
Threshold Cryptography for the {HiiMap} Next Generation
{Internet} Architecture",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "1",
pages = "14--30",
day = "01",
month = feb,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3010014",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:46 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/1/14",
abstract = "In this article, a security extension for the HiiMap
Next Generation Internet Architecture is presented. We
regard a public key infrastructure which is integrated
into the mapping infrastructure of the
locator/identifier-split addressing scheme. The
security approach is based on Threshold Cryptography
which enables a sharing of keys among the mapping
servers. Hence, a more trustworthy and fair approach
for a Next Generation Internet Architecture as compared
to the state of the art approach is fostered.
Additionally, we give an evaluation based on IETF AAA
recommendations for security-related systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantics in the Future Internet.",
}
@Article{Rifa-Pous:2011:CEC,
author = "Helena Rif{\`a}-Pous and Jordi
Herrera-Joancomart{\'\i}",
title = "Computational and Energy Costs of Cryptographic
Algorithms on Handheld Devices",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "1",
pages = "31--48",
day = "14",
month = feb,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3010031",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:46 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/1/31",
abstract = "Networks are evolving toward a ubiquitous model in
which heterogeneous devices are interconnected.
Cryptographic algorithms are required for developing
security solutions that protect network activity.
However, the computational and energy limitations of
network devices jeopardize the actual implementation of
such mechanisms. In this paper, we perform a wide
analysis on the expenses of launching symmetric and
asymmetric cryptographic algorithms, hash chain
functions, elliptic curves cryptography and pairing
based cryptography on personal agendas, and compare
them with the costs of basic operating system
functions. Results show that although cryptographic
power costs are high and such operations shall be
restricted in time, they are not the main limiting
factor of the autonomy of a device.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue The Internet of Things.",
}
@Article{Petrie:2011:ECI,
author = "Charles Petrie",
title = "Enterprise Coordination on the {Internet}",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "1",
pages = "49--66",
day = "17",
month = feb,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3010049",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:46 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/1/49",
abstract = "Enterprises are now connected internally and
externally to other Enterprises via the Internet in
ways that are increasingly difficult to manage,
especially as these interconnections become more
dynamic. Current methods of coordinating the effects of
change as they propagate through these networks of
connections are not likely to scale. What is needed is
a new paradigm for how the Internet supports such
coordination. Indeed, the Internet should and could
provide fundamental coordination functions that are
missing today. In this paper, we describe how such a
``Coordinated Internet'' would work (this paper is an
expanded version of [1]). The key functionality of a
Coordinated Internet would be that the Internet
actively watches what people do (analogous to search
completion on desktops today), correlates these
activities, and actively notifies people when and how
their current tasks affect and are affected by the
activities of other people. This would be accomplished
by standard coordination functions implemented as a
common Internet layer that can be used as a utility by
more specialized applications. Such a Coordinated
Internet would revolutionize enterprise management, for
all enterprises, large and small, corporate and
personal. For example, static workflows would become
obsolete for all but the the most routine processes.
Some solutions provide existence proofs of such a
coordination substrate, such as the Redux solution in
concurrent engineering, which we describe herein.
However, foundational research remains to be done in
the new field of Coordination Engineering in order to
reach the goal of a future Internet in which
coordination functions are fundamental.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantics in the Future Internet.",
}
@Article{Mikoczy:2011:ECN,
author = "Eugen Mik{\'o}czy and Ivan Kotuliak and Oskar van
Deventer",
title = "Evolution of the Converged {NGN} Service Platforms
Towards Future Networks",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "1",
pages = "67--86",
day = "04",
month = mar,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3010067",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:46 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/1/67",
abstract = "This article presents a comparison of main
characteristics of the Next Generation Networks (NGN)
and Future Generation Internet (FGI). The aim is to
discuss and compare two approaches to Future Networks
(FN) and services: the evolution of NGN, and the
revolutionary approach of a new FGI. We present both
frameworks from the services point of view as they are
delivered to the end-user, as well as from the
architectural point of view. We compare selected
properties of both approaches to explain commonalities
and differences. Their challenges are similar: managing
the quality of experience, mobility, security,
scalability and providing openness to applications.
Based on this comparison, we evaluate possible areas
for future convergence in the approach of the two
architectures to the Future Network concept. Our
analysis shows that despite their different
backgrounds, the internet's FGI and telco's NGN are not
that different after all. The convergence of the two
approaches therefore seems the only logical way
forward.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Network vs. Application Based Solutions
for NGN.",
}
@Article{Tonnies:2011:SOA,
author = "Sascha T{\"o}nnies and Benjamin K{\"o}hncke and
Patrick Hennig and Ingo Brunkhorst and Wolf-Tilo
Balke",
title = "A Service Oriented Architecture for Personalized
Universal Media Access",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "2",
pages = "87--116",
day = "01",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3020087",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:46 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/2/87",
abstract = "Multimedia streaming means delivering continuous data
to a plethora of client devices. Besides the actual
data transport, this also needs a high degree of
content adaptation respecting the end users' needs
given by content preferences, transcoding constraints,
and device capabilities. Such adaptations can be
performed in many ways, usually on the media server.
However, when it comes to content editing, like mixing
in subtitles or picture-in-picture composition, relying
on third party service providers may be necessary. For
economic reasons this should be done in a
service-oriented way, because a lot of adaptation
modules can be reused within different adaptation
workflows. Although service-oriented architectures have
become widely accepted in the Web community, the
multimedia environment is still dominated by monolithic
systems. The main reason is the insufficient support
for working with continuous data: generally the
suitability of Web services for handling complex data
types and state-full applications is still limited. In
this paper we discuss extensions of Web service
frameworks, and present a first implementation of a
service-oriented framework for media streaming and
digital item adaptation. The focus lies on the
technical realization of the services. Our experimental
results show the practicality of the actual deployment
of service-oriented multimedia frameworks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Network Architectures.",
}
@Article{Chay:2011:UOT,
author = "Sengtha Chay and Nophea Sasaki",
title = "Using Online Tools to Assess Public Responses to
Climate Change Mitigation Policies in {Japan}",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "2",
pages = "117--129",
day = "01",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3020117",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:46 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/2/117",
abstract = "As a member of the Annex 1 countries to the Kyoto
Protocol of the United Nations Framework Convention on
Climate Change, Japan is committed to reducing 6\% of
the greenhouse gas emissions. In order to achieve this
commitment, Japan has undertaken several major
mitigation measures, one of which is the domestic
measure that includes ecologically friendly lifestyle
programs, utilizing natural energy, participating in
local environmental activities, and amending
environmental laws. Mitigation policies could be
achieved if public responses were strong. As the
internet has increasingly become an online platform for
sharing environmental information, public responses to
the need for reducing greenhouse gas emissions may be
assessed using available online tools. We used Google
Insights for Search, Google AdWords Keyword Tool, and
Google Timeline View to assess public responses in
Japan based on the interest shown for five search terms
that define global climate change and its mitigation
policies. Data on online search interests from January
04, 2004 to July 18, 2010 were analyzed according to
locations and categories. Our study suggests that the
search interests for the five chosen search terms
dramatically increased, especially when new mitigation
policies were introduced or when climate change related
events were organized. Such a rapid increase indicates
that the Japanese public strongly responds to climate
change mitigation policies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Glassey:2011:MIM,
author = "Olivier Glassey",
title = "Metadata For Identity Management of Population
Registers",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "2",
pages = "130--143",
day = "18",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3020130",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:46 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/2/130",
abstract = "A population register is an inventory of residents
within a country, with their characteristics (date of
birth, sex, marital status, etc.) and other
socio-economic data, such as occupation or education.
However, data on population are also stored in numerous
other public registers such as tax, land, building and
housing, military, foreigners, vehicles, etc.
Altogether they contain vast amounts of personal and
sensitive information. Access to public information is
granted by law in many countries, but this transparency
is generally subject to tensions with data protection
laws. This paper proposes a framework to analyze data
access (or protection) requirements, as well as a model
of metadata for data exchange.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Brown:2011:MPB,
author = "Katie Brown and Scott W. Campbell and Rich Ling",
title = "Mobile Phones Bridging the Digital Divide for Teens in
the {US}?",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "2",
pages = "144--158",
day = "13",
month = may,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3020144",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:46 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/2/144",
abstract = "In 2009, just 27\% of American teens with mobile
phones reported using their devices to access the
internet. However, teens from lower income families and
minority teens were significantly more likely to use
their phones to go online. Together, these surprising
trends suggest a potential narrowing of the digital
divide, offering internet access to those without other
means of going online. This is an important move, as,
in today's society, internet access is central to
active citizenship in general and teen citizenship in
particular. Yet the cost of this move toward equal
access is absorbed by those who can least afford it:
Teenagers from low income households. Using survey and
focus group data from a national study of ``Teens and
Mobile Phone Use'' (released by Pew and the University
of Michigan in 2010), this article helps identify and
explain this and other emergent trends for teen use (as
well as non-use) of the internet through mobile
phones.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Social Transformations from the Mobile
Internet.",
}
@Article{Mugridge:2011:EWB,
author = "Rick Mugridge and Mark Utting and David Streader",
title = "Evolving {Web}-Based Test Automation into Agile
Business Specifications",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "2",
pages = "159--174",
day = "03",
month = jun,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3020159",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:46 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/2/159",
abstract = "Usually, test automation scripts for a web application
directly mirror the actions that the tester carries out
in the browser, but they tend to be verbose and
repetitive, making them expensive to maintain and
ineffective in an agile setting. Our research has
focussed on providing tool-support for business-level,
example-based specifications that are mapped to the
browser level for automatic verification. We provide
refactoring support for the evolution of existing
browser-level tests into business-level specifications.
As resulting business rule tables may be incomplete,
redundant or contradictory, our tool provides feedback
on coverage.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Agile Practices.",
}
@Article{Sempere:2011:ADV,
author = "Andrew Sempere",
title = "Architecture and Design for Virtual Conferences: a
Case Study",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "3",
pages = "175--184",
day = "06",
month = jul,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3030175",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/3/175",
abstract = "This paper presents a case study of the design issues
facing a large multi-format virtual conference. The
conference took place twice in two different years,
each time using an avatar-based 3D world with
spatialized audio including keynote, poster and social
sessions. Between year 1 and 2, major adjustments were
made to the architecture and design of the space,
leading to improvement in the nature of interaction
between the participants. While virtual meetings will
likely never supplant the effectiveness of face-to-face
meetings, this paper seeks to outline a few design
principles learned from this experience, which can be
applied generally to make computer mediated
collaboration more effective.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Virtual Worlds.",
}
@Article{Graham:2011:IDP,
author = "Roderick Graham and Danielle Taana Smith",
title = "{Internet} as Digital Practice: Examining Differences
in {African American} {Internet} Usage",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "3",
pages = "185--203",
day = "20",
month = jul,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3030185",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/3/185",
abstract = "This study assesses differences within the African
American population with respect to internet activity.
Using survey data, we find wide variations within the
population. While some segments of African Americans
are indeed less likely to perform certain activities on
the internet, we note that certain segments of the
African American population are reporting more internet
activity than other racial groups. These `haves' score
high not just in comparison to their African American
peers, but to the US American population as a whole. We
suggest a move away from the digital divide/digital
inequality models and a move towards thinking of
greater or lesser Information and Communication
Technology (ICT) usage as conditioned by the
instrumental needs of population groups. We term this a
digital practice model.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Schroth:2011:TTV,
author = "Olaf Schroth and Ellen Pond and Cam Campbell and Petr
Cizek and Stephen Bohus and Stephen R. J. Sheppard",
title = "Tool or Toy? {Virtual} Globes in Landscape Planning",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "4",
pages = "204--227",
day = "20",
month = oct,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3040204",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/4/204",
abstract = "Virtual globes, i.e., geobrowsers that integrate
multi-scale and temporal data from various sources and
are based on a globe metaphor, have developed into
serious tools that practitioners and various
stakeholders in landscape and community planning have
started using. Although these tools originate from
Geographic Information Systems (GIS), they have become
a different, potentially interactive and public tool
set, with their own specific limitations and new
opportunities. Expectations regarding their utility as
planning and community engagement tools are high, but
are tempered by both technical limitations and ethical
issues [1,2]. Two grassroots campaigns and a
collaborative visioning process, the Kimberley Climate
Adaptation Project case study (British Columbia),
illustrate and broaden our understanding of the
potential benefits and limitations associated with the
use of virtual globes in participatory planning
initiatives. Based on observations, questionnaires and
in-depth interviews with stakeholders and community
members using an interactive 3D model of regional
climate change vulnerabilities, potential impacts, and
possible adaptation and mitigation scenarios in
Kimberley, the benefits and limitations of virtual
globes as a tool for participatory landscape planning
are discussed. The findings suggest that virtual globes
can facilitate access to geospatial information, raise
awareness, and provide a more representative virtual
landscape than static visualizations. However,
landscape is not equally representative at all scales,
and not all types of users seem to benefit equally from
the tool. The risks of misinterpretation can be managed
by integrating the application and interpretation of
virtual globes into face-to-face planning processes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet and Landscapes.",
}
@Article{Paar:2011:LCM,
author = "Philip Paar and J{\"o}rg Rekittke",
title = "Low-Cost Mapping and Publishing Methods for Landscape
Architectural Analysis and Design in Slum-Upgrading
Projects",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "4",
pages = "228--247",
day = "20",
month = oct,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3040228",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/4/228",
abstract = "The research project ``Grassroots GIS'' focuses on the
development of low-cost mapping and publishing methods
for slums and slum-upgrading projects in Manila. In
this project smartphones, collaborative mapping and 3D
visualization applications are systematically employed
to support landscape architectural analysis and design
work in the context of urban poverty and urban informal
settlements. In this paper we focus on the description
of the developed methods and present preliminary
results of this work-in-progress.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet and Landscapes.",
}
@Article{Imhof:2011:NRK,
author = "Mark Imhof and Matthew Cox and Angela Fadersen and
Wayne Harvey and Sonia Thompson and David Rees and
Christopher Pettit",
title = "Natural Resource Knowledge and Information Management
via the {Victorian} Resources Online {Website}",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "4",
pages = "248--280",
day = "09",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3040248",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/4/248",
abstract = "Since 1997, the Victorian Resources Online (VRO)
website (http://www.dpi.vic.gov.au/vro) has been a key
means for the dissemination of landscape-based natural
resources information via the internet in Victoria,
Australia. The website currently consists of
approximately 11,000 web pages, including 1900 maps and
1000 downloadable documents. Information is provided at
a range of scales-from statewide and regional overviews
to more detailed catchment and sub-catchment levels. At
all these levels of generalisation, information is
arranged in an organisationally agnostic way around key
knowledge ``domains'' (e.g., soil, landform, water).
VRO represents a useful model for the effective
dissemination of a wide range of natural resources
information; relying on partnerships with key subject
matter experts and data custodians, including a
``knowledge network'' of retired land resource
assessment specialists. In this paper, case studies are
presented that illustrate various approaches to
information and knowledge management with a focus on
presentation of spatially contexted soil and landscape
information at different levels of generalisation.
Examples are provided of adapting site-based
information into clickable maps that reveal
site-specific details, as well as ``spatialising'' data
from specialist internal databases to improve
accessibility to a wider audience. Legacy information
sources have also been consolidated and spatially
referenced. More recent incorporation of interactive
visualisation products (such as landscape panoramas,
videos and animations) is providing interactive rich
media content. Currently the site attracts an average
of 1190 user visits per day and user evaluation has
indicated a wide range of users, including students,
teachers, consultants, researchers and extension staff.
The wide range of uses for information and, in
particular, the benefits for natural resource
education, research and extension has also been
identified.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet and Landscapes.",
}
@Article{Parsons:2011:TDD,
author = "David Parsons and Ramesh Lal and Manfred Lange",
title = "Test Driven Development: Advancing Knowledge by
Conjecture and Confirmation",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "4",
pages = "281--297",
day = "14",
month = dec,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3040281",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/4/281",
abstract = "Test Driven Development (TDD) is a critical agile
software development practice that supports innovation
in short development cycles. However, TDD is one of the
most challenging agile practices to adopt because it
requires changes to work practices and skill sets. It
is therefore important to gain an understanding of TDD
through the experiences of those who have successfully
adopted this practice. We collaborated with an agile
team to provide this experience report on their
adoption of TDD, using observations and interviews
within the product development environment. This
article highlights a number of practices that underlie
successful development with TDD. To provide a
theoretical perspective that can help to explain how
TDD supports a positive philosophy of software
development, we have revised Northover et al.'s
conceptual framework, which is based on a four stage
model of agile development, to reinterpret Popper's
theory of conjecture and falsification in the context
of agile testing strategies. As a result of our
findings, we propose an analytical model for TDD in
agile software development which provides a theoretical
basis for further investigations into the role of TDD
and related practices.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Agile Practices.",
}
@Article{Li:2011:SOA,
author = "Haifeng Li and Bo Wu",
title = "A Service-Oriented Architecture for Proactive
Geospatial Information Services",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "4",
pages = "298--318",
day = "19",
month = dec,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3040298",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/4/298",
abstract = "The advances in sensor network, linked data, and
service-oriented computing has indicated a trend of
information technology, i.e., toward an open, flexible,
and distributed architecture. However, the existing
information technologies show a lack of effective
sharing, aggregation, and cooperation services to
handle the sensors, data, and processing resources to
fulfill user's complicated tasks in near real-time.
This paper presents a service-orientated architecture
for proactive geospatial information services (PGIS),
which integrates the sensors, data, processing, and
human services. PGIS is designed to organize,
aggregate, and co-operate services by composing small
scale services into service chains to meet the
complicated user requirements. It is a platform to
provide real-time or near real-time data collection,
storage, and processing capabilities. It is a flexible,
reusable, and scalable system to share and interoperate
geospatial data, information, and services. The
developed PGIS framework has been implemented and
preliminary experiments have been performed to verify
its performance. The results show that the basic
functions such as task analysis, managing sensors for
data acquisition, service composition, service chain
construction and execution are validated, and the
important properties of PGIS, including
interoperability, flexibility, and reusability, are
achieved.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet and Landscapes.",
}
@Article{Sharma:2011:OLO,
author = "Subhash Sharma and Christopher Pettit and Ian Bishop
and Pang Chan and Falak Sheth",
title = "An Online Landscape Object Library to Support
Interactive Landscape Planning",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "4",
pages = "319--343",
day = "20",
month = dec,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3040319",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/4/319",
abstract = "Using landscape objects with geo-visualisation tools
to create 3D virtual environments is becoming one of
the most prominent communication techniques to
understand landscape form, function and processes.
Geo-visualisation tools can also provide useful
participatory planning support systems to explore
current and future environmental issues such as
biodiversity loss, crop failure, competing pressures on
water availability and land degradation. These issues
can be addressed by understanding them in the context
of their locality. In this paper we discuss some of the
technologies which facilitate our work on the issues of
sustainability and productivity, and ultimately support
for planning and decision-making. We demonstrate an
online Landscape Object Library application with a
suite of geo-visualisation tools to support landscape
planning. This suite includes: a GIS based Landscape
Constructor tool, a modified version of a 3D game
engine SIEVE (Spatial Information Exploration and
Visualisation Environment) and an interactive touch
table display. By integrating the Landscape Object
Library with this suite of geo-visualisation tools, we
believe we developed a tool that can support a
diversity of landscape planning activities. This is
illustrated by trial case studies in biolink design,
whole farm planning and renewable energy planning. We
conclude the paper with an evaluation of our Landscape
Object Library and the suite of geographical tools, and
outline some further research directions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet and Landscapes.",
}
@Article{Formosa:2011:SIS,
author = "Saviour Formosa and Vincent Magri and Julia Neuschmid
and Manfred Schrenk",
title = "Sharing Integrated Spatial and Thematic Data: The
{CRISOLA} Case for {Malta} and the {European Project
Plan4all} Process",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "4",
pages = "344--361",
day = "20",
month = dec,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3040344",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/4/344",
abstract = "Sharing data across diverse thematic disciplines is
only the next step in a series of hard-fought efforts
to ensure barrier-free data availability. The Plan4all
project is one such effort, focusing on the
interoperability and harmonisation of spatial planning
data as based on the INSPIRE protocols. The aims are to
support holistic planning and the development of a
European network of public and private actors as well
as Spatial Data Infrastructure (SDI). The Plan4all and
INSPIRE standards enable planners to publish and share
spatial planning data. The Malta case tackled the wider
scenario for sharing of data, through the investigation
of the availability, transformation and dissemination
of data using geoportals. The study is brought to the
fore with an analysis of the approaches taken to ensure
that data in the physical and social domains are
harmonised in an internationally-established process.
Through an analysis of the criminological theme, the
Plan4all process is integrated with the social and land
use themes as identified in the CRISOLA model. The
process serves as a basis for the need to view sharing
as one part of the datacycle rather than an end in
itself: without a solid protocol the foundations have
been laid for the implementation of the datasets in the
social and crime domains.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Lai:2011:OSE,
author = "Sabrina Lai and Corrado Zoppi",
title = "An Ontology of the Strategic Environmental Assessment
of City Masterplans",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "4",
pages = "362--378",
day = "20",
month = dec,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3040362",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/4/362",
abstract = "Following a discussion on the semantics of the term
``ontology'', this paper discusses some key points
concerning the ontology of the Strategic Environmental
Assessment procedure applied to city Masterplans, using
sustainability as a reference point. It also assumes
the implementation of Guidelines of the Autonomous
Region of Sardinia as an experimental context, with the
objective of proposing the SEA ontology as an important
contribution to improve SEA's effectiveness.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Coltekin:2011:HQG,
author = "Arzu Coltekin and Tumasch Reichenbacher",
title = "High Quality Geographic Services and Bandwidth
Limitations",
journal = j-FUTURE-INTERNET,
volume = "3",
number = "4",
pages = "379--396",
day = "20",
month = dec,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi3040379",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/3/4/379",
abstract = "In this paper we provide a critical overview of the
state of the art in human-centric intelligent data
management approaches for geographic visualizations
when we are faced with bandwidth limitations. These
limitations often force us to rethink how we design
displays for geographic visualizations. We need ways to
reduce the amount of data to be visualized and
transmitted. This is partly because modern instruments
effortlessly produce large volumes of data and Web 2.0
further allows bottom-up creation of rich and diverse
content. Therefore, the amount of information we have
today for creating useful and usable cartographic
products is higher than ever before. However, how much
of it can we really use online? To answer this
question, we first calculate the bandwidth needs for
geographic data sets in terms of waiting times. The
calculations are based on various data volumes
estimated by scholars for different scenarios.
Documenting the waiting times clearly demonstrates the
magnitude of the problem. Following this, we summarize
the current hardware and software solutions, then the
current human-centric design approaches trying to
address the constraints such as various screen sizes
and information overload. We also discuss a limited set
of social issues touching upon the digital divide and
its implications. We hope that our systematic
documentation and critical review will help researchers
and practitioners in the field to better understand the
current state of the art.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet and Landscapes.",
}
@Article{Neis:2012:SNE,
author = "Pascal Neis and Dennis Zielstra and Alexander Zipf",
title = "The Street Network Evolution of Crowdsourced Maps:
{OpenStreetMap} in {Germany} 2007--2011",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "1--21",
day = "29",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/1",
abstract = "The OpenStreetMap (OSM) project is a prime example in
the field of Volunteered Geographic Information (VGI).
Worldwide, several hundred thousand people are
currently contributing information to the ``free''
geodatabase. However, the data contributions show a
geographically heterogeneous pattern around the globe.
Germany counts as one of the most active countries in
OSM; thus, the German street network has undergone an
extensive development in recent years. The question
that remains is this: How does the street network
perform in a relative comparison with a commercial
dataset? By means of a variety of studies, we show that
the difference between the OSM street network for car
navigation in Germany and a comparable proprietary
dataset was only 9\% in June 2011. The results of our
analysis regarding the entire street network showed
that OSM even exceeds the information provided by the
proprietary dataset by 27\%. Further analyses show on
what scale errors can be reckoned with in the topology
of the street network, and the completeness of turn
restrictions and street name information. In addition
to the analyses conducted over the past few years,
projections have additionally been made about the point
in time by which the OSM dataset for Germany can be
considered ``complete'' in relative comparison to a
commercial dataset.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Stenliden:2012:HCW,
author = "Linnea Stenliden and Mikael Jern",
title = "How Can We Study Learning with Geovisual Analytics
Applied to Statistics?",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "22--41",
day = "30",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010022",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/22",
abstract = "It is vital to understand what kind of processes for
learning that Geovisual Analytics creates, as certain
activities and conditions are produced when employing
Geovisual Anlytic tools in education. To understand
learning processes created by Geovisual Analytics,
first requires an understanding of the interactions
between the technology, the workplace where the
learning takes place, and learners' specific knowledge
formation. When studying these types of interaction it
demands a most critical consideration from theoretical
perspectives on research design and methods. This paper
first discusses common, and then a more uncommon,
theoretical approach used within the fields of learning
with multimedia environments and Geovisual Analytics,
the socio-cultural theoretical perspective. The paper
next advocates this constructivist theoretical and
empirical perspective when studying learning with
multiple representational Geovisual Analytic tools. To
illustrate, an outline of a study made within this
theoretical tradition is offered. The study is
conducted in an educational setting where the Open
Statistics eXplorer platform is used. Discussion of our
study results shows that the socio-cultural perspective
has much to offer in terms of what kind of
understanding can be reached in conducting this kind of
studies. Therefore, we argue that empirical research to
analyze how specific communities use various Geovisual
Analytics to evaluate information is best positioned in
a socio-cultural theoretical perspective.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Geovisual Analytics.",
}
@Article{Lowell:2012:EAS,
author = "Kim Lowell and Lindsay Smith and Ian Miller and
Christopher Pettit and Eloise Seymour",
title = "{Extension Activity Support System (EASY)}: a
{Web}-Based Prototype for Facilitating Farm
Management",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "42--64",
day = "04",
month = jan,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010042",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/42",
abstract = "In response to disparate advances in delivering
spatial information to support agricultural extension
activities, the Extension Activity Support System
(EASY) project was established to develop a vision
statement and conceptual design for such a system based
on a national needs assessment. Personnel from across
Australia were consulted and a review of existing farm
information/management software undertaken to ensure
that any system that is eventually produced from the
EASY vision will build on the strengths of existing
efforts. This paper reports on the collaborative
consultative process undertaken to create the EASY
vision as well as the conceptual technical design and
business models that could support a fully functional
spatially enabled online system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet and Landscapes.",
}
@Article{Montenegro:2012:LUP,
author = "Nuno Montenegro and Jorge C. Gomes and Paulo Urbano
and Jos{\'e} P. Duarte",
title = "A Land Use Planning Ontology: {LBCS}",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "65--82",
day = "06",
month = jan,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010065",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/65",
abstract = "Urban planning has a considerable impact on the
economic performance of cities and on the quality of
life of their populations. Efficiency at this level has
been hampered by the lack of integrated tools to
adequately describe urban space in order to formulate
appropriate design solutions. This paper describes an
ontology called LBCS-OWL2 specifically developed to
overcome this flaw, based on the Land Based
Classification Standards (LBCS), a comprehensive and
detailed land use standard to describe the different
dimensions of urban space. The goal is to provide
semantic and computer-readable land use descriptions of
geo-referenced spatial data. This will help to make
programming strategies available to those involved in
the urban development process. There are several
advantages to transferring a land use standard to an
OWL2 land use ontology: it is modular, it can be shared
and reused, it can be extended and data consistency
maintained, and it is ready for integration, thereby
supporting the interoperability of different urban
planning applications. This standard is used as a basic
structure for the ``City Information Modelling'' (CIM)
model developed within a larger research project called
City Induction, which aims to develop a tool for urban
planning and design.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Jurgenson:2012:WAM,
author = "Nathan Jurgenson",
title = "When Atoms Meet Bits: Social Media, the Mobile {Web}
and Augmented Revolution",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "83--91",
day = "23",
month = jan,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010083",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/83",
abstract = "The rise of mobile phones and social media may come to
be historically coupled with a growing atmosphere of
dissent that is enveloping much of the globe. The Arab
Spring, UK Riots, Occupy and many other protests and
so-called ``flash-mobs'' are all massive gatherings of
digitally-connected individuals in physical space; and
they have recently become the new normal. The primary
role of technology in producing this atmosphere has, in
part, been to effectively link the on and the offline.
The trend to view these as separate spaces, what I call
``digital dualism'', is faulty. Instead, I argue that
the digital and physical enmesh to form an ``augmented
reality''. Linking the power of the digital-creating
and disseminating networked information-with the power
of the physical-occupying geographic space with
flesh-and-blood bodies-is an important part of why we
have this current flammable atmosphere of augmented
revolution.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Social Transformations from the Mobile
Internet.",
}
@Article{Anisetti:2012:WSA,
author = "Marco Anisetti and Claudio A. Ardagna and Ernesto
Damiani and Fulvio Frati and Hausi A. M{\"u}ller and
Atousa Pahlevan",
title = "{Web} Service Assurance: The Notion and the Issues",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "92--109",
day = "14",
month = feb,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010092",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/92",
abstract = "Web service technology provides basic infrastructure
for deploying collaborative business processes. Web
Service security standards and protocols aim to provide
secure communication and conversation between service
providers and consumers. Still, for a client calling a
Web service it is difficult to ascertain that a
particular service instance satisfies-at execution
time-specific non-functional properties. In this paper
we introduce the notion of certified Web service
assurance, characterizing how service consumers can
specify the set of security properties that a service
should satisfy. Also, we illustrate a mechanism to
re-check non-functional properties when the execution
context changes. To this end, we introduce the concept
of context-aware certificate, and describe a dynamic,
context-aware service discovery environment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Web Services.",
}
@Article{Fehling:2012:PBD,
author = "Christoph Fehling and Frank Leymann and Jochen
R{\"u}tschlin and David Schumm",
title = "Pattern-Based Development and Management of Cloud
Applications",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "110--141",
day = "15",
month = feb,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010110",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/110",
abstract = "Cloud-based applications require a high degree of
automation regarding their IT resource management, for
example, to handle scalability or resource failures.
This automation is enabled by cloud providers offering
management interfaces accessed by applications without
human interaction. The properties of clouds, especially
pay-per-use billing and low availability of individual
resources, demand such a timely system management. We
call the automated steps to perform one of these
management tasks a ``management flow''. Because the
emerging behavior of the overall system is comprised of
many such management flows and is often hard to
predict, we propose defining abstract management flows,
describing common steps handling the management tasks.
These abstract management flows may then be refined for
each individual use case. We cover abstract management
flows describing how to make an application elastic,
resilient regarding IT resource failure, and how to
move application components between different runtime
environments. The requirements of these management
flows for handled applications are expressed using
architectural patterns that have to be implemented by
the applications. These dependencies result in abstract
management flows being interrelated with architectural
patterns in a uniform pattern catalog. We propose a
method by use of a catalog to guide application
managers during the refinement of abstract management
flows at the design stage of an application. Following
this method, runtime-specific management functionality
and management interfaces are used to obtain automated
management flows for a developed application.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Web Services.",
}
@Article{Bunting:2012:PAE,
author = "Ben S. {Bunting, Jr.} and Jacob Hughes and Tim
Hetland",
title = "The Player as Author: Exploring the Effects of Mobile
Gaming and the Location-Aware Interface on
Storytelling",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "142--160",
day = "17",
month = feb,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010142",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/142",
abstract = "The mobile internet expands the immersive potential of
storytelling by introducing electronic games powered by
portable, location-aware interfaces. Mobile gaming has
become the latest iteration in a decades-long evolution
of electronic games that seek to empower the player not
just as an avatar in a gameworld but also as a
co-author of that gameworld, alongside the game's
original designers. Location-aware interfaces allow
players to implicate places in the physical world as
part of their gameworld (and vice versa) for the first
time. In addition to empowering the player as a
co-author in the process of constructing a compelling
gameworld, then, mobile games eschew linear narrative
structures in favor of a cooperative storytelling
process that is reliant in part on the player's
experience of place. While such an author-player
``worldmaking'' approach to storytelling is not new,
mobile games evolve the process beyond what has yet
been possible within the technical and physical
constraints of the traditional video gaming format.
Location-aware interfaces allow mobile games to extend
the worldmaking process beyond the screen and into the
physical world, co-opting the player's sensory
experiences of real-world places as potential
storytelling tools. In our essay, we theorize the
unique storytelling potential of mobile games while
describing our experience attempting to harness that
potential through the design and implementation of our
hybrid-reality game University of Death.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Social Transformations from the Mobile
Internet.",
}
@Article{Oie:2012:SNU,
author = "Kjetil Vaage {\O}ie",
title = "Sensing the News: User Experiences when Reading
Locative News",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "161--178",
day = "21",
month = feb,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010161",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/161",
abstract = "This article focuses on user experiences on reading
location-aware news on the mobile platform and aims to
explore what experiences this kind of locative
journalism generates and how such experiences change
the users' social interaction with news. We produced a
specially designed mobile application and tailored news
stories specific to this project called LocaNews in
order to explore participants' relation to the content
in this journalistic format. The result is generated
through a field study and a questionnaire of 32 people
to find out how they experience the news presented in
this format. The user participants' responses are
analyzed based on their news experiences,
contextualizing places and their social interaction
with the news within this form of journalism. Results
showed that the local, semi-local and non-local user
approaches the locative news in a different manner, but
that the average user found this kind of news more
interesting and more informative than ordinary news.
The participants also have a problem identifying this
as journalism, rather than an information service.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Social Transformations from the Mobile
Internet.",
}
@Article{Sorschag:2012:FOI,
author = "Robert Sorschag",
title = "A Flexible Object-of-Interest Annotation Framework for
Online Video Portals",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "179--215",
day = "22",
month = feb,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010179",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/179",
abstract = "In this work, we address the use of object recognition
techniques to annotate what is shown where in online
video collections. These annotations are suitable to
retrieve specific video scenes for object related text
queries which is not possible with the manually
generated metadata that is used by current portals. We
are not the first to present object annotations that
are generated with content-based analysis methods.
However, the proposed framework possesses some
outstanding features that offer good prospects for its
application in real video portals. Firstly, it can be
easily used as background module in any video
environment. Secondly, it is not based on a fixed
analysis chain but on an extensive recognition
infrastructure that can be used with all kinds of
visual features, matching and machine learning
techniques. New recognition approaches can be
integrated into this infrastructure with low
development costs and a configuration of the used
recognition approaches can be performed even on a
running system. Thus, this framework might also benefit
from future advances in computer vision. Thirdly, we
present an automatic selection approach to support the
use of different recognition strategies for different
objects. Last but not least, visual analysis can be
performed efficiently on distributed, multi-processor
environments and a database schema is presented to
store the resulting video annotations as well as the
off-line generated low-level features in a compact
form. We achieve promising results in an annotation
case study and the instance search task of the TRECVID
2011 challenge.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Visual Information Retrieval.",
}
@Article{Exter:2012:UWT,
author = "Kristin Den Exter and Stephen Rowe and William Boyd
and David Lloyd",
title = "Using {Web 2.0} Technologies for Collaborative
Learning in Distance Education-Case Studies from an
{Australian} {University}",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "216--237",
day = "07",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010216",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/216",
abstract = "This paper explores the use of Web 2.0 technologies
for collaborative learning in a higher education
context. A review of the literature exploring the
strengths and weaknesses of Web 2.0 technology is
presented, and a conceptual model of a Web 2.0
community of inquiry is introduced. Two Australian case
studies are described, with an ex-poste evaluation of
the use of Web 2.0 tools. Conclusions are drawn as to
the potential for the use of Web 2.0 tools for
collaborative e-learning in higher education. In
particular, design and integration of Web 2.0 tools
should be closely related to curriculum intent and
pedagogical requirements, care must be taken to provide
clear guidance on both expected student activity and
learning expectations, and there is a clear need to
develop, support and encourage strong interaction both
between teachers and students, and amongst the students
themselves.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Martin:2012:RW,
author = "Ludger Martin and Thomas Gottron",
title = "Readability and the {Web}",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "238--252",
day = "12",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010238",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/238",
abstract = "Readability indices measure how easy or difficult it
is to read and comprehend a text. In this paper we look
at the relation between readability indices and web
documents from two different perspectives. On the one
hand we analyse how to reliably measure the readability
of web documents by applying content extraction
techniques and incorporating a bias correction. On the
other hand we investigate how web based corpus
statistics can be used to measure readability in a
novel and language independent way.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from ITA 11.",
}
@Article{Garside:2012:SMS,
author = "Debbie Garside and Arjun Ponnusamy and Steve Chan and
Richard Picking",
title = "Secure Military Social Networking and Rapid
Sensemaking in Domain Specific Concept Systems:
Research Issues and Future Solutions",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "253--264",
day = "12",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010253",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/253",
abstract = "This paper identifies the need for a secure military
social networking site and the underlying research
issues linked to the successful development of such
sites. The paper further proposes a solution to the
most basic issues by identifying and tackling known
potential security threats to military personnel and
their families. The paper further defines the base
platform for this development to facilitate rapid
sensemaking to inform critical communications and rapid
decision making processes during abrupt governance and
eco-system change, and how the plethora of information
(termed as Big Data) on social networking sites can be
analysed and harnessed. Underlying architectural
issues, efficiency and complexity are explored and
their future development is considered.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from ITA 11.",
}
@Article{Roche:2012:WBC,
author = "St{\'e}phane Roche and Boris Mericskay and Wided
Batita and Matthieu Bach and Mathieu Rondeau",
title = "{WikiGIS} Basic Concepts: {Web 2.0} for Geospatial
Collaboration",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "265--284",
day = "13",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010265",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/265",
abstract = "With the emergence of Web 2.0, new applications arise
and evolve into more interactive forms of collective
intelligence. These applications offer to both
professionals and citizens an open and expanded access
to geographic information. In this paper, we develop
the conceptual foundations of a new technology solution
called WikiGIS. WikiGIS's strength lies in its ability
to ensure the traceability of changes in
spatial-temporal geographic components (geometric
location and shape, graphics: iconography and
descriptive) generated by users. The final use case
highlights to what extent WikiGIS could be a relevant
and useful technological innovation in
Geocollaboration.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Mooney:2012:CHE,
author = "Peter Mooney and Padraig Corcoran",
title = "Characteristics of Heavily Edited Objects in
{OpenStreetMap}",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "285--305",
day = "20",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010285",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/285",
abstract = "This paper describes the results of an analysis of the
OpenStreetMap (OSM) database for the United Kingdom
(UK) and Ireland (correct to April 2011). 15, 640 OSM
ways (polygons and polylines), resulting in 316, 949
unique versions of these objects, were extracted and
analysed from the OSM database for the UK and Ireland.
In our analysis we only considered ``heavily edited''
objects in OSM: objects which have been edited 15 or
more times. Our results show that there is no strong
relationship between increasing numbers of contributors
to a given object and the number of tags (metadata)
assigned to it. 87\% of contributions/edits to these
objects are performed by 11\% of the total 4128
contributors. In 79\% of edits additional spatial data
(nodes) are added to objects. The results in this paper
do not attempt to evaluate the OSM data as good/poor
quality but rather informs potential consumers of OSM
data that the data itself is changing over time. In
developing a better understanding of the
characteristics of ``heavily edited'' objects there may
be opportunities to use historical analysis in working
towards quality indicators for OSM in the future.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Goggin:2012:DIM,
author = "Gerard Goggin",
title = "Driving the {Internet}: Mobile {Internets}, Cars, and
the Social",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "306--321",
day = "20",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010306",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/306",
abstract = "This paper looks at the tandem technologies of cars
and the Internet, and the new ways that they are
assembling the social with the mobile Internet. My
argument is two-fold: firstly, the advent of mobile
Internet in cars brings together new, widely divergent
trajectories of Internet; secondly, such developments
have social implications that vary widely depending on
whether or not we recognize the broader technological
systems and infrastructures, media practices, flows,
and mobilities in which vehicular mobile Internets are
being created.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Social Transformations from the Mobile
Internet.",
}
@Article{Nguyen:2012:BAS,
author = "Dinh Khoa Nguyen and Francesco Lelli and Mike P.
Papazoglou and Willem-Jan {Van den Heuvel}",
title = "Blueprinting Approach in Support of Cloud Computing",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "322--346",
day = "21",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010322",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/322",
abstract = "Current cloud service offerings, i.e.,
Software-as-a-service (SaaS), Platform-as-a-service
(PaaS) and Infrastructure-as-a-service (IaaS) offerings
are often provided as monolithic, one-size-fits-all
solutions and give little or no room for customization.
This limits the ability of Service-based Application
(SBA) developers to configure and syndicate offerings
from multiple SaaS, PaaS, and IaaS providers to address
their application requirements. Furthermore, combining
different independent cloud services necessitates a
uniform description format that facilitates the design,
customization, and composition. Cloud Blueprinting is a
novel approach that allows SBA developers to easily
design, configure and deploy virtual SBA payloads on
virtual machines and resource pools on the cloud. We
propose the Blueprint concept as a uniform abstract
description for cloud service offerings that may cross
different cloud computing layers, i.e., SaaS, PaaS and
IaaS. To support developers with the SBA design and
development in the cloud, this paper introduces a
formal Blueprint Template for unambiguously describing
a blueprint, as well as a Blueprint Lifecycle that
guides developers through the manipulation, composition
and deployment of different blueprints for an SBA.
Finally, the empirical evaluation of the blueprinting
approach within an EC's FP7 project is reported and an
associated blueprint prototype implementation is
presented.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Web Services.",
}
@Article{Hanzl:2012:HGU,
author = "Ma{\l}gorzata Hanzl and Karol Dzik and Paulina
Kowalczyk and Krystian Kwieci{\'n}ski and Ewa
Stankiewicz and Agata L. Wierzbicka",
title = "Human Geomatics in Urban Design-Two Case Studies",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "1",
pages = "347--361",
day = "22",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4010347",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/1/347",
abstract = "The mapping of different aspects of urban phenomena
and their relation to the physical cityscape has been
greatly extended by the use of geomatics. The tradition
to base reasoning on ` understanding the world ' dates
from the time of Aristotle. The extension plan for
Barcelona (Eixample), developed by Cerd{\`a}, which
opened the era of modern urban planning, was preceded
by analyses of rich data, describing both detailed
demographic issues and physical structures. The
contemporary, postmodernist city planning continues
this tradition, although a shift towards analyses of
more human-related issues can be observed, covering,
inter alia, citizens' perception, cultural differences
and patterns of human activities with regard to
distinct social groups. The change towards a more
human-related perspective and the inclusion of urban
morphology analyses are direct consequences of this
trend. The required data may be gathered within a
crowd-sourcing participation process. According to
communicative planning theory, communication with the
wider public is indispensable in order to achieve the
best results, and can be realized with the use of
sophisticated IT tools. Evidence-based reasoning may be
supported by images of significant aesthetic values,
which inspire immediate reactions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Nilsen:2012:CBP,
author = "Line Lundvoll Nilsen",
title = "Collaboration between Professionals: The Use of
Videoconferencing for Delivering E-Health",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "362--371",
day = "02",
month = apr,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020362",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/362",
abstract = "This article explores the ways in which collaboration
between professionals using videoconferencing affects
the e-health delivered to patients. In Norway, general
practitioners (GPs) and specialists routinely hold
videoconferences. Observations of 42 VC meetings, each
lasting from 5 to 40 min, were analysed in terms of the
interactions. In addition, five semi-structured,
face-to-face interviews were conducted, each lasting
from 20 to 70 minutes. Statements were selected to
illustrate the content of the interactions and how
collaborative work affects the delivery of healthcare.
Successful collaborative work provides practitioners
with a new way of thinking: exchanging information and
knowledge between levels of care in order to provide
the best treatment for patients locally. The regularity
makes the collaborative work a two-way achievement. GPs
receive decision support and second opinions, and
specialists receive information and opportunities to
follow up. How the professionals manage their work
(i.e., collaborating) may benefit their patients. The
regular use of videoconferencing will furnish
professionals with enhanced resources for the meeting
of patients' demands in the future. Regularly informing
one another and exchanging knowledge, benefits the
professionals by providing increased certainty with
regard to their medical decisions, and it benefits the
patients because they will feel satisfied with the
competence of the specialists where they live.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future e-Health.",
}
@Article{Kennedy:2012:SAP,
author = "Sean Kennedy and Owen Molloy and Robert Stewart and
Paul Jacob and Maria Maleshkova and Frank Doheny",
title = "A Semantically Automated Protocol Adapter for Mapping
{SOAP} {Web} Services to {RESTful} {HTTP} Format to
Enable the {Web} Infrastructure, Enhance {Web} Service
Interoperability and Ease {Web} Service Migration",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "372--395",
day = "11",
month = apr,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020372",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/372",
abstract = "Semantic Web Services (SWS) are Web Service (WS)
descriptions augmented with semantic information. SWS
enable intelligent reasoning and automation in areas
such as service discovery, composition, mediation,
ranking and invocation. This paper applies SWS to a
previous protocol adapter which, operating within
clearly defined constraints, maps SOAP Web Services to
RESTful HTTP format. However, in the previous adapter,
the configuration element is manual and the latency
implications are locally based. This paper applies SWS
technologies to automate the configuration element and
the latency tests are conducted in a more realistic
Internet based setting.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from ITA 11.",
}
@Article{Zafiropoulos:2012:BCC,
author = "Kostas Zafiropoulos and Vasiliki Vrana and Dimitrios
Vagianos",
title = "Bloggers' Community Characteristics and Influence
within {Greek} Political Blogosphere",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "396--412",
day = "19",
month = apr,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020396",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/396",
abstract = "This paper investigates the properties of central or
core political blogs. They can be located as clusters
of blogs whose members have many incoming links. Other
blogs form clouds around them in the sense that they
link the core blogs. A case study records Greek
political blogs and their incoming links reported
through their blogrolls. The adjacency matrix from the
blogs' social network is analyzed and clusters are
located. Three of them, those with the larger numbers
of incoming links, may be considered to be central.
Next, four measures of influence are used to test the
influence of the central blogs. The findings suggest
that there are many kinds of central blogs, influential
and non-influential, and high influence does not always
involve high hyperlinking.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Government 2.0.",
}
@Article{Davies:2012:PEA,
author = "John N. Davies and Paul Comerford and Vic Grout",
title = "Principles of Eliminating Access Control Lists within
a Domain",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "413--429",
day = "19",
month = apr,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020413",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/413",
abstract = "The infrastructure of large networks is broken down
into areas that have a common security policy called a
domain. Security within a domain is commonly
implemented at all nodes. However this can have a
negative effect on performance since it introduces a
delay associated with packet filtering. When Access
Control Lists (ACLs) are used within a router for this
purpose then a significant overhead is introduced
associated with this process. It is likely that
identical checks are made at multiple points within a
domain prior to a packet reaching its destination.
Therefore by eliminating ACLs within a domain by
modifying the ingress/egress points with equivalent
functionality an improvement in the overall performance
can be obtained. This paper considers the effect of the
delays when using router operating systems offering
different levels of functionality. It considers factors
which contribute to the delay particularly due to ACLs
and by using theoretical principles modified by
practical calculation a model is created. Additionally
this paper provides an example of an optimized solution
which reduces the delay through network routers by
distributing the security rules to the ingress/egress
points of the domain without affecting the security
policy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from ITA 11.",
}
@Article{Fernandez:2012:SPW,
author = "Eduardo B. Fernandez and Ola Ajaj and Ingrid Buckley
and Nelly Delessy-Gassant and Keiko Hashizume and Maria
M. Larrondo-Petrie",
title = "A Survey of Patterns for {Web} Services Security and
Reliability Standards",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "430--450",
day = "20",
month = apr,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020430",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/430",
abstract = "An important aspect for the acceptance of
Service-Oriented Architectures is having convenient
ways to help designers build secure applications.
Numerous standards define ways to apply security in web
services. However, these standards are rather complex
and sometimes overlap, which makes them hard to use and
may produce inconsistencies. Representing them as
patterns makes them easier to understand, to compare to
other patterns, to discover inconsistencies, and to use
them to build secure web services applications.
Security patterns abstract the key aspects of a
security mechanism and can thus be applied by
non-experts. We survey here our work on security
patterns for web services and their standards and we
put them in perspective with respect to each other and
to more fundamental patterns. We also consider other
patterns for web services security. All the patterns
described here have been previously published, we only
show here one of them in detail as an illustration of
our style for writing patterns. Our main purpose here
is to enumerate them, show their use, and show how they
relate to each other.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Web Services.",
}
@Article{Pollino:2012:COS,
author = "Maurizio Pollino and Grazia Fattoruso and Luigi {La
Porta} and Antonio Bruno {Della Rocca} and Valentina
James",
title = "Collaborative Open Source Geospatial Tools and Maps
Supporting the Response Planning to Disastrous
Earthquake Events",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "451--468",
day = "07",
month = may,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020451",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/gnu.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/451",
abstract = "The latest improvements in geo-informatics offer new
opportunities in a wide range of territorial and
environmental applications. In this general framework,
a relevant issue is represented by earthquake early
warning and emergency management. This research work
presents the investigation and development of a simple
and innovative geospatial methodology and related
collaborative open source geospatial tools for
predicting and mapping the vulnerability to seismic
hazard in order to support the response planning to
disastrous events. The proposed geospatial methodology
and tools have been integrated into an open source
collaborative GIS system, designed and developed as an
integrated component of an earthquake early warning and
emergency management system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Rosado:2012:SAM,
author = "David G. Rosado and Rafael G{\'o}mez and Daniel
Mellado and Eduardo Fern{\'a}ndez-Medina",
title = "Security Analysis in the Migration to Cloud
Environments",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "469--487",
day = "08",
month = may,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020469",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/469",
abstract = "Cloud computing is a new paradigm that combines
several computing concepts and technologies of the
Internet creating a platform for more agile and
cost-effective business applications and IT
infrastructure. The adoption of Cloud computing has
been increasing for some time and the maturity of the
market is steadily growing. Security is the question
most consistently raised as consumers look to move
their data and applications to the cloud. We justify
the importance and motivation of security in the
migration of legacy systems and we carry out an
analysis of different approaches related to security in
migration processes to cloud with the aim of finding
the needs, concerns, requirements, aspects,
opportunities and benefits of security in the migration
process of legacy systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Web Services.",
}
@Article{Muller:2012:DPM,
author = "Sebastian M{\"u}ller and Franziska Brecht and Benjamin
Fabian and Steffen Kunz and Dominik Kunze",
title = "Distributed Performance Measurement and Usability
Assessment of the {Tor} Anonymization Network",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "488--513",
day = "15",
month = may,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020488",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/488",
abstract = "While the Internet increasingly permeates everyday
life of individuals around the world, it becomes
crucial to prevent unauthorized collection and abuse of
personalized information. Internet anonymization
software such as Tor is an important instrument to
protect online privacy. However, due to the performance
overhead caused by Tor, many Internet users refrain
from using it. This causes a negative impact on the
overall privacy provided by Tor, since it depends on
the size of the user community and availability of
shared resources. Detailed measurements about the
performance of Tor are crucial for solving this issue.
This paper presents comparative experiments on Tor
latency and throughput for surfing to 500 popular
websites from several locations around the world during
the period of 28 days. Furthermore, we compare these
measurements to critical latency thresholds gathered
from web usability research, including our own user
studies. Our results indicate that without massive
future optimizations of Tor performance, it is unlikely
that a larger part of Internet users would adopt it for
everyday usage. This leads to fewer resources available
to the Tor community than theoretically possible, and
increases the exposure of privacy-concerned
individuals. Furthermore, this could lead to an
adoption barrier of similar privacy-enhancing
technologies for a Future Internet.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Privacy in the Future Internet.",
}
@Article{Nordfeldt:2012:YPV,
author = "Sam Nordfeldt and Carina Berter{\"o}",
title = "Young Patients' Views on the Open {Web 2.0} Childhood
Diabetes Patient Portal: a Qualitative Study",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "514--527",
day = "18",
month = may,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020514",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/514",
abstract = "Little is known about the views of young patients
themselves on interactive Web portal services provided
by pediatric practitioners. We aimed to explore their
perceptions of a real-world diabetes portal that offers
facts and contact with peers and practitioners; e.g.,
discussion forums, blog tools, self-care and treatment
information, research updates and news from local
practitioners. Twelve young patients (ages 12-21,
median 15 years), one boyfriend, 7 mothers and one
father each wrote an essay on their experience from use
of the portal. Their essays underwent qualitative
content analysis. A major theme was ``Helping and
facilitating daily life with diabetes'', the portal was
perceived as a place where contents are interesting,
inspiring and may trigger users' curiosity. There were
three subthemes; ``Ease of use in my everyday life,''
which includes the perception that the portal was
perceived as smooth and easy to enter and navigate
whenever needed; that information was easy to
understand for different groups of users. ``Support via
an exchange of experience,'' includes the ability to
contact peers being regarded advantageous. Some said
that just reading others' experiences can be helpful in
terms of persevering; children could find peers in the
same age group. ``Evidence based information,''
includes the perception of the portal being a useful
and trustworthy source of facts on e.g., physical
activity, blood glucose, medical devices, emotional
wellbeing, food and nutrition, and other aspects that
impact living with diabetes. Young users expressed
positive perceptions towards the interactive web
portal. Such services seem to have great potential for
supporting young patients and significant others -
intergrading for confidence.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future e-Health.",
}
@Article{Zafiropoulos:2012:AAG,
author = "Kostas Zafiropoulos and Ioannis Karavasilis and
Vasiliki Vrana",
title = "Assessing the Adoption of e-Government Services by
Teachers in {Greece}",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "528--544",
day = "21",
month = may,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020528",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/528",
abstract = "Technological developments and governments'
understanding of what citizens need usually determine
the design of public online services. For successful
implementation of e-Government services, governments
have to place the user in the center of future
developments, understand what citizens need and measure
what increases citizens' willingness to adopt
e-government services. The paper uses the Technology
Acceptance Model (TAM), the extended TAM, the Diffusion
of Innovations (DOI) theory and the important
determinants of user acceptance perceived risk and
trust, in order to describe teachers' behavioral
intensions to adopt e-Government services. A model
containing trust and risk, along with cognitive, social
and intrinsic factors is used to study the intentions
of e-Government use by Greek primary and secondary
education teachers. Two hundred and thirty teachers
responded to an online survey. Findings reveal that
cognitive and intrinsic factors have significant
effects on intentions to use e-Government websites.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Farman:2012:IST,
author = "Jason Farman",
title = "Introduction to the Social Transformations from the
Mobile {Internet} Special Issue",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "545--550",
day = "23",
month = may,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020545",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/545",
abstract = "The social transformations brought about by the mobile
internet are extensive. In discussing the broad range
of these transformations-positioned as a shift from
personal computing to pervasive computing-this
editorial elaborates on the key contributions addressed
by the articles in this special issue of Future
Internet. These articles touch on topics such as the
digital divide, the role of the mobile internet in
revolutions like the Arab Spring and the Occupy Wall
Street movement, the development of site-specific and
context-aware news, the incorporation of the internet
into existing technologies like the automobile, and the
utilization of the mobile internet to transform
everyday spaces into game spaces.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Social Transformations from the Mobile
Internet.",
}
@Article{Newell:2012:CSC,
author = "David A. Newell and Margaret M. Pembroke and William
E. Boyd",
title = "Crowd Sourcing for Conservation: {Web 2.0} a Powerful
Tool for Biologists",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "551--562",
day = "24",
month = may,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020551",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/551",
abstract = "The advent and adoption of Web 2.0 technologies offers
a powerful approach to enhancing the capture of
information in natural resource ecology, notably
community knowledge of species distributions. Such
information has previously been collected using, for
example, postal surveys; these are typically
inefficient, with low response rates, high costs, and
requiring respondents to be spatially literate. Here we
describe an example, using the Google Maps Application
Programming Interface, to discuss the opportunities
such tools provide to conservation biology. Toad
Tracker was created as a prototype to demonstrate the
utility of this technology to document the distribution
of an invasive vertebrate pest species, the cane toad,
within Australia. While the technological aspects of
this tool are satisfactory, manager resistance towards
its use raises issues around the public nature of the
technology, the collaborative (non-expert) role in data
collection, and data ownership. We conclude in
suggesting that, for such tools to be accepted by
non-innovation adopters, work is required on both the
technological aspects and, importantly, a cultural
change is required to create an environment of
acceptance of the shifting relationship between
authority, expertise and knowledge.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Rotondo:2012:UCP,
author = "Francesco Rotondo",
title = "The {U-City} Paradigm: Opportunities and Risks for
E-Democracy in Collaborative Planning",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "563--574",
day = "05",
month = jun,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020563",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/563",
abstract = "Volunteered Geographic Information (VGI) tools appear
to enhance the possibilities offered by a collaborative
approach to planning. The present paper analyzes both
the results of experiences of the author and of those
available in the literature, highlighting possible
advantages and disadvantages. After a brief
introduction to the meaning of e-democracy, the second
part focuses on the role of ICT in collaborative
planning, proceeding in the third part to an
illustration of an initial panorama of knowledge
gathered using ICT in such processes, while discussing
criticisms and opportunities. The fourth part discusses
the U-city paradigm as a driver of change in urban
planning participation processes. Research perspectives
are then outlined in the final part.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Goetz:2012:UCI,
author = "Marcus Goetz",
title = "Using Crowdsourced Indoor Geodata for the Creation of
a Three-Dimensional Indoor Routing {Web} Application",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "575--591",
day = "06",
month = jun,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020575",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/575",
abstract = "Routing services for outdoor areas are omnipresent and
also three-dimensional (3D) visualization is quite
common within this area. Recent research efforts are
now trying to adapt well known outdoor routing services
to complex indoor environments. However, most of the
current indoor routing systems only focus on
two-dimensional visualization, thus only one level can
be depicted. Especially multi-level routes therefore
lack visualization. Also, most of the (few) existing 3D
indoor routing services utilize proprietary software or
plugins, thus a widespread accessibility for those
services by using common computers or mobile devices is
not feasible. Therefore this paper describes the
development of a web-based 3D routing system based on a
new HTML extension. The visualization of rooms as well
as the computed routes is realized with XML3D. Since
this emerging technology is based on WebGL and will
likely be integrated into the HTML5 standard, the
developed system is already compatible with most common
browsers such as Google Chrome or Firefox. Another key
difference of the approach presented in this paper is
that all utilized data is actually crowdsourced geodata
from OpenStreetMap (OSM). Such data is collaboratively
collected by both amateurs and professionals and can be
used at no charge under the Open Data Commons Open
Database License (ODbL). Our research combines
user-generated geo content of the Web 2.0 with future
Internet technology for the provision of a ubiquitously
accessible 3D indoor routing application.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Garau:2012:FCP,
author = "Chiara Garau",
title = "Focus on Citizens: Public Engagement with Online and
Face-to-Face Participation --- a Case Study",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "592--606",
day = "15",
month = jun,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020592",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/592",
abstract = "The main objective of this paper is to focus on how an
integrated system based on Information Communication
Technology (ICT) and face-to-face communication can
increase participation in order to have a positive
effect on quality of life, plans and decisions, and to
discuss the many benefits which web-based public
participation can bring to the planning process through
a set of improvements to relations, quality and
structure of cities in general and in this case example
specifically. With the development of a transparent
support system for collaborative decision-making
processes, it is possible to identify a strategy for
addressing gaps to reach collaborative decisions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning.",
}
@Article{Le:2012:SHO,
author = "Quynh L{\^e} and Hoang Boi Nguyen and Tony Barnett",
title = "Smart Homes for Older People: Positive Aging in a
Digital World",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "2",
pages = "607--617",
day = "19",
month = jun,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4020607",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/2/607",
abstract = "Smart homes are homes with technologically advanced
systems to enable domestic task automation, easier
communication, and higher security. As an enabler of
health and well-being enhancement, smart homes have
been geared to accommodate people with special needs,
especially older people. This paper examines the
concept of ``smart home'' in a technologically driven
society and its multi-functional contribution to the
enhancement of older people's lives. Discussion then
focuses on the challenges in the use of smart homes
among older people such as accessibility and ethical
issues. Finally, some implications and recommendations
are provided.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future e-Health.",
}
@Article{Fernandez:2012:ISI,
author = "Eduardo B. Fernandez",
title = "Introduction to the Special Issue on Recent Advances
in {Web} Services",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "618--620",
day = "27",
month = jun,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030618",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/618",
abstract = "We have collected five papers describing different
aspects of web services and cloud computing. Cloud
computing is the next stage of application
interoperability and it is a logical extension of web
services, both approaches being a variety of
Service-Oriented Architecture. The papers cover
security, migration, certification, and application
development. Together, these papers provide a useful
panorama of some of the issues of these two
technologies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Web Services.",
}
@Article{AbuKhousa:2012:HCO,
author = "Eman AbuKhousa and Nader Mohamed and Jameela
Al-Jaroodi",
title = "e-Health Cloud: Opportunities and Challenges",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "621--645",
day = "04",
month = jul,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030621",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/621",
abstract = "As the costs of healthcare services rise and
healthcare professionals are becoming scarce and hard
to find, it is imminent that healthcare organizations
consider adopting health information technology (HIT)
systems. HIT allows health organizations to streamline
many of their processes and provide services in a more
efficient and cost-effective manner. The latest
technological trends such as Cloud Computing (CC)
provide a strong infrastructure and offer a true
enabler for HIT services over the Internet. This can be
achieved on a pay-as-you-use model of the ``e-Health
Cloud'' to help the healthcare industry cope with
current and future demands yet keeping their costs to a
minimum. Despite its great potential, HIT as a CC model
has not been addressed extensively in the literature.
There are no apparent frameworks which clearly
encompass all viable schemes and interrelationships
between HIT and CC. Therefore, analyzing and comparing
the effectiveness of such schemes is important. In this
paper we introduce the concept of ``e-Health Cloud''
highlighting many of its constituents and proposing
building an e-health environment and elucidating many
of the challenges confronting the success of the
e-Health Cloud. We will also discuss different possible
solutions to address challenges such as security and
privacy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future e-Health.",
}
@Article{Yerima:2012:AMB,
author = "Suleiman Y. Yerima and Gerard P. Parr and Sally I.
McClean and Philip J. Morrow",
title = "Adaptive Measurement-Based Policy-Driven {QoS}
Management with Fuzzy-Rule-based Resource Allocation",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "646--671",
day = "04",
month = jul,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030646",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/java2010.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/646",
abstract = "Fixed and wireless networks are increasingly
converging towards common connectivity with IP-based
core networks. Providing effective end-to-end resource
and QoS management in such complex heterogeneous
converged network scenarios requires unified, adaptive
and scalable solutions to integrate and co-ordinate
diverse QoS mechanisms of different access technologies
with IP-based QoS. Policy-Based Network Management
(PBNM) is one approach that could be employed to
address this challenge. Hence, a policy-based framework
for end-to-end QoS management in converged networks,
CNQF (Converged Networks QoS Management Framework) has
been proposed within our project. In this paper, the
CNQF architecture, a Java implementation of its
prototype and experimental validation of key elements
are discussed. We then present a fuzzy-based CNQF
resource management approach and study the performance
of our implementation with real traffic flows on an
experimental testbed. The results demonstrate the
efficacy of our resource-adaptive approach for
practical PBNM systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from ITA 11.",
}
@Article{Denning:2012:SWC,
author = "Dorothy E. Denning",
title = "{Stuxnet}: What Has Changed?",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "672--687",
day = "16",
month = jul,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030672",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/672",
abstract = "This paper considers the impact of Stuxnet on
cyber-attacks and cyber-defense. It first reviews
trends in cyber-weapons and how Stuxnet fits into these
trends. Because Stuxnet targeted an industrial control
system in order to wreak physical damage, the focus is
on weapons that target systems of that type and produce
physical effects. The paper then examines the impact of
Stuxnet on various domains of action where
cyber-attacks play a role, including state-level
conflict, terrorism, activism, crime, and pranks. For
each domain, it considers the potential for new types
of cyber-attacks, especially attacks against industrial
control systems, and whether such attacks would be
consistent with other trends in the domain. Finally,
the paper considers the impact of Stuxnet on
cyber-defense.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Aftermath of Stuxnet.",
}
@Article{Nilsen:2012:TPV,
author = "Line Lundvoll Nilsen and Terje Solvoll",
title = "Traditional Practice vs. New Tools and Routines in
Stroke Treatment",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "688--699",
day = "06",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030688",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/688",
abstract = "In Norway, it is a national goal to provide more
patients with thrombolytic treatment. A referring
hospital and a specialist hospital have implemented
videoconferencing (VC) equipment to share knowledge and
discuss stroke patients, regarding thrombolytic
treatment. VC has only been used four times within the
19 months that the service has been available. The
objective in this article is to increase the
understanding of the contradiction between the need for
knowledge-sharing through VC technology, as well as the
reasons for low frequency of use when discussing stroke
patients. Semi-structured interviews were conducted
with 13 professionals. The results illustrate how the
technology per se is not the reason for the low
frequency use. Health care is shaped by behavior,
traditional rules, standards and division of labor. By
using cultural historical activity theory (CHAT) as a
framework, we illustrate the importance of
understanding the historic way of performing an
activity to be able to expand the treatment activity in
the future.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future e-Health.",
}
@Article{Prandini:2012:RRA,
author = "Marco Prandini and Marco Ramilli",
title = "Raising Risk Awareness on the Adoption of {Web 2.0}
Technologies in Decision Making Processes",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "700--718",
day = "09",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030700",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/700",
abstract = "In the recent past, the so-called ``Web 2.0'' became a
powerful tool for decision making processes.
Politicians and managers, seeking to improve
participation, embraced this technology as if it simply
were a new, enhanced version of the WorldWideWeb,
better suited to retrieve information, opinions and
feedbacks from the general public on subjects like
laws, acts and policies. This approach was often naive,
neglecting the less-obvious aspects of the technology,
and thus bringing on significant security problems.
This paper shows how, in the end, the result could
easily be the opposite of what was desired. Malicious
attackers, in fact, could quite easily exploit the
vulnerabilities in these systems to hijack the process
and lead to wrong decisions, also causing the public to
lose trust in the systems themselves.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Government 2.0.",
}
@Article{Zafiropoulos:2012:CPA,
author = "Kostas Zafiropoulos",
title = "Connectivity Practices and Activity of {Greek}
Political Blogs",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "719--736",
day = "14",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030719",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/719",
abstract = "This paper uses Social Network Analysis indexes to
study Greek political blogs. The indexes describe
bloggers' community recommendations, centrality and
bloggers' attempt to form spheres of influence. Five
Social Network Analysis indexes are used: incoming
links, normalized betweenness, outgoing links, number
of 1-cliques a blog belongs to, and size of blog's
ego-network. By recording 127 Greek political blogs,
the paper finds that there are two distinct blog
performance properties regarding connectivity: Only a
few blogs serve as authority blogs having many incoming
links and centrality, while a few others try to expand
their influence territory by having many outgoing links
and forming larger 1-cliques and ego-networks. Next,
the paper associates the proposed indexes with blogs'
and users' community activity. Authority blogs present
high blog activity and users' community activity, as
well. These are recorded by large numbers of posts and
comments to the blog posts, respectively. It is shown
that blogs, which strive to expand their network by
using many outgoing links are more likely to link to
the authority blogs. Content analysis reveals that
authority blogs provide news and information and
promote discussion to a much higher degree compared to
the overall Greek political blogosphere.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Loskyll:2012:CBO,
author = "Matthias Loskyll and Ines Heck and Jochen Schlick and
Michael Schwarz",
title = "Context-Based Orchestration for Control of
Resource-Efficient Manufacturing Processes",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "737--761",
day = "14",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030737",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/737",
abstract = "The increasing competition between manufacturers, the
shortening of innovation cycles and the growing
importance of resource-efficient manufacturing demand a
higher versatility of factory automation.
Service-oriented approaches depict a promising
possibility to realize new control architectures by
encapsulating the functionality of mechatronic devices
into services. An efficient discovery, context-based
selection and dynamic orchestration of these services
are the key features for the creation of highly
adaptable manufacturing processes. We describe a
semantic service discovery and ad-hoc orchestration
system, which is able to react to new process variants
and changed contextual information (e.g., failure of
field devices, requirements on the consumption of
resources). Because a standardized vocabulary,
especially for the description of mechatronic
functionalities, is still missing in the manufacturing
domain, the semantic description of services, processes
and manufacturing plants as well as the semantic
interpretation of contextual information play an
important part.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Interoperability and Knowledge
Building.",
}
@Article{Subirats:2012:KRP,
author = "Laia Subirats and Luigi Ceccaroni and Felip Miralles",
title = "Knowledge Representation for Prognosis of Health
Status in Rehabilitation",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "762--775",
day = "20",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030762",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/762",
abstract = "In this article, key points are discussed concerning
knowledge representation for clinical decision support
systems in the domain of physical medicine and
rehabilitation. Information models, classifications and
terminologies, such as the ``virtual medical record''
(vMR), the ``international classification of
functioning, disability and health'' (ICF), the
``international classification of diseases'' (ICD) and
the ``systematized nomenclature of medicine-clinical
terms'' (SNOMED CT), are used for knowledge integration
and reasoning. A system is described that supports the
measuring of functioning status, diversity, prognosis
and similarity between patients in the post-acute
stage, thus helping health professionals' prescription
of recommendations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future e-Health.",
}
@Article{Stojmenova:2012:AUC,
author = "Emilija Stojmenova and Bojan Imperl and Tomaz Zohar
and Dejan Dinevski",
title = "Adapted User-Centered Design: a Strategy for the
Higher User Acceptance of Innovative e-Health
Services",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "776--787",
day = "27",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030776",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/776",
abstract = "Being familiar with all the benefits of e-Health and
the strategic plan for the Slovenian health sector's
informatization, Telekom Slovenia and the Faculty of
Medicine from the University of Maribor, along with
other partners, have initiated an e-Health project. The
project group is developing various e-Health services
that are based on modern ICT (information and
communications technology) solutions and will be
available on several screens. In order to meet the
users' needs and expectations and, consequently,
achieve the high acceptance of e-Health services, the
user-centered design (UCD) approach was employed in the
e-Health project. However, during the research it was
found that conventional UCD methods are not completely
appropriate for older adults: the target population of
the e-Health services. That is why the selected UCD
methods were modified and adapted for older adults. The
modified UCD methods used in the research study are
presented in this paper. Using the results of the
adapted UCD methods, a prototype for a service named
MedReminder was developed. The prototype was evaluated
by a group of 12 study participants. The study
participants evaluated the MedReminder service as
acceptable with a good potential for a high adoption
rate among its target population, i.e., older adults.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future e-Health.",
}
@Article{Hunter:2012:TAE,
author = "Jane Hunter and Anna Gerber",
title = "Towards Annotopia-Enabling the Semantic
Interoperability of {Web}-Based Annotations",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "788--806",
day = "30",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030788",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/788",
abstract = "This paper describes the results of a collaborative
effort that has reconciled the Open Annotation
Collaboration (OAC) ontology and the Annotation
Ontology (AO) to produce a merged data model [the Open
Annotation (OA) data model] to describe Web-based
annotations-and hence facilitate the discovery, sharing
and re-use of such annotations. Using a number of case
studies that include digital scholarly editing, 3D
museum artifacts and sensor data streams, we evaluate
the OA model's capabilities. We also describe our
implementation of an online annotation server that
supports the storage, search and retrieval of
OA-compliant annotations across multiple applications
and disciplines. Finally we discuss outstanding problem
issues associated with the OA ontology, and the impact
that certain design decisions have had on the efficient
storage, indexing, search and retrieval of complex
structured annotations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Interoperability and Knowledge
Building.",
}
@Article{Schade:2012:SOI,
author = "Sven Schade and Frank Ostermann and Laura Spinsanti
and Werner Kuhn",
title = "Semantic Observation Integration",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "807--829",
day = "03",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030807",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/807",
abstract = "Although the integration of sensor-based information
into analysis and decision making has been a research
topic for many years, semantic interoperability has not
yet been reached. The advent of user-generated content
for the geospatial domain, Volunteered Geographic
Information (VGI), makes it even more difficult to
establish semantic integration. This paper proposes a
novel approach to integrating conventional sensor
information and VGI, which is exploited in the context
of detecting forest fires. In contrast to common
logic-based semantic descriptions, we present a formal
system using algebraic specifications to unambiguously
describe the processing steps from natural phenomena to
value-added information. A generic ontology of
observations is extended and profiled for forest fire
detection in order to illustrate how the sensing
process, and transformations between heterogeneous
sensing systems, can be represented as mathematical
functions and grouped into abstract data types. We
discuss the required ontological commitments and a
possible generalization.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Interoperability and Knowledge
Building.",
}
@Article{Bouzidi:2012:SWA,
author = "Khalil Riad Bouzidi and Bruno Fies and Catherine
Faron-Zucker and Alain Zarli and Nhan Le Thanh",
title = "{Semantic Web} Approach to Ease Regulation Compliance
Checking in Construction Industry",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "830--851",
day = "11",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030830",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/830",
abstract = "Regulations in the Building Industry are becoming
increasingly complex and involve more than one
technical area, covering products, components and
project implementations. They also play an important
role in ensuring the quality of a building, and to
minimize its environmental impact. Control or
conformance checking are becoming more complex every
day, not only for industrials, but also for
organizations charged with assessing the conformity of
new products or processes. This paper will detail the
approach taken by the CSTB (Centre Scientifique et
Technique du B{\^a}timent) in order to simplify this
conformance control task. The approach and the proposed
solutions are based on semantic web technologies. For
this purpose, we first establish a domain-ontology,
which defines the main concepts involved and the
relationships, including one based on OWL (Web Ontology
Language) [1]. We rely on SBVR (Semantics of Business
Vocabulary and Business Rules) [2] and SPARQL (SPARQL
Protocol and RDF Query Language) [3] to reformulate the
regulatory requirements written in natural language,
respectively, in a controlled and formal language. We
then structure our control process based on expert
practices. Each elementary control step is defined as a
SPARQL query and assembled into complex control
processes ``on demand'', according to the component
tested and its semantic definition. Finally, we
represent in RDF (Resource Description Framework) [4]
the association between the SBVR rules and SPARQL
queries representing the same regulatory constraints.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Interoperability and Knowledge
Building.",
}
@Article{Pileggi:2012:WSM,
author = "Salvatore F. Pileggi and Carlos Fernandez-Llatas and
Vicente Traver",
title = "When the Social Meets the Semantic: Social {Semantic
Web} or {Web} 2.5",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "3",
pages = "852--864",
day = "21",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4030852",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:48 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/3/852",
abstract = "The social trend is progressively becoming the key
feature of current Web understanding (Web 2.0). This
trend appears irrepressible as millions of users,
directly or indirectly connected through social
networks, are able to share and exchange any kind of
content, information, feeling or experience. Social
interactions radically changed the user approach.
Furthermore, the socialization of content around social
objects provides new unexplored commercial marketplaces
and business opportunities. On the other hand, the
progressive evolution of the web towards the Semantic
Web (or Web 3.0) provides a formal representation of
knowledge based on the meaning of data. When the social
meets semantics, the social intelligence can be formed
in the context of a semantic environment in which user
and community profiles as well as any kind of
interaction is semantically represented (Semantic
Social Web). This paper first provides a conceptual
analysis of the second and third version of the Web
model. That discussion is aimed at the definition of a
middle concept (Web 2.5) resulting in the convergence
and integration of key features from the current and
next generation Web. The Semantic Social Web (Web 2.5)
has a clear theoretical meaning, understood as the
bridge between the overused Web 2.0 and the not yet
mature Semantic Web (Web 3.0).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Interoperability and Knowledge
Building.",
}
@Article{Groza:2012:PDL,
author = "Adrian Groza and Ioan Alfred Letia",
title = "Plausible Description Logic Programs for Stream
Reasoning",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "865--881",
day = "17",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4040865",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/865",
abstract = "Sensor networks are estimated to drive the formation
of the future Internet, with stream reasoning
responsible for analysing sensor data. Stream reasoning
is defined as real time logical reasoning on large,
noisy, heterogeneous data streams, aiming to support
the decision process of large numbers of concurrent
querying agents. In this research we exploited
non-monotonic rule-based systems for handling
inconsistent or incomplete information and also
ontologies to deal with heterogeneity. Data is
aggregated from distributed streams in real time and
plausible rules fire when new data is available. The
advantages of lazy evaluation on data streams were
investigated in this study, with the help of a
prototype developed in Haskell.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Interoperability and Knowledge
Building.",
}
@Article{Gomes:2012:CDL,
author = "Rui Gomes and L{\'\i}gia Sousa",
title = "Contributions to the Development of Local e-Government
2.0",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "882--899",
day = "22",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4040882",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/882",
abstract = "With the emergence of Web 2.0 (Blog, Wiki, RSS,
YouTube, Flickr, Podcast, Social Networks, and
Mashups), new ways of communicating, interacting and
being on the Web have arisen. These new communication
tools and strategies can radically change some specific
work processes in communities, such as the work
processes of an autarchy. Some authors emphasize the
advantages of using Web 2.0 tools in autarchies; thus,
we were interested in exploring the possibilities and
constraints of implementing these tools in our region
of Portugal, the Minho. Using a case study methodology,
we aimed to find out about the possibilities of
implementing Web 2.0 tools in autarchies through
exploring the interest and motivation of autarchic
collaborators in their use (our unit of analysis in
autarchies). Information was gathered with the help of
a questionnaire, the design of which was based on
previous exploratory interviews and applied to four
autarchic units in the Minho region. In each unit,
three different target-groups were surveyed
(Councilors, Information Systems (IS) Technicians, and
General Staff), so that we could triangulate the data.
Data analysis and results emphasized the interest and
motivation of the autarchies in using Web 2.0 tools, as
well as the main constraints that would be faced during
Web 2.0 implementation. It also allowed us to establish
some guidelines for adequate Web 2.0 implementation,
including an ``ideal'' profile of the person
responsible for the implementation process.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Government 2.0.",
}
@Article{Harrison:2012:COG,
author = "Teresa M. Harrison and Theresa A. Pardo and Meghan
Cook",
title = "Creating Open Government Ecosystems: a Research and
Development Agenda",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "900--928",
day = "23",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4040900",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/900",
abstract = "In this paper, we propose to view the concept of open
government from the perspective of an ecosystem, a
metaphor often used by policy makers, scholars, and
technology gurus to convey a sense of the
interdependent social systems of actors, organizations,
material infrastructures, and symbolic resources that
can be created in technology-enabled,
information-intensive social systems. We use the
concept of an ecosystem to provide a framework for
considering the outcomes of a workshop organized to
generate a research and development agenda for open
government. The agenda was produced in discussions
among participants from the government (at the federal,
state, and local levels), academic and civil sector
communities at the Center for Technology in Government
(CTG) at the University at Albany, SUNY in April 2011.
The paper begins by discussing concepts central to
understanding what is meant by an ecosystem and some
principles that characterize its functioning. We then
apply this metaphor more directly to government,
proposing that policymakers engage in strategic
ecosystems thinking, which means being guided by the
goal of explicitly and purposefully constructing open
government ecosystems. From there, we present the
research agenda questions essential to the development
of this new view of government's interaction with users
and organizations. Our goal is to call attention to
some of the fundamental ways in which government must
change in order to evolve from outdated industrial
bureaucratic forms to information age networked and
interdependent systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Government 2.0.",
}
@Article{Hu:2012:SLP,
author = "Yuh-Jong Hu and Win-Nan Wu and Kua-Ping Cheng and
Ya-Ling Huang",
title = "Semantic Legal Policies for Data Exchange and
Protection across Super-Peer Domains in the Cloud",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "929--954",
day = "25",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4040929",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/929",
abstract = "In semantic policy infrastructure, a Trusted Legal
Domain (TLD), designated as a Super-Peer Domain (SPD),
is a legal cage model used to circumscribe the legal
virtual boundary of data disclosure and usage in the
cloud. Semantic legal policies in compliance with the
law are enforced at the super-peer within an SPD to
enable Law-as-a-Service (LaaS) for cloud service
providers. In addition, cloud users could query
fragmented but protected outsourcing cloud data from a
law-aware super-peer, where each query is also
compliant with the law. Semantic legal policies are
logic-based formal policies, which are shown to be a
combination of OWL-DL ontologies and stratified Datalog
rules with negation, i.e., so-called non-monotonic
cq-programs, for policy representation and enforcement.
An agent at the super-peer is a unique law-aware
guardian that provides protected data integration
services for its peers within an SPD. Furthermore,
agents at the super-peers specify how law-compliant
legal policies are unified with each other to provide
protected data exchange services across SPDs in the
semantic data cloud.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Interoperability and Knowledge
Building.",
}
@Article{Davis:2012:SME,
author = "Jenny L. Davis",
title = "Social Media and Experiential Ambivalence",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "955--970",
day = "26",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4040955",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/955",
abstract = "At once fearful and dependent, hopeful and
distrustful, our contemporary relationship with
technology is highly ambivalent. Using experiential
accounts from an ongoing Facebook-based qualitative
study (N = 231), I both diagnose and articulate this
ambivalence. I argue that technological ambivalence is
rooted primarily in the deeply embedded moral
prescription to lead a meaningful life, and a related
uncertainty about the role of new technologies in the
accomplishment of this task. On the one hand,
technology offers the potential to augment or even
enhance personal and public life. On the other hand,
technology looms with the potential to supplant or
replace real experience. I examine these polemic
potentialities in the context of personal experiences,
interpersonal relationships, and political activism. I
conclude by arguing that the pervasive integration and
non-optionality of technical systems amplifies utopian
hopes, dystopian fears, and ambivalent concerns in the
contemporary era.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Theorizing the Web 2012.",
}
@Article{Bencsath:2012:CSD,
author = "Boldizs{\'a}r Bencs{\'a}th and G{\'a}bor P{\'e}k and
Levente Butty{\'a}n and M{\'a}rk F{\'e}legyh{\'a}zi",
title = "The Cousins of {Stuxnet}: {Duqu}, {Flame}, and
{Gauss}",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "971--1003",
day = "06",
month = nov,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4040971",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/971",
abstract = "Stuxnet was the first targeted malware that received
worldwide attention for causing physical damage in an
industrial infrastructure seemingly isolated from the
onlineworld. Stuxnet was a powerful targeted
cyber-attack, and soon other malware samples were
discovered that belong to this family. In this paper,
we will first present our analysis of Duqu, an
information-collecting malware sharing striking
similarities with Stuxnet. We describe our
contributions in the investigation ranging from the
original detection of Duquvia finding the dropper file
to the design of a Duqu detector toolkit. We then
continue with the analysis of the Flame advanced
information-gathering malware. Flame is unique in the
sense that it used advanced cryptographic techniques to
masquerade as a legitimate proxy and we are currently
collecting intelligence information to be able to break
its very specialencryption mechanism. Besides
explaining the operation of these pieces of malware, we
also examine if and how they could have been detected
by vigilant system administrators manually or in a
semi-automated manner using available tools. Finally,
we discuss lessons that the community can learn from
these incidents. We focus on technical issues, and
avoid speculations on the origin of these threats and
other geopolitical questions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Aftermath of Stuxnet.",
}
@Article{Lord:2012:TSH,
author = "Phillip Lord and Simon Cockell and Robert Stevens",
title = "Three Steps to Heaven: Semantic Publishing in a Real
World Workflow",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "1004--1015",
day = "08",
month = nov,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4041004",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/1004",
abstract = "Semantic publishing offers the promise of computable
papers, enriched visualisation and a realisation of the
linked data ideal. In reality, however, the publication
process contrives to prevent richer semantics while
culminating in a ``lumpen'' PDF. In this paper, we
discuss a web-first approach to publication, and
describe a three-tiered approach that integrates with
the existing authoring tooling. Critically, although it
adds limited semantics, it does provide value to all
the participants in the process: the author, the reader
and the machine.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sarma:2012:STP,
author = "Amardeo Sarma and Joao Girao",
title = "Supporting Trust and Privacy with an Identity-Enabled
Architecture",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "1016--1025",
day = "19",
month = nov,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4041016",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/1016",
abstract = "Cost reduction and a vastly increased potential to
create new services, such as via the proliferation of
the Cloud, have led to many more players and ``end
points''. With many of them being new entrants,
possibly short-lived, the question of how to handle
trust and privacy in this new context arises. In this
paper, we specifically look at the underlying
infrastructure that connects end-points served by these
players, which is an essential part of the overall
architecture to enable trust and privacy. We present an
enhanced architecture that allows real people, objects
and services to reliably interact via an infrastructure
providing assured levels of trust.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Privacy in the Future Internet.",
}
@Article{George:2012:TMB,
author = "Mathew George and Klaus-Peter Fischer-Hellmann and
Martin Knahl and Udo Bleimann and Shirley Atkinson",
title = "Traceability in Model-Based Testing",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "1026--1036",
day = "26",
month = nov,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4041026",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/1026",
abstract = "The growing complexities of software and the demand
for shorter time to market are two important challenges
that face today's IT industry. These challenges demand
the increase of both productivity and quality of
software. Model-based testing is a promising technique
for meeting these challenges. Traceability modeling is
a key issue and challenge in model-based testing.
Relationships between the different models will help to
navigate from one model to another, and trace back to
the respective requirements and the design model when
the test fails. In this paper, we present an approach
for bridging the gaps between the different models in
model-based testing. We propose relation definition
markup language (RDML) for defining the relationships
between models.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from ITA 11.",
}
@Article{Antley:2012:TDA,
author = "Jeremy Antley",
title = "Textual Dualism and Augmented Reality in the {Russian}
Empire",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "1037--1048",
day = "10",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4041037",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/1037",
abstract = "While the current focus on how digital technology
alters our conception of the self and its place in the
broader perceived reality yields fascinating insight
into modern issues, there is much to be gained by
analyzing the presence of dualist and augmented reality
discourses in a pre-digital era. This essay will
examine the ontological interplay of textual dualist
norms in the Russian and Soviet states of the 19th and
early 20th centuries and how those norms were
challenged by augmented claims embodied in rumors,
refrains, and the spelling of names. By utilizing the
informational concepts of mobility and asynchronicity,
three Russian historical vignettes --- the Emancipation
of the Serfs in 1861, the documentation of Jews in
Imperial Russia, and the attempts by Trotsky to realize
Soviet symchka --- demonstrate that not only are
dualist discourses prevalent in periods outside of the
contemporary, but also that the way in which those
conflicts framed themselves in the past directly
influences their deployment in today's digital world.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Theorizing the Web 2012.",
}
@Article{Wang:2012:VAS,
author = "Jue Wang and Keith J. Bennett and Edward A. Guinness",
title = "Virtual Astronaut for Scientific Visualization--- a
Prototype for {Santa Maria Crater} on {Mars}",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "1049--1068",
day = "13",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4041049",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/1049",
abstract = "To support scientific visualization of
multiple-mission data from Mars, the Virtual Astronaut
(VA) creates an interactive virtual 3D environment
built on the Unity3D Game Engine. A prototype study was
conducted based on orbital and Opportunity Rover data
covering Santa Maria Crater in Meridiani Planum on
Mars. The VA at Santa Maria provides dynamic visual
representations of the imaging, compositional, and
mineralogical information. The VA lets one navigate
through the scene and provides geomorphic and geologic
contexts for the rover operations. User interactions
include in-situ observations visualization, feature
measurement, and an animation control of rover drives.
This paper covers our approach and implementation of
the VA system. A brief summary of the prototype system
functions and user feedback is also covered. Based on
external review and comments by the science community,
the prototype at Santa Maria has proven the VA to be an
effective tool for virtual geovisual analysis.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Geovisual Analytics.",
}
@Article{Sun:2012:WBG,
author = "Min Sun and Jing Li and Chaowei Yang and Gavin A.
Schmidt and Myra Bambacus and Robert Cahalan and
Qunying Huang and Chen Xu and Erik U. Noble and
Zhenlong Li",
title = "A {Web}-Based Geovisual Analytical System for Climate
Studies",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "1069--1085",
day = "14",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4041069",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/1069",
abstract = "Climate studies involve petabytes of spatiotemporal
datasets that are produced and archived at distributed
computing resources. Scientists need an intuitive and
convenient tool to explore the distributed
spatiotemporal data. Geovisual analytical tools have
the potential to provide such an intuitive and
convenient method for scientists to access climate
data, discover the relationships between various
climate parameters, and communicate the results across
different research communities. However, implementing a
geovisual analytical tool for complex climate data in a
distributed environment poses several challenges. This
paper reports our research and development of a
web-based geovisual analytical system to support the
analysis of climate data generated by climate model.
Using the ModelE developed by the NASA Goddard
Institute for Space Studies (GISS) as an example, we
demonstrate that the system is able to (1) manage large
volume datasets over the Internet; (2) visualize
2D/3D/4D spatiotemporal data; (3) broker various
spatiotemporal statistical analyses for climate
research; and (4) support interactive data analysis and
knowledge discovery. This research also provides an
example for managing, disseminating, and analyzing Big
Data in the 21st century.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Geovisual Analytics.",
}
@Article{Cap:2012:TCN,
author = "Clemens H. Cap",
title = "Towards Content Neutrality in {Wiki} Systems",
journal = j-FUTURE-INTERNET,
volume = "4",
number = "4",
pages = "1086--1104",
day = "19",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi4041086",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/4/4/1086",
abstract = "The neutral point of view (NPOV) cornerstone of
Wikipedia (WP) is challenged for next generation
knowledge bases. A case is presented for content
neutrality as a new, every point of view (EPOV) guiding
principle. The architectural implications of content
neutrality are discussed and translated into novel
concepts of Wiki architectures. Guidelines for
implementing this architecture are presented. Although
NPOV is criticized, the contribution avoids ideological
controversy and focuses on the benefits of the novel
approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from ITA 11.",
}
@Article{Tomas-Gabarron:2013:OVT,
author = "Juan-Bautista Tomas-Gabarron and Esteban Egea-Lopez
and Joan Garcia-Haro",
title = "Optimization of Vehicular Trajectories under
{Gaussian} Noise Disturbances",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "1",
pages = "1--20",
day = "27",
month = dec,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/1/1",
abstract = "Nowadays, research on Vehicular Technology aims at
automating every single mechanical element of vehicles,
in order to increase passengers' safety, reduce human
driving intervention and provide entertainment services
on board. Automatic trajectory tracing for vehicles
under especially risky circumstances is a field of
research that is currently gaining enormous attention.
In this paper, we show some results on how to develop
useful policies to execute maneuvers by a vehicle at
high speeds with the mathematical optimization of some
already established mobility conditions of the car. We
also study how the presence of Gaussian noise on
measurement sensors while maneuvering can disturb
motion and affect the final trajectories. Different
performance criteria for the optimization of such
maneuvers are presented, and an analysis is shown on
how path deviations can be minimized by using
trajectory smoothing techniques like the Kalman Filter.
We finalize the paper with a discussion on how
communications can be used to implement these
schemes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Vehicular Communications and
Networking.",
}
@Article{Paltrinieri:2013:PIE,
author = "Roberta Paltrinieri and Piergiorgio Degli Esposti",
title = "Processes of Inclusion and Exclusion in the Sphere of
Prosumerism",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "1",
pages = "21--33",
day = "10",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5010021",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/1/21",
abstract = "The term prosumer, first introduced by Toffler in the
1980s, has been developed by sociologists in response
to Web 2.0 (the set of technologies that has
transformed a predominantly static web into the
collaborative medium initially envisaged by Tim
Berners-Lee). The phenomena is now understood as a
process involving the creation of meanings on the part
of the consumer, who re-appropriates spaces that were
dominated by institutionalized production, and this
extends to the exploitation of consumer creativity on
the production side. Recent consumption literature can
be re-interpreted through the prosumer lens in order to
understand whether prosumers are more creative or
alienated in their activities. The peculiar typology of
prosumption introduced by Web 2.0 leads us to analyze
social capital as a key element in value creation, and
to investigate its different online and offline forms.
Our analysis then discusses the digital divide and
critical consumerism as forms of empowerment
impairment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Theorizing the Web 2012.",
}
@Article{Fritsch:2013:CPE,
author = "Lothar Fritsch",
title = "The Clean Privacy Ecosystem of the Future {Internet}",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "1",
pages = "34--45",
day = "14",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5010034",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/1/34",
abstract = "This article speculates on the future of privacy and
electronic identities on the Internet. Based on a short
review of security models and the development of
privacy-enhancing technology, privacy and electronic
identities will be discussed as parts of a larger
context-an ecosystem of personal information and
electronic identities. The article argues for an
ecosystem view of personal information and electronic
identities, as both personal information and identity
information are basic required input for many
applications. Therefore, for both application owners
and users, a functioning ecosystem of personal
information and electronic identification is important.
For the future of the Internet, high-quality
information and controlled circulation of such
information is therefore argued as decisive for the
value of future Internet applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Privacy in the Future Internet.",
}
@Article{Desmet:2013:GAM,
author = "Antoine Desmet and Erol Gelenbe",
title = "Graph and Analytical Models for Emergency Evacuation",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "1",
pages = "46--55",
day = "21",
month = feb,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5010046",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/1/46",
abstract = "Cyber-Physical-Human Systems (CPHS) combine sensing,
communication and control to obtain desirable outcomes
in physical environments for human beings, such as
buildings or vehicles. A particularly important
application area is emergency management. While recent
work on the design and optimisation of emergency
management schemes has relied essentially on discrete
event simulation, which is challenged by the
substantial amount of programming or reprogramming of
the simulation tools and by the scalability and the
computing time needed to obtain useful performance
estimates, this paper proposes an approach that offers
fast estimates based on graph models and probability
models. We show that graph models can offer insight
into the critical areas in an emergency evacuation and
that they can suggest locations where sensor systems
are particularly important and may require hardening.
On the other hand, we also show that analytical models
based on queueing theory can provide useful estimates
of evacuation times and for routing optimisation. The
results are illustrated with regard to the evacuation
of a real-life building.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Emergency Management, Communications and
the Internet.",
}
@Article{Smith:2013:AAN,
author = "Danielle Taana Smith",
title = "{African Americans} and Network Disadvantage:
Enhancing Social Capital through Participation on
Social Networking Sites",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "1",
pages = "56--66",
day = "06",
month = mar,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5010056",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/1/56",
abstract = "This study examines the participation of African
Americans on social networking sites (SNS), and
evaluates the degree to which African Americans engage
in activities in the online environment to mitigate
social capital deficits. Prior literature suggests that
compared with whites, African Americans have less
social capital that can enhance their socio-economic
mobility. As such, my research question is: do African
Americans enhance their social capital through their
participation on SNS? I use nationally representative
data collected from the Pew Internet and American Life
Project to explore the research question. The results
suggest that the online environment is potentially a
space in which African Americans can lessen social
capital deficits.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Inequality in the Digital Environment.",
}
@Article{Menth:2013:GLL,
author = "Michael Menth and Matthias Hartmann and Dominik
Klein",
title = "Global Locator, Local Locator, and Identifier Split
({GLI}-Split)",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "1",
pages = "67--94",
day = "11",
month = mar,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5010067",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/1/67",
abstract = "The locator/identifier split is an approach for a new
addressing and routing architecture to make routing in
the core of the Internet more scalable. Based on this
principle, we developed the GLI-Split framework, which
separates the functionality of current IP addresses
into a stable identifier and two independent locators,
one for routing in the Internet core and one for edge
networks. This makes routing in the Internet more
stable and provides more flexibility for edge networks.
GLI-Split can be incrementally deployed and it is
backward-compatible with the IPv6 Internet. We describe
its architecture, compare it to other approaches,
present its benefits, and finally present a
proof-of-concept implementation of GLI-Split.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Multisilta:2013:SLW,
author = "Jari Multisilta and Arttu Perttula",
title = "Supporting Learning with Wireless Sensor Data",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "1",
pages = "95--112",
day = "19",
month = mar,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5010095",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:49 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/1/95",
abstract = "In this article, learning is studied in in situ
applications that involve sensors. The main questions
are how to conceptualize experiential learning
involving sensors and what kinds of learning
applications using sensors already exist or could be
designed. It is claimed that experiential learning,
context information and sensor data supports twenty
first century learning. The concepts of context,
technology-mediated experiences, shared felt
experiences and experiential learning theory will be
used to describe a framework for sensor-based mobile
learning environments. Several scenarios and case
examples using sensors and sensor data will be
presented, and they will be analyzed using the
framework. Finally, the article contributes to the
discussion concerning the role of technology-mediated
learning experiences and collective sensor data in
developing twenty first century learning by
characterizing what kinds of skills and competences are
supported in learning situations that involve
sensors.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Scholz:2013:CSF,
author = "Markus Scholz and Dawud Gordon and Leonardo Ramirez
and Stephan Sigg and Tobias Dyrks and Michael Beigl",
title = "A Concept for Support of Firefighter Frontline
Communication",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "2",
pages = "113--127",
day = "16",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5020113",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/2/113",
abstract = "In an indoor firefighter mission, coordination and
communication support are of the utmost importance. We
present our experience from over five years of research
with current firefighter support technology. In
contrast to some large scale emergency response
research, our work is focused on the frontline
interaction between teams of firefighters and the
incident commander on a single site. In this paper we
investigate the flaws in firefighter communication
systems. Frequent technical failures and the high
cognitive costs incurred by communicating impede
coordination. We then extract a list of requirements
for an assistant emergency management technology from
expert interviews. Thirdly, we provide a system concept
and explore challenges for building a novel firefighter
support system based on our previous work. The system
has three key features: robust ad-hoc network,
telemetry and text messaging, as well as implicit
interaction. The result would provide a complementary
mode of communication in addition to the current
trunked radio.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Emergency Management, Communications and
the Internet.",
}
@Article{Gelenbe:2013:EQT,
author = "Erol Gelenbe and Ricardo Lent",
title = "Energy-{QoS} Trade-Offs in Mobile Service Selection",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "2",
pages = "128--139",
day = "19",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5020128",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/2/128",
abstract = "An attractive advantage of mobile networks is that
their users can gain easy access to different services.
In some cases, equivalent services could be fulfilled
by different providers, which brings the question of
how to rationally select the best provider among all
possibilities. In this paper, we investigate an answer
to this question from both quality-of-service (QoS) and
energy perspectives by formulating an optimisation
problem. We illustrate the theoretical results with
examples from experimental measurements of the
resulting energy and performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Managing Quality-of-Service and Security
in Mobile Heterogeneous Environments.",
}
@Article{Uto:2013:MRI,
author = "Nelson Uto",
title = "A Methodology for Retrieving Information from Malware
Encrypted Output Files: {Brazilian} Case Studies",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "2",
pages = "140--167",
day = "25",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5020140",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/2/140",
abstract = "This article presents and explains a methodology based
on cryptanalytic and reverse engineering techniques
that can be employed to quickly recover information
from encrypted files generated by malware. The
objective of the methodology is to minimize the effort
with static and dynamic analysis, by using
cryptanalysis and related knowledge as much as
possible. In order to illustrate how it works, we
present three case studies, taken from a big Brazilian
company that was victimized by directed attacks focused
on stealing information from a special purpose hardware
they use in their environment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security of Systems and Software
Resiliency.",
}
@Article{Kolding:2013:QSP,
author = "Troels Kolding and Pawel Ochal and Niels Terp
Kjeldgaard J{\o}rgensen and Klaus Pedersen",
title = "{QoS} Self-Provisioning and Interference Management
for Co-Channel Deployed {3G} Femtocells",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "2",
pages = "168--189",
day = "02",
month = may,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5020168",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/2/168",
abstract = "A highly efficient self-provisioning interference
management scheme is derived for 3G Home Node-Bs (HNB).
The proposed scheme comprises self-adjustment of the
HNB transmission parameters to meet the targeted QoS
(quality of service) requirements in terms of downlink
and uplink guaranteed minimum throughput and coverage.
This objective is achieved by means of an autonomous
HNB solution, where the transmit power of pilot and
data are adjusted separately, while also controlling
the uplink interference pollution towards the
macro-layer. The proposed scheme is evaluated by means
of extensive system level simulations and the results
show significant performance improvements in terms of
user throughput outage probability, power efficiency,
femtocell coverage, and impact on macro-layer
performance as compared to prior art baseline
techniques. The paper is concluded by also showing
corresponding measurements from live 3G high-speed
packet access (HSPA) HNB field-trials, confirming the
validity of major simulation results and assumptions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Managing Quality-of-Service and Security
in Mobile Heterogeneous Environments.",
}
@Article{Soderstrom:2013:DDY,
author = "Sylvia S{\"o}derstr{\"o}m",
title = "Digital Differentiation in Young People's {Internet}
Use --- Eliminating or Reproducing Disability
Stereotypes",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "2",
pages = "190--204",
day = "07",
month = may,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5020190",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/2/190",
abstract = "Norwegian authorities' policy aims at securing an
information society for all, emphasizing the importance
of accessible and usable Information and Communication
Technology (ICT) for everyone. While the body of
research on young people's use of ICT is quite
comprehensive, research addressing digital
differentiation in young people with disabilities' use
of ICT is still in its early days. This article
investigates how young people with disabilities' use,
or non-use, of assistive ICT creates digital
differentiations. The investigation elaborates on how
the anticipations and stereotypes of disability
establish an authoritative definition of assistive ICT,
and the consequence this creates for the use of the Web
by young people with disabilities. The object of the
article is to provide enhanced insight into the field
of technology and disability by illuminating how
assistive ICT sometimes eliminates and sometimes
reproduces stereotypes and digital differentiations.
The investigation draws on a qualitative interview
study with 23 young Norwegians with disabilities, aged
15-20 years. I draw on a theoretical perspective to
analyze the findings of the study, which employs the
concept of identity multiplicity. The article's closing
discussion expands on technology's significance in
young people's negotiations of impairment and of
perceptions of disability.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Inequality in the Digital Environment.",
}
@Article{Loukas:2013:RCT,
author = "George Loukas and Diane Gan and Tuan Vuong",
title = "A Review of Cyber Threats and Defence Approaches in
Emergency Management",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "2",
pages = "205--236",
day = "07",
month = may,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5020205",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/2/205",
abstract = "Emergency planners, first responders and relief
workers increasingly rely on computational and
communication systems that support all aspects of
emergency management, from mitigation and preparedness
to response and recovery. Failure of these systems,
whether accidental or because of malicious action, can
have severe implications for emergency management.
Accidental failures have been extensively documented in
the past and significant effort has been put into the
development and introduction of more resilient
technologies. At the same time researchers have been
raising concerns about the potential of cyber attacks
to cause physical disasters or to maximise the impact
of one by intentionally impeding the work of the
emergency services. Here, we provide a review of
current research on the cyber threats to communication,
sensing, information management and vehicular
technologies used in emergency management. We emphasise
on open issues for research, which are the cyber
threats that have the potential to affect emergency
management severely and for which solutions have not
yet been proposed in the literature.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Emergency Management, Communications and
the Internet.",
}
@Article{Ober:2013:SAB,
author = "Micha Ober and Stefan Katzenbeisser and Kay Hamacher",
title = "Structure and Anonymity of the {Bitcoin} Transaction
Graph",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "2",
pages = "237--250",
day = "07",
month = may,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5020237",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/2/237",
abstract = "The Bitcoin network of decentralized payment
transactions has attracted a lot of attention from both
Internet users and researchers in recent years. Bitcoin
utilizes a peer-to-peer network to issue anonymous
payment transactions between different users. In the
currently used Bitcoin clients, the full transaction
history is available at each node of the network to
prevent double spending without the need for a central
authority, forming a valuable source for empirical
research on network structure, network dynamics, and
the implied anonymity challenges, as well as guidance
on the future evolution of complex payment systems. We
found dynamical effects of which some increase
anonymity while others decrease it. Most importantly,
several parameters of the Bitcoin transaction graph
seem to have become stationary over the last 12-18
months. We discuss the implications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Digital Cash: Design and Impacts.",
}
@Article{West:2013:REO,
author = "Rebecca J. West and Bhoomi K. Thakore",
title = "Racial Exclusion in the Online World",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "2",
pages = "251--267",
day = "24",
month = may,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5020251",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/2/251",
abstract = "As the internet has become an integral part of
everyday life, it is understood that patterns of racial
stereotyping and discrimination found in the offline
world are often reproduced online. In our paper, we
examine two exclusionary practices in an online
environment for adult toy collectors: First, the
exclusion of non-white individuals who are expected to
form immediate friendships with other non-white
members; and second, the essentializing of racial
issues when concerns over the lack of racial diversity
in the toys are discussed. This dismissal is often
directly connected to non-white members' decisions to
no longer participate, resulting in a new form of
segregation within virtual space.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Inequality in the Digital Environment.",
}
@Article{Sakellari:2013:ITB,
author = "Georgia Sakellari and Christina Morfopoulou and Erol
Gelenbe",
title = "Investigating the Tradeoffs between Power Consumption
and Quality of Service in a Backbone Network",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "2",
pages = "268--281",
day = "24",
month = may,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5020268",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/2/268",
abstract = "Energy saving in networks has traditionally focussed
on reducing battery consumption through smart wireless
network design. Recently, researchers have turned their
attention to the energy cost and carbon emissions of
the backbone network that both fixed and mobile
communications depend on, proposing primarily
mechanisms that turn equipments OFF or put them into
deep sleep. This is an effective way of saving energy,
provided that the nodes can return to working condition
quickly, but it introduces increased delays and packet
losses that directly affect the quality of
communication experienced by the users. Here we
investigate the associated tradeoffs between power
consumption and quality of service in backbone networks
that employ deep sleep energy savings. We examine these
tradeoffs by conducting experiments on a real PC-based
network topology, where nodes are put into deep sleep
at random times and intervals, resulting in a
continuously changing network with reduced total power
consumption. The average power consumption, the packet
loss and the average delay of this network are examined
with respect to the average value of the ON rate and
the ON/OFF cycle of the nodes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Managing Quality-of-Service and Security
in Mobile Heterogeneous Environments.",
}
@Article{Neis:2013:CVG,
author = "Pascal Neis and Dennis Zielstra and Alexander Zipf",
title = "Comparison of Volunteered Geographic Information Data
Contributions and Community Development for Selected
World Regions",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "2",
pages = "282--300",
day = "03",
month = jun,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5020282",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/2/282",
abstract = "Volunteered Geographic Information (VGI) projects and
their crowdsourced data have been the focus of a number
of scientific analyses and investigations in recent
years. Oftentimes the results show that the
collaboratively collected geodata of one of the most
popular VGI projects, OpenStreetMap (OSM), provides
good coverage in urban areas when considering
particular completeness factors. However, results can
potentially vary significantly for different world
regions. In this article, we conduct an analysis to
determine similarities and differences in data
contributions and community development in OSM between
12 selected urban areas of the world. Our findings
showed significantly different results in data
collection efforts and local OSM community sizes.
European cities provide quantitatively larger amounts
of geodata and number of contributors in OSM, resulting
in a better representation of the real world in the
dataset. Although the number of volunteers does not
necessarily correlate with the general population
density of the urban areas, similarities could be
detected while comparing the percentage of different
contributor groups and the number of changes they made
to the OSM project. Further analyses show that
socio-economic factors, such as income, can have an
impact on the number of active contributors and the
data provided in the analyzed areas. Furthermore, the
results showed significant data contributions by
members whose main territory of interest lies more than
one thousand kilometers from the tested areas.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Marganski:2013:VRV,
author = "Alison Marganski",
title = "Virtual Relationship Violence and Perspectives on
Punishment: Do Gender or Nationality Matter?",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "3",
pages = "301--316",
day = "26",
month = jun,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5030301",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/3/301",
abstract = "Given the increasingly popular use of socially
interactive technology (SIT), it is believed that the
way in which individuals communicate and experience
relationships has drastically been changing. For those
who partake in this electronic world, damaging
behaviors akin to those found in the real world have
emerged. Yet, we know little about the extent of these
behaviors in the context of romantic relationships,
especially from a gender or cultural standpoint.
Research on dating violence generally indicates that
women experience in-person victimization at higher
rates than men, although some research has called this
into question. It also suggests that some national
groups experience higher rates of violence than others.
However, research is almost non-existent when it comes
to exploring violence in the digital world. This study
investigated gender and nationality in (1) the nature
and extent of socially interactive intimate violence,
and (2) perceptions of the seriousness of virtual
relationship violence. Using a sample of students from
the United States and Poland, findings revealed that
socially interactive technology may serve as a new
avenue for aggressing against partners, as virtual
relationship violence was not uncommon and reflected
some patterns present in the real world. Some
unexpected patterns also emerged. The results of this
research signal a possible transferability of covert
intimate violence and highlight ways in which
inequalities may exist in our virtual worlds.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Inequality in the Digital Environment.",
}
@Article{Imadali:2013:ESS,
author = "Sofiane Imadali and Athanasia Karanasiou and Alexandru
Petrescu and Ioannis Sifniadis and Eleftheria Velidou
and V{\'e}ronique V{\`e}que and Pantelis Angelidis",
title = "{eHealth} Service Support in Future {IPv6} Vehicular
Networks",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "3",
pages = "317--335",
day = "27",
month = jun,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5030317",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/3/317",
abstract = "Recent vehicular networking activities include novel
automotive applications, such as public vehicle to
vehicle/infrastructure (V2X), large scale deployments,
machine-to-machine (M2M) integration scenarios, and
more. The platform described in this paper focuses on
the integration of eHealth in a V2I setting. This is to
allow the use of Internet from a vehicular setting to
disseminate health-related information. From an eHealth
viewpoint, the use of remote healthcare solutions to
record and transmit a patient's vital signs is a
special telemedicine application that helps hospital
resident health professionals to optimally prepare the
patient's admittance. From the automotive perspective,
this is a typical vehicle-to-infrastructure (V2I)
communication scenario. This proposal provides an IPv6
vehicular platform, which integrates eHealth devices
and allows sending captured health-related data to a
personal health record (PHR) application server in the
IPv6 Internet. The collected data is viewed remotely by
a doctor and supports his diagnostic decision. In
particular, our work introduces the integration of
vehicular and eHealth testbeds, describes related work
and presents a lightweight auto-configuration method
based on a DHCPv6 extension to provide IPv6
connectivity with a few numbers of messages.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Vehicular Communications and
Networking.",
}
@Article{Gelenbe:2013:FRC,
author = "Erol Gelenbe and Fang-Jing Wu",
title = "Future Research on Cyber-Physical Emergency Management
Systems",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "3",
pages = "336--354",
day = "27",
month = jun,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5030336",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/3/336",
abstract = "Cyber-physical systems that include human beings and
vehicles in a built environment, such as a building or
a city, together with sensor networks and decision
support systems have attracted much attention. In
emergencies, which also include mobile searchers and
rescuers, the interactions among civilians and the
environment become much more diverse, and the
complexity of the emergency response also becomes much
greater. This paper surveys current research on
sensor-assisted evacuation and rescue systems and
discusses the related research issues concerning
communication protocols for sensor networks, as well as
several other important issues, such as the integrated
asynchronous control of large-scale emergency response
systems, knowledge discovery for rescue and prototyping
platforms. Then, we suggest directions for further
research.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Emergency Management, Communications and
the Internet.",
}
@Article{Kotenko:2013:DIH,
author = "Igor Kotenko and Olga Polubelova and Andrey Chechulin
and Igor Saenko",
title = "Design and Implementation of a Hybrid
Ontological-Relational Data Repository for {SIEM}
Systems",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "3",
pages = "355--375",
day = "09",
month = jul,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5030355",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/3/355",
abstract = "The technology of Security Information and Event
Management (SIEM) becomes one of the most important
research applications in the area of computer network
security. The overall functionality of SIEM systems
depends largely on the quality of solutions implemented
at the data storage level, which is purposed for the
representation of heterogeneous security events, their
storage in the data repository, and the extraction of
relevant data for analytical modules of SIEM systems.
The paper discusses the key issues of design and
implementation of a hybrid SIEM data repository, which
combines relational and ontological data
representations. Based on the analysis of existing SIEM
systems and standards, the ontological approach is
chosen as a core component of the repository, and an
example of the ontological data model for
vulnerabilities representation is outlined. The hybrid
architecture of the repository is proposed for
implementation in SIEM systems. Since the most of works
on the repositories of SIEM systems is based on the
relational data model, the paper focuses mainly on the
ontological part of the hybrid approach. To test the
repository we used the data model intended for attack
modeling and security evaluation, which includes both
ontological and relational dimensions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security of Systems and Software
Resiliency.",
}
@Article{Chadwick:2013:IAP,
author = "Darren Chadwick and Caroline Wesson and Chris
Fullwood",
title = "{Internet} Access by People with Intellectual
Disabilities: Inequalities and Opportunities",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "3",
pages = "376--397",
day = "17",
month = jul,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5030376",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/3/376",
abstract = "This review gives an overview of the societal
inequalities faced by people with intellectual
disabilities, before focusing specifically on
challenges people face accessing the Internet. Current
access will be outlined along with the societal,
support and attitudinal factors that can hinder access.
Discussion of carer views of Internet use by people
with intellectual disabilities will be covered
incorporating consideration of the tension between
protection, self-determination and lifestyle issues and
gaining Internet access. We will address how impairment
related factors may impede access and subsequently
discuss how supports may be used to obfuscate
impairments and facilitate access. We will move on from
this to critically describe some of the potential
benefits the Internet could provide to people with
intellectual disabilities, including the potential for
self-expression, advocacy and developing friendships.
Finally, strategies to better include people with
intellectual disabilities online will be given along
with future research suggestions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Inequality in the Digital Environment.",
}
@Article{Busanelli:2013:CNI,
author = "Stefano Busanelli and Filippo Rebecchi and Marco
Picone and Nicola Iotti and Gianluigi Ferrari",
title = "Cross-Network Information Dissemination in Vehicular
Ad hoc Networks {(VANETs)}: Experimental Results from a
{Smartphone}-Based Testbed",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "3",
pages = "398--428",
day = "05",
month = aug,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5030398",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/3/398",
abstract = "In this work, we present an innovative approach for
effective cross-network information dissemination, with
applications to vehicular ad hoc networks (VANETs). The
proposed approach, denoted as ``Cross-Network Effective
Traffic Alert Dissemination'' (X-NETAD), leverages on
the spontaneous formation of local WiFi (IEEE 802.11b)
VANETs, with direct connections between neighboring
vehicles, in order to disseminate, very quickly and
inexpensively, traffic alerts received from the
cellular network. The proposed communication
architecture has been implemented on Android
smartphones. The obtained experimental results show
that an effective cross-network information
dissemination service can entirely rely on
smartphone-based communications. This paves the way to
future Internet architectures, where vehicles will play
a key role as information destinations and sources.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Vehicular Communications and
Networking.",
}
@Article{Teets:2013:LRC,
author = "Michael Teets and Matthew Goldner",
title = "Libraries' Role in Curating and Exposing Big Data",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "3",
pages = "429--438",
day = "20",
month = aug,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5030429",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/3/429",
abstract = "This article examines how one data hub is working to
become a relevant and useful source in the Web of big
data and cloud computing. The focus is on OCLC's
WorldCat database of global library holdings and
includes work by other library organizations to expose
their data using big data concepts and standards.
Explanation is given of how OCLC has begun work on the
knowledge graph for this data and its active
involvement with Schema.org in working to make this
data useful throughout the Web.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Server Technologies in Cloud Computing
and Big Data.",
}
@Article{Gupta:2013:PLN,
author = "Smrati Gupta and M. A. V{\'a}zquez-Castro",
title = "Physical Layer Network Coding Based on Integer Forcing
Precoded Compute and Forward",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "3",
pages = "439--459",
day = "28",
month = aug,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5030439",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:50 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/3/439",
abstract = "In this paper, we address the implementation of
physical layer network coding (PNC) based on compute
and forward (CF) in relay networks. It is known that
the maximum achievable rates in CF-based transmission
is limited due to the channel approximations at the
relay. In this work, we propose the integer forcing
precoder (IFP), which bypasses this maximum rate
achievability limitation. Our precoder requires channel
state information (CSI) at the transmitter, but only
that of the channel between the transmitter and the
relay, which is a feasible assumption. The overall
contributions of this paper are three-fold. Firstly, we
propose an implementation of CF using IFP and prove
that this implementation achieves higher rates as
compared to traditional relaying schemes. Further, the
probability of error from the proposed scheme is shown
to have up to 2 dB of gain over the existent lattice
network coding-based implementation of CF. Secondly, we
analyze the two phases of transmission in the CF
scheme, thereby characterizing the end-to-end behavior
of the CF and not only one-phase behavior, as in
previous proposals. Finally, we develop decoders for
both the relay and the destination. We use a
generalization of Bezout's theorem to justify the
construction of these decoders. Further, we make an
analytical derivation of the end-to-end probability of
error for cubic lattices using the proposed scheme.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Vehicular Communications and
Networking.",
}
@Article{Mantere:2013:NTF,
author = "Matti Mantere and Mirko Sailio and Sami Noponen",
title = "Network Traffic Features for Anomaly Detection in
Specific Industrial Control System Network",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "4",
pages = "460--473",
day = "25",
month = sep,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5040460",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/4/460",
abstract = "The deterministic and restricted nature of industrial
control system networks sets them apart from more open
networks, such as local area networks in office
environments. This improves the usability of network
security, monitoring approaches that would be less
feasible in more open environments. One of such
approaches is machine learning based anomaly detection.
Without proper customization for the special
requirements of the industrial control system network
environment, many existing anomaly or misuse detection
systems will perform sub-optimally. A machine learning
based approach could reduce the amount of manual
customization required for different industrial control
system networks. In this paper we analyze a possible
set of features to be used in a machine learning based
anomaly detection system in the real world industrial
control system network environment under investigation.
The network under investigation is represented by
architectural drawing and results derived from network
trace analysis. The network trace is captured from a
live running industrial process control network and
includes both control data and the data flowing between
the control network and the office network. We limit
the investigation to the IP traffic in the traces.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security of Systems and Software
Resiliency.",
}
@Article{Ogul:2013:PAM,
author = "Murat Ogul and Sel{\c{c}}uk Baktir",
title = "Practical Attacks on Mobile Cellular Networks and
Possible Countermeasures",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "4",
pages = "474--489",
day = "30",
month = sep,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5040474",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/4/474",
abstract = "Due to widespread adoption of mobile communications
devices and increasingly high throughput capacity of
cellular networks, Third-Generation (3G) and Long Term
Evolution (LTE) are becoming ever more popular.
Millions of smart phones with 3G capabilities are sold
every year and used for mostly browsing the Internet.
Hence, mobile operators have been heavily investing in
their packet switched networks to meet customer demand
and stay ahead in the market. The widespread use of
broadband mobile Internet bring along also some IP
based threats such as the Denial of Service (DoS)
attacks, botnets and malwares. In this paper, we
performed DoS and flooding attacks on 3G mobile
networks and measured their effect on the most critical
elements of a network such as the Radio Network
Controller (RNC) and the Serving GPRS Support Node
(SGSN) devices. We carried out our experiments on a
real mobile network, not just a simulation environment,
and hence our findings depict a realistic picture of
the vulnerabilities existent in 3G mobile networks. We
propose alternative solutions to avoid these
vulnerabilities and mitigate the issues raised.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ziaimatin:2013:STD,
author = "Hasti Ziaimatin and Tudor Groza and Jane Hunter",
title = "Semantic and Time-Dependent Expertise Profiling Models
in Community-Driven Knowledge Curation Platforms",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "4",
pages = "490--514",
day = "11",
month = oct,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5040490",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/4/490",
abstract = "Online collaboration and web-based knowledge sharing
have gained momentum as major components of the Web 2.0
movement. Consequently, knowledge embedded in such
platforms is no longer static and continuously evolves
through experts' micro-contributions. Traditional
Information Retrieval and Social Network Analysis
techniques take a document-centric approach to
expertise modeling by creating a macro-perspective of
knowledge embedded in large corpus of static documents.
However, as knowledge in collaboration platforms
changes dynamically, the traditional macro-perspective
is insufficient for tracking the evolution of knowledge
and expertise. Hence, Expertise Profiling is presented
with major challenges in the context of dynamic and
evolving knowledge. In our previous study, we proposed
a comprehensive, domain-independent model for expertise
profiling in the context of evolving knowledge. In this
paper, we incorporate Language Modeling into our
methodology to enhance the accuracy of resulting
profiles. Evaluation results indicate a significant
improvement in the accuracy of profiles generated by
this approach. In addition, we present our profile
visualization tool, Profile Explorer, which serves as a
paradigm for exploring and analyzing time-dependent
expertise profiles in knowledge-bases where content
evolves overtime. Profile Explorer facilitates
comparative analysis of evolving expertise, independent
of the domain and the methodology used in creating
profiles.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Han:2013:MEO,
author = "Qing Han",
title = "Managing Emergencies Optimally Using a Random Neural
Network-Based Algorithm",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "4",
pages = "515--534",
day = "16",
month = oct,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5040515",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/4/515",
abstract = "Emergency rescues require that first responders
provide support to evacuate injured and other civilians
who are obstructed by the hazards. In this case, the
emergency personnel can take actions strategically in
order to rescue people maximally, efficiently and
quickly. The paper studies the effectiveness of a
random neural network (RNN)-based task assignment
algorithm involving optimally matching emergency
personnel and injured civilians, so that the emergency
personnel can aid trapped people to move towards
evacuation exits in real-time. The evaluations are run
on a decision support evacuation system using the
Distributed Building Evacuation Simulator (DBES)
multi-agent platform in various emergency scenarios.
The simulation results indicate that the RNN-based task
assignment algorithm provides a near-optimal solution
to resource allocation problems, which avoids resource
wastage and improves the efficiency of the emergency
rescue process.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Huang:2013:SSV,
author = "Jun Steed Huang and Oliver Yang and Funmilyo Lawal",
title = "Sending Safety Video over {WiMAX} in Vehicle
Communications",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "4",
pages = "535--567",
day = "31",
month = oct,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5040535",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/4/535",
abstract = "This paper reports on the design of an OPNET
simulation platform to test the performance of sending
real-time safety video over VANET (Vehicular Adhoc
NETwork) using the WiMAX technology. To provide a more
realistic environment for streaming real-time video, a
video model was created based on the study of video
traffic traces captured from a realistic vehicular
camera, and different design considerations were taken
into account. A practical controller over real-time
streaming protocol is implemented to control data
traffic congestion for future road safety development.
Our driving video model was then integrated with the
WiMAX OPNET model along with a mobility model based on
real road maps. Using this simulation platform,
different mobility cases have been studied and the
performance evaluated in terms of end-to-end delay,
jitter and visual experience.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Vehicular Communications and
Networking.",
}
@Article{Jang:2013:CIS,
author = "S. Mo Jang and Yong Jin Park",
title = "The Citizen as Issue Specialists in a Changing Media
Environment",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "4",
pages = "568--579",
day = "13",
month = nov,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5040568",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/4/568",
abstract = "Although recent research suggests that the selective
nature of new media helps foster issue specialists,
little empirical evidence has been documented, mostly
due to theoretical and methodological limitations.
Extending the concept of issue publics, the present
study proposes a method to estimate the degree to which
an individual is a specialist- or a generalist-type
citizen. Applying the method to the 2008 American
National Election Studies data, the study reveals
various characteristics of specialists and generalists.
The results indicate that specialist-type citizens are
positively associated with online news use, but
negatively associated with conventional news media,
such as television, newspaper, and radio. The
implications of the growth of specialists as well as
the validity of the proposed method are discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Graham:2013:ISI,
author = "Roderick Graham",
title = "Introduction to the Special Issue on Inequality in the
Digital Environment",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "4",
pages = "580--584",
day = "26",
month = nov,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5040580",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/4/580",
abstract = "The purpose of this special issue is to explore social
inequalities in the digital environment. The motivation
for this issue is derived from the disproportionate
focus on technological and economic aspects of the
Information Society to the detriment of sociological
and cultural aspects. The research presented here falls
along three dimensions of inequality. Two papers
explore the ways that race orders interaction online. A
second pair of papers explores the experiences of
technology users with physical and mental disabilities.
A final paper looks at gender, and the higher rates of
intimate partner violence experienced by women online.
Taken as a whole, these five papers highlight some of
the ways that the digital environment can reproduce or
mitigate inequalities that have been molded and
routinized in the physical environment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Inequality in the Digital Environment.",
}
@Article{Pileggi:2013:ASG,
author = "Salvatore F. Pileggi and Robert Amor",
title = "Addressing Semantic Geographic Information Systems",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "4",
pages = "585--590",
day = "26",
month = nov,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5040585",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/4/585",
abstract = "The progressive consolidation of information
technologies on a large scale has been facilitating and
progressively increasing the production, collection,
and diffusion of geographic data, as well as
facilitating the integration of a large amount of
external information into geographic information
systems (GIS). Traditional GIS is transforming into a
consolidated information infrastructure. This
consolidated infrastructure is affecting more and more
aspects of internet computing and services. Most
popular systems (such as social networks, GPS, and
decision support systems) involve complex GIS and
significant amounts of information. As a web service,
GIS is affected by exactly the same problems that
affect the web as a whole. Therefore, next generation
GIS solutions have to address further methodological
and data engineering challenges in order to accommodate
new applications' extended requirements (in terms of
scale, interoperability, and complexity). The
conceptual and semantic modeling of GIS, as well as the
integration of semantics into current GIS, provide
highly expressive environments that are capable of
meeting the needs and requirements of a wide range of
applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Geographic Information System
(Semantic GIS).",
}
@Article{Jeong:2013:FAA,
author = "Sooman Jeong and Kisung Lee and Jungwoo Hwang and
Seongjin Lee and Youjip Won",
title = "Framework for Analyzing {Android} {I/O} Stack
Behavior: From Generating the Workload to Analyzing the
Trace",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "4",
pages = "591--610",
day = "13",
month = dec,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5040591",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/4/591",
abstract = "Abstract: The existing I/O workload generators and
trace capturing tools are not adaptable to generating
nor capturing the I/O requests of Android apps. The
Android platform needs proper tools to capture and
replay real world workload in the Android platform to
verify the result of benchmark tools. This paper
introduces Android Storage Performance Analysis Tool,
AndroStep, which is specifically designed for
characterizing and analyzing the behavior of the I/O
subsystem in Android based devices. The AndroStep
consists of Mobibench (workload generator), MOST
(Mobile Storage Analyzer), and Mobigen (workload
replayer). Mobibench is an Android app that generates a
filesystem as well as SQLite database operations.
Mobibench can also vary the number of concurrent
threads to examining the filesystem scalability to
support concurrency, e.g., metadata updates, journal
file creation/deletion. MOST captures the trace and
extracts key filesystem access characteristics such as
access pattern with respect to file types, ratio
between random vs. sequential access, ratio between
buffered vs. synchronous I/O, fraction of metadata
accesses, etc. MOST implements reverse mapping feature
(finding an inode for a given block) and retrospective
reverse mapping (finding an inode for a deleted file).
Mobigen is a trace capturing and replaying tool that is
specifically designed to perform the user experiment
without actual human intervention. Mobigen records the
system calls generated from the user behavior and
sanitizes the trace for replayable form. Mobigen can
replay this trace on different Android platforms or
with different I/O stack configurations. As an example
of using AndroStep, we analyzed the performances of
twelve Android smartphones and the SQLite performances
on five different filesystems. AndroStep makes
otherwise time consuming I/O stack analysis extremely
versatile. AndroStep makes a significant contribution
in terms of shedding light on internal behavior of the
Android I/O stack.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Mobile Engineering.",
}
@Article{Wan:2013:LEC,
author = "Liangtian Wan and Lutao Liu and Guangjie Han and Joel
J. P. C. Rodrigues",
title = "A Low Energy Consumption {DOA} Estimation Approach for
Conformal Array in Ultra-Wideband",
journal = j-FUTURE-INTERNET,
volume = "5",
number = "4",
pages = "611--630",
day = "16",
month = dec,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi5040611",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/5/4/611",
abstract = "Most direction-of-arrival (DOA) estimation approaches
for conformal array suffer from high computational
complexity, which cause high energy loss for the
direction finding system. Thus, a low energy
consumption DOA estimation algorithm for conformal
array antenna is proposed in this paper. The arbitrary
baseline direction finding algorithm is extended to
estimate DOA for a conformal array in ultra-wideband.
The rotation comparison method is adopted to solve the
ambiguity of direction finding. The virtual baseline
approach is used to construct the virtual elements.
Theoretically, the virtual elements can be extended in
the space flexibility. Four elements (both actual and
virtual elements) can be used to obtain a group of
solutions. The space angle estimation can be obtained
by using sub-array divided technique and matrix
inversion method. The stability of the proposed
algorithm can be guaranteed by averaging the angles
obtained by different sub-arrays. Finally, the
simulation results verify the effectiveness of the
proposed method with high DOA estimation accuracy and
relatively low computational complexity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Green Communications and Networking.",
}
@Article{Hermann:2014:CIP,
author = "Steffen Hermann and Benjamin Fabian",
title = "A Comparison of {Internet} Protocol {(IPv6)} Security
Guidelines",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "1",
pages = "1--60",
day = "10",
month = jan,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/1/1",
abstract = "The next generation of the Internet Protocol (IPv6) is
currently about to be introduced in many organizations.
However, its security features are still a very novel
area of expertise for many practitioners. This study
evaluates guidelines for secure deployment of IPv6,
published by the U.S. NIST and the German federal
agency BSI, for topicality, completeness and depth. The
later two are scores defined in this paper and are
based on the Requests for Comments relevant for IPv6
that were categorized, weighted and ranked for
importance using an expert survey. Both guides turn out
to be of practical value, but have a specific focus and
are directed towards different audiences. Moreover,
recommendations for possible improvements are
presented. Our results could also support strategic
management decisions on security priorities as well as
for the choice of security guidelines for IPv6
roll-outs.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Branchi:2014:AMS,
author = "Pablo E. Branchi and Carlos Fern{\'a}ndez-Valdivielso
and Ignacio R. Matias",
title = "Analysis Matrix for Smart Cities",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "1",
pages = "61--75",
day = "22",
month = jan,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6010061",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/1/61",
abstract = "The current digital revolution has ignited the
evolution of communications grids and the development
of new schemes for productive systems. Traditional
technologic scenarios have been challenged, and Smart
Cities have become the basis for urban competitiveness.
The citizen is the one who has the power to set new
scenarios, and that is why a definition of the way
people interact with their cities is needed, as is
commented in the first part of the article. At the same
time, a lack of clarity has been detected in the way of
describing what Smart Cities are, and the second part
will try to set the basis for that. For all before, the
information and communication technologies that manage
and transform 21st century cities must be reviewed,
analyzing their impact on new social behaviors that
shape the spaces and means of communication, as is
posed in the experimental section, setting the basis
for an analysis matrix to score the different elements
that affect a Smart City environment. So, as the better
way to evaluate what a Smart City is, there is a need
for a tool to score the different technologies on the
basis of their usefulness and consequences, considering
the impact of each application. For all of that, the
final section describes the main objective of this
article in practical scenarios, considering how the
technologies are used by citizens, who must be the main
concern of all urban development.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Neis:2014:RDF,
author = "Pascal Neis and Dennis Zielstra",
title = "Recent Developments and Future Trends in Volunteered
Geographic Information Research: The Case of
{OpenStreetMap}",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "1",
pages = "76--106",
day = "27",
month = jan,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6010076",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/1/76",
abstract = "User-generated content (UGC) platforms on the Internet
have experienced a steep increase in data contributions
in recent years. The ubiquitous usage of
location-enabled devices, such as smartphones, allows
contributors to share their geographic information on a
number of selected online portals. The collected
information is oftentimes referred to as volunteered
geographic information (VGI). One of the most utilized,
analyzed and cited VGI-platforms, with an increasing
popularity over the past few years, is OpenStreetMap
(OSM), whose main goal it is to create a freely
available geographic database of the world. This paper
presents a comprehensive overview of the latest
developments in VGI research, focusing on its
collaboratively collected geodata and corresponding
contributor patterns. Additionally, trends in the realm
of OSM research are discussed, highlighting which
aspects need to be investigated more closely in the
near future.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning 2014.",
}
@Article{Office:2014:ARF,
author = "Future Internet Editorial Office",
title = "Acknowledgement to Reviewers of Future {Internet} in
2013",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "1",
pages = "107--108",
day = "24",
month = feb,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6010107",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/1/107",
abstract = "The term ``crowdsourcing'' was initially introduced by
Howe in his article ``The Rise of Crowdsourcing'' [1].
During the last few years, crowdsourcing has become
popular among companies, institutions and universities,
as a crowd-centered modern ``tool'' for problem
solving. Crowdsourcing is mainly based on the idea of
an open-call publication of a problem, requesting the
response of the crowd for reaching the most appropriate
solution. The focus of this paper is on the role of
crowdsourcing in knowledge acquisition for planning
applications. The first part provides an introduction
to the origins of crowdsourcing in knowledge
generation. The second part elaborates on the concept
of crowdsourcing, while some indicative platforms
supporting the development of crowdsourcing
applications are also described. The third part focuses
on the integration of crowdsourcing with certain web
technologies and GIS (Geographic Information Systems),
for spatial planning applications, while in the fourth
part, a general framework of the rationale behind
crowdsourcing applications is presented. Finally, the
fifth part focuses on a range of case studies that
adopted several crowdsourcing techniques.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Papadopoulou:2014:CTK,
author = "Chrysaida-Aliki Papadopoulou and Maria Giaoutzi",
title = "Crowdsourcing as a Tool for Knowledge Acquisition in
Spatial Planning",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "1",
pages = "109--125",
day = "05",
month = mar,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6010109",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/1/109",
abstract = "The term ``crowdsourcing'' was initially introduced by
Howe in his article ``The Rise of Crowdsourcing'' [1].
During the last few years, crowdsourcing has become
popular among companies, institutions and universities,
as a crowd-centered modern ``tool'' for problem
solving. Crowdsourcing is mainly based on the idea of
an open-call publication of a problem, requesting the
response of the crowd for reaching the most appropriate
solution. The focus of this paper is on the role of
crowdsourcing in knowledge acquisition for planning
applications. The first part provides an introduction
to the origins of crowdsourcing in knowledge
generation. The second part elaborates on the concept
of crowdsourcing, while some indicative platforms
supporting the development of crowdsourcing
applications are also described. The third part focuses
on the integration of crowdsourcing with certain web
technologies and GIS (Geographic Information Systems),
for spatial planning applications, while in the fourth
part, a general framework of the rationale behind
crowdsourcing applications is presented. Finally, the
fifth part focuses on a range of case studies that
adopted several crowdsourcing techniques.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning 2014.",
}
@Article{Trinugroho:2014:IIP,
author = "Yohanes Baptista Dafferianto Trinugroho",
title = "Information Integration Platform for Patient-Centric
Healthcare Services: Design, Prototype and
Dependability Aspects",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "1",
pages = "126--154",
day = "06",
month = mar,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6010126",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/1/126",
abstract = "Technology innovations have pushed today's healthcare
sector to an unprecedented new level. Various portable
and wearable medical and fitness devices are being sold
in the consumer market to provide the self-empowerment
of a healthier lifestyle to society. Many vendors
provide additional cloud-based services for devices
they manufacture, enabling the users to visualize,
store and share the gathered information through the
Internet. However, most of these services are
integrated with the devices in a closed ``silo''
manner, where the devices can only be used with the
provided services. To tackle this issue, an information
integration platform (IIP) has been developed to
support communications between devices and
Internet-based services in an event-driven fashion by
adopting service-oriented architecture (SOA) principles
and a publish/subscribe messaging pattern. It follows
the ``Internet of Things'' (IoT) idea of connecting
everyday objects to various networks and to enable the
dissemination of the gathered information to the global
information space through the Internet. A
patient-centric healthcare service environment is
chosen as the target scenario for the deployment of the
platform, as this is a domain where IoT can have a
direct positive impact on quality of life enhancement.
This paper describes the developed platform, with
emphasis on dependability aspects, including
availability, scalability and security.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Toward people aware IoT.",
}
@Article{Lan:2014:NDE,
author = "Xiaoyu Lan and Liangtian Wan and Guangjie Han and Joel
J. P. C. Rodrigues",
title = "A Novel {DOA} Estimation Algorithm Using Array
Rotation Technique",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "1",
pages = "155--170",
day = "17",
month = mar,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6010155",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/1/155",
abstract = "The performance of traditional direction of arrival
(DOA) estimation algorithm based on uniform circular
array (UCA) is constrained by the array aperture.
Furthermore, the array requires more antenna elements
than targets, which will increase the size and weight
of the device and cause higher energy loss. In order to
solve these issues, a novel low energy algorithm
utilizing array base-line rotation for multiple targets
estimation is proposed. By rotating two elements and
setting a fixed time delay, even the number of elements
is selected to form a virtual UCA. Then, the received
data of signals will be sampled at multiple positions,
which improves the array elements utilization greatly.
2D-DOA estimation of the rotation array is accomplished
via multiple signal classification (MUSIC) algorithms.
Finally, the Cramer-Rao bound (CRB) is derived and
simulation results verified the effectiveness of the
proposed algorithm with high resolution and estimation
accuracy performance. Besides, because of the
significant reduction of array elements number, the
array antennas system is much simpler and less complex
than traditional array.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Green Communications and Networking.",
}
@Article{Motoyoshi:2014:MTF,
author = "Gen Motoyoshi and Kenji Leibnitz and Masayuki Murata",
title = "Mobility Tolerant Firework Routing for Improving
Reachability in {MANETs}",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "1",
pages = "171--189",
day = "24",
month = mar,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6010171",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/1/171",
abstract = "In this paper, we investigate our mobility-assisted
and adaptive broadcast routing mechanism, called
Mobility Tolerant Firework Routing (MTFR), which
utilizes the concept of potentials for routing and
improves node reachability, especially in situations
with high mobility, by including a broadcast mechanism.
We perform detailed evaluations by simulations in a
mobile environment and demonstrate the advantages of
MTFR over conventional potential-based routing. In
particular, we show that MTFR produces better
reachability in many aspects at the expense of a small
additional transmission delay and intermediate traffic
overhead, making MTFR a promising routing protocol and
feasible for future mobile Internet infrastructures.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lallie:2014:PCM,
author = "Harjinder Singh Lallie",
title = "The Problems and Challenges of Managing Crowd Sourced
Audio-Visual Evidence",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "2",
pages = "190--202",
day = "01",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6020190",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/2/190",
abstract = "A number of recent incidents, such as the Stanley Cup
Riots, the uprisings in the Middle East and the London
riots have demonstrated the value of crowd sourced
audio-visual evidence wherein citizens submit
audio-visual footage captured on mobile phones and
other devices to aid governmental institutions,
responder agencies and law enforcement authorities to
confirm the authenticity of incidents and, in the case
of criminal activity, to identify perpetrators. The use
of such evidence can present a significant logistical
challenge to investigators, particularly because of the
potential size of data gathered through such mechanisms
and the added problems of time-lining disparate sources
of evidence and, subsequently, investigating the
incident(s). In this paper we explore this problem and,
in particular, outline the pressure points for an
investigator. We identify and explore a number of
particular problems related to the secure receipt of
the evidence, imaging, tagging and then time-lining the
evidence, and the problem of identifying duplicate and
near duplicate items of audio-visual evidence.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Contemporary and Future Digital
Forensics.",
}
@Article{Bi:2014:RDE,
author = "Huibo Bi",
title = "Routing Diverse Evacuees with the Cognitive Packet
Network Algorithm",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "2",
pages = "203--222",
day = "17",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6020203",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/2/203",
abstract = "Regarding mobility, health conditions and personal
preferences, evacuees can be categorized into different
classes in realistic environments. Previous emergency
navigation algorithms that direct evacuees with a
single decision rule cannot fulfil civilians' distinct
service requirements and increase the likelihood of
inducing destructive crowd behaviours, such as
clogging, pushing and trampling, due to diverse
mobility. This paper explores a distributed emergency
navigation algorithm that employs the cognitive packet
network concept to tailor different quality of service
needs to different categories of evacuees. In addition,
a congestion-aware algorithm is presented to predict
the future congestion degree of a path with respect to
the observed population density, arrival rate and
service rate of each route segment. Experiments are
implemented in a simulated environment populated with
autonomous agents. Results show that our algorithm can
increase the number of survivors while providing
improved quality of service.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zoppi:2014:OAA,
author = "Corrado Zoppi and Sabrina Lai",
title = "An Ontology of the Appropriate Assessment of Municipal
Master Plans Related to {Sardinia} ({Italy})",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "2",
pages = "223--241",
day = "23",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6020223",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/2/223",
abstract = "This paper discusses some key points related to the
ontology of the ``appropriate assessment'' [1]
procedure concerning plans significantly affecting
Natura 2000 sites. We study this ontology by discussing
its implementation into the adjustment process of the
master plans of the regional municipalities of Sardinia
(Italy) to the Regional Landscape Plan (RLP) and put as
evidence some important general observations, coming
from the case study, concerning the utility and
effectiveness of the ontological conceptual framework
in order to help planners and decision-makers
understand and structure the assessment process of
plans.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning 2014.",
}
@Article{Hare:2014:EMC,
author = "Jonathon S. Hare and David P. Dupplaw and Paul H.
Lewis and Wendy Hall and Kirk Martinez",
title = "Exploiting Multimedia in Creating and Analysing
Multimedia {Web} Archives",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "2",
pages = "242--260",
day = "24",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6020242",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/2/242",
abstract = "The data contained on the web and the social web are
inherently multimedia and consist of a mixture of
textual, visual and audio modalities. Community
memories embodied on the web and social web contain a
rich mixture of data from these modalities. In many
ways, the web is the greatest resource ever created by
human-kind. However, due to the dynamic and distributed
nature of the web, its content changes, appears and
disappears on a daily basis. Web archiving provides a
way of capturing snapshots of (parts of) the web for
preservation and future analysis. This paper provides
an overview of techniques we have developed within the
context of the EU funded ARCOMEM (ARchiving COmmunity
MEMories) project to allow multimedia web content to be
leveraged during the archival process and for
post-archival analysis. Through a set of use cases, we
explore several practical applications of multimedia
analytics within the realm of web archiving, web
archive analysis and multimedia data on the web in
general.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Archiving Community Memories.",
}
@Article{Latvakoski:2014:THA,
author = "Juhani Latvakoski and Mahdi {Ben Alaya} and Herve
Ganem and Bashar Jubeh and Antti Iivari and Jeremie
Leguay and Jaume Martin Bosch and Niclas Granqvist",
title = "Towards Horizontal Architecture for Autonomic {M2M}
Service Networks",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "2",
pages = "261--301",
day = "06",
month = may,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6020261",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/2/261",
abstract = "Today, increasing number of industrial application
cases rely on the Machine to Machine (M2M) services
exposed from physical devices. Such M2M services enable
interaction of physical world with the core processes
of company information systems. However, there are
grand challenges related to complexity and ``vertical
silos'' limiting the M2M market scale and
interoperability. It is here expected that horizontal
approach for the system architecture is required for
solving these challenges. Therefore, a set of
architectural principles and key enablers for the
horizontal architecture have been specified in this
work. A selected set of key enablers called as
autonomic M2M manager, M2M service capabilities, M2M
messaging system, M2M gateways towards energy
constrained M2M asset devices and creation of trust to
enable end-to-end security for M2M applications have
been developed. The developed key enablers have been
evaluated separately in different scenarios dealing
with smart metering, car sharing and electric bike
experiments. The evaluation results shows that the
provided architectural principles, and developed key
enablers establish a solid ground for future research
and seem to enable communication between objects and
applications, which are not initially been designed to
communicate together. The aim as the next step in this
research is to create a combined experimental system to
evaluate the system interoperability and performance in
a more detailed manner.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Toward people aware IoT.",
}
@Article{Braun:2014:SDN,
author = "Wolfgang Braun and Michael Menth",
title = "Software-Defined Networking Using {OpenFlow}:
Protocols, Applications and Architectural Design
Choices",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "2",
pages = "302--336",
day = "12",
month = may,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6020302",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/2/302",
abstract = "We explain the notion of software-defined networking
(SDN), whose southbound interface may be implemented by
the OpenFlow protocol. We describe the operation of
OpenFlow and summarize the features of specification
versions 1.0-1.4. We give an overview of existing
SDN-based applications grouped by topic areas. Finally,
we point out architectural design choices for SDN using
OpenFlow and discuss their performance implications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zafiropoulos:2014:SFG,
author = "Kostas Zafiropoulos and Konstantinos Antoniadis and
Vasiliki Vrana",
title = "Sharing Followers in e-Government {Twitter} Accounts:
The Case of {Greece}",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "2",
pages = "337--358",
day = "14",
month = may,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6020337",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/2/337",
abstract = "The recent emergence of e-government and online social
media offers opportunities for governments to meet the
demands and expectations of citizens, to provide
value-added services and overcome barriers of reduced
public budgets. Twitter is the most popular
microblogging platform that can facilitate interaction
and engagement. It is widely used by government
agencies, public affairs practitioners, non-government
organizations, members of Parliament and politicians.
The paper aims to explore the use of Twitter by
government agencies in Greece and record Twitter
followers' preferences regarding which accounts they
follow. The paper records 27 Greek e-government Twitter
accounts and their 107,107 followers. It uses a data
mining technique, association rules and two
multivariate statistical methods, multidimensional
scaling and cluster analysis and proposes the use of a
similarity measure, suitable for describing Twitter
account proximity. In this way, the paper locates
accounts that share followers. Groups of Twitter
accounts are located, and their common orientation is
described. The analysis not only describes Twitter
account similarities and group formation, but to some
extent, the followers' preferences and habits of
obtaining information through Twitter, as well.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Open Government Meets Social Data.",
}
@Article{Copeland:2014:UPV,
author = "Andrea Copeland",
title = "The Use of Personal Value Estimations to Select Images
for Preservation in Public Library Digital Community
Collections",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "2",
pages = "359--377",
day = "27",
month = may,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6020359",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/2/359",
abstract = "A considerable amount of information, particularly in
image form, is shared on the web through social
networking sites. If any of this content is worthy of
preservation, who decides what is to be preserved and
based on what criteria. This paper explores the
potential for public libraries to assume this role of
community digital repositories through the creation of
digital collections. Thirty public library users and
thirty librarians were solicited from the Indianapolis
metropolitan area to evaluate five images selected from
Flickr in terms of their value to public library
digital collections and their worthiness of long-term
preservation. Using a seven-point Likert scale,
participants assigned a value to each image in terms of
its importance to self, family and society.
Participants were then asked to explain the reasoning
behind their valuations. Public library users and
librarians had similar value estimations of the images
in the study. This is perhaps the most significant
finding of the study, given the importance of
collaboration and forming partnerships for building and
sustaining community collections and archives.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Archiving Community Memories.",
}
@Article{Mearns:2014:TMS,
author = "Graeme Mearns and Rebecca Simmonds and Ranald
Richardson and Mark Turner and Paul Watson and Paolo
Missier",
title = "Tweet My Street: a Cross-Disciplinary Collaboration
for the Analysis of Local {Twitter} Data",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "2",
pages = "378--396",
day = "27",
month = may,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6020378",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/2/378",
abstract = "Tweet My Street is a cross-disciplinary project
exploring the extent to which data derived from Twitter
can reveal more about spatial and temporal behaviours
and the meanings attached to these locally. This is
done with a longer-term view to supporting the
coproduction and delivery of local services, complaint
mechanisms and horizontal community support networks.
The project has involved the development of a web-based
software application capable of retrieving, storing and
visualising geo-located ``tweets'' (and associated
digital content) from Twitter's Firehose. This has been
piloted in Newcastle upon Tyne (UK) and has proven a
scalable tool that can aid the analysis of social media
data geographically. Beyond explaining efforts to
analyse pilot data via this software, this paper
elucidates three methodological challenges encountered
during early collaboration. These include issues
relating to ``proximity'' with subjects, ethics and
critical questions about scholars' digital
responsibilities during the neogeographic turn.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning 2014.",
}
@Article{Scassa:2014:POG,
author = "Teresa Scassa",
title = "Privacy and Open Government",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "2",
pages = "397--413",
day = "18",
month = jun,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6020397",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:51 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/2/397",
abstract = "The public-oriented goals of the open government
movement promise increased transparency and
accountability of governments, enhanced citizen
engagement and participation, improved service
delivery, economic development and the stimulation of
innovation. In part, these goals are to be achieved by
making more and more government information public in
reusable formats and under open licences. This paper
identifies three broad privacy challenges raised by
open government. The first is how to balance privacy
with transparency and accountability in the context of
``public'' personal information. The second challenge
flows from the disruption of traditional approaches to
privacy based on a collapse of the distinctions between
public and private sector actors. The third challenge
is that of the potential for open government data-even
if anonymized-to contribute to the big data environment
in which citizens and their activities are increasingly
monitored and profiled.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Open Government Meets Social Data.",
}
@Article{Roy:2014:ODO,
author = "Jeffrey Roy",
title = "Open Data and Open Governance in {Canada}: a Critical
Examination of New Opportunities and Old Tensions",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "3",
pages = "414--432",
day = "27",
month = jun,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6030414",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/3/414",
abstract = "As governments develop open data strategies, such
efforts reflect the advent of the Internet, the
digitization of government, and the emergence of
meta-data as a wider socio-economic and societal
transformational. Within this context the purpose of
this article is twofold. First, we seek to both situate
and examine the evolution and effectiveness of open
data strategies in the Canadian public sector, with a
particular focus on municipal governments that have led
this movement. Secondly, we delve more deeply into-if
and how, open data can facilitate more open and
innovative forms of governance enjoining an
outward-oriented public sector (across all government
levels) with an empowered and participative society.
This latter vantage point includes four main and
inter-related dimensions: (i) conceptualizing public
value and public engagement; (ii) media
relations-across traditional intermediaries and
channels and new social media; (iii) political culture
and the politics of privacy in an increasingly
data-centric world; and (iv) federated architectures
and the alignment of localized, sub-national, and
national strategies and governance mechanisms. This
article demonstrates how each of these dimensions
includes important determinants of not only open data's
immediate impacts but also its catalytic ability to
forge wider and collective innovation and more holistic
governance renewal.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Open Government Meets Social Data.",
}
@Article{Demidova:2014:AEF,
author = "Elena Demidova and Nicola Barbieri and Stefan Dietze
and Adam Funk and Helge Holzmann and Diana Maynard and
Nikolaos Papailiou and Wim Peters and Thomas Risse and
Dimitris Spiliotopoulos",
title = "Analysing and Enriching Focused {Semantic Web}
Archives for {Parliament} Applications",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "3",
pages = "433--456",
day = "30",
month = jul,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6030433",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/3/433",
abstract = "The web and the social web play an increasingly
important role as an information source for Members of
Parliament and their assistants, journalists, political
analysts and researchers. It provides important and
crucial background information, like reactions to
political events and comments made by the general
public. The case study presented in this paper is
driven by two European parliaments (the Greek and the
Austrian parliament) and targets an effective
exploration of political web archives. In this paper,
we describe semantic technologies deployed to ease the
exploration of the archived web and social web content
and present evaluation results.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Archiving Community Memories.",
}
@Article{Maynard:2014:SCA,
author = "Diana Maynard and Gerhard Gossen and Adam Funk and
Marco Fisichella",
title = "Should {I} Care about Your Opinion? {Detection} of
Opinion Interestingness and Dynamics in Social Media",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "3",
pages = "457--481",
day = "13",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6030457",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/3/457",
abstract = "In this paper, we describe a set of reusable text
processing components for extracting opinionated
information from social media, rating it for
interestingness, and for detecting opinion events. We
have developed applications in GATE to extract named
entities, terms and events and to detect opinions about
them, which are then used as the starting point for
opinion event detection. The opinions are then
aggregated over larger sections of text, to give some
overall sentiment about topics and documents, and also
some degree of information about interestingness based
on opinion diversity. We go beyond traditional opinion
mining techniques in a number of ways: by focusing on
specific opinion-target extraction related to key terms
and events, by examining and dealing with a number of
specific linguistic phenomena, by analysing and
visualising opinion dynamics over time, and by
aggregating the opinions in different ways for a more
flexible view of the information contained in the
documents.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Archiving Community Memories.",
}
@Article{Tsimpourla:2014:RDL,
author = "Clare Tsimpourla",
title = "{Rikki} Don't Lose That Number: Enumerated Human
Rights in a Society of Infinite Connections",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "3",
pages = "482--497",
day = "19",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6030482",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/3/482",
abstract = "The international Human Rights regime acknowledges a
certain number of rights. That number, albeit
increasing since its inception, does not seem able to
keep up with the pace of modern technology. Human
rights today are not only exercised in the tangible
world; they are also exercised on a daily basis in a
world of ubiquitous computing-as such they can be
easily breached with a mere click of a button. To make
matters worse, these rights are controlled largely by
multinational corporations that have little regard for
their value. In this paper we will attempt to explore
the difficulties the global human rights regime faces
today, the challenge that is its enforcement, and
whether it has come to a standstill in an age where
connections grow faster than the rule of law.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Digital Inequalities.",
}
@Article{Viscusi:2014:ASV,
author = "Gianluigi Viscusi and Marco Castelli and Carlo
Batini",
title = "Assessing Social Value in Open Data Initiatives: a
Framework",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "3",
pages = "498--517",
day = "19",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6030498",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/3/498",
abstract = "Open data initiatives are characterized, in several
countries, by a great extension of the number of data
sets made available for access by public
administrations, constituencies, businesses and other
actors, such as journalists, international institutions
and academics, to mention a few. However, most of the
open data sets rely on selection criteria, based on a
technology-driven perspective, rather than a focus on
the potential public and social value of data to be
published. Several experiences and reports confirm this
issue, such as those of the Open Data Census. However,
there are also relevant best practices. The goal of
this paper is to investigate the different dimensions
of a framework suitable to support public
administrations, as well as constituencies, in
assessing and benchmarking the social value of open
data initiatives. The framework is tested on three
initiatives, referring to three different countries,
Italy, the United Kingdom and Tunisia. The countries
have been selected to provide a focus on European and
Mediterranean countries, considering also the
difference in legal frameworks (civic law vs. common
law countries).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Open Government Meets Social Data.",
}
@Article{Plachouras:2014:ACA,
author = "Vassilis Plachouras and Florent Carpentier and
Muhammad Faheem and Julien Masan{\`e}s and Thomas Risse
and Pierre Senellart and Patrick Siehndel and Yannis
Stavrakas",
title = "{ARCOMEM} Crawling Architecture",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "3",
pages = "518--541",
day = "19",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6030518",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/3/518",
abstract = "The World Wide Web is the largest information
repository available today. However, this information
is very volatile and Web archiving is essential to
preserve it for the future. Existing approaches to Web
archiving are based on simple definitions of the scope
of Web pages to crawl and are limited to basic
interactions with Web servers. The aim of the ARCOMEM
project is to overcome these limitations and to provide
flexible, adaptive and intelligent content acquisition,
relying on social media to create topical Web archives.
In this article, we focus on ARCOMEM's crawling
architecture. We introduce the overall architecture and
we describe its modules, such as the online analysis
module, which computes a priority for the Web pages to
be crawled, and the Application-Aware Helper which
takes into account the type of Web sites and
applications to extract structure from crawled content.
We also describe a large-scale distributed crawler that
has been developed, as well as the modifications we
have implemented to adapt Heritrix, an open source
crawler, to the needs of the project. Our experimental
results from real crawls show that ARCOMEM's crawling
architecture is effective in acquiring focused
information about a topic and leveraging the
information from social media.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Archiving Community Memories.",
}
@Article{Formosa:2014:NPR,
author = "Saviour Formosa",
title = "{NeoGeography} and Preparedness for Real-to-Virtual
World Knowledge Transfer: Conceptual Steps to
{Minecraft Malta}",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "3",
pages = "542--555",
day = "28",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6030542",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/3/542",
abstract = "Societies have rapidly morphed into complex entities
that are creating accessibility, yet, at the same time,
they are developing new forms of neogeographic-poverty
related to information uptake. Those that have managed
to partake in the opportunities provided by the web
have new vistas to survive in, in contrast to the new
poor who have limited or no access to information. New
forms of data in spatial format are accessible to all,
however few realize the implications of such a
transitional change in wellbeing: Whether entire
societies or individuals. The different generations
taking up the information access can face different
levels of accessibility that may be limited by access
to online data, knowledge of usage of tools and the
understanding of the results, all within the limits on
the spaces they are familiar with. This paper reviews a
conceptual process underlining the initial steps of a
long-term project in the Maltese Islands that seeks to
create an online series of tools that bring the concept
of ``physical place'' to the different generations
through the management of a major project, the creation
of a 3D virtuality, employing scanning processes, GIS,
conversion aspects, and a small block-based Minecraft
engine.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning 2014.",
}
@Article{Kaschesky:2014:DVF,
author = "Michael Kaschesky and Luigi Selmi",
title = "{7R} Data Value Framework for Open Data in Practice:
{Fusepool}",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "3",
pages = "556--583",
day = "08",
month = sep,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6030556",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/3/556",
abstract = "Based on existing literature, this article makes a
case for open (government) data as supporting political
efficiency, socio-economic innovation and
administrative efficiency, but also finds a lack of
measurable impact. It attributes the lack of impact to
shortcomings regarding data access (must be efficient)
and data usefulness (must be effective). To address
these shortcomings, seven key activities that add value
to data are identified and are combined into the 7R
Data Value Framework, which is an applied methodology
for linked data to systematically address both
technical and social shortcomings. The 7R Data Value
Framework is then applied to the international Fusepool
project that develops a set of integrated software
components to ease the publishing of open data based on
linked data and associated best practices. Real-life
applications for the Dutch Parliament and the Libraries
of Free University of Berlin are presented, followed by
a concluding discussion.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Open Government Meets Social Data.",
}
@Article{Irons:2014:DFI,
author = "Alastair Irons and Harjinder Singh Lallie",
title = "Digital Forensics to Intelligent Forensics",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "3",
pages = "584--596",
day = "12",
month = sep,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6030584",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/3/584",
abstract = "In this paper we posit that current investigative
techniques-particularly as deployed by law enforcement,
are becoming unsuitable for most types of crime
investigation. The growth in cybercrime and the
complexities of the types of the cybercrime coupled
with the limitations in time and resources, both
computational and human, in addressing cybercrime put
an increasing strain on the ability of digital
investigators to apply the processes of digital
forensics and digital investigations to obtain timely
results. In order to combat the problems, there is a
need to enhance the use of the resources available and
move beyond the capabilities and constraints of the
forensic tools that are in current use. We argue that
more intelligent techniques are necessary and should be
used proactively. The paper makes the case for the need
for such tools and techniques, and investigates and
discusses the opportunities afforded by applying
principles and procedures of artificial intelligence to
digital forensics intelligence and to intelligent
forensics and suggests that by applying new techniques
to digital investigations there is the opportunity to
address the challenges of the larger and more complex
domains in which cybercrimes are taking place.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Contemporary and Future Digital
Forensics.",
}
@Article{Perger:2014:GGW,
author = "Christoph Perger and Ellsworth LeDrew and Linda See
and Steffen Fritz",
title = "Geography {Geo-Wiki} in the Classroom: Using
Crowdsourcing to Enhance Geographical Teaching",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "4",
pages = "597--611",
day = "29",
month = sep,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6040597",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/4/597",
abstract = "Geo-Wiki is a crowdsourcing tool used to derive
information, based on satellite imagery, to validate
and enhance global land cover. Around 5000 users are
registered, who contribute to different campaigns to
collect data across various domains (e.g., agriculture,
biomass, human impact, etc.). However, seeing the
Earth's surface from above does not provide all of the
necessary information for understanding what is
happening on the ground. Instead, we need to enhance
this experience with local knowledge or with additional
information, such as geo-located photographs of surface
features with annotation. The latest development in
enhancing Geo-Wiki in this context has been achieved
through collaboration with the University of Waterloo
to set up a separate branch called Geography Geo-Wiki
for use in undergraduate teaching. We provide the
pedagogical objectives for this branch and describe two
modules that we have introduced in first and third year
Physical Geography classes. The majority of the
feedback was positive and in, many cases, was part of
what the student liked best about the course. Future
plans include the development of additional assignments
for the study of environmental processes using Geo-Wiki
that would engage students in a manner that is very
different from that of conventional teaching.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning 2014.",
}
@Article{Dalmau:2014:RDM,
author = "Francesc Valls Dalmau and Pilar Garcia-Almirall and
Ernest Redondo Dom{\'\i}nguez and David Fonseca
Escudero",
title = "From Raw Data to Meaningful Information: a
Representational Approach to Cadastral Databases in
Relation to Urban Planning",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "4",
pages = "612--639",
day = "24",
month = oct,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6040612",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/4/612",
abstract = "Digesting the data hose that cities are constantly
producing is complex; data is usually structured with
different criteria, which makes comparative analysis of
multiple cities challenging. However, the publicly
available data from the Spanish cadaster contains urban
information in a documented format with common
semantics for the whole territory, which makes these
analyses possible. This paper uses the information
about the 3D geometry of buildings, their use and their
year of construction, stored in cadastral databases, to
study the relation between the built environment (what
the city is) and the urban plan (what the city wants to
become), translating the concepts of the cadastral data
into the semantics of the urban plan. Different
representation techniques to better understand the city
from the pedestrians' point of view and to communicate
this information more effectively are also discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Geographic Information System
(Semantic GIS).",
}
@Article{Batita:2014:TCF,
author = "Wided Batita and St{\'e}phane Roche and Yvan
B{\'e}dard and Claude Caron",
title = "Towards a Conceptual Framework for {WikiGIS}",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "4",
pages = "640--672",
day = "29",
month = oct,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6040640",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/4/640",
abstract = "As an emerging complex concept, GeoDesign requires an
innovative theoretical basis, tools, supports and
practices. For this reason, we propose a new concept,
``WikiGIS'', designed to answer some dimensions of the
GeoDesign process. WikiGIS focuses on the needs of
GeoDesign, but we leave the door open for future
improvement when tested in other areas that may have
additional needs. WikiGIS is built on Web 2.0
technologies-and primarily on wiki-to manage the
tracking of participants' editing (i.e., managing the
contributions history). It also offers GIS functions
for geoprocessing and a design-based approach for
sketching proposals. One of the main strengths of
WikiGIS is its ability to manage the traceability of
contributions with an easy and dynamical access, data
quality and deltification. The core of this paper
consists of presenting a conceptual framework for
WikiGIS using UML diagrams. A user interface is
presented later to show how our WikiGIS proposal works.
This interface is simply a means to illustrate the
concepts underlying WikiGIS.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning 2014.",
}
@Article{Antonio:2014:GDD,
author = "Amy Antonio and David Tuffley",
title = "The Gender Digital Divide in Developing Countries",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "4",
pages = "673--687",
day = "31",
month = oct,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6040673",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/4/673",
abstract = "Empirical studies clearly show that women in the
developing world have significantly lower technology
participation rates than men; a result of entrenched
socio-cultural attitudes about the role of women in
society. However, as studies are beginning to show,
when those women are able to engage with Internet
technology, a wide range of personal, family and
community benefits become possible. The key to these
benefits is on-line education, the access to which sets
up a positive feedback loop. This review gives an
overview of the digital divide, before focusing
specifically on the challenges women in developing
countries face in accessing the Internet. Current
gender disparities in Internet use will be outlined and
the barriers that potentially hinder women's access and
participation in the online world will be considered.
We will then look at the potential opportunities for
women's participation in a global digital society along
with a consideration of current initiatives that have
been developed to mitigate gender inequity in
developing countries. We will also consider a promising
avenue for future research.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Digital Inequalities.",
}
@Article{Risse:2014:AAS,
author = "Thomas Risse and Elena Demidova and Stefan Dietze and
Wim Peters and Nikolaos Papailiou and Katerina Doka and
Yannis Stavrakas and Vassilis Plachouras and Pierre
Senellart and Florent Carpentier and Amin Mantrach and
Bogdan Cautis and Patrick Siehndel and Dimitris
Spiliotopoulos",
title = "The {ARCOMEM} Architecture for Social- and
Semantic-Driven {Web} Archiving",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "4",
pages = "688--716",
day = "04",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6040688",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/4/688",
abstract = "The constantly growing amount ofWeb content and the
success of the SocialWeb lead to increasing needs for
Web archiving. These needs go beyond the pure
preservation of Web pages. Web archives are turning
into ``community memories'' that aim at building a
better understanding of the public view on, e.g.,
celebrities, court decisions and other events. Due to
the size of the Web, the traditional ``collect-all''
strategy is in many cases not the best method to build
Web archives. In this paper, we present the ARCOMEM
(From Future Internet 2014, 6 689 Collect-All Archives
to Community Memories) architecture and implementation
that uses semantic information, such as entities,
topics and events, complemented with information from
the Social Web to guide a novel Web crawler. The
resulting archives are automatically enriched with
semantic meta-information to ease the access and allow
retrieval based on conditions that involve high-level
concepts.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Archiving Community Memories.",
}
@Article{Hatlevik:2014:UMA,
author = "Ove Edvard Hatlevik and Karoline T{\o}mte",
title = "Using Multilevel Analysis to Examine the Relationship
between Upper Secondary Students {Internet} Safety
Awareness, Social Background and Academic Aspirations",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "4",
pages = "717--734",
day = "14",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6040717",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/4/717",
abstract = "Since 2009, most Norwegian students in upper secondary
have had access to their own personal computer at
school. Hence, with the increased access to technology,
the importance of online connectedness has increased
for adolescents' social interaction and communication.
It is, therefore, important to identify and understand
the concept of Internet safety among upper secondary
school students. A total of 4216 students from 238
classrooms in 23 upper secondary schools completed an
Internet safety assessment. The aim of the study was to
operationalize and measure Internet safety in a school
context, and to further examine the factors predicting
students' Internet safety awareness and responsibility.
Our analysis revealed substantial variation in Internet
safety awareness between schools, classrooms and
students. Overall, the findings indicate that students'
social backgrounds are determining for their
development and understanding of Internet safety
awareness.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Digital Inequalities.",
}
@Article{Somarakis:2014:PIT,
author = "Giorgos Somarakis and Anastasia Stratigea",
title = "Public Involvement in Taking Legislative Action as to
the Spatial Development of the Tourist Sector in
{Greece} --- The {``OpenGov''} Platform Experience",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "4",
pages = "735--759",
day = "25",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6040735",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/4/735",
abstract = "By the Aarhus Convention (1998) it is recognized the
right of citizens to get access to and influence
decision-making in respect to issues affecting the
state of the environment. More specifically, in Article
8 it is stated that public authorities are forced to
engage public participation when preparing regulations
or legally binding rules that have a significant
environmental impact. Towards this end, Information and
Communication Technologies (ICTs) and their
applications have considerably expanded the potential
of planners and decision makers to interact with
stakeholders and the public and engage them in
participatory processes through ICTs-enabled platforms.
The focus of the present paper is on the context of
public consultation in taking legislative action as to
the spatial development of the tourist sector in
Greece. It consists of three parts: the first part,
where the context of engaging the public in
governmental decision-making in Greece is discussed,
following the Open Government Partnership (OGP)
initiative; the second part, presenting the steps of
the ``OpenGov'' online platform, designed for gathering
public knowledge to further improve legislative efforts
and policy; and the third part, elaborating on the
experience gained by the use of the ``OpenGov''
platform for decision-making on the spatial development
of the tourist sector in Greece.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue NeoGeography and WikiPlanning 2014.",
}
@Article{Shepherd:2014:RRS,
author = "Lynsay A. Shepherd and Jacqueline Archibald and Robert
Ian Ferguson",
title = "Reducing Risky Security Behaviours: Utilising
Affective Feedback to Educate Users",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "4",
pages = "760--772",
day = "27",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6040760",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/4/760",
abstract = "Despite the number of tools created to help end-users
reduce risky security behaviours, users are still
falling victim to online attacks. This paper proposes a
browser extension utilising affective feedback to
provide warnings on detection of risky behaviour. The
paper provides an overview of behaviour considered to
be risky, explaining potential threats users may face
online. Existing tools developed to reduce risky
security behaviours in end-users have been compared,
discussing the success rates of various methodologies.
Ongoing research is described which attempts to educate
users regarding the risks and consequences of poor
security behaviour by providing the appropriate
feedback on the automatic recognition of risky
behaviour. The paper concludes that a solution
utilising a browser extension is a suitable method of
monitoring potentially risky security behaviour.
Ultimately, future work seeks to implement an affective
feedback mechanism within the browser extension with
the aim of improving security awareness.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Developments in Cybercrime and
Cybercrime Mitigation.",
}
@Article{Brainin:2014:ITO,
author = "Esther Brainin and Efrat Neter",
title = "Inside Technology: Opening the Black Box of Health ---
{Website} Configuration and Content Management",
journal = j-FUTURE-INTERNET,
volume = "6",
number = "4",
pages = "773--799",
day = "10",
month = dec,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi6040773",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:52 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/6/4/773",
abstract = "Given the existing divide related to Internet skills
and types of Internet use, it is safe to assume that a
large proportion of the population uses the Internet
for health purposes in a partially productive fashion.
We suggest that in addition to user characteristics,
another factor that inhibits productive Internet use,
and thus contributes to the existing gap, is related to
the ways in which the technology is configured. The
goal of this study was to explore the processes that
webmasters and content managers use for constructing
and producing, or selecting content, for health
websites. Interviews conducted with 23 website builders
and managers of websites that represent public and
non-public health organizations revealed that they do
not plan or conduct activities for content needs
elicitation, either in the design stage or on an
ongoing basis. Rather, these professionals rely on a
``self-embodiment'' standard, whereby their and their
cohorts' expectations determine the quality and
functionality of the websites' structure and content.
Hence, target groups beyond their social sphere are
disregarded, and instead of new opportunities, new
cleavages are created. We recommended that government,
public and non-public stakeholders work to establish
construction standards, to ensure that health websites
meet the needs of varied end-user populations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Digital Inequalities.",
}
@Article{Laurini:2015:GOG,
author = "Robert Laurini",
title = "Geographic Ontologies, Gazetteers and
Multilingualism",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "1",
pages = "1--23",
day = "05",
month = jan,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/1/1",
abstract = "Different languages imply different visions of space,
so that terminologies are different in geographic
ontologies. In addition to their geometric shapes,
geographic features have names, sometimes different in
diverse languages. In addition, the role of gazetteers,
as dictionaries of place names (toponyms), is to
maintain relations between place names and location.
The scope of geographic information retrieval is to
search for geographic information not against a
database, but against the whole Internet: but the
Internet stores information in different languages, and
it is of paramount importance not to remain stuck to a
unique language. In this paper, our first step is to
clarify the links between geographic objects as
computer representations of geographic features,
ontologies and gazetteers designed in various
languages. Then, we propose some inference rules for
matching not only types, but also relations in
geographic ontologies with the assistance of
gazetteers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Geographic Information System
(Semantic GIS).",
}
@Article{Office:2015:ARF,
author = "Future Internet Editorial Office",
title = "Acknowledgement to Reviewers of {{\booktitle{Future
Internet}}} in 2014",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "1",
pages = "24--25",
day = "09",
month = jan,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7010024",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/1/24",
abstract = "The significance of approaches to technology-enhanced
learning (TEL) has increased rapidly during the last
few years. Nowadays in education different approaches
such as game-based learning, web-based learning,
video-based online courses, and many others are used on
a daily basis. However, what defines the success of
technology-enhanced learning approaches and how can
such approaches be developed in a structured way?
Furthermore, what different aspects have to be
considered while doing so? To answer these questions,
4567 publications were analyzed in this present
literature review in order to recognize the different
aspects of implementing technology-enhanced learning
approaches. Finally, 20 categories are defined in four
main areas that summarize all the aspects in the field
of technology-enhanced learning. Moreover, the study
also reveals research areas that are important but
hardly investigated in the observed journals of this
study.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Schweighofer:2015:ACW,
author = "Patrick Schweighofer and Martin Ebner",
title = "Aspects to Be Considered when Implementing
Technology-Enhanced Learning Approaches: a Literature
Review",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "1",
pages = "26--49",
day = "03",
month = feb,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7010026",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/1/26",
abstract = "The significance of approaches to technology-enhanced
learning (TEL) has increased rapidly during the last
few years. Nowadays in education different approaches
such as game-based learning, web-based learning,
video-based online courses, and many others are used on
a daily basis. However, what defines the success of
technology-enhanced learning approaches and how can
such approaches be developed in a structured way?
Furthermore, what different aspects have to be
considered while doing so? To answer these questions,
4567 publications were analyzed in this present
literature review in order to recognize the different
aspects of implementing technology-enhanced learning
approaches. Finally, 20 categories are defined in four
main areas that summarize all the aspects in the field
of technology-enhanced learning. Moreover, the study
also reveals research areas that are important but
hardly investigated in the observed journals of this
study.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Huang:2015:PDE,
author = "Yi-Ting Huang",
title = "Participatory Design to Enhance {ICT} Learning and
Community Attachment: a Case Study in Rural {Taiwan}",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "1",
pages = "50--66",
day = "02",
month = mar,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7010050",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/1/50",
abstract = "This study used observation and interviews with
participants in ``PunCar Action'' to understand how
participatory design methods can be applied to the
education of rural individuals in information and
communication technology (ICT). PunCar Action is a
volunteer program in which ICT educators tour the rural
communities of Taiwan, offering courses on the use of
digital technology. This paper makes three
contributions: First, we found that participatory
design is an excellent way to teach ICT and Web 2.0
skills, co-create community blogs, and sustain
intrinsic motivation to use Web applications. Second,
PunCar Action provides an innovative bottom-up
intergenerational ICT education model with high
penetrability capable of enhancing the confidence of
rural residents in the use of ICT. Third, the content
of basic courses was based on applications capable of
making the lives of elderly individuals more
convenient, and the advanced course was based on the
co-creation of community blogs aimed at reviving the
core functions of communities and expanding local
industry. Our research was conducted with the use of a
non-quantitative index to measure ICT learning
performance of participants from a rural community. The
results show that PunCar Action emphasizes
interpersonal communication and informational
applications and creates a collaborative process that
encourages rural residents to take action to close the
digital divide.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Digital Inequalities.",
}
@Article{Gan:2015:SNP,
author = "Diane Gan and Lily R. Jenkins",
title = "Social Networking Privacy --- Who's Stalking You?",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "1",
pages = "67--93",
day = "23",
month = mar,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7010067",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/1/67",
abstract = "This research investigates the privacy issues that
exist on social networking sites. It is reasonable to
assume that many Twitter users are unaware of the
dangers of uploading a tweet to their timeline which
can be seen by anyone. Enabling geo-location tagging on
tweets can result in personal information leakage,
which the user did not intend to be public and which
can seriously affect that user's privacy and anonymity
online. This research demonstrates that key information
can easily be retrieved using the starting point of a
single tweet with geo-location turned on. A series of
experiments have been undertaken to determine how much
information can be obtained about a particular
individual using only social networking sites and
freely available mining tools. The information gathered
enabled the target subjects to be identified on other
social networking sites such as Foursquare, Instagram,
LinkedIn, Facebook and Google+, where more personal
information was leaked. The tools used are discussed,
the results of the experiments are presented and the
privacy implications are examined.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Guillen:2015:IIS,
author = "Edward Guillen and Jeisson S{\'a}nchez and Rafael
Paez",
title = "Inefficiency of {IDS} Static Anomaly Detectors in
Real-World Networks",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "2",
pages = "94--109",
day = "06",
month = may,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7020094",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/2/94",
abstract = "A wide range of IDS implementations with anomaly
detection modules have been deployed. In general, those
modules depend on intrusion knowledge databases, such
as Knowledge Discovery Dataset (KDD99), Center for
Applied Internet Data Analysis (CAIDA) or Community
Resource for Archiving Wireless Data at Dartmouth
(CRAWDAD), among others. Once the database is analyzed
and a machine learning method is employed to generate
detectors, some classes of new detectors are created.
Thereafter, detectors are supposed to be deployed in
real network environments in order to achieve detection
with good results for false positives and detection
rates. Since the traffic behavior is quite different
according to the user's network activities over
available services, restrictions and applications, it
is supposed that behavioral-based detectors are not
well suited to all kind of networks. This paper
presents the differences of detection results between
some network scenarios by applying traditional
detectors that were calculated with artificial neural
networks. The same detector is deployed in different
scenarios to measure the efficiency or inefficiency of
static training detectors.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet Security.",
}
@Article{Pahlevan:2015:DEC,
author = "Atousa Pahlevan and Jean-Luc Duprat and Alex Thomo and
Hausi M{\"u}ller",
title = "{Dynamis}: Effective Context-Aware {Web} Service
Selection Using Dynamic Attributes",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "2",
pages = "110--139",
day = "12",
month = may,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7020110",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/2/110",
abstract = "Quality web service discovery requires narrowing the
search space from an overwhelming set of services down
to the most relevant ones, while matching the
consumer's request. Today, the ranking of services only
considers static attributes or snapshots of current
attribute values, resulting in low-quality search
results. To satisfy the user's need for timely,
well-chosen web services, we ought to consider quality
of service attributes. The problem is that dynamic
attributes can be difficult to measure, frequently
fluctuate, are context-sensitive and depend on
environmental factors, such as network availability at
query time. In this paper, we propose the Dynamis
algorithm to address these challenges effectively.
Dynamis is based on well-established database
techniques, such as skyline and aggregation. We
illustrate our approach using observatory telescope web
services and experimentally evaluate it using stock
market data. In our evaluation, we show significant
improvement in service selection over existing
techniques.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Laneuville:2015:QAU,
author = "Odette Laneuville and Dorota Sikora",
title = "Quantitative Analysis of the Usage of a Pedagogical
Tool Combining Questions Listed as Learning Objectives
and Answers Provided as Online Videos",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "2",
pages = "140--151",
day = "15",
month = may,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7020140",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/2/140",
abstract = "To improve the learning of basic concepts in molecular
biology of an undergraduate science class, a
pedagogical tool was developed, consisting of learning
objectives listed at the end of each lecture and
answers to those objectives made available as videos
online. The aim of this study was to determine if the
pedagogical tool was used by students as instructed,
and to explore students' perception of its usefulness.
A combination of quantitative survey data and measures
of online viewing was used to evaluate the usage of the
pedagogical practice. A total of 77 short videos linked
to 11 lectures were made available to 71 students, and
64 completed the survey. Using online tracking tools, a
total of 7046 views were recorded. Survey data
indicated that most students (73.4\%) accessed all
videos, and the majority (98.4\%) found the videos to
be useful in assisting their learning. Interestingly,
approximately half of the students (53.1\%) always or
most of the time used the pedagogical tool as
recommended, and consistently answered the learning
objectives before watching the videos. While the
proposed pedagogical tool was used by the majority of
students outside the classroom, only half used it as
recommended limiting the impact on students'
involvement in the learning of the material presented
in class.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue eLearning.",
}
@Article{Yamashita:2015:RTH,
author = "Ryoma Yamashita and Kazumasa Takami",
title = "Receiver-Triggered Handshake Protocol for {DTN} in
Disaster Area",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "2",
pages = "152--169",
day = "27",
month = may,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7020152",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/2/152",
abstract = "When a disaster hits a wide area, communication
services for public use will be rendered unavailable.
This will make it difficult to confirm the safety of
people in the disaster area. A solution to this problem
is to form delay/disruption tolerant networks (DTN)
using mobile terminals of victims, those of rescuers,
who serve as information carriers, and terminals
(servers) in shelters. In this paper, we propose using
a receiver-triggered handshake protocol for
communication between these terminals. We have
developed the bundle layer protocol for this handshake
method. The proposed method has been implemented on a
network simulator to build an evaluation environment.
The disaster area has been modeled on an area around
Shinjuku Station in Tokyo. Victims are randomly
distributed in the area. We have compared the proposed
method with Epidemic Routing and Spray and Wait in
terms of the delivery rate at which messages reach
their destinations, and the length of time taken for
messages to reach their destinations. We have found
that the delivery rate of the three methods are, more
or less, the same, but that the proposed method is
superior to the other two methods in terms of storage
usage and battery consumption of terminals, and the
number of bundles generated in the network.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Smith:2015:OSP,
author = "Marlene A. Smith",
title = "Output from Statistical Predictive Models as Input to
{eLearning} Dashboards",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "2",
pages = "170--183",
day = "02",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7020170",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/2/170",
abstract = "We describe how statistical predictive models might
play an expanded role in educational analytics by
giving students automated, real-time information about
what their current performance means for eventual
success in eLearning environments. We discuss how an
online messaging system might tailor information to
individual students using predictive analytics. The
proposed system would be data-driven and quantitative;
e.g., a message might furnish the probability that a
student will successfully complete the certificate
requirements of a massive open online course. Repeated
messages would prod underperforming students and alert
instructors to those in need of intervention.
Administrators responsible for accreditation or
outcomes assessment would have ready documentation of
learning outcomes and actions taken to address
unsatisfactory student performance. The article's brief
introduction to statistical predictive models sets the
stage for a description of the messaging system.
Resources and methods needed to develop and implement
the system are discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue eLearning.",
}
@Article{Knapp:2015:UEM,
author = "Herschel Knapp and Sanjog Pangarkar",
title = "Utilizing the {ECHO} Model in the Veterans Health
Affairs System: Guidelines for Setup, Operations and
Preliminary Findings",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "2",
pages = "184--195",
day = "08",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7020184",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/2/184",
abstract = "Background: In 2011, the Veterans Health
Administration (VHA) consulted with the Project ECHO
(Extension for Community Healthcare Outcomes) team at
the University of New Mexico, Albuquerque, to reproduce
their successful model within the VHA. Methods: The VHA
launched SCAN-ECHO (Specialty Care Access
Network-Extension for Community Healthcare Outcomes), a
multisite videoconferencing system to conduct live
clinical consultations between specialists at a VHA
Medical Center (hospital) and primary care providers
stationed at satellite VHA CBOCs (Community-Based
Outpatient Clinic). Results: Analysis of the first
three years rendered a mean attendee satisfaction of
89.53\% and a consultation satisfaction score of
88.10\%. About half of the SCAN-ECHO consultations
resulted in patients receiving their treatment from
their local primary care providers; the remaining half
were referred to the VHA Medical Center when the
treatment involved equipment or services not available
at the CBOCs (e.g., MRI, surgery). Conclusion: This
paper details the setup, operation logistics and
preliminary findings, suggesting that SCAN-ECHO is a
viable model for providing quality specialty clinical
consultation service, prompter access to care, reduced
commutes and continuing education. Additionally, the
use of a secured Internet-based videoconferencing
system that supports connectivity to multiple (mobile)
devices could expand the utilization of this service.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue eLearning.",
}
@Article{Davaasambuu:2015:SOH,
author = "Battulga Davaasambuu and Keping Yu and Takuro Sato",
title = "Self-Optimization of Handover Parameters for Long-Term
Evolution with Dual Wireless Mobile Relay Nodes",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "2",
pages = "196--213",
day = "11",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7020196",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:53 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/2/196",
abstract = "In recent years, train passengers have been
transferring increasing amounts of data using mobile
devices. Wireless networks with mobile relay nodes
support broadband wireless communications for
passengers of such vehicles using backhaul links.
However, the mobility management entity reuses the
handover of existing user equipment, resulting in the
handover of the Long-Term Evolution network being
unsuitable for user equipment within the cabins of
vehicles traveling at high speed. In this paper, we
propose a self-optimizing handover hysteresis scheme
with dual mobile relay nodes for wireless networks in
high-speed mobile environments. The proposed mechanism
tunes the hysteresis and cell individual offset
handover parameters based on the velocity of the
vehicle and the handover performance indicator, which
affects the handover triggering decision and
performance. The results of simulations conducted in
which the performance of the proposed scheme was
compared to that of an existing scheme show that the
proposed scheme can reduce the number of radio link
failures and service interruptions during handover
procedures.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cheng:2015:TPA,
author = "Xiu-Zhi Cheng and Da-Rong Zhu and Shen Zhang and Ping
He",
title = "Tracking Positioning Algorithm for Direction of
Arrival Based on Direction Lock Loop",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "3",
pages = "214--224",
day = "26",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7030214",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/3/214",
abstract = "In order to solve the problem of poor real-time
performance, low accuracy and high computational
complexity in the traditional process of locating and
tracking of Direction of Arrival (DOA) of moving
targets, this paper proposes a DOA algorithm based on
the Direction Lock Loop (DILL) which adopts Lock Loop
structure to realize the estimation and location of DOA
and can adjust the direction automatically along with
the changes of a signal's angular variation to track
the position of the signal. Meanwhile, to reduce the
influence of nonlinearity and noise on its performance,
the UKF filter is designed for eliminating interference
of the estimated target signal to improve accuracy of
the signal tracking and stability of the system.
Simulation results prove that the algorithm can not
only get a high resolution DOA estimate signal, but can
also locate and track multiple mobile targets
effectively with enhanced accuracy, efficiency and
stability.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Aman:2015:EEP,
author = "Waqas Aman and Einar Snekkenes",
title = "{EDAS}: An Evaluation Prototype for Autonomic
Event-Driven Adaptive Security in the {Internet of
Things}",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "3",
pages = "225--256",
day = "08",
month = jul,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7030225",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/3/225",
abstract = "In Internet of Things (IoT), the main driving
technologies are considered to be tiny sensory objects.
These objects cannot host traditional preventive and
detective technologies to provide protection against
the increasing threat sophistication. Furthermore,
these solutions are limited to analyzing particular
contextual information, for instance network
information or files, and do not provide holistic
context for risk analysis and response. Analyzing a
part of a situation may lead to false alarms and later
to unnecessary and incorrect configurations. To
overcome these concerns, we proposed an event-driven
adaptive security (EDAS) model for IoT. EDAS aims to
observe security events (changes) generated by various
things in the monitored IoT environment, investigates
any intentional or unintentional risks associated with
the events and adapts to it autonomously. It correlates
different events in time and space to reduce any false
alarms and provides a mechanism to predict attacks
before they are realized. Risks are responded to
autonomically by utilizing a runtime adaptation
ontology. The mitigation action is chosen after
assessing essential information, such as the risk
faced, user preferences, device capabilities and
service requirements. Thus, it selects an optimal
mitigation action in a particular adverse situation.
The objective of this paper is to investigate EDAS
feasibility and its aptitude as a real-world prototype
in a remote patient monitoring context. It details how
EDAS can be a practical choice for IoT-eHealth in terms
of the security, design and implementation features it
offers as compared to traditional security controls. We
have explained the prototype's major components and
have highlighted the key technical challenges.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet Security.",
}
@Article{Zaidi:2015:VIS,
author = "Kamran Zaidi and Muttukrishnan Rajarajan",
title = "Vehicular {Internet}: Security \& Privacy Challenges
and Opportunities",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "3",
pages = "257--275",
day = "24",
month = jul,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7030257",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/3/257",
abstract = "The vehicular internet will drive the future of
vehicular technology and intelligent transportation
systems (ITS). Whether it is road safety, infotainment,
or driver-less cars, the vehicular internet will lay
the foundation for the future of road travel.
Governments and companies are pursuing driver-less
vehicles as they are considered to be more reliable
than humans and, therefore, safer. The vehicles today
are not just a means of transportation but are also
equipped with a wide range of sensors that provide
valuable data. If vehicles are enabled to share data
that they collect with other vehicles or authorities
for decision-making and safer driving, they thereby
form a vehicular network. However, there is a lot at
stake in vehicular networks if they are compromised.
With the stakes so high, it is imperative that the
vehicular networks are secured and made resilient to
any attack or attempt that may have serious
consequences. The vehicular internet can also be the
target of a cyber attack, which can be devastating. In
this paper, the opportunities that the vehicular
internet offers are presented and then various security
and privacy aspects are discussed and some solutions
are presented.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet Security.",
}
@Article{Floris:2015:SMR,
author = "Roberta Floris and Corrado Zoppi",
title = "Social Media-Related Geographic Information in the
Context of Strategic Environmental Assessment of
Municipal Masterplans: a Case Study Concerning
{Sardinia} ({Italy})",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "3",
pages = "276--293",
day = "07",
month = aug,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7030276",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/3/276",
abstract = "This paper proposes a discussion concerning the use of
social media-related geographic information in the
context of the strategic environmental assessment (SEA)
of Sardinian Municipal masterplans (MMPs). We show that
this kind of information improves, substantially, the
SEA process since it provides planners, evaluators, and
the local communities with information retrieved from
social media that would have not been available
otherwise. This information integrates authoritative
data collection, which comes from official sources, and
enlightens tastes and preferences of the users of
services and infrastructure, and their expectations
concerning their spatial organization. A methodological
approach related to the collection of social
media-related geographic information is implemented and
discussed with reference to the urban context of the
city of Cagliari (Sardinia, Italy). The results are
very effective in terms of provision of information,
which may possibly increase the spatial knowledge
available for planning policy definition and
implementation. In this perspective, this kind of
information discloses opportunities for building
analytical scenarios related to urban and regional
planning and it offers useful suggestions for
sustainable development based on tourism strategies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tuffley:2015:EEO,
author = "David Tuffley and Amy Antonio",
title = "Enhancing Educational Opportunities with
Computer-Mediated Assessment Feedback",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "3",
pages = "294--306",
day = "11",
month = aug,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7030294",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/3/294",
abstract = "As internet technologies make their way into
developing areas, so too does the possibility of
education and training being delivered to the people
living in those previously unserved areas. The growing
catalogue of free, high quality courseware, when
combined with the newly acquired means of delivery,
creates the potential for millions of people in the
developing world to acquire a good education. Yet a
good education obviously requires more than simply
delivering information; students must also receive high
quality feedback on their assessments. They must be
told how their performance compares with the ideal, and
be shown how to close the gap between the two. However,
delivering high quality feedback is labor-intensive,
and therefore expensive, and has long been recognized
as a problematic issue by educators. This paper
outlines a case study that uses a Learning Management
System (LMS) to efficiently deliver detailed feedback
that is informed by the principles of best practice. We
make the case that the efficiencies of this method
allow for large-scale courses with thousands of
enrolments that are accessible to developing and
developed areas alike. We explore the question; is
computer-mediated feedback delivery efficient and
effective and might it be applied to large-scale
courses at low-cost?",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lu:2015:LJW,
author = "Cunbo Lu and Liangtian Wan",
title = "A Low-Jitter Wireless Transmission Based on Buffer
Management in Coding-Aware Routing",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "3",
pages = "307--328",
day = "31",
month = aug,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7030307",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/3/307",
abstract = "It is significant to reduce packet jitter for
real-time applications in a wireless network. Existing
coding-aware routing algorithms use the opportunistic
network coding (ONC) scheme in a packet coding
algorithm. The ONC scheme never delays packets to wait
for the arrival of a future coding opportunity. The
loss of some potential coding opportunities may degrade
the contribution of network coding to jitter
performance. In addition, most of the existing
coding-aware routing algorithms assume that all flows
participating in the network have equal rate. This is
unrealistic, since multi-rate environments often
appear. To overcome the above problem and expand
coding-aware routing to multi-rate scenarios, from the
view of data transmission, we present a low-jitter
wireless transmission algorithm based on buffer
management (BLJCAR), which decides packets in coding
node according to the queue-length based threshold
policy instead of the regular ONC policy as used in
existing coding-aware routing algorithms. BLJCAR is a
unified framework to merge the single rate case and
multiple rate case. Simulations results show that the
BLJCAR algorithm embedded in coding-aware routing
outperforms the traditional ONC policy in terms of
jitter, packet delivery delay, packet loss ratio and
network throughput in network congestion in any traffic
rates.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2015:DRM,
author = "Hua Li and Huan Wang and Wenqing Yin and Yongwei Li
and Yan Qian and Fei Hu",
title = "Development of a Remote Monitoring System for Henhouse
Environment Based on {IoT} Technology",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "3",
pages = "329--341",
day = "10",
month = sep,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7030329",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/3/329",
abstract = "To monitor multiple environmental factors of henhouses
in modern chicken farms, a henhouse online monitoring
system based on wireless sensor network was developed
using wireless sensor technology and computer network
technology. Sensor data compensation and correction
were designed to be achieved using software and data
fitting methods, data reliable transmission achieved
using a data loss recovery strategy, and data missing
during monitoring addressed using a self-decision and
online filling method. Operation test of the system
showed that: The system was economic and reliable; it
enabled wireless monitoring and Web display of the
environmental factors of a henhouse; and the root mean
square errors (RMSEs) between the estimated values from
the self-decision and on-line filling method and
experimental values of the four environmental factors
were 0.1698, 3.0859, 77 and 0.094, respectively,
indicative of high estimation accuracy. The system can
provide support for modern management of henhouses and
can be transplanted to related monitoring scenarios in
the agricultural field.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet of Things.",
}
@Article{Singh:2015:EST,
author = "Dilraj Singh and Amardeep Singh",
title = "Enhanced Secure Trusted {AODV} {(ESTA)} Protocol to
Mitigate Blackhole Attack in Mobile Ad Hoc Networks",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "3",
pages = "342--362",
day = "23",
month = sep,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7030342",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/3/342",
abstract = "The self-organizing nature of the Mobile Ad hoc
Networks (MANETs) provide a communication channel
anywhere, anytime without any pre-existing network
infrastructure. However, it is exposed to various
vulnerabilities that may be exploited by the malicious
nodes. One such malicious behavior is introduced by
blackhole nodes, which can be easily introduced in the
network and, in turn, such nodes try to crumble the
working of the network by dropping the maximum data
under transmission. In this paper, a new protocol is
proposed which is based on the widely used Ad hoc
On-Demand Distance Vector (AODV) protocol, Enhanced
Secure Trusted AODV (ESTA), which makes use of multiple
paths along with use of trust and asymmetric
cryptography to ensure data security. The results,
based on NS-3 simulation, reveal that the proposed
protocol is effectively able to counter the blackhole
nodes in three different scenarios.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Heller:2015:SID,
author = "Alfred Heller",
title = "The Sensing {Internet}--- a Discussion on Its Impact
on Rural Areas",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "4",
pages = "363--371",
day = "28",
month = sep,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7040363",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/4/363",
abstract = "This paper is based on the experience of introducing
wireless sensor networks (WSNs) into the building
industry in Denmark and in a rural area of Greenland.
There are very real advantages in the application of
the technology and its consequences for the life cycle
operation of the building sector. Sensor networks can
be seen as an important part of the Internet of Things
and may even constitute an Internet of Sensors, since
the communication layers can differ from the Internet
standards. The current paper describes the case for
application, followed by a discussion of the observed
adaptive advantages and consequences of the technology.
Essentially, WSNs constitute a highly sophisticated
technology that is more robust in a rural context due
to its extremely simple installation procedures (plug
and play) allowing the use of local less-skilled
labour, and the possibility of reconfiguring and
repurposing its use remotely.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet of Things.",
}
@Article{Boulos:2015:TIF,
author = "Maged N. Kamel Boulos and Abdulslam Yassine and
Shervin Shirmohammadi and Chakkrit Snae Namahoot and
Michael Br{\"u}ckner",
title = "Towards an ``{Internet of Food}'': Food Ontologies for
the {Internet of Things}",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "4",
pages = "372--392",
day = "01",
month = oct,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7040372",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/4/372",
abstract = "Automated food and drink recognition methods connect
to cloud-based lookup databases (e.g., food item
barcodes, previously identified food images, or
previously classified NIR (Near Infrared) spectra of
food and drink items databases) to match and identify a
scanned food or drink item, and report the results back
to the user. However, these methods remain of limited
value if we cannot further reason with the identified
food and drink items, ingredients and
quantities/portion sizes in a proposed meal in various
contexts; i.e., understand from a semantic perspective
their types, properties, and interrelationships in the
context of a given user's health condition and
preferences. In this paper, we review a number of
``food ontologies'', such as the Food Products
Ontology/FOODpedia (by Kolchin and Zamula), Open Food
Facts (by Gigandet et al.), FoodWiki (Ontology-driven
Mobile Safe Food Consumption System by Celik),
FOODS-Diabetes Edition (A Food-Oriented Ontology-Driven
System by Snae Namahoot and Bruckner), and AGROVOC
multilingual agricultural thesaurus (by the UN Food and
Agriculture Organization-FAO). These food ontologies,
with appropriate modifications (or as a basis, to be
added to and further expanded) and together with other
relevant non-food ontologies (e.g., about
diet-sensitive disease conditions), can supplement the
aforementioned lookup databases to enable progression
from the mere automated identification of food and
drinks in our meals to a more useful application
whereby we can automatically reason with the identified
food and drink items and their details (quantities and
ingredients/bromatological composition) in order to
better assist users in making the correct, healthy food
and drink choices for their particular health
condition, age, body weight/BMI (Body Mass Index),
lifestyle and preferences, etc.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fiore:2015:EIB,
author = "Ugo Fiore and Francesco Rossi",
title = "Embedding an Identity-Based Short Signature as a
Digital Watermark",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "4",
pages = "393--404",
day = "23",
month = oct,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7040393",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/4/393",
abstract = "Digital watermarking aims at protecting multimedia
content by hiding into it some data that can be used
for such purposes as, for example, intellectual
property protection or integrity control. Sometimes,
the owner of an image would prefer to not transmit,
publish, or hand to a cloud service the original image,
but rather an encrypted version of it. Encrypted images
allow for less embedding room with respect to their
unencrypted counterparts, as there is less spatial
correlation to leverage upon. An architecture for
embedding as payload the digital signature of an
encrypted image, by means of a reversible watermarking
technique, is presented in this work. A noteworthy
point is the use of an identity-based cryptosystem to
avoid certificate management and improve performance.
In addition, the use of IBS-1, a recently proposed
signature scheme, allows for a reduction in the size of
the signature.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tian:2015:DTR,
author = "Bo Tian and Kecheng Liu and Yuanzhong Chen",
title = "Dynamical Trust and Reputation Computation Model for
{B2C} E-Commerce",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "4",
pages = "405--428",
day = "27",
month = oct,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7040405",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/4/405",
abstract = "Trust is one of the most important factors that
influence the successful application of network service
environments, such as e-commerce, wireless sensor
networks, and online social networks. Computation
models associated with trust and reputation have been
paid special attention in both computer societies and
service science in recent years. In this paper, a
dynamical computation model of reputation for B2C
e-commerce is proposed. Firstly, conceptions associated
with trust and reputation are introduced, and the
mathematical formula of trust for B2C e-commerce is
given. Then a dynamical computation model of reputation
is further proposed based on the conception of trust
and the relationship between trust and reputation. In
the proposed model, classical varying processes of
reputation of B2C e-commerce are discussed.
Furthermore, the iterative trust and reputation
computation models are formulated via a set of
difference equations based on the closed-loop feedback
mechanism. Finally, a group of numerical simulation
experiments are performed to illustrate the proposed
model of trust and reputation. Experimental results
show that the proposed model is effective in simulating
the dynamical processes of trust and reputation for B2C
e-commerce.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Freina:2015:SEI,
author = "Laura Freina and Rosa Bottino and Michela Ott and
Filippo Costa",
title = "Social Empowerment of Intellectually Impaired through
a Cloud Mobile System",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "4",
pages = "429--444",
day = "17",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7040429",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/4/429",
abstract = "There is not a unique definition of ``empowerment'',
nevertheless the idea that it involves, on the one
hand, people having control over their own lives and,
on the other, some social aspects seems to be a common
characteristic. Most authors recognize three levels of
empowerment: individual, group, and community level,
which are interconnected and changes at one level
influence the others. Enhancing individual competence
and self-esteem has a direct effect on the control of
one's own life and, in turn, on the social components
of empowerment. In this paper we present Smart Angel, a
project that aims at creating a network involving
families, caregivers, experts, and tutors, as well as
the final users and their friends, based on a mobile
cloud system in support of both everyday living and
urban mobility for people with medium-mild intellectual
disabilities, with particular attention to the Down
syndrome. The system can be seen as a tool to empower
its users to be more independent and therefore
increasing their possibility to have an active role in
their life and an active participation to the
community.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Buchanan:2015:FIW,
author = "William J. Buchanan and David Lanc and Elochukwu
Ukwandu and Lu Fan and Gordon Russell and Owen Lo",
title = "The Future {Internet}: a World of Secret Shares",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "4",
pages = "445--464",
day = "24",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7040445",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/4/445",
abstract = "The Public Key Infrastructure (PKI) is crumbling,
partially due to the lack of a strong understanding of
how encryption actually works, but also due to
weaknesses in its implementation. This paper outlines
an Internet storage technique using secret sharing
methods which could be used to overcome the problems
inherent with PKI, while supporting new types of
architectures incorporating such things as automated
failover and break-glass data recovery. The paper
outlines a novel architecture: SECRET, which supports a
robust cloud-based infrastructure with in-built privacy
and failover. In order to understand the performance
overhead of SECRET, the paper outlines a range of
experiments that investigate the overhead of this and
other secret share methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet Security.",
}
@Article{Gao:2015:DLB,
author = "Ren Gao and Juebo Wu",
title = "Dynamic Load Balancing Strategy for Cloud Computing
with Ant Colony Optimization",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "4",
pages = "465--483",
day = "26",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7040465",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/4/465",
abstract = "How to distribute and coordinate tasks in cloud
computing is a challenging issue, in order to get
optimal resource utilization and avoid overload. In
this paper, we present a novel approach on load
balancing via ant colony optimization (ACO), for
balancing the workload in a cloud computing platform
dynamically. Two strategies, forward-backward ant
mechanism and max-min rules, are introduced to quickly
find out the candidate nodes for load balancing. We
formulate pheromone initialization and pheromone update
according to physical resources under the cloud
computing environment, including pheromone evaporation,
incentive, and punishment rules, etc. Combined with
task execution prediction, we define the moving
probability of ants in two ways, that is, whether the
forward ant meets the backward ant, or not, in the
neighbor node, with the aim of accelerating searching
processes. Simulations illustrate that the proposed
strategy can not only provide dynamic load balancing
for cloud computing with less searching time, but can
also get high network performance under medium and
heavily loaded contexts.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet of Things.",
}
@Article{Kruger:2015:ITE,
author = "Dov Kruger and Sarah Inman and Zhiyu Ding and Yijin
Kang and Poornima Kuna and Yujie Liu and Xiakun Lu and
Stephen Oro and Yingzhu Wang",
title = "Improving Teacher Effectiveness: Designing Better
Assessment Tools in Learning Management Systems",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "4",
pages = "484--499",
day = "18",
month = dec,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7040484",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/4/484",
abstract = "Current-generation assessment tools used in K-12 and
post-secondary education are limited in the type of
questions they support; this limitation makes it
difficult for instructors to navigate their assessment
engines. Furthermore, the question types tend to score
low on Bloom's Taxonomy. Dedicated learning management
systems (LMS) such as Blackboard, Moodle and Canvas are
somewhat better than informal tools as they offer more
question types and some randomization. Still, question
types in all the major LMS assessment engines are
limited. Additionally, LMSs place a heavy burden on
teachers to generate online assessments. In this study
we analyzed the top three LMS providers to identify
inefficiencies. These inefficiencies in LMS design,
point us to ways to ask better questions. Our findings
show that teachers have not adopted current tools
because they do not offer definitive improvements in
productivity. Therefore, we developed LiquiZ, a design
for a next-generation assessment engine that reduces
user effort and provides more advanced question types
that allow teachers to ask questions that can currently
only be asked in one-on-one demonstration. The initial
LiquiZ project is targeted toward STEM subjects, so the
question types are particularly advantageous in math or
science subjects.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue eLearning.",
}
@Article{Drogkaris:2015:HMA,
author = "Prokopios Drogkaris and Stefanos Gritzalis and
Christos Kalloniatis and Costas Lambrinoudakis",
title = "A Hierarchical Multitier Approach for Privacy Policies
in e-Government Environments",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "4",
pages = "500--515",
day = "21",
month = dec,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7040500",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/4/500",
abstract = "The appeal of e-Government users to retain control
over their personal information, while making use of
advanced governmental electronic services through
interconnected and interoperable deployments, can be
assisted by the incorporation of privacy policy and
Preferences documents. This paper addresses the
formulation of light-weight and accurate privacy
policies, while preserving compliance with underlying
legal and regulatory framework. Through the
exploitation of existing governmental hierarchies, a
multitier approach is proposed able to support diverge
data needs and processing requests imposed by service
providers. The incorporation of this approach into
e-Government environments will reduce the
administrative workload, imposed by the inclusion of
privacy policy documents, and promote the
implementation and provision of user-centric and data
privacy aware electronic services.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet Security.",
}
@Article{Zhou:2015:ORR,
author = "Dan Zhou and Zhong Yao",
title = "Optimal Referral Reward Considering Customer's Budget
Constraint",
journal = j-FUTURE-INTERNET,
volume = "7",
number = "4",
pages = "516--529",
day = "21",
month = dec,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi7040516",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:54 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/7/4/516",
abstract = "Everyone likes Porsche but few can afford it. Budget
constraints always play a critical role in a customer's
decision-making. The literature disproportionally
focuses on how firms can induce customer valuations
toward the product, but does not address how to assess
the influence of budget constraints. We study these
questions in the context of a referral reward program
(RRP). RRP is a prominent marketing strategy that
utilizes recommendations passed from existing customers
to their friends and effectively stimulates word of
mouth (WoM). We build a stylized game-theoretical model
with a nested Stackelberg game involving three players:
a firm, an existing customer, and a potential customer
who is a friend of the existing customer. The budget is
the friend's private information. We show that RRPs
might be optimal when the friend has either a low or a
high valuation, but they work differently in each
situation because of the budget. Furthermore, there are
two budget thresholds, a fixed one and a variable one,
which limit a firm's ability to use rewards.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computational Social Sciences:
Contagion, Collective Behaviors, and Networks.",
}
@Article{Chang:2016:PQF,
author = "Gary Chang and Chung-Chieh Lee",
title = "Priority Queues with Fractional Service for Tiered
Delay {QoS}",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "1",
pages = "1",
day = "29",
month = dec,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/1/1",
abstract = "Packet scheduling is key to quality of service (QoS)
capabilities of broadband wired and wireless networks.
In a heterogeneous traffic environment, a comprehensive
QoS packet scheduler must strike a balance between flow
fairness and access delay. Many advanced packet
scheduling solutions have targeted fair bandwidth
allocation while protecting delay-constrained traffic
by adding priority queue(s) on top of a fair bandwidth
scheduler. Priority queues are known to cause
performance uncertainties and, thus, various
modifications have been proposed. In this paper, we
present a packet queueing engine dubbed Fractional
Service Buffer (FSB), which, when coupled with a
configurable flow scheduler, can achieve desired QoS
objectives, such as fair throughputs and differentiated
delay guarantees. Key performance metrics, such as
delay limit and probability of delay limit violation,
are derived as a function of key FSB parameters for
each delay class in the packet queueing engine using
diffusion approximations. OPNET simulations verify
these analytical results.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Managing QoS and QoE Levels in Wired and
Wireless Data Networks.",
}
@Article{Wang:2016:DII,
author = "Yun Wang and William Chu and Sarah Fields and Colleen
Heinemann and Zach Reiter",
title = "Detection of Intelligent Intruders in Wireless Sensor
Networks",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "1",
pages = "2",
day = "20",
month = jan,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8010002",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/1/2",
abstract = "Most of the existing research works on the intrusion
detection problem in a wireless sensor network (WSN)
assume linear or random mobility patterns in
abstracting intruders' models in traversing the WSN
field. However, in real-life WSN applications, an
intruder is usually an intelligent mobile robot with
environment learning and detection avoidance capability
(i.e., the capability to avoid surrounding sensors).
Due to this, the literature results based on the linear
or random mobility models may not be applied to the
real-life WSN design and deployment for efficient and
effective intrusion detection in practice. This
motivates us to investigate the impact of intruder's
intelligence on the intrusion detection problem in a
WSN for various applications. To be specific, we
propose two intrusion algorithms, the pinball and
flood-fill algorithms, to mimic the intelligent motion
and behaviors of a mobile intruder in detecting and
circumventing nearby sensors for detection avoidance
while heading for its destination. The two proposed
algorithms are integrated into a WSN framework for
intrusion detection analysis in various circumstances.
Monte Carlo simulations are conducted, and the results
indicate that: (1) the performance of a WSN drastically
changes as a result of the intruder's intelligence in
avoiding sensor detections and intrusion algorithms;
(2) network parameters, including node density, sensing
range and communication range, play a crucial part in
the effectiveness of the intruder's intrusion
algorithms; and (3) it is imperative to integrate
intruder's intelligence in the WSN research for
intruder detection problems under various application
circumstances.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet of Things.",
}
@Article{Office:2016:ARF,
author = "Future Internet Editorial Office",
title = "Acknowledgement to Reviewers of {{\booktitle{Future
Internet}}} in 2015",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "1",
pages = "3",
day = "22",
month = jan,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8010003",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/1/3",
abstract = "In this paper, we address the problem of energy
conservation and optimization in residential
environments by providing users with useful information
to solicit a change in consumption behavior. Taking
care to highly limit the costs of installation and
management, our work proposes a Non-Intrusive Load
Monitoring (NILM) approach, which consists of
disaggregating the whole-house power consumption into
the individual portions associated to each device.
State of the art NILM algorithms need monitoring data
sampled at high frequency, thus requiring high costs
for data collection and management. In this paper, we
propose an NILM approach that relaxes the requirements
on monitoring data since it uses total active power
measurements gathered at low frequency (about 1 Hz).
The proposed approach is based on the use of Factorial
Hidden Markov Models (FHMM) in conjunction with context
information related to the user presence in the house
and the hourly utilization of appliances. Through a set
of tests, we investigated how the use of these
additional context-awareness features could improve
disaggregation results with respect to the basic FHMM
algorithm. The tests have been performed by using
Tracebase, an open dataset made of data gathered from
real home environments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Paradiso:2016:CBE,
author = "Francesca Paradiso and Federica Paganelli and Dino
Giuli and Samuele Capobianco",
title = "Context-Based Energy Disaggregation in Smart Homes",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "1",
pages = "4",
day = "27",
month = jan,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8010004",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/1/4",
abstract = "In this paper, we address the problem of energy
conservation and optimization in residential
environments by providing users with useful information
to solicit a change in consumption behavior. Taking
care to highly limit the costs of installation and
management, our work proposes a Non-Intrusive Load
Monitoring (NILM) approach, which consists of
disaggregating the whole-house power consumption into
the individual portions associated to each device.
State of the art NILM algorithms need monitoring data
sampled at high frequency, thus requiring high costs
for data collection and management. In this paper, we
propose an NILM approach that relaxes the requirements
on monitoring data since it uses total active power
measurements gathered at low frequency (about 1 Hz).
The proposed approach is based on the use of Factorial
Hidden Markov Models (FHMM) in conjunction with context
information related to the user presence in the house
and the hourly utilization of appliances. Through a set
of tests, we investigated how the use of these
additional context-awareness features could improve
disaggregation results with respect to the basic FHMM
algorithm. The tests have been performed by using
Tracebase, an open dataset made of data gathered from
real home environments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Ecosystemic Evolution Feeded by Smart
Systems.",
}
@Article{Ismail:2016:FST,
author = "Umar Mukhtar Ismail and Shareeful Islam and Moussa
Ouedraogo and Edgar Weippl",
title = "A Framework for Security Transparency in Cloud
Computing",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "1",
pages = "5",
day = "17",
month = feb,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8010005",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/1/5",
abstract = "Individuals and corporate users are persistently
considering cloud adoption due to its significant
benefits compared to traditional computing
environments. The data and applications in the cloud
are stored in an environment that is separated, managed
and maintained externally to the organisation.
Therefore, it is essential for cloud providers to
demonstrate and implement adequate security practices
to protect the data and processes put under their
stewardship. Security transparency in the cloud is
likely to become the core theme that underpins the
systematic disclosure of security designs and practices
that enhance customer confidence in using cloud service
and deployment models. In this paper, we present a
framework that enables a detailed analysis of security
transparency for cloud based systems. In particular, we
consider security transparency from three different
levels of abstraction, i.e., conceptual, organisation
and technical levels, and identify the relevant
concepts within these levels. This allows us to provide
an elaboration of the essential concepts at the core of
transparency and analyse the means for implementing
them from a technical perspective. Finally, an example
from a real world migration context is given to provide
a solid discussion on the applicability of the proposed
framework.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security in Cloud Computing and Big
Data.",
}
@Article{Ma:2016:MDR,
author = "Tinghuai Ma and Xichao Xu and Meili Tang and Yuanfeng
Jin and Wenhai Shen",
title = "{MHBase}: a Distributed Real-Time Query Scheme for
Meteorological Data Based on {HBase}",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "1",
pages = "6",
day = "01",
month = mar,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8010006",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/1/6",
abstract = "Meteorological technology has evolved rapidly in
recent years to provide enormous, accurate and
personalized advantages in the public service. Large
volumes of observational data are generated gradually
by technologies such as geographical remote sensing,
meteorological radar satellite, etc. that makes data
analysis in weather forecasting more precise but also
poses a threat to the traditional method of data
storage. In this paper, we present MHBase,
Meteorological data based on HBase (Hadoop Database), a
distributed real-time query scheme for meteorological
data based on HBase. The calibrated data obtained from
terminal devices will be partitioned into HBase and
persisted to HDFS (the Hadoop Distributed File System).
We propose two algorithms (the Indexed Store and the
Indexed Retrieve Algorithms) to implement a secondary
index using HBase Coprocessors, which allow MHbase to
provide high performance data querying on columns other
than rowkey. Experimental results show that the
performance of MHBase can satisfy the basic demands of
meteorological business services.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lischke:2016:ABN,
author = "Matthias Lischke and Benjamin Fabian",
title = "Analyzing the {Bitcoin} Network: The First Four
Years",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "1",
pages = "7",
day = "07",
month = mar,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8010007",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/1/7",
abstract = "In this explorative study, we examine the economy and
transaction network of the decentralized digital
currency Bitcoin during the first four years of its
existence. The objective is to develop insights into
the evolution of the Bitcoin economy during this
period. For this, we establish and analyze a novel
integrated dataset that enriches data from the Bitcoin
blockchain with off-network data such as business
categories and geo-locations. Our analyses reveal the
major Bitcoin businesses and markets. Our results also
give insights on the business distribution by countries
and how businesses evolve over time. We also show that
there is a gambling network that features many very
small transactions. Furthermore, regional differences
in the adoption and business distribution could be
found. In the network analysis, the small world
phenomenon is investigated and confirmed for several
subgraphs of the Bitcoin network.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Deng:2016:ELF,
author = "Zhi-An Deng and Di Wu and Yiran Zhou and Zhenyu Na",
title = "Enhanced Local {Fisher} Discriminant Analysis for
Indoor Positioning in Wireless Local Area Network",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "8",
day = "25",
month = mar,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020008",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/8",
abstract = "Feature extraction methods have been used to extract
location features for indoor positioning in wireless
local area networks. However, existing methods, such as
linear discriminant analysis and principal component
analysis, all suffer from the multimodal property of
signal distribution. This paper proposes a novel
method, based on enhanced local fisher discriminant
analysis (LFDA). First, LFDA is proposed to extract
discriminative location features. It maximizes
between-class separability while preserving
within-class local structure of signal space, thereby
guaranteeing maximal discriminative information
involved in positioning. Then, the generalization
ability of LFDA is further enhanced using signal
perturbation, which generates more number of
representative training samples. Experimental results
in realistic indoor environment show that, compared
with previous feature extraction methods, the proposed
method reduces the mean and standard deviation of
positing error by 23.9\% and 33.0\%, respectively.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Mobile Computing.",
}
@Article{Golbeck:2016:UPF,
author = "Jennifer Golbeck and Matthew Louis Mauriello",
title = "User Perception of {Facebook} App Data Access: a
Comparison of Methods and Privacy Concerns",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "9",
day = "25",
month = mar,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020009",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/9",
abstract = "Users share vast amounts of personal information
online, but are they fully aware of what information
they are sharing and with whom? In this paper, we
focused on Facebook apps and set out to understand how
concerned users are about privacy and how well-informed
they are about what personal data apps can access. We
found that initially, subjects were generally
under-informed about what data apps could access from
their profiles. After viewing additional information
about these permissions, subjects' concern about
privacy on Facebook increased. Subjects' understanding
of what data apps were able to access increased,
although even after receiving explicit information on
the topic, many subjects still did not fully understand
the extent to which apps could access their data.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Human-Computer Interaction and the
Social Web.",
}
@Article{Massa:2016:FEU,
author = "Daniele Massa and Lucio Davide Spano",
title = "{FaceMashup}: An End-User Development Tool for Social
Network Data",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "10",
day = "29",
month = mar,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020010",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/10",
abstract = "Every day, each active social network user produces
and shares texts, images and videos. While developers
can access such data through application programming
interfaces (APIs) for creating games, visualizations
and routines, end users have less control on such
information. Their access is mediated by the social
application features, which limits them in combining
sources, filtering results and performing actions on
groups of elements. In order to fill this gap, we
introduce FaceMashup, an end user development (EUD)
environment supporting the manipulation of the Facebook
graph. We describe the tool interface, documenting the
choices we made during the design iterations. Data
types are represented through widgets containing user
interface (UI) elements similar to those used in the
social network application. Widgets can be connected
with each other with the drag and drop of their inner
fields, and the application updates their content.
Finally, we report the results of a user-test on the
FaceMashup prototype, which shows a good acceptance of
the environment by end-users.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Human-Computer Interaction and the
Social Web.",
}
@Article{Golbeck:2016:EFA,
author = "Jennifer Golbeck and Carman Neustaedter",
title = "Environmental Factors Affecting Where People
Geocache",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "11",
day = "12",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020011",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/11",
abstract = "Outdoor leisure activities are important for public
health as well as family cohesiveness, yet
environmental factors may easily affect someone's
ability to participate in such activities. We explored
this with a focus on the social web-based treasure hunt
game called Geocaching. We collected data on all US and
Canadian geocaches from OpenCaching.com and conducted
an online survey with twenty geocachers as a follow-up
to our data analysis. Data analysis showed that
geocaches were more often found in areas that were
wealthier, better educated, younger, and more urban,
and had higher population density and better weather.
Survey results showed similar trends: Most people
actively thought about where they would cache and tried
to minimize risks, despite cache hiders thinking less
about these concerns. These results further emphasize
the importance of environmental factors when it comes
to participation in outdoor activities and leads to
Human-Computer Interaction design implications for
location-based online social activities.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Human-Computer Interaction and the
Social Web.",
}
@Article{Antoniadis:2016:MAP,
author = "Konstantinos Antoniadis and Kostas Zafiropoulos and
Vasiliki Vrana",
title = "A Method for Assessing the Performance of e-Government
{Twitter} Accounts",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "12",
day = "18",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020012",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/12",
abstract = "This paper introduces a method for assessing the
influence of Twitter accounts of central e-government
agencies. It first stresses the importance of activity
and popularity of the e-government accounts, and also
the importance of community formation among
followers-citizens, as the two main stages of
e-government adoption. The proposed approach combines
activity and popularity of the accounts and followers'
community characteristics in a ranking system, using an
idea originally introduced to measure blogosphere
authority. A Twitter Authority Index is produced. The
method is demonstrated through an extended example: 56
Twitter accounts of ministries of EU countries are
sorted according to their indexes in the proposed
ranking system. Detailed values for the ministries'
accounts and average values for the countries that the
ministries belong to are reported and commented.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computational Social Sciences:
Contagion, Collective Behaviors, and Networks.",
}
@Article{Fernandez:2016:MSC,
author = "Eduardo B. Fernandez and Nobukazu Yoshioka and
Hironori Washizaki and Madiha H. Syed",
title = "Modeling and Security in Cloud Ecosystems",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "13",
day = "20",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020013",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/13",
abstract = "Clouds do not work in isolation but interact with
other clouds and with a variety of systems either
developed by the same provider or by external entities
with the purpose to interact with them; forming then an
ecosystem. A software ecosystem is a collection of
software systems that have been developed to coexist
and evolve together. The stakeholders of such a system
need a variety of models to give them a perspective of
the possibilities of the system, to evaluate specific
quality attributes, and to extend the system. A
powerful representation when building or using software
ecosystems is the use of architectural models, which
describe the structural aspects of such a system. These
models have value for security and compliance, are
useful to build new systems, can be used to define
service contracts, find where quality factors can be
monitored, and to plan further expansion. We have
described a cloud ecosystem in the form of a pattern
diagram where its components are patterns and reference
architectures. A pattern is an encapsulated solution to
a recurrent problem. We have recently expanded these
models to cover fog systems and containers. Fog
Computing is a highly-virtualized platform that
provides compute, storage, and networking services
between end devices and Cloud Computing Data Centers; a
Software Container provides an execution environment
for applications sharing a host operating system,
binaries, and libraries with other containers. We
intend to use this architecture to answer a variety of
questions about the security of this system as well as
a reference to design interacting combinations of
heterogeneous components. We defined a metamodel to
relate security concepts which is being expanded.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security in Cloud Computing and Big
Data.",
}
@Article{Heaberlin:2016:EWN,
author = "Bradi Heaberlin and Simon DeDeo",
title = "The Evolution of {Wikipedia}'s Norm Network",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "14",
day = "20",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020014",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/14",
abstract = "Social norms have traditionally been difficult to
quantify. In any particular society, their sheer number
and complex interdependencies often limit a
system-level analysis. One exception is that of the
network of norms that sustain the online Wikipedia
community. We study the fifteen-year evolution of this
network using the interconnected set of pages that
establish, describe, and interpret the community's
norms. Despite Wikipedia's reputation for ad hoc
governance, we find that its normative evolution is
highly conservative. The earliest users create norms
that both dominate the network and persist over time.
These core norms govern both content and interpersonal
interactions using abstract principles such as
neutrality, verifiability, and assume good faith. As
the network grows, norm neighborhoods decouple
topologically from each other, while increasing in
semantic coherence. Taken together, these results
suggest that the evolution of Wikipedia's norm network
is akin to bureaucratic systems that predate the
information age.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computational Social Sciences:
Contagion, Collective Behaviors, and Networks.",
}
@Article{Okamoto:2016:RBI,
author = "Kazuaki Okamoto and Kazumasa Takami",
title = "Routing Based on Information about the Routes of
Fixed-Route Traveling Nodes and on Destination Areas
Aimed at Reducing the Load on the {DTN}",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "15",
day = "27",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020015",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/15",
abstract = "In recent years, the interest in delay/disruption
tolerant networking (DTN) is growing as a means of
communication in times of disaster. To ensure that a
DTN works well in an emergency, it is desirable to
promote general use of the DTN, so that it will also be
used in normal times. Since the DTN uses mobile
terminals and vehicles, which are not dedicated network
devices, as relay nodes, the routing method should be
such that it does not impose a large processing load on
relay nodes. This paper considers use of a DTN for a
day-to-day service of delivering content to a specific
area and proposes a new routing method that is based on
information about the routes of fixed-route traveling
nodes, such as public transportation vehicles. The
destination of a bundle is specified not by a terminal
identifier, but by an area, which is identified by its
location information. This paper presents an
outbound-type bundle protocol, which is used by relay
nodes when they have received a forwarding-bundle
request from a sending terminal and try to determine
whether the bundle can reach its destination area.
Using simulation, the superiority of the proposed
routing was confirmed by comparing it to existing
routing methods in terms of the bundle arrival rate and
factors that affect the network load, such as the
number of bundle copies, the number of hops and the
maximum required buffer size.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ibba:2016:DLC,
author = "Simona Ibba and Filippo Eros Pani",
title = "Digital Libraries: The Challenge of Integrating
{Instagram} with a Taxonomy for Content Management",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "16",
day = "10",
month = may,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020016",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/16",
abstract = "Interoperability and social implication are two
current challenges in the digital library (DL) context.
To resolve the problem of interoperability, our work
aims to find a relationship between the main metadata
schemas. In particular, we want to formalize knowledge
through the creation of a metadata taxonomy built with
the analysis and the integration of existing schemas
associated with DLs. We developed a method to integrate
and combine Instagram metadata and hashtags. The final
result is a taxonomy, which provides innovative
metadata with respect to the classification of
resources, as images of Instagram and the
user-generated content, that play a primary role in the
context of modern DLs. The possibility of Instagram to
localize the photos inserted by users allows us to
interpret the most relevant and interesting informative
content for a specific user type and in a specific
location and to improve access, visibility and
searching of library content.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Human-Computer Interaction and the
Social Web.",
}
@Article{Premnath:2016:SPC,
author = "Sriram Nandha Premnath and Zygmunt J. Haas",
title = "Supporting Privacy of Computations in Mobile Big Data
Systems",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "17",
day = "10",
month = may,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020017",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/17",
abstract = "Cloud computing systems enable clients to rent and
share computing resources of third party platforms, and
have gained widespread use in recent years. Numerous
varieties of mobile, small-scale devices such as
smartphones, red e-health devices, etc., across users,
are connected to one another through the massive
internetwork of vastly powerful servers on the cloud.
While mobile devices store ``private information'' of
users such as location, payment, health data, etc.,
they may also contribute ``semi-public information''
(which may include crowdsourced data such as transit,
traffic, nearby points of interests, etc.) for data
analytics. In such a scenario, a mobile device may seek
to obtain the result of a computation, which may depend
on its private inputs, crowdsourced data from other
mobile devices, and/or any ``public inputs'' from other
servers on the Internet. We demonstrate a new method of
delegating real-world computations of
resource-constrained mobile clients using an encrypted
program known as the garbled circuit. Using the garbled
version of a mobile client's inputs, a server in the
cloud executes the garbled circuit and returns the
resulting garbled outputs. Our system assures privacy
of the mobile client's input data and output of the
computation, and also enables the client to verify that
the evaluator actually performed the computation. We
analyze the complexity of our system. We measure the
time taken to construct the garbled circuit as well as
evaluate it for varying number of servers. Using
real-world data, we evaluate our system for a
practical, privacy preserving search application that
locates the nearest point of interest for the mobile
client to demonstrate feasibility.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security in Cloud Computing and Big
Data.",
}
@Article{Carrino:2016:IIT,
author = "Francesco Carrino and Elena Mugellini and Omar Abou
Khaled and Nabil Ouerhani and Juergen Ehrensberger",
title = "{iNUIT}: {Internet of Things} for Urban Innovation",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "18",
day = "11",
month = may,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020018",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/18",
abstract = "Internet of Things (IoT) seems a viable way to enable
the Smart Cities of the future. iNUIT (Internet of
Things for Urban Innovation) is a multi-year research
program that aims to create an ecosystem that exploits
the variety of data coming from multiple sensors and
connected objects installed on the scale of a city, in
order to meet specific needs in terms of development of
new services (physical security, resource management,
etc.). Among the multiple research activities within
iNUIT, we present two projects: SmartCrowd and OpEc.
SmartCrowd aims at monitoring the crowd's movement
during large events. It focuses on real-time tracking
using sensors available in smartphones and on the use
of a crowd simulator to detect possible dangerous
scenarios. A proof-of-concept of the application has
been tested at the Pal{\'e}o Festival (Switzerland)
showing the feasibility of the approach. OpEc
(Optimisation de l'Eclairage public) aims at using IoT
to implement dynamic street light management and
control with the goal of reducing street light energy
consumption while guaranteeing the same level of
security of traditional illumination. The system has
been tested during two months in a street in St-Imier
(Switzerland) without interruption, validating its
stability and resulting in an overall energy saving of
about 56\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Ecosystemic Evolution Feeded by Smart
Systems.",
}
@Article{Lettieri:2016:CSS,
author = "Nicola Lettieri",
title = "Computational Social Science, the Evolution of Policy
Design and Rule Making in Smart Societies",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "19",
day = "12",
month = may,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020019",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/19",
abstract = "In the last 20 years, the convergence of different
factors-the rise of the complexity of science, the
``data deluge'' and the advances in information
technologies-triggered a paradigm shift in the way we
understand complex social systems and their evolution.
Beyond shedding new light onto social dynamics, the
emerging research area of Computational Social Science
(CSS) is providing a new rationale for a more
scientifically-grounded and effective policy design.
The paper discusses the opportunities potentially
deriving from the intersection between policy design
issues and CSS methods. After a general introduction to
the limits of traditional policy-making and a brief
review of the most promising CSS methodologies, the
work deals with way in which the insights potentially
offered by CSS can concretely flow in policy choices.
The attention is focused, to this end, on the legal
mechanisms regulating the formulation and the
evaluation of public policies. Our goal is two-fold:
sketch how the project of a ``smart society'' is
connected to the evolution of social sciences and
emphasize the need for change in the way in which
public policies are conceived of, designed and
implemented.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Ecosystemic Evolution Feeded by Smart
Systems.",
}
@Article{Pandey:2016:UFI,
author = "Pankaj Pandey and Einar Snekkenes",
title = "Using Financial Instruments to Transfer the
Information Security Risks",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "20",
day = "17",
month = may,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020020",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/20",
abstract = "For many individuals and organizations,
cyber-insurance is the most practical and only way of
handling a major financial impact of an information
security event. However, the cyber-insurance market
suffers from the problem of information asymmetry, lack
of product diversity, illiquidity, high transaction
cost, and so on. On the other hand, in theory, capital
market-based financial instruments can provide a risk
transfer mechanism with the ability to absorb the
adverse impact of an information security event. Thus,
this article addresses the limitations in the
cyber-(re)insurance markets with a set of capital
market-based financial instruments. This article
presents a set of information security derivatives,
namely options, vanilla options, swap, and futures that
can be traded at an information security prediction
market. Furthermore, this article demonstrates the
usefulness of information security derivatives in a
given scenario and presents an evaluation of the same
in comparison with cyber-insurance. In our analysis, we
found that the information security derivatives can at
least be a partial solution to the problems in the
cyber-insurance markets. The information security
derivatives can be used as an effective tool for
information elicitation and aggregation, cyber risk
pricing, risk hedging, and strategic decision making
for information security risk management.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lerman:2016:IVO,
author = "Kristina Lerman",
title = "Information Is Not a Virus, and Other Consequences of
Human Cognitive Limits",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "21",
day = "13",
month = may,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020021",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/21",
abstract = "The many decisions that people make about what to pay
attention to online shape the spread of information in
online social networks. Due to the constraints of
available time and cognitive resources, the ease of
discovery strongly impacts how people allocate their
attention to social media content. As a consequence,
the position of information in an individual's social
feed, as well as explicit social signals about its
popularity, determine whether it will be seen, and the
likelihood that it will be shared with followers.
Accounting for these cognitive limits simplifies
mechanics of information diffusion in online social
networks and explains puzzling empirical observations:
(i) information generally fails to spread in social
media and (ii) highly connected people are less likely
to re-share information. Studies of information
diffusion on different social media platforms reviewed
here suggest that the interplay between human cognitive
limits and network structure differentiates the spread
of information from other social contagions, such as
the spread of a virus through a population.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computational Social Sciences:
Contagion, Collective Behaviors, and Networks.",
}
@Article{Sanchez:2016:DES,
author = "Luis Enrique S{\'a}nchez and Antonio Santos-Olmo and
Esther {\'A}lvarez and Monica Huerta and Sara Camacho
and Eduardo Fern{\'a}ndez-Medina",
title = "Development of an Expert System for the Evaluation of
Students' Curricula on the Basis of Competencies",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "22",
day = "18",
month = may,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020022",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/22",
abstract = "The concept of competence, which emerged during the
reform of computer engineering degrees, has not brought
benefits to companies when attempting to select the
most suitable candidates for their jobs. This article
aims to show some of the research that has been
conducted to determine why companies have not found
these skills useful and how both can be aligned.
Finally, we show the development of an Expert System
that will enable companies to select the most suitable
candidates for their jobs, considering personal and
social skills, along with technical knowledge. This
prototype will serve as a basis to align the
competencies defined in the curricula with professional
requirements, thus allowing a true alignment between
degree courses and the needs of professional
companies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{Fantacci:2016:CSS,
author = "Romano Fantacci and Dania Marabissi",
title = "Cognitive Spectrum Sharing: An Enabling Wireless
Communication Technology for a Wide Use of Smart
Systems",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "23",
day = "20",
month = may,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020023",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/23",
abstract = "A smart city is an environment where a pervasive,
multi-service network is employed to provide citizens
improved living conditions as well as better public
safety and security. Advanced communication
technologies are essential to achieve this goal. In
particular, an efficient and reliable communication
network plays a crucial role in providing continue,
ubiquitous, and reliable interconnections among users,
smart devices, and applications. As a consequence,
wireless networking appears as the principal enabling
communication technology despite the necessity to face
severe challenges to satisfy the needs arising from a
smart environment, such as explosive data volume,
heterogeneous data traffic, and support of quality of
service constraints. An interesting approach for
meeting the growing data demand due to smart city
applications is to adopt suitable methodologies to
improve the usage of all potential spectrum resources.
Towards this goal, a very promising solution is
represented by the Cognitive Radio technology that
enables context-aware capability in order to pursue an
efficient use of the available communication resources
according to the surrounding environment conditions. In
this paper we provide a review of the characteristics,
challenges, and solutions of a smart city communication
architecture, based on the Cognitive Radio technology,
by focusing on two new network paradigms-namely,
Heterogeneous Network and Machines-to-Machines
communications-that are of special interest to
efficiently support smart city applications and
services.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Ecosystemic Evolution Feeded by Smart
Systems.",
}
@Article{Martini:2016:SOA,
author = "Barbara Martini and Federica Paganelli",
title = "A Service-Oriented Approach for Dynamic Chaining of
Virtual Network Functions over Multi-Provider
Software-Defined Networks",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "24",
day = "01",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020024",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/24",
abstract = "Emerging technologies such as Software-Defined
Networks (SDN) and Network Function Virtualization
(NFV) promise to address cost reduction and flexibility
in network operation while enabling innovative network
service delivery models. However, operational network
service delivery solutions still need to be developed
that actually exploit these technologies, especially at
the multi-provider level. Indeed, the implementation of
network functions as software running over a
virtualized infrastructure and provisioned on a service
basis let one envisage an ecosystem of network services
that are dynamically and flexibly assembled by
orchestrating Virtual Network Functions even across
different provider domains, thereby coping with
changeable user and service requirements and context
conditions. In this paper we propose an approach that
adopts Service-Oriented Architecture (SOA)
technology-agnostic architectural guidelines in the
design of a solution for orchestrating and dynamically
chaining Virtual Network Functions. We discuss how SOA,
NFV, and SDN may complement each other in realizing
dynamic network function chaining through service
composition specification, service selection, service
delivery, and placement tasks. Then, we describe the
architecture of a SOA-inspired NFV orchestrator, which
leverages SDN-based network control capabilities to
address an effective delivery of elastic chains of
Virtual Network Functions. Preliminary results of
prototype implementation and testing activities are
also presented. The benefits for Network Service
Providers are also described that derive from the
adaptive network service provisioning in a
multi-provider environment through the orchestration of
computing and networking services to provide end users
with an enhanced service experience.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Ecosystemic Evolution Feeded by Smart
Systems.",
}
@Article{Garcia-Martinez:2016:MAE,
author = "Ant{\'o}n Garc{\'\i}a-Mart{\'\i}nez and Jos{\'e}
Rivas-Rangel and Jaime Rangel-Quintos and Jos{\'e}
Antonio Espinosa and Cecilio Barba and Carmen
De-Pablos-Heredero",
title = "A Methodological Approach to Evaluate Livestock
Innovations on Small-Scale Farms in Developing
Countries",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "25",
day = "03",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020025",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/25",
abstract = "The aim of the study was deepening the knowledge of
livestock innovations knowledge on small-scale farms in
developing countries. First, we developed a methodology
focused on identifying potential appropriate livestock
innovations for smallholders and grouped them in
innovation areas, defined as a set of well-organized
practices with a business purpose. Finally, a process
management program (PMP) was evaluated according to the
livestock innovation level and viability of the
small-scale farms. Logistic regression was used to
evaluate the impact of PMP on the economic viability of
the farm. Information from 1650 small-scale livestock
farms in Mexico was collected and the innovations were
grouped in five innovation areas: A1. Management, A2.
Feeding, A3. Genetic, A4. Reproduction and A5. Animal
Health. The resulting innovation level in the system
was low at 45.7\% and heterogeneous among areas. This
study shows the usefulness of the methodology described
and confirms that implementing a PMP allows improving
the viability an additional 21\%, due to a better
integration of processes, resulting in more efficient
management.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Intelligent Systems and
Networks.",
}
@Article{Vovides:2016:ELU,
author = "Yianna Vovides and Sarah Inman",
title = "Elusive Learning-Using Learning Analytics to Support
Reflective Sensemaking of Ill-Structured Ethical
Problems: a Learner-Managed Dashboard Solution",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "2",
pages = "26",
day = "11",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8020026",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/2/26",
abstract = "Since the turn of the 21st century, we have seen a
surge of studies on the state of U.S. education
addressing issues such as cost, graduation rates,
retention, achievement, engagement, and curricular
outcomes. There is an expectation that graduates should
be able to enter the workplace equipped to take on
complex and ``messy'' or ill-structured problems as
part of their professional and everyday life. In the
context of online learning, we have identified two key
issues that are elusive (hard to capture and make
visible): learning with ill-structured problems and the
interaction of social and individual learning. We
believe that the intersection between learning and
analytics has the potential, in the long-term, to
minimize the elusiveness of deep learning. A proposed
analytics model is described in this article that is
meant to capture and also support further development
of a learner's reflective sensemaking.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue eLearning.",
}
@Article{Ye:2016:DSA,
author = "Ting Ye and Baowei Wang",
title = "Density Self-Adaptive Hybrid Clustering Routing
Protocol for Wireless Sensor Networks",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "27",
day = "29",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030027",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/27",
abstract = "Energy efficiency is of major concern in wireless
sensor networks, especially in difficult node
deployment environments. Clustering is an effective
method to save energy consumption and prolong the
network lifetime. There are two kinds of clustering
methods in hierarchical routing protocols, namely
distributed control and centralized control. In the
distributed strategy, the algorithm has good
scalability, but it can easily lead to an uneven
distribution of cluster heads. When the centralized
strategy is used, the network is balanced and robust,
but the overhead of clustering is large and the network
latency is increased. In our proposed protocol, named
DAHC, a mixture algorithm of distributed and
centralized control is used to select a cluster head
(CH). Simultaneously, we propose a novel approach to
judge the cluster density and adjust according to the
preset threshold. The simulation results show that our
methods can evenly distribute the energy load on all
nodes, save the energy consumption of communication and
extend the network lifetime concurrently.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Strizhov:2016:SPS,
author = "Mikhail Strizhov and Zachary Osman and Indrajit Ray",
title = "Substring Position Search over Encrypted Cloud Data
Supporting Efficient Multi-User Setup",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "28",
day = "04",
month = jul,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030028",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/28",
abstract = "Existing Searchable Encryption (SE) solutions are able
to handle simple Boolean search queries, such as single
or multi-keyword queries, but cannot handle substring
search queries over encrypted data that also involve
identifying the position of the substring within the
document. These types of queries are relevant in areas
such as searching DNA data. In this paper, we propose a
tree-based Substring Position Searchable Symmetric
Encryption (SSP-SSE) to overcome the existing gap. Our
solution efficiently finds occurrences of a given
substring over encrypted cloud data. Specifically, our
construction uses the position heap tree data structure
and achieves asymptotic efficiency comparable to that
of an unencrypted position heap tree. Our encryption
takes O (k n) time, and the resulting ciphertext is of
size O (k n), where k is a security parameter and n is
the size of stored data. The search takes O (m 2 + o c
c) time and three rounds of communication, where m is
the length of the queried substring and o c c is the
number of occurrences of the substring in the document
collection. We prove that the proposed scheme is secure
against chosen-query attacks that involve an adaptive
adversary. Finally, we extend SSP-SSE to the multi-user
setting where an arbitrary group of cloud users can
submit substring queries to search the encrypted
data.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security in Cloud Computing and Big
Data.",
}
@Article{Haider:2016:WBD,
author = "Waqas Haider and Gideon Creech and Yi Xie and Jiankun
Hu",
title = "{Windows} Based Data Sets for Evaluation of Robustness
of Host Based Intrusion Detection Systems {(IDS)} to
Zero-Day and Stealth Attacks",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "29",
day = "05",
month = jul,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030029",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/29",
abstract = "The Windows Operating System (OS) is the most popular
desktop OS in the world, as it has the majority market
share of both servers and personal computing
necessities. However, as its default signature-based
security measures are ineffectual for detecting
zero-day and stealth attacks, it needs an intelligent
Host-based Intrusion Detection System (HIDS).
Unfortunately, a comprehensive data set that reflects
the modern Windows OS's normal and attack surfaces is
not publicly available. To fill this gap, in this paper
two open data sets generated by the cyber security
department of the Australian Defence Force Academy
(ADFA) are introduced, namely: Australian Defence Force
Academy Windows Data Set (ADFA-WD); and Australian
Defence Force Academy Windows Data Set with a Stealth
Attacks Addendum (ADFA-WD: SAA). Statistical analysis
results based on these data sets show that, due to the
low foot prints of modern attacks and high similarity
of normal and attacked data, both these data sets are
complex, and highly intelligent Host based Anomaly
Detection Systems (HADS) design will be required.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cyber Warfare.",
}
@Article{Santos-Olmo:2016:ISC,
author = "Antonio Santos-Olmo and Luis Enrique S{\'a}nchez and
Ismael Caballero and Sara Camacho and Eduardo
Fernandez-Medina",
title = "The Importance of the Security Culture in {SMEs} as
Regards the Correct Management of the Security of Their
Assets",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "30",
day = "07",
month = jul,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030030",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/30",
abstract = "The information society is increasingly more dependent
on Information Security Management Systems (ISMSs), and
the availability of these kinds of systems is now vital
for the development of Small and Medium-Sized
Enterprises (SMEs). However, these companies require
ISMSs that have been adapted to their special features,
and which are optimized as regards the resources needed
to deploy and maintain them. This article shows how
important the security culture within ISMSs is for
SMEs, and how the concept of security culture has been
introduced into a security management methodology
(MARISMA is a Methodology for ``Information Security
Management System in SMEs'' developed by the Sicaman
Nuevas Tecnolog{\'\i}as Company, Research Group GSyA
and Alarcos of the University of Castilla-La Mancha.)
for SMEs. This model is currently being directly
applied to real cases, thus allowing a steady
improvement to be made to its implementation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{DeDeo:2016:CCW,
author = "Simon DeDeo",
title = "Conflict and Computation on {Wikipedia}: a
Finite-State Machine Analysis of {Editor}
Interactions",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "31",
day = "08",
month = jul,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030031",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/31",
abstract = "What is the boundary between a vigorous argument and a
breakdown of relations? What drives a group of
individuals across it? Taking Wikipedia as a test case,
we use a hidden Markov model to approximate the
computational structure and social grammar of more than
a decade of cooperation and conflict among its editors.
Across a wide range of pages, we discover a bursty
war/peace structure where the systems can become
trapped, sometimes for months, in a computational
subspace associated with significantly higher levels of
conflict-tracking ``revert'' actions. Distinct patterns
of behavior characterize the lower-conflict subspace,
including tit-for-tat reversion. While a fraction of
the transitions between these subspaces are associated
with top-down actions taken by administrators, the
effects are weak. Surprisingly, we find no statistical
signal that transitions are associated with the
appearance of particularly anti-social users, and only
weak association with significant news events outside
the system. These findings are consistent with
transitions being driven by decentralized processes
with no clear locus of control. Models of belief
revision in the presence of a common resource for
information-sharing predict the existence of two
distinct phases: a disordered high-conflict phase, and
a frozen phase with spontaneously-broken symmetry. The
bistability we observe empirically may be a consequence
of editor turn-over, which drives the system to a
critical point between them.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computational Social Sciences:
Contagion, Collective Behaviors, and Networks.",
}
@Article{Guidi:2016:CSI,
author = "Gabriele Guidi and Roberto Miniati and Matteo Mazzola
and Ernesto Iadanza",
title = "Case Study: {IBM Watson} Analytics Cloud Platform as
Analytics-as-a-Service System for Heart Failure Early
Detection",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "32",
day = "13",
month = jul,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030032",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/32",
abstract = "In the recent years the progress in technology and the
increasing availability of fast connections have
produced a migration of functionalities in Information
Technologies services, from static servers to
distributed technologies. This article describes the
main tools available on the market to perform Analytics
as a Service (AaaS) using a cloud platform. It is also
described a use case of IBM Watson Analytics, a cloud
system for data analytics, applied to the following
research scope: detecting the presence or absence of
Heart Failure disease using nothing more than the
electrocardiographic signal, in particular through the
analysis of Heart Rate Variability. The obtained
results are comparable with those coming from the
literature, in terms of accuracy and predictive power.
Advantages and drawbacks of cloud versus static
approaches are discussed in the last sections.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Ecosystemic Evolution Feeded by Smart
Systems.",
}
@Article{Florez:2016:ADC,
author = "Ang{\'e}lica Fl{\'o}rez and Lenin Serrano and Urbano
G{\'o}mez and Luis Su{\'a}rez and Alejandro Villarraga
and Hugo Rodr{\'\i}guez",
title = "Analysis of Dynamic Complexity of the Cyber Security
Ecosystem of {Colombia}",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "33",
day = "19",
month = jul,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030033",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/33",
abstract = "This paper presents two proposals for the analysis of
the complexity of the Cyber security Ecosystem of
Colombia (CEC). This analysis shows the available
knowledge about entities engaged in cyber security in
Colombia and the relationships between them, which
allow an understanding of the synergy between the
different existing components. The complexity of the
CEC is detailed from the view of the Influence Diagram
of System Dynamics and the Domain Diagram of Software
Engineering. The resulting model makes cyber security
evident as a strategic component of national
security.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{Merrick:2016:SGT,
author = "Kathryn Merrick and Medria Hardhienata and Kamran
Shafi and Jiankun Hu",
title = "A Survey of Game Theoretic Approaches to Modelling
Decision-Making in Information Warfare Scenarios",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "34",
day = "22",
month = jul,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030034",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/34",
abstract = "Our increasing dependence on information technologies
and autonomous systems has escalated international
concern for information- and cyber-security in the face
of politically, socially and religiously motivated
cyber-attacks. Information warfare tactics that
interfere with the flow of information can challenge
the survival of individuals and groups. It is
increasingly important that both humans and machines
can make decisions that ensure the trustworthiness of
information, communication and autonomous systems.
Subsequently, an important research direction is
concerned with modelling decision-making processes. One
approach to this involves modelling decision-making
scenarios as games using game theory. This paper
presents a survey of information warfare literature,
with the purpose of identifying games that model
different types of information warfare operations. Our
contribution is a systematic identification and
classification of information warfare games, as a basis
for modelling decision-making by humans and machines in
such scenarios. We also present a taxonomy of games
that map to information warfare and cyber crime
problems as a precursor to future research on
decision-making in such scenarios. We identify and
discuss open research questions including the role of
behavioural game theory in modelling human decision
making and the role of machine decision-making in
information warfare scenarios.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cyber Warfare.",
}
@Article{Kou:2016:TVR,
author = "Weili Kou and Hui Li and Kailai Zhou",
title = "Turning Video Resource Management into Cloud
Computing",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "35",
day = "21",
month = jul,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030035",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/35",
abstract = "Big data makes cloud computing more and more popular
in various fields. Video resources are very useful and
important to education, security monitoring, and so on.
However, issues of their huge volumes, complex data
types, inefficient processing performance, weak
security, and long times for loading pose challenges in
video resource management. The Hadoop Distributed File
System (HDFS) is an open-source framework, which can
provide cloud-based platforms and presents an
opportunity for solving these problems. This paper
presents video resource management architecture based
on HDFS to provide a uniform framework and a five-layer
model for standardizing the current various algorithms
and applications. The architecture, basic model, and
key algorithms are designed for turning video resources
into a cloud computing environment. The design was
tested by establishing a simulation system prototype.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Intelligent Systems and
Networks.",
}
@Article{Santos-Olmo:2016:AAR,
author = "Antonio Santos-Olmo and Luis Enrique S{\'a}nchez and
David G. Rosado and Eduardo Fern{\'a}ndez-Medina and
Mario Piattini",
title = "Applying the Action-Research Method to Develop a
Methodology to Reduce the Installation and Maintenance
Times of Information Security Management Systems",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "36",
day = "22",
month = jul,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030036",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/36",
abstract = "Society is increasingly dependent on Information
Security Management Systems (ISMS), and having these
kind of systems has become vital for the development of
Small and Medium-Sized Enterprises (SMEs). However,
these companies require ISMS that have been adapted to
their special features and have been optimized as
regards the resources needed to deploy and maintain
them, with very low costs and short implementation
periods. This paper discusses the different cycles
carried out using the `Action Research (AR)' method,
which have allowed the development of a security
management methodology for SMEs that is able to
automate processes and reduce the implementation time
of the ISMS.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{Boulos:2016:IWH,
author = "Maged N. Kamel Boulos and Dean M. Giustini and Steve
Wheeler",
title = "{Instagram} and {WhatsApp} in Health and Healthcare:
an Overview",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "37",
day = "26",
month = jul,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030037",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/37",
abstract = "Instagram and WhatsApp are two social media and
networking services introduced in 2010. They are
currently subsidiaries of Facebook, Inc., California,
USA. Using evidence from the published literature and
case reports indexed in PubMed and other sources, we
present an overview of the various applications of
Instagram and WhatsApp in health and healthcare. We
also briefly describe the main issues surrounding the
uses of these two apps in health and medicine.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue e-Health.",
}
@Article{Yang:2016:NQP,
author = "Weijun Yang and Yuanfeng Chen",
title = "A Novel {QoS} Provisioning Algorithm for Optimal
Multicast Routing in {WMNs}",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "38",
day = "01",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030038",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/38",
abstract = "The problem of optimal multicast routing in Wireless
Mess Networks (WMNs) with Quality-of-Service (QoS)
provisioning, which is Non-Deterministic Polynomial
(NP)-complete, is studied in this paper. The existing
algorithms are not very efficient or effective. In
order to find an approximation optimal solution for
WMNs in feasible time from source to the set of
destination nodes, combining the previous deterministic
algorithm with the well-known Minimum Path Cost
Heuristic (MPH) algorithm, a novel multicast heuristic
approximation (NMHA) algorithm with QoS provisioning is
proposed in this paper to deal with it. The theoretical
validations for the proposed algorithm are presented to
show its performance and efficiency. After that, the
random static networks with different destination nodes
are evaluated. Simulations in these networks show that
the proposed algorithm can achieve the approximate
optimal solution with the approximation factor of 2(1 +
\epsilon)(1 - 1/ q) and the time complexity of O(qmn 2
\tau K-1).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Intelligent Systems and
Networks.",
}
@Article{Liu:2016:OBR,
author = "Xin Liu and Zhongfu Li and Shaohua Jiang",
title = "Ontology-Based Representation and Reasoning in
Building Construction Cost Estimation in {China}",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "39",
day = "03",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030039",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/39",
abstract = "Cost estimation is one of the most critical tasks for
building construction project management. The existing
building construction cost estimation methods of many
countries, including China, require information from
several sources, including material, labor, and
equipment, and tend to be manual, time-consuming, and
error-prone. To solve these problems, a building
construction cost estimation model based on ontology
representation and reasoning is established, which
includes three major components, i.e., concept model
ontology, work item ontology, and construction
condition ontology. Using this model, the cost
estimation information is modeled into OWL axioms and
SWRL rules that leverage the semantically rich ontology
representation to reason about cost estimation. Based
on OWL axioms and SWRL rules, the cost estimation
information can be translated into a set of concept
models, work items, and construction conditions
associated with the specific construction conditions.
The proposed method is demonstrated in Prot{\'e}g{\'e}
3.4.8 through case studies based on the Measurement
Specifications of Building Construction and Decoration
Engineering taken from GB 50500-2013 (the Chinese
national mandatory specifications). Finally, this
research discusses the limitations of the proposed
method and future research directions. The proposed
method can help a building construction cost estimator
extract information more easily and quickly.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Computing and Knowledge
Building.",
}
@Article{Chinnachodteeranun:2016:SOS,
author = "Rassarin Chinnachodteeranun and Kiyoshi Honda",
title = "Sensor Observation Service {API} for Providing Gridded
Climate Data to Agricultural Applications",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "40",
day = "09",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030040",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/40",
abstract = "We developed a mechanism for seamlessly providing
weather data and long-term historical climate data from
a gridded data source through an international standard
web API, which was the Sensor Observation Service (SOS)
defined by the Open Geospatial Consortium (OGC). The
National Agriculture and Food Research Organization
(NARO) Japan has been providing gridded climate data
consisting of nine daily meteorological variables,
which are average, minimum, maximum of air temperature,
relative humidity, sunshine duration, solar radiant
exposure, downward longwave radiation, precipitation
and wind speed for 35 years covering Japan. The gridded
data structure is quite useful for spatial analysis,
such as developing crop suitability maps and monitoring
regional crop development. Individual farmers, however,
make decisions using historical climate information and
forecasts for an incoming cropping season of their
farms. In this regard, climate data at a point-based
structure are convenient for application development to
support farmers' decisions. Through the proposed
mechanism in this paper, the agricultural applications
and analysis can request point-based climate data from
a gridded data source through the standard API with no
need to deal with the complicated hierarchical data
structure of the gridded climate data source. Clients
can easily obtain data and metadata by only accessing
the service endpoint. The mechanism also provides
several web bindings and data encodings for the
clients' convenience. Caching, including the
pre-caching mechanism, was developed and evaluated to
secure an effective response time. The mechanism
enhances the accessibility and usability of the gridded
weather data source, as well as SOS API for
agricultural applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Diaz:2016:CAT,
author = "Paloma D{\'\i}az and John M. Carroll and Ignacio
Aedo",
title = "Coproduction as an Approach to Technology-Mediated
Citizen Participation in Emergency Management",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "41",
day = "10",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030041",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/41",
abstract = "Social and mobile computing open up new possibilities
for integrating citizens' information, knowledge, and
social capital in emergency management (EM). This
participation can improve the capacity of local
agencies to respond to unexpected events by involving
citizens not only as first line informants, but also as
first responders. This participation could contribute
to build resilient communities aware of the risks they
are threatened by and able to mobilize their social
capital to cope with them and, in turn, decrease the
impact of threats and hazards. However for this
participation to be possible organizations in charge of
EM need to realize that involving citizens does not
interfere with their protocols and that citizens are a
valuable asset that can contribute to the EM process
with specific skills and capabilities. In this paper we
discuss the design challenges of using social and
mobile computing to move to a more participatory EM
process that starts by empowering both citizens and
organizations in a coproduction service envisioned as a
partnership effort. As an example, we describe a case
study of a participatory design approach that involved
professional EM workers and decision makers in an
effort to understand the challenges of using
technology-based solutions to integrate citizen skills
and capabilities in their operation protocols. The case
study made it possible to identify specific roles that
citizens might play in a crisis or disaster and to
envision scenarios were technologies could be used to
integrate their skills into the EM process. In this way
the paper contributes to the roles and the scenarios of
theory-building about coproduction in EM services.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Mobile Computing.",
}
@Article{Francese:2016:SEP,
author = "Rita Francese and Michele Risi",
title = "Supporting Elderly People by Ad Hoc Generated Mobile
Applications Based on Vocal Interaction",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "42",
day = "25",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030042",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/42",
abstract = "Mobile devices can be exploited for enabling people to
interact with Internet of Things (IoT) services. The
MicroApp Generator [1] is a service-composition tool
for supporting the generation of mobile applications
directly on the mobile device. The user interacts with
the generated app by using the traditional touch-based
interaction. This kind of interaction often is not
suitable for elderly and special needs people that
cannot see or touch the screen. In this paper, we
extend the MicroApp Generator with an interaction
approach enabling a user to interact with the generated
app only by using his voice, which can be very useful
to let special needs people live at home. To this aim,
once the mobile app has been generated and executed,
the system analyses and describes the user interface,
listens to the user speech and performs the associated
actions. A preliminary analysis has been conducted to
assess the user experience of the proposed approach by
a sample composed of elderly users by using a
questionnaire as a research instrument.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Mobile Computing.",
}
@Article{Carta:2016:ISI,
author = "Salvatore Carta and Ludovico Boratto",
title = "Introduction to the Special Issue on Human-Computer
Interaction and the {Social Web}",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "43",
day = "01",
month = sep,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030043",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/43",
abstract = "Data is currently one of the most important assets for
companies in every field. The continuous growth in the
importance and volume of data has created a new
problem: it cannot be handled by traditional analysis
techniques. This problem was, therefore, solved through
the creation of a new paradigm: Big Data. However, Big
Data originated new issues related not only to the
volume or the variety of the data, but also to data
security and privacy. In order to obtain a full
perspective of the problem, we decided to carry out an
investigation with the objective of highlighting the
main issues regarding Big Data security, and also the
solutions proposed by the scientific community to solve
them. In this paper, we explain the results obtained
after applying a systematic mapping study to security
in the Big Data ecosystem. It is almost impossible to
carry out detailed research into the entire topic of
security, and the outcome of this research is,
therefore, a big picture of the main problems related
to security in a Big Data system, along with the
principal solutions to them proposed by the research
community.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Human-Computer Interaction and the
Social Web.",
}
@Article{Moreno:2016:MIB,
author = "Julio Moreno and Manuel A. Serrano and Eduardo
Fern{\'a}ndez-Medina",
title = "Main Issues in Big Data Security",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "44",
day = "01",
month = sep,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030044",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/44",
abstract = "Data is currently one of the most important assets for
companies in every field. The continuous growth in the
importance and volume of data has created a new
problem: it cannot be handled by traditional analysis
techniques. This problem was, therefore, solved through
the creation of a new paradigm: Big Data. However, Big
Data originated new issues related not only to the
volume or the variety of the data, but also to data
security and privacy. In order to obtain a full
perspective of the problem, we decided to carry out an
investigation with the objective of highlighting the
main issues regarding Big Data security, and also the
solutions proposed by the scientific community to solve
them. In this paper, we explain the results obtained
after applying a systematic mapping study to security
in the Big Data ecosystem. It is almost impossible to
carry out detailed research into the entire topic of
security, and the outcome of this research is,
therefore, a big picture of the main problems related
to security in a Big Data system, along with the
principal solutions to them proposed by the research
community.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security in Cloud Computing and Big
Data.",
}
@Article{Kosenkov:2016:CCN,
author = "Alexander Kosenkov",
title = "Cyber Conflicts as a New Global Threat",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "3",
pages = "45",
day = "09",
month = sep,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8030045",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:55 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/3/45",
abstract = "In this paper, an attempt is made to analyze the
potential threats and consequences of cyber conflicts
and, in particular, the risks of a global cyber
conflict. The material is based on a comprehensive
analysis of the nature of cyber conflict and its
elements from both technical and societal points of
view. The approach used in the paper considers the
societal component as an essential part of cyber
conflicts, allowing basics of cyber conflicts often
disregarded by researchers and the public to be
highlighted. Finally, the conclusion offers an
opportunity to consider cyber conflict as the most
advanced form of modern warfare, which imposes the most
serious threat and whose effect could be comparable to
weapons of mass destruction.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cyber Warfare.",
}
@Article{Marti:2016:DED,
author = "Patrizia Marti and Carl Megens and Caroline Hummels",
title = "Data-Enabled Design for Social Change: Two Case
Studies",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "4",
pages = "46",
day = "23",
month = sep,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8040046",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/4/46",
abstract = "Smartness in contemporary society implies the use of
massive data to improve the experience of people with
connected services and products. The use of big data to
collect information about people's behaviours opens a
new concept of ``user-centred design'' where users are
remotely monitored, observed and profiled. In this
paradigm, users are considered as sources of
information and their participation in the design
process is limited to a role of data generators. There
is a need to identify methodologies that actively
involve people and communities at the core of
ecosystems of interconnected products and services. Our
contribution to designing for social innovation in
ecosystems relies on developing new methods and
approaches to transform data-driven design using a
participatory and co-creative data-enabled design
approach. To this end, we present one of the methods we
have developed to design ``smart'' systems called
Experiential Design Landscapes (EDL), and two sample
projects, Social Stairs and [Y]our Perspective. Social
Stairs faces the topic of behaviour change mediated by
sensing technologies. [Y]our Perspective is a social
platform to sustain processes of deliberative
democracy. Both projects exemplify our approach to
data-enabled design as a social proactive participatory
design approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Ecosystemic Evolution Feeded by Smart
Systems.",
}
@Article{Deng:2016:RCM,
author = "Ziyun Deng and Lei Chen and Tingqing He and Tao Meng",
title = "A Reliability Calculation Method for {Web} Service
Composition Using Fuzzy Reasoning Colored {Petri} Nets
and Its Application on Supercomputing Cloud Platform",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "4",
pages = "47",
day = "27",
month = sep,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8040047",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/4/47",
abstract = "In order to develop a Supercomputing Cloud Platform
(SCP) prototype system using Service-Oriented
Architecture (SOA) and Petri nets, we researched some
technologies for Web service composition. Specifically,
in this paper, we propose a reliability calculation
method for Web service compositions, which uses Fuzzy
Reasoning Colored Petri Net (FRCPN) to verify the Web
service compositions. We put forward a definition of
semantic threshold similarity for Web services and a
formal definition of FRCPN. We analyzed five kinds of
production rules in FRCPN, and applied our method to
the SCP prototype. We obtained the reliability value of
the end Web service as an indicator of the overall
reliability of the FRCPN. The method can test the
activity of FRCPN. Experimental results show that the
reliability of the Web service composition has a
correlation with the number of Web services and the
range of reliability transition values.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Intelligent Systems and
Networks.",
}
@Article{Alti:2016:ASB,
author = "Adel Alti and Abderrahim Lakehal and S{\'e}bastien
Laborie and Philippe Roose",
title = "Autonomic Semantic-Based Context-Aware Platform for
Mobile Applications in Pervasive Environments",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "4",
pages = "48",
day = "29",
month = sep,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8040048",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/4/48",
abstract = "Currently, the field of smart-* (home, city, health,
tourism, etc.) is naturally heterogeneous and
multimedia oriented. In such a domain, there is an
increasing usage of heterogeneous mobile devices, as
well as captors transmitting data (IoT). They are
highly connected and can be used for many different
services, such as to monitor, to analyze and to display
information to users. In this context, data management
and adaptation in real time are becoming a challenging
task. More precisely, at one time, it is necessary to
handle in a dynamic, intelligent and transparent
framework various data provided by multiple devices
with several modalities. This paper presents a
Kali-Smart platform, which is an autonomic
semantic-based context-aware platform. It is based on
semantic web technologies and a middleware providing
autonomy and reasoning facilities. Moreover, Kali-Smart
is generic and, as a consequence, offers to users a
flexible infrastructure where they can easily control
various interaction modalities of their own situations.
An experimental study has been made to evaluate the
performance and feasibility of the proposed platform.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Mobile Computing.",
}
@Article{Huckle:2016:SB,
author = "Steve Huckle and Martin White",
title = "Socialism and the Blockchain",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "4",
pages = "49",
day = "18",
month = oct,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8040049",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/4/49",
abstract = "Bitcoin (BTC) is often cited as Libertarian. However,
the technology underpinning Bitcoin, blockchain, has
properties that make it ideally suited to Socialist
paradigms. Current literature supports the Libertarian
viewpoint by focusing on the ability of Bitcoin to
bypass central authority and provide anonymity; rarely
is there an examination of blockchain technology's
capacity for decentralised transparency and
auditability in support of a Socialist model. This
paper conducts a review of the blockchain,
Libertarianism, and Socialist philosophies. It then
explores Socialist models of public ownership and looks
at the unique cooperative properties of blockchain that
make the technology ideal for supporting Socialist
societies. In summary, this paper argues that
blockchain technologies are not just a Libertarian
tool, they also enhance Socialist forms of
governance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Intelligent Systems and
Networks.",
}
@Article{Angelini:2016:SLL,
author = "Leonardo Angelini and Stefano Carrino and Omar Abou
Khaled and Susie Riva-Mossman and Elena Mugellini",
title = "Senior Living Lab: An Ecological Approach to {Foster}
Social Innovation in an Ageing Society",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "4",
pages = "50",
day = "21",
month = oct,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8040050",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/4/50",
abstract = "The Senior Living Lab (SLL) is a transdisciplinary
research platform created by four Universities that
aims at promoting ageing well at home through the
co-creation of innovative products, services and
practices with older adults. While most living labs for
ageing well are focused on Information and
Communication Technologies (ICTs), this social
laboratory adopts a transdisciplinary approach,
bringing together designers, economists, engineers and
healthcare professionals to develop multiple forms of
social innovation using participatory methods. The SLL
is based on an ecological approach, connecting
professionals and users in a cooperative network and
involving all of the stakeholders concerned with ageing
well, such as existing associations, business entities
and policy-makers. Three main themes for the co-design
of products and services were identified at the
beginning of the SLL conception, each sustained by a
major business partner: healthy nutrition to cope with
frailty, improved autonomous mobility to foster
independence and social communication to prevent
isolation. This article shows the innovative
transdisciplinary approach of the SLL and discusses the
particular challenges that emerged during the first
year of its creation, investigating the role of ICTs
when designing products and services for older
adults.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Ecosystemic Evolution Feeded by Smart
Systems.",
}
@Article{Ali:2016:OSD,
author = "Syed Mustafa Ali and Rachel Powers and Jeffrey Beorse
and Arif Noor and Farah Naureen and Naveed Anjum and
Muhammad Ishaq and Javariya Aamir and Richard
Anderson",
title = "{ODK} Scan: Digitizing Data Collection and Impacting
Data Management Processes in {Pakistan}'s Tuberculosis
Control Program",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "4",
pages = "51",
day = "24",
month = oct,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8040051",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/4/51",
abstract = "The present grievous tuberculosis situation can be
improved by efficient case management and timely
follow-up evaluations. With the advent of digital
technology, this can be achieved through quick
summarization of the patient-centric data. The aim of
our study was to assess the effectiveness of the ODK
Scan paper-to-digital system during a testing period of
three months. A sequential, explanatory mixed-method
research approach was employed to elucidate technology
use. Training, smartphones, the application and
3G-enabled SIMs were provided to the four field
workers. At the beginning, baseline measures of the
data management aspects were recorded and compared with
endline measures to determine the impact of ODK Scan.
Additionally, at the end of the study, users' feedback
was collected regarding app usability, user interface
design and workflow changes. A total of 122 patients'
records were retrieved from the server and analysed in
terms of quality. It was found that ODK Scan recognized
99.2\% of multiple choice fill-in bubble responses and
79.4\% of numerical digit responses correctly. However,
the overall quality of the digital data was decreased
in comparison to manually entered data. Using ODK Scan,
a significant time reduction is observed in data
aggregation and data transfer activities, but data
verification and form-filling activities took more
time. Interviews revealed that field workers saw value
in using ODK Scan, but they were more concerned about
the time-consuming aspects of the use of ODK Scan.
Therefore, it is concluded that minimal disturbance in
the existing workflow, continuous feedback and value
additions are the important considerations for the
implementing organization to ensure technology adoption
and workflow improvements.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue e-Health.",
}
@Article{Hoang:2016:RHI,
author = "Xuan Dau Hoang and Hong Ky Pham",
title = "A Review on Hot-{IP} Finding Methods and Its
Application in Early {DDoS} Target Detection",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "4",
pages = "52",
day = "25",
month = oct,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8040052",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/4/52",
abstract = "On the high-speed connections of the Internet or
computer networks, the IP (Internet Protocol) packet
traffic passing through the network is extremely high,
and that makes it difficult for network monitoring and
attack detection applications. This paper reviews
methods to find the high-occurrence-frequency elements
in the data stream and applies the most efficient
methods to find Hot-IPs that are high-frequency IP
addresses of IP packets passing through the network.
Fast finding of Hot-IPs in the IP packet stream can be
effectively used in early detection of DDoS
(Distributed Denial of Service) attack targets and
spreading sources of network worms. Research results
show that the Count-Min method gives the best overall
performance for Hot-IP detection thanks to its low
computational complexity, low space requirement and
fast processing speed. We also propose an early
detection model of DDoS attack targets based on Hot-IP
finding, which can be deployed on the target network
routers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cyber Warfare.",
}
@Article{Zhu:2016:NMF,
author = "Zhiqin Zhu and Guanqiu Qi and Yi Chai and Yinong
Chen",
title = "A Novel Multi-Focus Image Fusion Method Based on
Stochastic Coordinate Coding and Local Density Peaks
Clustering",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "4",
pages = "53",
day = "11",
month = nov,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8040053",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/4/53",
abstract = "The multi-focus image fusion method is used in image
processing to generate all-focus images that have large
depth of field (DOF) based on original multi-focus
images. Different approaches have been used in the
spatial and transform domain to fuse multi-focus
images. As one of the most popular image processing
methods, dictionary-learning-based spare representation
achieves great performance in multi-focus image fusion.
Most of the existing dictionary-learning-based
multi-focus image fusion methods directly use the whole
source images for dictionary learning. However, it
incurs a high error rate and high computation cost in
dictionary learning process by using the whole source
images. This paper proposes a novel stochastic
coordinate coding-based image fusion framework
integrated with local density peaks. The proposed
multi-focus image fusion method consists of three
steps. First, source images are split into small image
patches, then the split image patches are classified
into a few groups by local density peaks clustering.
Next, the grouped image patches are used for
sub-dictionary learning by stochastic coordinate
coding. The trained sub-dictionaries are combined into
a dictionary for sparse representation. Finally, the
simultaneous orthogonal matching pursuit (SOMP)
algorithm is used to carry out sparse representation.
After the three steps, the obtained sparse coefficients
are fused following the max L1-norm rule. The fused
coefficients are inversely transformed to an image by
using the learned dictionary. The results and analyses
of comparison experiments demonstrate that fused images
of the proposed method have higher qualities than
existing state-of-the-art methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Intelligent Systems and
Networks.",
}
@Article{He:2016:NFM,
author = "Jingsha He and Chengyue Chang and Peng He and Muhammad
Salman Pathan",
title = "Network Forensics Method Based on Evidence Graph and
Vulnerability Reasoning",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "4",
pages = "54",
day = "10",
month = nov,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8040054",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/4/54",
abstract = "As the Internet becomes larger in scale, more complex
in structure and more diversified in traffic, the
number of crimes that utilize computer technologies is
also increasing at a phenomenal rate. To react to the
increasing number of computer crimes, the field of
computer and network forensics has emerged. The general
purpose of network forensics is to find malicious users
or activities by gathering and dissecting firm
evidences about computer crimes, e.g., hacking.
However, due to the large volume of Internet traffic,
not all the traffic captured and analyzed is valuable
for investigation or confirmation. After analyzing some
existing network forensics methods to identify common
shortcomings, we propose in this paper a new network
forensics method that uses a combination of network
vulnerability and network evidence graph. In our
proposed method, we use vulnerability evidence and
reasoning algorithm to reconstruct attack scenarios and
then backtrack the network packets to find the original
evidences. Our proposed method can reconstruct attack
scenarios effectively and then identify multi-staged
attacks through evidential reasoning. Results of
experiments show that the evidence graph constructed
using our method is more complete and credible while
possessing the reasoning capability.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cyber Warfare.",
}
@Article{Chinnachodteeranun:2016:DIW,
author = "Rassarin Chinnachodteeranun and Nguyen Duy Hung and
Kiyoshi Honda and Amor V. M. Ines and Eunjin Han",
title = "Designing and Implementing Weather Generators as {Web}
Services",
journal = j-FUTURE-INTERNET,
volume = "8",
number = "4",
pages = "55",
day = "15",
month = dec,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi8040055",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/8/4/55",
abstract = "Climate and weather realizations are essential inputs
for simulating crop growth and yields to analyze the
risks associated with future conditions. To simplify
the procedure of generating weather realizations and
make them available over the Internet, we implemented
novel mechanisms for providing weather generators as
web services, as well as a mechanism for sharing
identical weather realizations given a climatological
information. A web service for preparing long-term
climate data was implemented based on an international
standard, Sensor Observation Service (SOS). The weather
generator services, which are the core components of
the framework, analyze climatological data, and can
take seasonal climate forecasts as inputs for
generating weather realizations. The generated weather
realizations are encoded in a standard format, which
are ready for use to crop modeling. All outputs are
generated in SOS standard, which broadens the extent of
data sharing and interoperability with other sectoral
applications, e.g., water resources management. These
services facilitate the development of other
applications requiring input weather realizations, as
these can be obtained easily by just calling the
service. The workload of analysts related to data
preparation and handling of legacy weather generator
programs can be reduced. The architectural design and
implementation presented here can be used as a
prototype for constructing further services on top of
an interoperable sensor network system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Communications and Computing for
Sustainable Development Goals.",
}
@Article{Lopez:2017:KTC,
author = "Lorena Isabel Barona L{\'o}pez and {\'A}ngel Leonardo
Valdivieso Caraguay and Marco Antonio Sotelo Monge and
Luis Javier Garc{\'\i}a Villalba",
title = "Key Technologies in the Context of Future Networks:
Operational and Management Requirements",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "1",
pages = "1",
day = "22",
month = dec,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/9/1/1",
abstract = "The concept of Future Networks is based on the premise
that current infrastructures require enhanced control,
service customization, self-organization and
self-management capabilities to meet the new needs in a
connected society, especially of mobile users. In order
to provide a high-performance mobile system, three main
fields must be improved: radio, network, and operation
and management. In particular, operation and management
capabilities are intended to enable business agility
and operational sustainability, where the addition of
new services does not imply an excessive increase in
capital or operational expenditures. In this context, a
set of key-enabled technologies have emerged in order
to aid in this field. Concepts such as Software Defined
Network (SDN), Network Function Virtualization (NFV)
and Self-Organized Networks (SON) are pushing
traditional systems towards the next 5G network
generation.This paper presents an overview of the
current status of these promising technologies and
ongoing works to fulfill the operational and management
requirements of mobile infrastructures. This work also
details the use cases and the challenges, taking into
account not only SDN, NFV, cloud computing and SON but
also other paradigms.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{Office:2017:ARF,
author = "Future Internet Editorial Office",
title = "Acknowledgement to Reviewers of {{\booktitle{Future
Internet}}} in 2016",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "1",
pages = "2",
day = "12",
month = jan,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9010002",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/1/2",
abstract = "The fifth generation mobile network, or 5G, moves
towards bringing solutions to deploying faster
networks, with hundreds of thousands of simultaneous
connections and massive data transfer. For this
purpose, several emerging technologies are implemented,
resulting in virtualization and self-organization of
most of their components, which raises important
challenges related to safety. In order to contribute to
their resolution, this paper proposes a novel
architecture for incident management on 5G. The
approach combines the conventional risk management
schemes with the Endsley Situational Awareness model,
thus improving effectiveness in different aspects,
among them the ability to adapt to complex and
dynamical monitoring environments, and countermeasure
tracking or the role of context when decision-making.
The proposal takes into account all layers for
information processing in 5G mobile networks, ranging
from infrastructure to the actuators responsible for
deploying corrective measures.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lopez:2017:TIM,
author = "Lorena Isabel Barona L{\'o}pez and {\'A}ngel Leonardo
Valdivieso Caraguay and Jorge Maestre Vidal and Marco
Antonio Sotelo Monge and Luis Javier Garc{\'\i}a
Villalba",
title = "Towards Incidence Management in {5G} Based on
Situational Awareness",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "1",
pages = "3",
day = "17",
month = jan,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9010003",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/1/3",
abstract = "The fifth generation mobile network, or 5G, moves
towards bringing solutions to deploying faster
networks, with hundreds of thousands of simultaneous
connections and massive data transfer. For this
purpose, several emerging technologies are implemented,
resulting in virtualization and self-organization of
most of their components, which raises important
challenges related to safety. In order to contribute to
their resolution, this paper proposes a novel
architecture for incident management on 5G. The
approach combines the conventional risk management
schemes with the Endsley Situational Awareness model,
thus improving effectiveness in different aspects,
among them the ability to adapt to complex and
dynamical monitoring environments, and countermeasure
tracking or the role of context when decision-making.
The proposal takes into account all layers for
information processing in 5G mobile networks, ranging
from infrastructure to the actuators responsible for
deploying corrective measures.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{Martelli:2017:PVN,
author = "Cristina Martelli",
title = "A Point of View on New Education for Smart
Citizenship",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "1",
pages = "4",
day = "01",
month = feb,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9010004",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/1/4",
abstract = "Smart cities and intelligent communities have an
ever-growing demand for specialized smart services,
applications, and research-driven innovation. Knowledge
of users' profiles, behavior, and preferences are a
potentially dangerous side effect of smart services.
Citizens are usually not aware of the knowledge bases
generated by the IT services they use: this dimension
of the contemporary and digital era sheds new light on
the elements concerning the concept of citizenship
itself, as it affects dimensions like freedom and
privacy. This paper addresses this issue from an
education system perspective, and advances a
non-technical methodology for being aware and
recognizing knowledge bases generated by user-service
interaction. Starting from narratives, developed in
natural language by unskilled smart service users about
their experience, the proposed method advances an
original methodology, which is identified in the
conceptual models derived from these narratives, a
bridge towards a deeper understanding of the
informative implications of their behavior. The
proposal; which is iterative and scalable; has been
tested on the field and some examples of lesson
contents are presented and discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Ecosystemic Evolution Feeded by Smart
Systems.",
}
@Article{Park:2017:CMR,
author = "Kyungmo Park and Sanghyo Lee and Yonghan Ahn",
title = "{Construction Management Risk System (CMRS)} for
Construction Management {(CM)} Firms",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "1",
pages = "5",
day = "10",
month = feb,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9010005",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/1/5",
abstract = "After the global financial crisis of 2008, the need
for risk management arose because it was necessary to
minimize the losses in construction management (CM)
firms. This was caused by a decreased amount of orders
in the Korean CM market, which intensified order
competition between companies. However, research
results revealed that risks were not being
systematically managed owing to the absence of risk
management systems. Thus, it was concluded that it was
necessary to develop standard operating systems and
implement risk management systems in order to manage
risks effectively. Therefore, the purpose of this study
was to develop a construction risk management system
(CRMS) for systematically managing risks. For this
purpose, the field operation managers of CM firms were
interviewed and surveyed in order to define risk
factors. Upon this, a risk assessment priority analysis
was performed. Finally, a risk management system that
comprised seven modules and 20 sub-modules and was
capable of responding systematically to risks was
proposed. Furthermore, the effectiveness of this system
was verified through on-site inspection. This system
allows early response to risks, accountability
verification and immediate response to legal disputes
with clients by managing risk records.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vidros:2017:ADO,
author = "Sokratis Vidros and Constantinos Kolias and Georgios
Kambourakis and Leman Akoglu",
title = "Automatic Detection of Online Recruitment Frauds:
Characteristics, Methods, and a Public Dataset",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "1",
pages = "6",
day = "03",
month = mar,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9010006",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/1/6",
abstract = "The critical process of hiring has relatively recently
been ported to the cloud. Specifically, the automated
systems responsible for completing the recruitment of
new employees in an online fashion, aim to make the
hiring process more immediate, accurate and
cost-efficient. However, the online exposure of such
traditional business procedures has introduced new
points of failure that may lead to privacy loss for
applicants and harm the reputation of organizations. So
far, the most common case of Online Recruitment Frauds
(ORF), is employment scam. Unlike relevant online fraud
problems, the tackling of ORF has not yet received the
proper attention, remaining largely unexplored until
now. Responding to this need, the work at hand defines
and describes the characteristics of this severe and
timely novel cyber security research topic. At the same
time, it contributes and evaluates the first to our
knowledge publicly available dataset of 17,880
annotated job ads, retrieved from the use of a
real-life system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{He:2017:APP,
author = "Jingsha He and Qi Xiao and Peng He and Muhammad Salman
Pathan",
title = "An Adaptive Privacy Protection Method for Smart Home
Environments Using Supervised Learning",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "1",
pages = "7",
day = "05",
month = mar,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9010007",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/1/7",
abstract = "In recent years, smart home technologies have started
to be widely used, bringing a great deal of convenience
to people's daily lives. At the same time, privacy
issues have become particularly prominent. Traditional
encryption methods can no longer meet the needs of
privacy protection in smart home applications, since
attacks can be launched even without the need for
access to the cipher. Rather, attacks can be
successfully realized through analyzing the frequency
of radio signals, as well as the timestamp series, so
that the daily activities of the residents in the smart
home can be learnt. Such types of attacks can achieve a
very high success rate, making them a great threat to
users' privacy. In this paper, we propose an adaptive
method based on sample data analysis and supervised
learning (SDASL), to hide the patterns of daily
routines of residents that would adapt to dynamically
changing network loads. Compared to some existing
solutions, our proposed method exhibits advantages such
as low energy consumption, low latency, strong
adaptability, and effective privacy protection.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Wireless and
Mobile Networks.",
}
@Article{Rametta:2017:DSN,
author = "Corrado Rametta and Giovanni Schembra",
title = "Designing a Softwarized Network Deployed on a Fleet of
Drones for Rural Zone Monitoring",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "1",
pages = "8",
day = "20",
month = mar,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9010008",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/1/8",
abstract = "In the last decade, the differences in the information
communication technology (ICT) infrastructures between
urban and rural areas have registered a tremendous
increase. ICT infrastructures could strongly help rural
communities where many operations are time consuming,
labor-intensive and expensive due to limited access and
large distances to cover. One of the most attractive
solutions, which is widely recognized as promising for
filling this gap, is the use of drone fleets. In this
context, this paper proposes a video monitoring
platform as a service (VMPaaS) for wide rural areas not
covered by Internet access. The platform is realized
with a Software-Defined Network (SDN)/Network Functions
Virtualization (NFV)-based flying ad-hoc network
(FANET), whose target is providing a flexible and
dynamic connectivity backbone, and a set of drones
equipped with high-resolution cameras, each
transmitting a video stream of a portion of the
considered area. After describing the architecture of
the proposed platform, service chains to realize the
video delivery service are described, and an analytical
model is defined to evaluate the computational load of
the platform nodes in such a way so as to allow the
network orchestrator to decide the backbone drones
where running the virtual functions, and the relative
resources to be allocated. Numerical analysis is
carried out in a case study.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Communications and Computing for
Sustainable Development Goals.",
}
@Article{Tian:2017:IRB,
author = "Hao Tian and Peifeng Liang",
title = "Improved Recommendations Based on Trust Relationships
in Social Networks",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "1",
pages = "9",
day = "21",
month = mar,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9010009",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:56 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/1/9",
abstract = "In order to alleviate the pressure of information
overload and enhance consumer satisfaction,
personalization recommendation has become increasingly
popular in recent years. As a result, various
approaches for recommendation have been proposed in the
past few years. However, traditional recommendation
methods are still troubled with typical issues such as
cold start, sparsity, and low accuracy. To address
these problems, this paper proposed an improved
recommendation method based on trust relationships in
social networks to improve the performance of
recommendations. In particular, we define trust
relationship afresh and consider several representative
factors in the formalization of trust relationships. To
verify the proposed approach comprehensively, this
paper conducted experiments in three ways. The
experimental results show that our proposed approach
leads to a substantial increase in prediction accuracy
and is very helpful in dealing with cold start and
sparsity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chen:2017:DBS,
author = "Yongqun Chen and Huaibei Zhou and Ruoshan Kong and Li
Zhu and Huaqing Mao",
title = "Decentralized Blind Spectrum Selection in Cognitive
Radio Networks Considering Handoff Cost",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "10",
day = "31",
month = mar,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020010",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/10",
abstract = "Due to the spectrum varying nature of cognitive radio
networks, secondary users are required to perform
spectrum handoffs when the spectrum is occupied by
primary users, which will lead to a handoff delay. In
this paper, based on the multi-armed bandit framework
of medium access in decentralized cognitive radio
networks, we investigate blind spectrum selection
problem of secondary users whose sensing ability of
cognitive radio is limited and the channel statistics
are a priori unknown, taking the handoff delay as a
fixed handoff cost into consideration. In this
scenario, secondary users have to make the choice of
either staying foregoing spectrum with low availability
or handing off to another spectrum with higher
availability. We model the problem and investigate the
performance of three representative policies, i.e.,
\rho PRE, SL(K), k th-UCB1. The simulation results show
that, despite the inclusion of the fixed handoff cost,
these policies achieve the same asymptotic performance
as that without handoff cost. Moreover, through
comparison of these policies, we found the k th-UCB1
policy has better overall performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Context-Awareness of Mobile Systems.",
}
@Article{Guazzini:2017:PPP,
author = "Andrea Guazzini and Ay{\c{c}}a Sara{\c{c}} and Camillo
Donati and Annalisa Nardi and Daniele Vilone and
Patrizia Meringolo",
title = "Participation and Privacy Perception in Virtual
Environments: The Role of Sense of Community, Culture
and Gender between {Italian} and {Turkish}",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "11",
day = "07",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020011",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/11",
abstract = "Advancements in information and communication
technologies have enhanced our possibilities to
communicate worldwide, eliminating borders and making
it possible to interact with people coming from other
cultures like never happened before. Such powerful
tools have brought us to reconsider our concept of
privacy and social involvement in order to make them
fit into this wider environment. It is possible to
claim that the information and communication
technologies (ICT) revolution is changing our world and
is having a core role as a mediating factor for social
movements (e.g., Arab spring) and political decisions
(e.g., Brexit), shaping the world in a faster and
shared brand new way. It is then interesting to explore
how the perception of this brand new environment (in
terms of social engagement, privacy perception and
sense of belonging to a community) differs even in
similar cultures separated by recent historical
reasons. Recent historical events may in effect have
shaped a different psychological representation of
Participation, Privacy and Sense of Community in ICT
environments, determining a different perception of
affordances and concerns of these complex behaviors.
The aim of this research is to examine the relation
between the constructs of Sense of Community,
Participation and Privacy compared with culture and
gender, considering the changes that have occurred in
the last few years with the introduction of the web
environment. A questionnaire, including ad hoc created
scales for Participation and Privacy, have been
administered to 180 participants from Turkey and Italy.
In order to highlight the cultural differences in the
perception of these two constructs, we have provided a
semantic differential to both sub-samples showing
interesting outcomes. The results are then discussed
while taking into account the recent history of both
countries in terms of the widespread of new
technologies, political actions and protest
movements.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Wireless and
Mobile Networks.",
}
@Article{Wang:2017:SEE,
author = "Xinhua Wang",
title = "Spectrum and Energy Efficiency of Uplink Massive
{MIMO} System with {D2D} Underlay",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "12",
day = "13",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020012",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/12",
abstract = "In this paper, both the spectrum efficiency (SE) and
the energy efficiency (EE) are investigated for an
uplink massive multiple-input multiple-output (MIMO)
system coexisting with an underlay device-to-device
(D2D) system. The outage probability and the achievable
rates of the cellular user equipments (CUEs) and the
D2D link are derived in closed-form, respectively.
Constrained by the SE of the D2D link and the CUEs, the
EE of the massive MIMO system is maximized by jointly
optimizing the transmit power of CUEs and the number of
BS antennas. An algorithm with low complexity is
proposed to solve the optimization problem. Performance
results are provided to validate our derived
closed-from results and verify the efficiency of our
proposed scheme.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Communications and Computing for
Sustainable Development Goals.",
}
@Article{Zhang:2017:FBI,
author = "Yunpeng Zhang and Chengyou Wang and Xiaoli Wang and
Min Wang",
title = "Feature-Based Image Watermarking Algorithm Using {SVD}
and {APBT} for Copyright Protection",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "13",
day = "19",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020013",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/13",
abstract = "Watermarking techniques can be applied in digital
images to maintain the authenticity and integrity for
copyright protection. In this paper, scale-invariant
feature transform (SIFT) is combined with local digital
watermarking and a digital watermarking algorithm based
on SIFT, singular value decomposition (SVD), and all
phase biorthogonal transform (APBT) is proposed. It
describes the generation process of the SIFT algorithm
in detail and obtains a series of scale-invariant
feature points. A large amount of candidate feature
points are selected to obtain the neighborhood which
can be used to embed the watermark. For these selected
feature points, block-based APBT is carried out on
their neighborhoods. Moreover, a coefficients matrix of
certain APBT coefficients is generated for SVD to embed
the encrypted watermark. Experimental results
demonstrate that the proposed watermarking algorithm
has stronger robustness than some previous schemes. In
addition, APBT-based digital watermarking algorithm has
good imperceptibility and is more robust to different
combinations of attacks, which can be applied for the
purpose of copyright protection.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{Yu:2017:EEM,
author = "Qingyao Yu and Guangming Li and Xiaojie Hang and Kun
Fu and Tianqi Li",
title = "An Energy Efficient {MAC} Protocol for Wireless
Passive Sensor Networks",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "14",
day = "19",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020014",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/14",
abstract = "Medium Access Control (MAC) protocol is one of the key
network protocols that ensure Wireless Sensor Networks
(WSNs) maintain high performance during communication.
MAC protocol design plays an important role in
improving the performances of the whole network. First,
Wireless Passive Sensor Networks (WPSNs) and MAC
protocols are introduced in this paper. Second, some
existing MAC protocols are introduced. Sensor MAC
(S-MAC) protocol is analyzed and existing improved
backoff algorithms are introduced. A new MAC protocol
called Improved Sensor MAC (IS-MAC) is then proposed to
solve the problem that the contention window (CW)
during carrier sense is fixed in S-MAC protocol. IS-MAC
protocol is able to adjust CW in terms of network load,
so energy consumption can be decreased. Finally,
according to the simulation results on NS2, the
proposed protocol has better performance in terms of
throughput and energy consumption.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sehra:2017:AOD,
author = "Sukhjit Singh Sehra and Jaiteg Singh and Hardeep Singh
Rai",
title = "Assessing {OpenStreetMap} Data Using Intrinsic Quality
Indicators: An Extension to the {QGIS} Processing
Toolbox",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "15",
day = "21",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020015",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/15",
abstract = "OpenStreetMap (OSM) is a recent emerging area in
computational science. There are several unexplored
issues in the quality assessment of OSM. Firstly,
researchers are using various established assessment
methods by comparing OSM with authoritative dataset.
However, these methods are unsuitable to assess OSM
data quality in the case of the non-availability of
authoritative data. In such a scenario, the intrinsic
quality indicators can be used to assess the quality.
Secondly, a framework for data assessment specific to
different geographic information system (GIS) domains
is not available. In this light, the current study
presents an extension of the Quantum GIS (QGIS)
processing toolbox by using existing functionalities
and writing new scripts to handle spatial data. This
would enable researchers to assess the completeness of
spatial data using intrinsic indicators. The study also
proposed a heuristic approach to test the road
navigability of OSM data. The developed models are
applied on Punjab (India) OSM data. The results suggest
that the OSM project in Punjab (India) is progressing
at a slow peace, and contributors' motivation is
required to enhance the fitness of data. It is
concluded that the scripts developed to provide an
intuitive method to assess the OSM data based on
quality indicators can be easily utilized for
evaluating the fitness-of-use of the data of any
region.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mamais:2017:PSD,
author = "Stylianos S. Mamais and George Theodorakopoulos",
title = "Private and Secure Distribution of Targeted
Advertisements to Mobile Phones",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "16",
day = "01",
month = may,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020016",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/16",
abstract = "Online Behavioural Advertising (OBA) enables promotion
companies to effectively target users with ads that
best satisfy their purchasing needs. This is highly
beneficial for both vendors and publishers who are the
owners of the advertising platforms, such as websites
and app developers, but at the same time creates a
serious privacy threat for users who expose their
consumer interests. In this paper, we categorize the
available ad-distribution methods and identify their
limitations in terms of security, privacy, targeting
effectiveness and practicality. We contribute our own
system, which utilizes opportunistic networking in
order to distribute targeted adverts within a social
network. We improve upon previous work by eliminating
the need for trust among the users (network nodes)
while at the same time achieving low memory and
bandwidth overhead, which are inherent problems of many
opportunistic networks. Our protocol accomplishes this
by identifying similarities between the consumer
interests of users and then allows them to share access
to the same adverts, which need to be downloaded only
once. Although the same ads may be viewed by multiple
users, privacy is preserved as the users do not learn
each other's advertising interests. An additional
contribution is that malicious users cannot alter the
ads in order to spread malicious content, and also,
they cannot launch impersonation attacks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Wireless and
Mobile Networks.",
}
@Article{Chen:2017:TRU,
author = "Haibao Chen and Yuyan Zhao and Chuxiong Yan",
title = "Towards Rack Utilization in {Internet} Datacenters: An
Approach Based on Dynamic Programming",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "17",
day = "06",
month = may,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020017",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/17",
abstract = "In the datacenter rented to Internet Service Providers
(ISPs), the low utilization of racks can seriously
affect ISPs' benefit because the ISPs are charged by
``rack per year'' rather than servers. Based on our
analysis about the utilization data from production
systems, we find that the over-provisioning of power
results in low power utilization, which potentially
decreases rack utilization as well as the ISPs'
benefit. To improve the rack utilization, maximizing
the number of servers in racks is an effective way. In
this paper, we propose a server placement algorithm to
minimize the power fragment in a rack. The experimental
results show that it can save more than 50\% leasing
cost (rack utilization improvement) in evaluation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Grout:2017:SAD,
author = "Vic Grout",
title = "A Simple Approach to Dynamic Optimisation of Flexible
Optical Networks with Practical Application",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "18",
day = "23",
month = may,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020018",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/18",
abstract = "This paper provides an initial introduction to, and
definition of, the `Dynamically Powered Relays for a
Flexible Optical Network' (DPR-FON) problem for
opto-electro-optical (OEO) regenerators used in optical
networks. In such networks, optical transmission
parameters can be varied dynamically as traffic
patterns change. This will provide different
bandwidths, but also change the regeneration limits as
a result. To support this flexibility, OEOs (`relays')
may be switched on and off as required, thus saving
power. DPR-FON is shown to be NP-complete;
consequently, solving such a dynamic problem in
real-time requires a fast heuristic capable of
delivering an acceptable approximation to the optimal
configuration with low complexity. In this paper, just
such an algorithm is developed, implemented, and
evaluated against more computationally-demanding
alternatives for two known cases. A number of
real-world extensions are considered as the paper
develops, combining to produce the `Generalised
Dynamically Powered Relays for a Flexible Optical
Network' (GDPR-FON) problem. This, too, is analysed and
an associated fast heuristic proposed, along with an
exploration of the further research that is required.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sun:2017:ABM,
author = "Peng Sun and Guangming Li and Fuqiang Wang",
title = "An Adaptive Back-Off Mechanism for Wireless Sensor
Networks",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "19",
day = "01",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020019",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/19",
abstract = "Wireless sensor networks (WSNs) have been extensively
applied in many domains such as smart homes and
Internet of Things (IoT). As part of WSNs'
communication protocols, back-off mechanisms play an
essential role in the deployment of wireless channels
for network nodes and have been at the core of ensuring
effective communication. The performance of many
back-off algorithms is excellent in light or middle
load networks. However, it degrades dramatically in
heavy load networks. In this paper, we propose an
adaptive contention window medium access control (MAC)
protocol to improve the throughput performance under
heavy load. By using the number of historical
collisions as the parameter in the back-off mechanism
to reflect the channel status, the size of the
contention window is adjusted automatically, and the
throughput of network is then improved. Simulation
results show that our optimized MAC protocol has higher
throughput and energy efficiency.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wu:2017:ACM,
author = "Jiang Wu and Zhou Lei and Shengbo Chen and Wenfeng
Shen",
title = "An Access Control Model for Preventing Virtual Machine
Escape Attack",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "20",
day = "02",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020020",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/20",
abstract = "With the rapid development of Internet, the
traditional computing environment is making a big
migration to the cloud-computing environment. However,
cloud computing introduces a set of new security
problems. Aiming at the virtual machine (VM) escape
attack, we study the traditional attack model and
attack scenarios in the cloud-computing environment. In
addition, we propose an access control model that can
prevent virtual machine escape (PVME) by adapting the
BLP (Bell-La Padula) model (an access control model
developed by D. Bell and J. LaPadula). Finally, the
PVME model has been implemented on full virtualization
architecture. The experimental results show that the
PVME module can effectively prevent virtual machine
escape while only incurring 4\% to 8\% time overhead.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2017:EEP,
author = "Xinhua Wang and Yan Yang and Jinlu Sheng",
title = "Energy Efficient Power Allocation for the Uplink of
Distributed Massive {MIMO} Systems",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "21",
day = "09",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020021",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/21",
abstract = "In this paper, an energy efficient power allocation
scheme is proposed for a distributed massive
multiple-input multiple-output (MIMO) system with a
circular antenna array. Single-antenna users
simultaneously transmit signal to the base station (BS)
with a large number of distributed antennas. The tight
approximation of the energy efficiency (EE) is derived
in closed form expressions. Through jointly optimizing
the power allocation and the antenna number of BS, an
NP-hard problem is formulated to maximize the EE. The
equal power allocation is proved to be optimal given
the total transmit power and the number of antennas.
Finally, the optimal antenna number is determined by
one dimension search. It is noteworthy that the NP-hard
problem is solved by one dimension search. Simulation
results validate the accuracy and the low-complexity of
our proposed scheme.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Communications and Computing for
Sustainable Development Goals.",
}
@Article{Wang:2017:MIM,
author = "Weijun Wang and Ying Li and Yinghui Huang and Hui Liu
and Tingting Zhang",
title = "A Method for Identifying the Mood States of Social
Network Users Based on Cyber Psychometrics",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "2",
pages = "22",
day = "16",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9020022",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/2/22",
abstract = "Analyzing people's opinions, attitudes, sentiments,
and emotions based on user-generated content (UGC) is
feasible for identifying the psychological
characteristics of social network users. However, most
studies focus on identifying the sentiments carried in
the micro-blogging text and there is no ideal
calculation method for users' real emotional states. In
this study, the Profile of Mood State (POMS) is used to
characterize users' real mood states and a regression
model is built based on cyber psychometrics and a
multitask method. Features of users' online behavior
are selected through structured statistics and
unstructured text. Results of the correlation analysis
of different features demonstrate that users' real mood
states are not only characterized by the messages
expressed through texts, but also correlate with
statistical features of online behavior. The
sentiment-related features in different timespans
indicate different correlations with the real mood
state. The comparison among various regression
algorithms suggests that the multitask learning method
outperforms other algorithms in root-mean-square error
and error ratio. Therefore, this cyber psychometrics
method based on multitask learning that integrates
structural features and temporal emotional information
could effectively obtain users' real mood states and
could be applied in further psychological measurements
and predictions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2017:NIT,
author = "Lingjun Liu and Zhonghua Xie and Cui Yang",
title = "A Novel Iterative Thresholding Algorithm Based on
Plug-and-Play Priors for Compressive Sampling",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "24",
day = "24",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030024",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/24",
abstract = "We propose a novel fast iterative thresholding
algorithm for image compressive sampling (CS) recovery
using three existing denoisers-i.e., TV (total
variation), wavelet, and BM3D (block-matching and 3D
filtering) denoisers. Through the use of the recently
introduced plug-and-play prior approach, we turn these
denoisers into CS solvers. Thus, our method can jointly
utilize the global and nonlocal sparsity of images. The
former is captured by TV and wavelet denoisers for
maintaining the entire consistency; while the latter is
characterized by the BM3D denoiser to preserve details
by exploiting image self-similarity. This composite
constraint problem is then solved with the fast
composite splitting technique. Experimental results
show that our algorithm outperforms several excellent
CS techniques.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cocco:2017:BBC,
author = "Luisanna Cocco and Andrea Pinna and Michele Marchesi",
title = "Banking on Blockchain: Costs Savings Thanks to the
Blockchain Technology",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "25",
day = "27",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030025",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/25",
abstract = "This paper looks at the challenges and opportunities
of implementing blockchain technology across banking,
providing food for thought about the potentialities of
this disruptive technology. The blockchain technology
can optimize the global financial infrastructure,
achieving sustainable development, using more efficient
systems than at present. In fact, many banks are
currently focusing on blockchain technology to promote
economic growth and accelerate the development of green
technologies. In order to understand the potential of
blockchain technology to support the financial system,
we studied the actual performance of the Bitcoin
system, also highlighting its major limitations, such
as the significant energy consumption due to the high
computing power required, and the high cost of
hardware. We estimated the electrical power and the
hash rate of the Bitcoin network, over time, and, in
order to evaluate the efficiency of the Bitcoin system
in its actual operation, we defined three quantities:
``economic efficiency'', ``operational efficiency'',
and ``efficient service''. The obtained results show
that by overcoming the disadvantages of the Bitcoin
system, and therefore of blockchain technology, we
could be able to handle financial processes in a more
efficient way than under the current system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Menesidou:2017:CKM,
author = "Sofia Anna Menesidou and Vasilios Katos and Georgios
Kambourakis",
title = "Cryptographic Key Management in Delay Tolerant
Networks: a Survey",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "26",
day = "27",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030026",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/26",
abstract = "Since their appearance at the dawn of the second
millennium, Delay or Disruption Tolerant Networks
(DTNs) have gradually evolved, spurring the development
of a variety of methods and protocols for making them
more secure and resilient. In this context, perhaps,
the most challenging problem to deal with is that of
cryptographic key management. To the best of our
knowledge, the work at hand is the first to survey the
relevant literature and classify the various so far
proposed key management approaches in such a restricted
and harsh environment. Towards this goal, we have
grouped the surveyed key management methods into three
major categories depending on whether the particular
method copes with (a) security initialization, (b) key
establishment, and (c) key revocation. We have
attempted to provide a concise but fairly complete
evaluation of the proposed up-to-date methods in a
generalized way with the aim of offering a central
reference point for future research.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2017:SFI,
author = "Xiruo Liu and Meiyuan Zhao and Sugang Li and Feixiong
Zhang and Wade Trappe",
title = "A Security Framework for the {Internet of Things} in
the Future {Internet} Architecture",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "27",
day = "28",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030027",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/27",
abstract = "The Internet of Things (IoT) is a recent trend that
extends the boundary of the Internet to include a wide
variety of computing devices. Connecting many
stand-alone IoT systems through the Internet introduces
many challenges, with security being front-and-center
since much of the collected information will be exposed
to a wide and often unknown audience. Unfortunately,
due to the intrinsic capability limits of low-end IoT
devices, which account for a majority of the IoT end
hosts, many traditional security methods cannot be
applied to secure IoT systems, which open a door for
attacks and exploits directed both against IoT services
and the broader Internet. This paper addresses this
issue by introducing a unified IoT framework based on
the MobilityFirst future Internet architecture that
explicitly focuses on supporting security for the IoT.
Our design integrates local IoT systems into the global
Internet without losing usability, interoperability and
security protection. Specifically, we introduced an IoT
middleware layer that connects heterogeneous hardware
in local IoT systems to the global MobilityFirst
network. We propose an IoT name resolution service
(IoT-NRS) as a core component of the middleware layer,
and develop a lightweight keying protocol that
establishes trust between an IoT device and the
IoT-NRS.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue IoT Security and Privacy.",
}
@Article{Rauniyar:2017:DDR,
author = "Ashish Rauniyar and Mohammad Irfan and Oka Danil
Saputra and Jin Woo Kim and Ah Ra Lee and Jae Min Jang
and Soo Young Shin",
title = "Design and Development of a Real-Time Monitoring
System for Multiple Lead-Acid Batteries Based on
{Internet of Things}",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "28",
day = "29",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030028",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/csharp.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/28",
abstract = "In this paper, real-time monitoring of multiple
lead-acid batteries based on Internet of things is
proposed and evaluated. Our proposed system monitors
and stores parameters that provide an indication of the
lead acid battery's acid level, state of charge,
voltage, current, and the remaining charge capacity in
a real-time scenario. To monitor these lead-acid
battery parameters, we have developed a data
acquisition system by building an embedded system,
i.e., dedicated hardware and software. The wireless
local area network is used as the backbone network. The
information collected from all the connected battery
clients in the system is analyzed in an asynchronous
transmission control protocol/user datagram
protocol-based C\# server program running on a personal
computer (server) to determine important parameters
like the state of charge of the individual battery, and
if required, appropriate action can be taken in advance
to prevent excessive impairment to the battery.
Further, data are also displayed on an Android mobile
device and are stored in an SQL server database. We
have developed a real prototype to devise an end
product for our proposed system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Big Data and Internet of Thing.",
}
@Article{Ebeid:2017:DEC,
author = "Emad Ebeid and Rune Heick and Rune Hylsberg Jacobsen",
title = "Deducing Energy Consumer Behavior from Smart Meter
Data",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "29",
day = "06",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030029",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/29",
abstract = "The ongoing upgrade of electricity meters to smart
ones has opened a new market of intelligent services to
analyze the recorded meter data. This paper introduces
an open architecture and a unified framework for
deducing user behavior from its smart main electricity
meter data and presenting the results in a natural
language. The framework allows a fast exploration and
integration of a variety of machine learning algorithms
combined with data recovery mechanisms for improving
the recognition's accuracy. Consequently, the framework
generates natural language reports of the user's
behavior from the recognized home appliances. The
framework uses open standard interfaces for exchanging
data. The framework has been validated through
comprehensive experiments that are related to an
European Smart Grid project.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Piezzo:2017:FSS,
author = "Chiara Piezzo and Kenji Suzuki",
title = "Feasibility Study of a Socially Assistive Humanoid
Robot for Guiding Elderly Individuals during Walking",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "30",
day = "08",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030030",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/30",
abstract = "The impact of the world-wide ageing population has
commenced with respect to society in developed
countries. Several researchers focused on exploring new
methods to improve the quality of life of elderly
individuals by allowing them to remain independent and
healthy to the maximum possible extent. For example,
new walking aids are designed to allow elderly
individuals to remain mobile in a safe manner because
the importance of walking is well-known. The aim of the
present study involves designing a humanoid robot guide
as a walking trainer for elderly individuals. It is
hypothesized that the same service robot provides an
assistive and social contribution with respect to
interaction between elderly users by motivating them to
walk more and simultaneously provides assistance, such
as physical assistance and gait monitoring, while
walking. This study includes a detailed statement of
the research problem as well as a literature review of
existing studies related to walking companion robots. A
user-centred design approach is adopted to report the
results of the current first feasibility study by using
a commercially available humanoid robot known as Pepper
developed by Softbank-Aldebaran. A quantitative
questionnaire was used to investigate all elements that
assess intrinsic motivation in users while performing a
given activity. Conversely, basic gait data were
acquired through a video analysis to test the
capability of the robot to modify the gait of human
users. The results in terms of the feedback received
from elderly subjects and the literature review improve
the design of the walking trainer for elderly
individuals.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Militano:2017:NID,
author = "Leonardo Militano and Antonino Orsino and Giuseppe
Araniti and Antonio Iera",
title = "{NB-IoT} for {D2D}-Enhanced Content Uploading with
Social Trustworthiness in {5G} Systems",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "31",
day = "08",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030031",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/31",
abstract = "Future fifth-generation (5G) cellular systems are set
to give a strong boost to the large-scale deployment of
Internet of things (IoT). In the view of a future
converged 5G-IoT infrastructure, cellular IoT solutions
such as narrowband IoT (NB-IoT) and device-to-device
(D2D) communications are key technologies for
supporting IoT scenarios and applications. However,
some open issues still need careful investigation. An
example is the risk of threats to privacy and security
when IoT mobile services rely on D2D communications. To
guarantee efficient and secure connections to IoT
services involving exchange of sensitive data,
reputation-based mechanisms to identify and avoid
malicious devices are fast gaining ground. In order to
tackle the presence of malicious nodes in the network,
this paper introduces reliability and reputation
notions to model the level of trust among devices
engaged in an opportunistic hop-by-hop D2D-based
content uploading scheme. To this end, social awareness
of devices is considered as a means to enhance the
identification of trustworthy nodes. A performance
evaluation study shows that the negative effects due to
malicious nodes can be drastically reduced by adopting
the proposed solution. The performance metrics that
proved to benefit from the proposed solution are data
loss, energy consumption, and content uploading time.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Cellular D2D
Communications.",
}
@Article{Gkioulos:2017:UMV,
author = "Vasileios Gkioulos and Gaute Wangen and Sokratis K.
Katsikas",
title = "User Modelling Validation over the Security Awareness
of Digital Natives",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "32",
day = "10",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030032",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/32",
abstract = "Young generations make extensive use of mobile
devices, such as smart-phones, tablets and laptops, for
a variety of daily tasks with potentially critical
impact, while the number of security breaches via
portable devices increases exponentially. A plethora of
security risks associated with these devices are
induced by design shortcomings and vulnerabilities
related to user behavior. Therefore, deploying suitable
risk treatments requires the investigation of how
security experts perceive the digital natives (young
people, born in the digital era), when utilizing their
user behavior models in the design and analysis of
related systems. In this article, we present the
results of a survey performed across a multinational
sample of security professionals, in comparison to our
earlier study over the security awareness of digital
natives. Through this study, we seek to identify
divergences between user behavior and the conceptual
user-models that security experts utilise in their
professional tasks. Our results indicate that the
experts understanding over the user behaviour does not
follow a solidified user-model, while influences from
personal perceptions and randomness are also
noticeable.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Wireless and
Mobile Networks.",
}
@Article{Shivani:2017:RIE,
author = "J. L. Divya Shivani and Ranjan K. Senapati",
title = "Robust Image Embedded Watermarking Using {DCT} and
Listless {SPIHT}",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "33",
day = "12",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030033",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/33",
abstract = "This paper presents a DCT-based (DCT: discrete cosine
transform) listless set partitioning in hierarchical
trees (SPIHT) digital watermarking technique that is
robust against several common attacks such as cropping,
filtering, sharpening, noise, inversion, contrast
manipulation, and compression. The proposed technique
is made further robust by the incorporation of the
Chinese remainder theorem (CRT) encryption technique.
Our scheme is compared with the recently proposed
CRT-based DCT technique, CRT-based spatial domain
watermarking, and DCT-based inter block correlation
techniques. Extensive simulation experiments show
better robustness in common image manipulations and, at
the same time, the proposed technique successfully
makes the watermark perceptually invisible. A better
Tamper Assessment Function (TAF) value of 2-15\% and a
better Normalized Correlation (NC) is achieved compared
to some of the above techniques. In particular, the
proposed technique shows better robustness on
compression attacks at moderate to higher compression
ratios. It is possible to maintain the imperceptibility
and low TAF for various values by doubling the capacity
of the watermark.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fourneau:2017:GNA,
author = "Jean-Michel Fourneau and Erol Gelenbe",
title = "{G}-Networks with Adders",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "34",
day = "10",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030034",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/34",
abstract = "Abstract: Queueing networks are used to model the
performance of the Internet, of manufacturing and
job-shop systems, supply chains, and other networked
systems in transportation or emergency management.
Composed of service stations where customers receive
service, and then move to another service station till
they leave the network, queueing networks are based on
probabilistic assumptions concerning service times and
customer movement that represent the variability of
system workloads. Subject to restrictive assumptions
regarding external arrivals, Markovian movement of
customers, and service time distributions, such
networks can be solved efficiently with ``product form
solutions'' that reduce the need for software
simulators requiring lengthy computations. G-networks
generalise these models to include the effect of
``signals'' that re-route customer traffic, or negative
customers that reject service requests, and also have a
convenient product form solution. This paper extends
G-networks by including a new type of signal, that we
call an ``Adder'', which probabilistically changes the
queue length at the service center that it visits,
acting as a load regulator. We show that this
generalisation of G-networks has a product form
solution.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sadik:2017:CAH,
author = "Ahmed R. Sadik and Bodo Urban",
title = "Combining Adaptive Holonic Control and {ISA-95}
Architectures to Self-Organize the Interaction in a
Worker-Industrial Robot Cooperative Workcell",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "35",
day = "14",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030035",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/35",
abstract = "Self-Organization is a spontaneous trend which exists
in nature among different organisms. Self-organization
refers to the process where some form of an overall
order arises in a group due to the local interaction
among the members of this group. In manufacturing, a
similar definition of a Reconfigurable Manufacturing
System (RMS) can be found. RMS is a system where the
production components and functions can be modified,
rearranged and/or interchanged in a timely and
cost-effective manner to quickly respond to the
production requirements. The definition of the RMS
concept implies that the self-organization is an
important key factor to fulfil that concept. A case
study where a cooperation among a variable number of
Industrial Robots (IRs) and workers is studied to show
the importance of the research problem. The goal of the
paper is to offer a suitable generic control and
interaction architecture solution model, which obtains
the self-organization from the RMS point of view.
Ultimately, applying the proposed solution concept to
the case study.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Binmad:2017:EFR,
author = "Ruchdee Binmad and Mingchu Li and Zhen Wang and Nakema
Deonauth and Chettupally Anil Carie",
title = "An Extended Framework for Recovering From Trust
Breakdowns in Online Community Settings",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "36",
day = "17",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030036",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/36",
abstract = "The violation of trust as a result of interactions
that do not proceed as expected gives rise to the
question as to whether broken trust can possibly be
recovered. Clearly, trust recovery is more complex than
trust initialization and maintenance. Trust recovery
requires a more complex mechanism to explore different
factors that cause the decline of trust and identify
the affected individuals of trust violation both
directly and indirectly. In this study, an extended
framework for recovering trust is presented. Aside from
evaluating whether there is potential for recovery
based on the outcome of a forgiveness mechanism after a
trust violation, encouraging cooperation between
interacting parties after a trust violation through
incentive mechanisms is also important. Furthermore, a
number of experiments are conducted to validate the
applicability of the framework and the findings show
that the e-marketplace incorporating our proposed
framework results in improved efficiency of trading,
especially in long-term interactions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lei:2017:NHC,
author = "Zhou Lei and Exiong Sun and Shengbo Chen and Jiang Wu
and Wenfeng Shen",
title = "A Novel Hybrid-Copy Algorithm for Live Migration of
Virtual Machine",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "37",
day = "18",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030037",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/37",
abstract = "Live migration of virtual machines is an important
approach for dynamic resource scheduling in cloud
environment. The hybrid-copy algorithm is an excellent
algorithm that combines the pre-copy algorithm with the
post-copy algorithm to remedy the defects of the
pre-copy algorithm and the post-copy algorithm.
Currently, the hybrid-copy algorithm only copies all
memory pages once in advance. In a write-intensive
workload, copy memory pages once may be enough.
However, more iterative copy rounds can significantly
reduce the page faults in a read-intensive workload. In
this paper, we propose a new parameter to decide the
appropriate time to stop the iterative copy phase based
on real-time situation. We use a Markov model to
forecast the memory access pattern. Based on the
predicted results and the analysis of the actual
situation, the memory page transfer order would be
adjusted to reduce the invalid transfers. The novel
hybrid-copy algorithm is implemented on the Xen
platform. The experimental results demonstrate that our
mechanism has good performance both on read-intensive
workloads and write-intensive workloads.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Computing for Real Time
Intelligent Systems.",
}
@Article{Lee:2017:IAO,
author = "Il-Gu Lee",
title = "Interference-Aware Opportunistic Dynamic Energy Saving
Mechanism for Wi-Fi Enabled {IoTs}",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "38",
day = "18",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030038",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/38",
abstract = "The wireless local area network (WLAN) is one of the
most popular wireless technologies offering
connectivity today, and one of the candidates for the
internet of things (IoTs). However, WLAN's inefficiency
in terms of complexity and relatively large power
consumption compared with other wireless standards has
been reported as a major barrier for IoTs applications.
This paper proposes an interference-aware opportunistic
dynamic energy saving mechanism to improve energy
efficiency for Wi-Fi enabled IoTs. The proposed scheme
optimizes operating clock frequencies adaptively for
signal processing when the mobile station transmits
packets in partial sub-channels. Evaluation results
demonstrate that the proposed scheme improves energy
efficiency by approximately 34\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Big Data and Internet of Thing.",
}
@Article{Roychowdhury:2017:ABS,
author = "Sohini Roychowdhury and Paul Hage and Joseph Vasquez",
title = "{Azure}-Based Smart Monitoring System for Anemia-Like
Pallor",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "39",
day = "26",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030039",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/39",
abstract = "Increasing costs of diagnostic healthcare have
necessitated the development of hardware independent
non-invasive Point of Care (POC) systems. Although
anemia prevalence rates in global populations vary
between 10\% and 60\% in various demographic groups,
smart monitoring systems have not yet been developed
for screening and tracking anemia-like pallor. In this
work, we present two cloud platform-hosted POC
applications that are directed towards smart monitoring
of anemia-like pallor through eye and tongue pallor
site images. The applications consist of a front-end
graphical user interface (GUI) module and two different
back-end image processing and machine learning modules.
Both applications are hosted on a browser accessible
tomcat server ported to an Azure Virtual Machine (VM).
We observe that the first application spatially
segments regions of interest from pallor site images
with higher pallor classification accuracy and
relatively longer processing times when compared to the
lesser accurate yet faster second application. Also,
both applications achieve 65\%-98\% accuracy in
separating normal images from images with pallor or
abnormalities. The optimized front-end module is
significantly light-weight with a run-through time
ratio of 10-5 with respect to the back-end modules.
Thus, the proposed applications are portable and
hardware independent, allowing for their use in pallor
monitoring and screening tasks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bauman:2017:VIE,
author = "Brian Bauman and Patrick Seeling",
title = "Visual Interface Evaluation for Wearables Datasets:
Predicting the Subjective Augmented Vision Image {QoE}
and {QoS}",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "40",
day = "28",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030040",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/40",
abstract = "As Augmented Reality (AR) applications become
commonplace, the determination of a device operator's
subjective Quality of Experience (QoE) in addition to
objective Quality of Service (QoS) metrics gains
importance. Human subject experimentation is common for
QoE relationship determinations due to the subjective
nature of the QoE. In AR scenarios, the overlay of
displayed content with the real world adds to the
complexity. We employ Electroencephalography (EEG)
measurements as the solution to the inherent
subjectivity and situationality of AR content display
overlaid with the real world. Specifically, we evaluate
prediction performance for traditional image display
(AR) and spherical/immersive image display (SAR) for
the QoE and underlying QoS levels. Our approach
utilizing a four-position EEG wearable achieves high
levels of accuracy. Our detailed evaluation of the
available data indicates that less sensors would
perform almost as well and could be integrated into
future wearable devices. Additionally, we make our
Visual Interface Evaluation for Wearables (VIEW)
datasets from human subject experimentation publicly
available and describe their utilization.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sun:2017:SQE,
author = "Mao-hua Sun and Yuan-gang Li and Bing He",
title = "Study on a Quality Evaluation Method for College
{English} Classroom Teaching",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "41",
day = "30",
month = jul,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030041",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/41",
abstract = "A quality evaluation method is an important means and
the main basis on which to evaluate the college English
classroom teaching quality of teachers. To overcome the
one-sided subjectivity and resulting imprecision of the
traditional classroom teaching quality evaluation
method, a scientific and reasonable quality evaluation
index system for college English classroom teaching is
constructed. The fuzzy comprehensive evaluation method
and the analytic hierarchy process method are combined
to propose an improved multi-level fuzzy comprehensive
evaluation model for obtaining a new college English
classroom teaching quality evaluation method. In the
proposed method, according to the fuzzy characteristics
of a college English classroom teaching quality
evaluation, the fuzzy comprehensive evaluation method
is used to transform the qualitative evaluation indexes
into limited quantitative evaluation indexes, then a
judgment matrix is constructed to determine the weights
among different levels by using the analytic hierarchy
process method. Additionally, the college English
classroom teaching quality is evaluated in detail.
Finally, an actual case of college English classroom
teaching is used to verify the effectiveness of the
college English classroom teaching quality evaluation
method. The results show that the proposed college
English classroom teaching method can overcome the
subjectivity and randomness shortcomings of the
traditional classroom teaching quality evaluation
methods, and improve the reliability, accuracy, and
objectivity of fuzzy comprehensive evaluation. It is an
effective method to evaluate college English classroom
teaching quality.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue u- and e- Service, Science and
Technology.",
}
@Article{Cominelli:2017:MPF,
author = "Lorenzo Cominelli and Nicola Carbonaro and Daniele
Mazzei and Roberto Garofalo and Alessandro Tognetti and
Danilo {De Rossi}",
title = "A Multimodal Perception Framework for Users Emotional
State Assessment in Social Robotics",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "42",
day = "01",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030042",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/42",
abstract = "In this work, we present an unobtrusive and
non-invasive perception framework based on the synergy
between two main acquisition systems: the Touch-Me Pad,
consisting of two electronic patches for physiological
signal extraction and processing; and the Scene
Analyzer, a visual-auditory perception system
specifically designed for the detection of social and
emotional cues. It will be explained how the
information extracted by this specific kind of
framework is particularly suitable for social robotics
applications and how the system has been conceived in
order to be used in human-robot interaction
scenarios.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bonguet:2017:SDS,
author = "Adrien Bonguet and Martine Bellaiche",
title = "A Survey of Denial-of-Service and Distributed Denial
of Service Attacks and Defenses in Cloud Computing",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "43",
day = "05",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030043",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/43",
abstract = "Cloud Computing is a computing model that allows
ubiquitous, convenient and on-demand access to a shared
pool of highly configurable resources (e.g., networks,
servers, storage, applications and services).
Denial-of-Service (DoS) and Distributed
Denial-of-Service (DDoS) attacks are serious threats to
the Cloud services' availability due to numerous new
vulnerabilities introduced by the nature of the Cloud,
such as multi-tenancy and resource sharing. In this
paper, new types of DoS and DDoS attacks in Cloud
Computing are explored, especially the XML-DoS and
HTTP-DoS attacks, and some possible detection and
mitigation techniques are examined. This survey also
provides an overview of the existing defense solutions
and investigates the experiments and metrics that are
usually designed and used to evaluate their
performance, which is helpful for the future research
in the domain.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{Katsinis:2017:MIM,
author = "Georgios Katsinis and Eirini Eleni Tsiropoulou and
Symeon Papavassiliou",
title = "Multicell Interference Management in Device to Device
Underlay Cellular Networks",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "44",
day = "07",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030044",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/44",
abstract = "In this paper, the problem of interference mitigation
in a multicell Device to Device (D2D) underlay cellular
network is addressed. In this type of network
architectures, cellular users and D2D users share
common Resource Blocks (RBs). Though such paradigms
allow potential increase in the number of supported
users, the latter comes at the cost of interference
increase that in turn calls for the design of efficient
interference mitigation methodologies. To treat this
problem efficiently, we propose a two step approach,
where the first step concerns the efficient RB
allocation to the users and the second one the
transmission power allocation. Specifically, the RB
allocation problem is formulated as a bilateral
symmetric interaction game. This assures the existence
of a Nash Equilibrium (NE) point of the game, while a
distributed algorithm, which converges to it, is
devised. The power allocation problem is formulated as
a linear programming problem per RB, and the
equivalency between this problem and the total power
minimization problem is shown. Finally, the operational
effectiveness of the proposed approach is evaluated via
numerical simulations, while its superiority against
state of the art approaches existing in the recent
literature is shown in terms of increased number of
supported users, interference reduction and power
minimization.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Cellular D2D
Communications.",
}
@Article{Zhang:2017:RIW,
author = "Heng Zhang and Chengyou Wang and Xiao Zhou",
title = "A Robust Image Watermarking Scheme Based on {SVD} in
the Spatial Domain",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "45",
day = "07",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030045",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/45",
abstract = "With the development of image processing technology,
the copyright protection of digital images has become
an urgent problem to be solved. As an effective method,
the robust digital watermarking technique emerges at a
historic moment. Currently, most robust watermarking
schemes are performed in the transform domains, such as
the discrete cosine transform (DCT) and singular value
decomposition (SVD). Compared with spatial domain
watermarking schemes, these methods have achieved good
performance, such as better robustness and higher
security. However, the computational complexity
increases with the use of forward and reverse
transforms. In this paper, we analyze the SVD-based
watermarking scheme and its impact on the spatial
domain. Based on this analysis and the mathematical
characteristics of SVD, we present a robust image
watermarking scheme where a binary watermark is
embedded into the largest singular value of each image
block in the spatial domain. Several experiments are
conducted to verify the performance of the proposed
watermarking scheme. The experimental results show that
compared with the existing SVD domain watermarking
schemes, our proposed method has maintained good
robustness against various attacks. Moreover, it avoids
the false positive problem existing in traditional
SVD-based watermarking schemes and has lower
computational complexity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lee:2017:DPD,
author = "Il-Gu Lee",
title = "Digital Pre-Distortion of Carrier Frequency Offset for
Reliable Wi-Fi Enabled {IoTs}",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "46",
day = "09",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030046",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/46",
abstract = "The Internet of Things (IoTs) will change the
requirements for wireless connectivity significantly,
mainly with regard to service coverage, data rate, and
energy efficiency. Therefore, to improve robustness and
reliability, WiFi-enabled IoT devices have been
developed to use narrowband communication. However,
narrowband transmission in WiFi such as IEEE 802.11ah
causes relatively higher frequency error due to the
reduced subcarrier space, which is larger than legacy
wireless local area networks (WLANs) in 2.4/5 GHz
frequencies. In a direct conversion receiver, this
error degrades the signal quality due to the presence
of direct current (DC) offset cancellation circuits. In
this paper, a digital carrier frequency offset (CFO)
predistortion scheme is proposed for a reliable
communication link in dense networks. Evaluation
results demonstrate that the proposed scheme can
improve received signal quality in terms of packet
error rate and error vector magnitude.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Big Data and Internet of Thing.",
}
@Article{Markus:2017:CAI,
author = "Andras Markus and Attila Kertesz and Gabor
Kecskemeti",
title = "Cost-Aware {IoT} Extension of {DISSECT-CF}",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "47",
day = "14",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030047",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/47",
abstract = "In the age of the Internet of Things (IoT), more and
more sensors, actuators and smart devices get connected
to the network. Application providers often combine
this connectivity with novel scenarios involving cloud
computing. Before implementing changes in these
large-scale systems, an in-depth analysis is often
required to identify governance models, bottleneck
situations, costs and unexpected behaviours.
Distributed systems simulators help in such analysis,
but they are often problematic to apply in this newly
emerging domain. For example, most simulators are
either too detailed (e.g., need extensive knowledge on
networking), or not extensible enough to support the
new scenarios. To overcome these issues, we discuss our
IoT cost analysis oriented extension of DIScrete event
baSed Energy Consumption simulaTor for Clouds and
Federations (DISSECT-CF). Thus, we present an in-depth
analysis of IoT and cloud related pricing models of the
most widely used commercial providers. Then, we show
how the fundamental properties (e.g., data production
frequency) of IoT entities could be linked to the
identified pricing models. To allow the adoption of
unforeseen scenarios and pricing schemes, we present a
declarative modelling language to describe these links.
Finally, we validate our extensions by analysing the
effects of various identified pricing models through
five scenarios coming from the field of weather
forecasting.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Big Data and Internet of Thing.",
}
@Article{Sadik:2017:FSS,
author = "Ahmed R. Sadik and Bodo Urban",
title = "Flow Shop Scheduling Problem and Solution in
Cooperative Robotics-Case-Study: One Cobot in
Cooperation with One Worker",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "48",
day = "16",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030048",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/48",
abstract = "This research combines between two different
manufacturing concepts. On the one hand, flow shop
scheduling is a well-known problem in production
systems. The problem appears when a group of jobs
shares the same processing sequence on two or more
machines sequentially. Flow shop scheduling tries to
find the appropriate solution to optimize the sequence
order of this group of jobs over the existing machines.
The goal of flow shop scheduling is to obtain the
continuity of the flow of the jobs over the machines.
This can be obtained by minimizing the delays between
two consequent jobs, therefore the overall makespan can
be minimized. On the other hand, collaborative robotics
is a relatively recent approach in production where a
collaborative robot (cobot) is capable of a close
proximity cooperation with the human worker to increase
the manufacturing agility and flexibility. The simplest
case-study of a collaborative workcell is one cobot in
cooperation with one worker. This collaborative
workcell can be seen as a special case of the shop flow
scheduling problem, where the required time from the
worker to perform a specific job is unknown and
variable. Therefore, during this research, we implement
an intelligent control solution which can optimize the
flow shop scheduling problem over the previously
mentioned case-study.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{De-Pablos-Heredero:2017:FIS,
author = "Carmen De-Pablos-Heredero",
title = "Future Intelligent Systems and Networks",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "49",
day = "02",
month = sep,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030049",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/49",
abstract = "The expansion of telecommunication technologies
touches almost all aspects life that we are living
nowadays. Indeed, such technologies have emerged as a
fourth essential utility alongside the traditional
utilities of electricity, water, and gas. In this
context, Cloud Data Center Networks (cloud-DCNs) have
been proposed as a promising way to cope with such a
high-tech era and with any expected trends in future
computing networks. Resources of cloud-DCNs are leased
to the interested users in the form of services, such
services come in different models that vary between
software, platform, and infrastructure. The leasing
process of any service model starts with the users
(i.e., service tenants). A tenant asks for the service
resources, and the cloud-provider allocates the
resources with a charge that follows a predefined cost
policy. Cloud resources are limited, and those cloud
providers have profit objectives to be satisfied. Thus,
to comply with the aforementioned promise, the limited
resources need to be carefully allocated. Existing
allocation proposals in the literature dealt with this
problem in varying ways. However, none proposes a
win-win allocation model that satisfies both the
providers and tenants. This work proposes A Rational
Allocation Approach in Cloud Data Center Networks
(ARAAC) that efficiently allocates the available cloud
resources, in a way that allows for a win-win
environment to satisfy both parties: the providers and
tenants. To do so, ARAAC deploys the Second Best-Price
(SBP) mechanism along with a behavioral-based
reputation model. The reputation is built according to
the tenants' utilization history throughout their
previous service allocations. The reputation records
along with the adoption of the SBP mechanism allows for
a locally free-equilibrium approach that allocates the
available cloud-DCN resources in an efficient and fair
manner. In ARAAC, through an auction scenario, tenants
with positive reputation records are awarded by having
the required resources allocated at prices that are
lower than what they have offered. Compared to other
benchmark models, simulation results show that ARAAC
can efficiently adapt the behavior of those rational
service-tenants to provide for better use of the cloud
resources, with an increase in the providers'
profits.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Intelligent Systems and
Networks.",
}
@Article{Quttoum:2017:ARA,
author = "Ahmad Nahar Quttoum and Ayoub Alsarhan and
Abidalrahman Moh'd",
title = "{ARAAC}: a Rational Allocation Approach in Cloud Data
Center Networks",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "50",
day = "06",
month = sep,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030050",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/50",
abstract = "The expansion of telecommunication technologies
touches almost all aspects life that we are living
nowadays. Indeed, such technologies have emerged as a
fourth essential utility alongside the traditional
utilities of electricity, water, and gas. In this
context, Cloud Data Center Networks (cloud-DCNs) have
been proposed as a promising way to cope with such a
high-tech era and with any expected trends in future
computing networks. Resources of cloud-DCNs are leased
to the interested users in the form of services, such
services come in different models that vary between
software, platform, and infrastructure. The leasing
process of any service model starts with the users
(i.e., service tenants). A tenant asks for the service
resources, and the cloud-provider allocates the
resources with a charge that follows a predefined cost
policy. Cloud resources are limited, and those cloud
providers have profit objectives to be satisfied. Thus,
to comply with the aforementioned promise, the limited
resources need to be carefully allocated. Existing
allocation proposals in the literature dealt with this
problem in varying ways. However, none proposes a
win-win allocation model that satisfies both the
providers and tenants. This work proposes A Rational
Allocation Approach in Cloud Data Center Networks
(ARAAC) that efficiently allocates the available cloud
resources, in a way that allows for a win-win
environment to satisfy both parties: the providers and
tenants. To do so, ARAAC deploys the Second Best-Price
(SBP) mechanism along with a behavioral-based
reputation model. The reputation is built according to
the tenants' utilization history throughout their
previous service allocations. The reputation records
along with the adoption of the SBP mechanism allows for
a locally free-equilibrium approach that allocates the
available cloud-DCN resources in an efficient and fair
manner. In ARAAC, through an auction scenario, tenants
with positive reputation records are awarded by having
the required resources allocated at prices that are
lower than what they have offered. Compared to other
benchmark models, simulation results show that ARAAC
can efficiently adapt the behavior of those rational
service-tenants to provide for better use of the cloud
resources, with an increase in the providers'
profits.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhou:2017:LPP,
author = "Kaijun Zhou and Lingli Yu and Ziwei Long and Siyao
Mo",
title = "Local Path Planning of Driverless Car Navigation Based
on Jump Point Search Method Under Urban Environment",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "51",
day = "12",
month = sep,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030051",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/51",
abstract = "The Jump Point Search (JPS) algorithm is adopted for
local path planning of the driverless car under urban
environment, and it is a fast search method applied in
path planning. Firstly, a vector Geographic Information
System (GIS) map, including Global Positioning System
(GPS) position, direction, and lane information, is
built for global path planning. Secondly, the GIS map
database is utilized in global path planning for the
driverless car. Then, the JPS algorithm is adopted to
avoid the front obstacle, and to find an optimal local
path for the driverless car in the urban environment.
Finally, 125 different simulation experiments in the
urban environment demonstrate that JPS can search out
the optimal and safety path successfully, and
meanwhile, it has a lower time complexity compared with
the Vector Field Histogram (VFH), the Rapidly Exploring
Random Tree (RRT), A*, and the Probabilistic Roadmaps
(PRM) algorithms. Furthermore, JPS is validated
usefully in the structured urban environment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lupetti:2017:DCP,
author = "Maria Luce Lupetti and Yuan Yao and Haipeng Mi and
Claudio Germak",
title = "Design for Children's Playful Learning with Robots",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "52",
day = "18",
month = sep,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030052",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/52",
abstract = "This article presents an investigation of the
implications of designing for children's playful
learning with robots. This study was carried out by
adopting a Research through Design approach that
resulted in the development of a novel
low-anthropomorphic robot called Shybo. The article
reports the main phases of the project: the preliminary
and exploratory research that was carried out to define
a list of design requirements; the design of the robot
and its supplementary materials for carrying out
playful learning experiences; and the evaluation of the
project that involved both parents and children. The
robot, in fact, was finally tested as part of a
two-hour experience that engaged children in activities
related to the associations between sounds and colours.
The article presents and discusses the results of this
evaluation to point out positive aspects of the
experience, emerging issues and hints for future works.
These are documented to share lessons learned that
might be supportive of the general development of
children's playful learning and cognitive experiences
with robots.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yang:2017:TND,
author = "Yao Yang",
title = "Towards a New Digital Era: Observing Local
E-Government Services Adoption in a {Chinese}
Municipality",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "3",
pages = "53",
day = "20",
month = sep,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9030053",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:57 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/3/53",
abstract = "As electronic government services (e-government)
evolve, traditional applications such as online portals
are encountering challenges in a new digital era in
which people thirst for more convenient, diverse
channels of communication with their government.
Despite the efforts devoted to the promotion of Social
Networking Service (SNS) use in e-government for the
past few years, empirical studies regarding this
ongoing trend are still insufficient. In the local
administration of China, a special collaboration
between local governments and private Internet
enterprises is happening: government services are
imported into commercial SNS platforms known as WeChat
and Weibo. This research conducts a case study of a
Chinese municipality premised upon survey data (N =
605) collected in Chongqing. It examines the
determinants of e-services adoption in four major local
applications: two traditional government-led services
``Government website portal'' and ``Government official
app'' (traditional government-led services), and two
built-in government services on social networking
applications ``Weibo Government official account''
``WeChat Public Services''. The paper aims to provide a
closer understanding of current trends in local
government e-services, or in this case, an innovative
trial of Chinese e-government practices.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue u- and e- Service, Science and
Technology.",
}
@Article{Rizvi:2017:DCB,
author = "Syed Tahir Hussain Rizvi and Denis Patti and Tomas
Bj{\"o}rklund and Gianpiero Cabodi and Gianluca
Francini",
title = "Deep Classifiers-Based License Plate Detection,
Localization and Recognition on {GPU}-Powered Mobile
Platform",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "66",
day = "21",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040066",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/66",
abstract = "The realization of a deep neural architecture on a
mobile platform is challenging, but can open up a
number of possibilities for visual analysis
applications. A neural network can be realized on a
mobile platform by exploiting the computational power
of the embedded GPU and simplifying the flow of a
neural architecture trained on the desktop workstation
or a GPU server. This paper presents an embedded
platform-based Italian license plate detection and
recognition system using deep neural classifiers. In
this work, trained parameters of a highly precise
automatic license plate recognition (ALPR) system are
imported and used to replicate the same neural
classifiers on a Nvidia Shield K1 tablet. A CUDA-based
framework is used to realize these neural networks. The
flow of the trained architecture is simplified to
perform the license plate recognition in real-time.
Results show that the tasks of plate and character
detection and localization can be performed in
real-time on a mobile platform by simplifying the flow
of the trained architecture. However, the accuracy of
the simplified architecture would be decreased
accordingly.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hanna:2017:SSD,
author = "Dalal Hanna and Prakash Veeraraghavan and Ben Soh",
title = "{SDMw}: Secure Dynamic Middleware for Defeating Port
and {OS} Scanning",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "67",
day = "21",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040067",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/67",
abstract = "Fingerprinting is a process of identifying the remote
network devices and services running on the devices,
including operating systems (OS) of the devices, and
hosts running different OSs. Several research proposals
and commercial products are available in the market to
defeat fingerprinting. However, they have performance
limitations and expose themselves to attackers. In this
paper, we utilize some real-time fault-tolerance
concepts (viz. real-time/dynamic, detection/locating,
confinement/localizing and masking/decoy) to propose a
plug-and-play adaptive middleware architecture called
Secure Dynamic Middleware (SDMw) with a view to defeat
attackers fingerprinting the network, without exposing
itself to the attackers. We verify that the proposed
scheme works seamlessly and requires zero-configuration
at the client side.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Colombo:2017:CWU,
author = "Bruna Armonas Colombo and Pedro Buck and Vinicius
Miana Bezerra",
title = "Challenges When Using Jurimetrics in {Brazil}--- a
Survey of Courts",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "68",
day = "25",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040068",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/68",
abstract = "Jurimetrics is the application of quantitative
methods, usually statistics, to law. An important step
to implement a jurimetric analysis is to extract raw
data from courts and organize that data in a way that
can be processed. Most of the raw data is unstructured
and written in natural language, which stands as a
challenge to Computer Science experts. As it requires
expertise in law, statistics, and computer science,
jurimetrics is a multidisciplinary field. When trying
to implement a jurimetric system in Brazil, additional
challenges were identified due to the heterogeneity of
the different court systems, the lack of standards, and
how the open data laws in Brazil are interpreted and
implemented. In this article, we present a survey of
Brazilian courts in terms of readiness to implement a
jurimetric system. Analyzing a sample of data, we have
found, in light of Brazil's open data regulation,
privacy issues and technical issues. Finally, we
propose a roadmap that encompasses both technology and
public policy to meet those challenges.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computation, Law and the Net-The Future
of Law in the Computational Social Science Era.",
}
@Article{Li:2017:SCT,
author = "Dongyuan Li and Chengshuai Li and Zidong Wang and
Deqiang Wang and Jianping Xing and Bo Zhang",
title = "Signal Consensus in {TSP} of the Same Grid in Road
Network",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "69",
day = "24",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040069",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/69",
abstract = "In this paper, we propose a consensus algorithm with
input constraints for traffic light signals in transit
signal priority (TSP). TSP ensures control strategy of
traffic light signals can be adjusted and applied
according to the real-time traffic status, and provides
priority for buses. We give the convergence conditions
of the consensus algorithms with and without input
constraints in TSP respectively and analyze the
convergence performance of them by using matrix theory
and graph theory, and PTV-VISSIM is used to simulate
the traffic accident probability of three cases at
intersections. Simulation results are presented that a
consensus is asymptotically reached for all weights of
priority; the algorithm with input constraints is more
suitable for TSP than the algorithm without input
constraints, and the traffic accident rate is
reduced.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Computing for Real Time
Intelligent Systems.",
}
@Article{Pruvost:2017:EDM,
author = "Hippolyte Pruvost and Peter Mooney",
title = "Exploring Data Model Relations in {OpenStreetMap}",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "70",
day = "24",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040070",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/70",
abstract = "The OpenStreetMap (OSM) geographic data model has
three principal object types: nodes (points), ways
(polygons and polylines), and relations (logical
grouping of all three object types to express
real-world geographical relationships). While there has
been very significant analysis of OSM over the past
decade or so, very little research attention has been
given to OSM relations. In this paper, we provide an
exploratory overview of relations in OSM for four
European cities. In this exploration, we undertake
analysis of relations to assess their complexity,
composition and flexibility within the OSM data model.
We show that some of the patterns discovered by
researchers related to OSM nodes and ways also exist in
relations. We find some other interesting aspects of
relations which we believe can act as a catalyst for a
more sustained future research effort on relations in
OSM. These aspects include: the potential influence of
bulk imports of geographical data to OSM, tagging of
relations, and contribution patterns of edits to OSM
relations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mazzenga:2017:FBF,
author = "Franco Mazzenga and Romeo Giuliano and Francesco
Vatalaro",
title = "{FttC}-Based Fronthaul for {5G} Dense\slash
Ultra-Dense Access Network: Performance and Costs in
Realistic Scenarios",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "71",
day = "27",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040071",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/71",
abstract = "One distinctive feature of the next 5G systems is the
presence of a dense/ultra-dense wireless access network
with a large number of access points (or nodes) at
short distances from each other. Dense/ultra-dense
access networks allow for providing very high
transmission capacity to terminals. However, the
deployment of dense/ultra-dense networks is slowed down
by the cost of the fiber-based infrastructure required
to connect radio nodes to the central processing units
and then to the core network. In this paper, we
investigate the possibility for existing FttC access
networks to provide fronthaul capabilities for
dense/ultra-dense 5G wireless networks. The analysis is
realistic in that it is carried out considering an
actual access network scenario, i.e., the Italian FttC
deployment. It is assumed that access nodes are
connected to the Cabinets and to the corresponding
distributors by a number of copper pairs. Different
types of cities grouped in terms of population have
been considered. Results focus on fronthaul transport
capacity provided by the FttC network and have been
expressed in terms of the available fronthaul bit rate
per node and of the achievable coverage.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Khan:2017:TAC,
author = "Muhidul Islam Khan and Muhammad Mahtab Alam and
Yannick {Le Moullec} and Elias Yaacoub",
title = "Throughput-Aware Cooperative Reinforcement Learning
for Adaptive Resource Allocation in Device-to-Device
Communication",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "72",
day = "01",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040072",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/72",
abstract = "Device-to-device (D2D) communication is an essential
feature for the future cellular networks as it
increases spectrum efficiency by reusing resources
between cellular and D2D users. However, the
performance of the overall system can degrade if there
is no proper control over interferences produced by the
D2D users. Efficient resource allocation among D2D User
equipments (UE) in a cellular network is desirable
since it helps to provide a suitable interference
management system. In this paper, we propose a
cooperative reinforcement learning algorithm for
adaptive resource allocation, which contributes to
improving system throughput. In order to avoid selfish
devices, which try to increase the throughput
independently, we consider cooperation between devices
as promising approach to significantly improve the
overall system throughput. We impose cooperation by
sharing the value function/learned policies between
devices and incorporating a neighboring factor. We
incorporate the set of states with the appropriate
number of system-defined variables, which increases the
observation space and consequently improves the
accuracy of the learning algorithm. Finally, we compare
our work with existing distributed reinforcement
learning and random allocation of resources. Simulation
results show that the proposed resource allocation
algorithm outperforms both existing methods while
varying the number of D2D users and transmission power
in terms of overall system throughput, as well as D2D
throughput by proper Resource block (RB)-power level
combination with fairness measure and improving the
Quality of service (QoS) by efficient controlling of
the interference level.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Cellular D2D
Communications.",
}
@Article{Anwar:2017:QSB,
author = "Asim Anwar and Boon-Chong Seet and Xue Jun Li",
title = "Quality of Service Based {NOMA} Group {D2D}
Communications",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "73",
day = "01",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040073",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/73",
abstract = "Non-orthogonal multiple access (NOMA) provides
superior spectral efficiency and is considered as a
promising multiple access scheme for fifth generation
(5G) wireless systems. The spectrum efficiency can be
further enhanced by enabling device-to-device (D2D)
communications. In this work, we propose quality of
service (QoS) based NOMA (Q-NOMA) group D2D
communications in which the D2D receivers (DRs) are
ordered according to their QoS requirements. We discuss
two possible implementations of proposed Q-NOMA group
D2D communications based on the two power allocation
coefficient policies. In order to capture the key
aspects of D2D communications, which are device
clustering and spatial separation, we model the
locations of D2D transmitters (DTs) by Gauss-Poisson
process (GPP). The DRs are then considered to be
clustered around DTs. Multiple DTs can exist in
proximity of each other. In order to characterize the
performance, we derive the Laplace transform of the
interference at the probe D2D receiver and obtain a
closed-form expression of its outage probability using
stochastic geometry tools. The performance of proposed
Q-NOMA group D2D communications is then evaluated and
benchmarked against conventional paired D2D
communications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Cellular D2D
Communications.",
}
@Article{Reddy:2017:ETE,
author = "Nalavala Ramanjaneya Reddy and Pakanati Chenna Reddy
and Mokkala Padmavathamma",
title = "Efficient Traffic Engineering Strategies for Improving
the Performance of {TCP} Friendly Rate Control
Protocol",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "74",
day = "01",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040074",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/74",
abstract = "Multimedia services will play a prominent role in the
next generation of internet. With increasing real time
requirements, internet technology has to provide
Quality of Service (QoS) for various kinds of real time
streaming services. When the bandwidth required exceeds
the available network resources, network paths can get
congested, which results in a delay in packet delivery
and packet loss. This situation leads to the design of
new strategies for congestion avoidance and control.
One of the popular and appropriate congestion control
mechanisms that is useful in transmitting multimedia
applications in the transport layer is TCP Friendly
Rate Control Protocol (TFRC). However, TFRC still
suffers from packet loss and delay due to long distance
heavy traffic and network fluctuations. This paper
introduces a number of key concerns like enhanced Round
Trip Time (RTT) and Retransmission Time Out (RTO)
calculations, Enhanced Average Loss Interval (ALI)
methods and improved Time to Live (TTL) features are
applied to TFRC to enhance the performance of TFRC over
wired networks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Computing for Real Time
Intelligent Systems.",
}
@Article{Chikaraishi:2017:CSA,
author = "Takenobu Chikaraishi and Yuichiro Yoshikawa and Kohei
Ogawa and Oriza Hirata and Hiroshi Ishiguro",
title = "Creation and Staging of {Android} Theatre
``{Sayonara}'' towards Developing Highly Human-Like
Robots",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "75",
day = "02",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040075",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/75",
abstract = "Even after long-term exposures, androids with a
strikingly human-like appearance evoke unnatural
feelings. The behavior that would induce human-like
feelings after long exposures is difficult to
determine, and it often depends on the cultural
background of the observers. Therefore, in this study,
we generate an acting performance system for the
android, in which an android and a human interact in a
stage play in the real world. We adopt the theatrical
theory called Contemporary Colloquial Theatre Theory to
give the android natural behaviors so that audiences
can comfortably observe it even after long-minute
exposure. A stage play is created and shown in various
locations, and the audiences are requested to report
their impressions of the stage and their cultural and
psychological backgrounds in a self-evaluating
questionnaire. Overall analysis indicates that the
audience had positive feelings, in terms of
attractiveness, towards the android on the stage even
after 20 min of exposure. The singularly high
acceptance of the android by Japanese audiences seems
to be correlated with a high animism tendency, rather
than to empathy. We also discuss how the stage play
approach is limited and could be extended to contribute
to realization of human-robot interaction in the real
world.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Engaging in Interaction with Robots.",
}
@Article{Saura:2017:UDM,
author = "Jos{\'e} Ram{\'o}n Saura and Pedro Palos-S{\'a}nchez
and Luis Manuel Cerd{\'a} Su{\'a}rez",
title = "Understanding the Digital Marketing Environment with
{KPIs} and {Web} Analytics",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "76",
day = "04",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040076",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/76",
abstract = "In the practice of Digital Marketing (DM), Web
Analytics (WA) and Key Performance Indicators (KPIs)
can and should play an important role in marketing
strategy formulation. It is the aim of this article to
survey the various DM metrics to determine and address
the following question: What are the most relevant
metrics and KPIs that companies need to understand and
manage in order to increase the effectiveness of their
DM strategies? Therefore, to achieve these objectives,
a Systematic Literature Review has been carried out
based on two main themes (i) Digital Marketing and (ii)
Web Analytics. The search terms consulted in the
databases have been (i) DM and (ii) WA obtaining a
result total of n = 378 investigations. The databases
that have been consulted for the extraction of data
were Scopus, PubMed, PsyINFO, ScienceDirect and Web of
Science. In this study, we define and identify the main
KPIs in measuring why, how and for what purpose users
interact with web pages and ads. The main contribution
of the study is to lay out and clarify quantitative and
qualitative KPIs and indicators for DM performance in
order to achieve a consensus on the use and measurement
of these indicators.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ali:2017:CSR,
author = "Ahmad Ali and Yu Ming and Sagnik Chakraborty and Saima
Iram",
title = "A Comprehensive Survey on Real-Time Applications of
{WSN}",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "77",
day = "07",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040077",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/77",
abstract = "Nowadays, the investigation of the Wireless Sensor
Network (WSN) has materialized its functional area
ubiquitously such as environmental engineering,
industrial and business applications, military,
feedstock and habitat, agriculture sector, seismic
detection, intelligent buildings, smart grids, and
predictive maintenance, etc. Although some challenges
still exist in the wireless sensor network, in spite of
the shortcoming, it has been gaining significant
attention among researchers and technologists due to
its versatility and robustness. WSN is subject to a
high potential technology that has been successfully
implemented and tested in real-time scenarios, as well
as deployed practically in various applications. In
this paper, we have carried out an extensive survey in
real-time applications of wireless sensor network
deployment in a practical scenario such as the
real-time intelligent monitoring of temperature,
criminal activity in borders and surveillance on
traffic monitoring, vehicular behavior on roads, water
level and pressure, and remote monitoring of patients.
The application of the Wireless Sensor Network in the
assorted field of research areas has been widely
deliberated. WSN is found to be the most effective
solution in remote areas which are not yet explored due
to its perilous nature and unreachable places. Here, in
this study, we have cited the recent and updated
research on the ubiquitous usage of WSN in diverse
fields in an extensive and comprehensive approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Communications and Computing for
Sustainable Development Goals.",
}
@Article{Kontogiannis:2017:PFN,
author = "Sotirios Kontogiannis and George Kokkonis and Soultana
Ellinidou and Stavros Valsamidis",
title = "Proposed Fuzzy-{NN} Algorithm with {LoRaCommunication}
Protocol for Clustered Irrigation Systems",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "78",
day = "07",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040078",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/78",
abstract = "Modern irrigation systems utilize sensors and
actuators, interconnected together as a single entity.
In such entities, A.I. algorithms are implemented,
which are responsible for the irrigation process. In
this paper, the authors present an irrigation Open
Watering System (OWS) architecture that spatially
clusters the irrigation process into autonomous
irrigation sections. Authors' OWS implementation
includes a Neuro-Fuzzy decision algorithm called FITRA,
which originates from the Greek word for seed. In this
paper, the FITRA algorithm is described in detail, as
are experimentation results that indicate significant
water conservations from the use of the FITRA
algorithm. Furthermore, the authors propose a new
communication protocol over LoRa radio as an
alternative low-energy and long-range OWS clusters
communication mechanism. The experimental scenarios
confirm that the FITRA algorithm provides more
efficient irrigation on clustered areas than existing
non-clustered, time scheduled or threshold adaptive
algorithms. This is due to the FITRA algorithm's
frequent monitoring of environmental conditions, fuzzy
and neural network adaptation as well as adherence to
past irrigation preferences.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Big Data and Internet of Thing.",
}
@Article{Zhang:2017:MCU,
author = "Jingbo Zhang and Lili Cai and Shufang Zhang",
title = "Malicious Cognitive User Identification Algorithm in
Centralized Spectrum Sensing System",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "79",
day = "08",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040079",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/79",
abstract = "Collaborative spectral sensing can fuse the perceived
results of multiple cognitive users, and thus will
improve the accuracy of perceived results. However, the
multi-source features of the perceived results result
in security problems in the system. When there is a
high probability of a malicious user attack, the
traditional algorithm can correctly identify the
malicious users. However, when the probability of
attack by malicious users is reduced, it is almost
impossible to use the traditional algorithm to
correctly distinguish between honest users and
malicious users, which greatly reduces the perceived
performance. To address the problem above, based on the
\beta function and the feedback iteration mathematical
method, this paper proposes a malicious user
identification algorithm under multi-channel
cooperative conditions (\beta -MIAMC), which involves
comprehensively assessing the cognitive user's
performance on multiple sub-channels to identify the
malicious user. Simulation results show under the same
attack probability, compared with the traditional
algorithm, the \beta -MIAMC algorithm can more
accurately identify the malicious users, reducing the
false alarm probability of malicious users by more than
20\%. When the attack probability is greater than 7\%,
the proposed algorithm can identify the malicious users
with 100\% certainty.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Joshi:2017:FCB,
author = "Pusp Raj Joshi and Shareeful Islam and Syed Islam",
title = "A Framework for Cloud Based E-Government from the
Perspective of Developing Countries",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "80",
day = "09",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040080",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/80",
abstract = "Despite significant efforts to initiate electronic
government projects, developing countries are still
struggling to reap the benefits of using e-government
services. An effective implementation of e-government
infrastructure is necessary to increase the efficiency
and transparency of the government services. There are
several studies that observed causes like lack of
infrastructure support, lack of payment gateway and
improper e-government service delivery channel as main
barriers to a wider adoption of e-government services.
The main contribution of this research is to propose a
cloud-based G2G (Government-to-government) e-government
framework for a viable e-government solution from the
perspective of developing countries. We have introduced
a list of concepts and a systematic process to guide
the implementation of e-government project based on the
government's vision, goals, chosen services through the
service delivery channel to the appropriate cloud
service and deployment model. We have used Nepal as a
context of the case study and applied the framework to
a real e-government project of driving licensing
department using action research methodology. The
results from the study show that the G2G approach of
e-government implementation would be the best for
providing effective government services to the
stakeholders of developing countries. The proposed
framework also supports a smooth integration of
government services and reduces the time of the overall
project.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Shah:2017:NID,
author = "Reehan Ali Shah and Yuntao Qian and Dileep Kumar and
Munwar Ali and Muhammad Bux Alvi",
title = "Network Intrusion Detection through Discriminative
Feature Selection by Using Sparse Logistic Regression",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "81",
day = "10",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040081",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/81",
abstract = "Intrusion detection system (IDS) is a well-known and
effective component of network security that provides
transactions upon the network systems with security and
safety. Most of earlier research has addressed
difficulties such as overfitting, feature redundancy,
high-dimensional features and a limited number of
training samples but feature selection. We approach the
problem of feature selection via sparse logistic
regression (SPLR). In this paper, we propose a
discriminative feature selection and intrusion
classification based on SPLR for IDS. The SPLR is a
recently developed technique for data analysis and
processing via sparse regularized optimization that
selects a small subset from the original feature
variables to model the data for the purpose of
classification. A linear SPLR model aims to select the
discriminative features from the repository of datasets
and learns the coefficients of the linear classifier.
Compared with the feature selection approaches, like
filter (ranking) and wrapper methods that separate the
feature selection and classification problems, SPLR can
combine feature selection and classification into a
unified framework. The experiments in this
correspondence demonstrate that the proposed method has
better performance than most of the well-known
techniques used for intrusion detection.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{Yuan:2017:CBM,
author = "Peiyan Yuan and Hai Yu",
title = "A Combinational Buffer Management Scheme in Mobile
Opportunistic Network",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "82",
day = "14",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040082",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/82",
abstract = "Nodes in Mobile Opportunistic Network (MON) have to
cache packets to deal with the intermittent connection.
The buffer management strategy obviously impacts the
performance of MON, and it attracts more attention
recently. Due to the limited storage capacity of nodes,
traditional buffer management strategies just drop
messages based on the property of message, and they
neglect the collaboration between neighbors, resulting
in an ineffective performance improvement. Therefore,
effective buffer management strategies are necessary to
ensure that each node has enough buffer space to store
the message when the node buffer is close to
congestion. In this paper, we propose a buffer
management strategy by integrating the characteristics
of messages and nodes, and migrate the redundant
messages to the neighbor to optimize the total utility,
instead of deleting them. The simulation experiment
results show that it can obviously improve the delivery
ratio, the overhead ratio and the average delays, and
reduce the amount of hops compared with the traditional
ones.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2017:REI,
author = "Haipeng Li and Hidenori Nakazato and Syed Hassan
Ahmed",
title = "Request Expectation Index Based Cache Replacement
Algorithm for Streaming Content Delivery over {ICN}",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "83",
day = "14",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040083",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/83",
abstract = "Since the content delivery unit over
Information-Centric Networking (ICN) has shifted from
files to the segments of a file named chunks, solely
either file-level or chunk-level request probability is
insufficient for ICN cache management. In this paper, a
Request Expectation Index (RXI) based cache replacement
algorithm for streaming content delivery is proposed.
In this algorithm, RXI is introduced to serve as a
fine-grained and unified estimation criteria of
possible future request probability for cached chunks.
RXI is customized for streaming content delivery by
adopting both file-level and chunk-level request
probability and considering the dynamically varied
request status at each route as well. Compared to prior
work, the proposed algorithm evicts the chunk with the
minimum expectation of future request to maintain a
high cache utilization. Additionally, simulation
results demonstrate that the RXI-based algorithm can
remarkably enhance the streaming content delivery
performance and can be deployed in complex network
scenarios. The proposed results validate that, by
taking fine-grained request probability and request
status into consideration, the customized in-network
caching algorithm can improve the ICN streaming content
delivery performance by high cache utilization, fast
content delivery, and lower network traffic.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jiang:2017:EER,
author = "Fan Jiang and Honglin Wang and Hao Ren and Shuai Xu",
title = "Energy-Efficient Resource and Power Allocation for
Underlay Multicast Device-to-Device Transmission",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "84",
day = "14",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040084",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/84",
abstract = "In this paper, we present an energy-efficient resource
allocation and power control scheme for D2D
(Device-to-Device) multicasting transmission. The
objective is to maximize the overall energy-efficiency
of D2D multicast clusters through effective resource
allocation and power control schemes, while considering
the quality of service (QoS) requirements of both
cellular users (CUs) and D2D clusters. We first build
the optimization model and a heuristic resource and
power allocation algorithm is then proposed to solve
the energy-efficiency problem with less computational
complexity. Numerical results indicate that the
proposed algorithm outperforms existing schemes in
terms of throughput per energy consumption.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Cellular D2D
Communications.",
}
@Article{Hong:2017:BEF,
author = "Zhen Hong and Zehua Wang and Wei Cai and Victor C. M.
Leung",
title = "Blockchain-Empowered Fair Computational Resource
Sharing System in the {D2D} Network",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "85",
day = "17",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040085",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/85",
abstract = "Device-to-device (D2D) communication is becoming an
increasingly important technology in future networks
with the climbing demand for local services. For
instance, resource sharing in the D2D network features
ubiquitous availability, flexibility, low latency and
low cost. However, these features also bring along
challenges when building a satisfactory resource
sharing system in the D2D network. Specifically, user
mobility is one of the top concerns for designing a
cooperative D2D computational resource sharing system
since mutual communication may not be stably available
due to user mobility. A previous endeavour has
demonstrated and proven how connectivity can be
incorporated into cooperative task scheduling among
users in the D2D network to effectively lower average
task execution time. There are doubts about whether
this type of task scheduling scheme, though effective,
presents fairness among users. In other words, it can
be unfair for users who contribute many computational
resources while receiving little when in need. In this
paper, we propose a novel blockchain-based credit
system that can be incorporated into the
connectivity-aware task scheduling scheme to enforce
fairness among users in the D2D network. Users'
computational task cooperation will be recorded on the
public blockchain ledger in the system as transactions,
and each user's credit balance can be easily accessible
from the ledger. A supernode at the base station is
responsible for scheduling cooperative computational
tasks based on user mobility and user credit balance.
We investigated the performance of the credit system,
and simulation results showed that with a minor
sacrifice of average task execution time, the level of
fairness can obtain a major enhancement.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Cellular D2D
Communications.",
}
@Article{Wang:2017:SME,
author = "Jinpeng Wang and G{\'e}rard Chalhoub",
title = "Study of Mobility Enhancements for {RPL} in
Convergecast Scenarios",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "86",
day = "17",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040086",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/86",
abstract = "In recent years, mobility support has become an
important requirement in various wireless sensor
network (WSN) applications. However, due to the strict
resource constraints of power, memory, and processing
resources in WSNs, routing protocols are mainly
designed without considering mobility. Low-Power and
Lossy Networks (LLNs) are a special type of WSNs that
tolerate data loss. The Routing Protocol for Low-Power
and Lossy Networks (RPL) is a routing protocol for LLNs
that adapts IPv6 (Internet Protocol version 6) and runs
on top of the IEEE (Institute of Electrical and
Electronics Engineers) 802.15.4 standard. RPL supports
multipoint-to-point traffic and point-to-multipoint
traffic. In this paper we propose a mobility
enhancement mechanism in order to improve data
collection applications in highly mobile scenarios. The
enhancement is based on signal strength monitoring and
depth updating in order to improve the routing protocol
performance in mobile scenarios. This enhancement helps
routing protocols to cope better with topology changes
and makes proactive decisions on updating next-hop
neighbours. We integrated this mechanism into the RPL
and compared it with other existing RPL mobility
support enhancements. Results obtained through
simulation using Cooja show that our work outperforms
other existing RPL mobility supports on different
performance metrics. Results also prove the efficiency
of our proposal in highly mobile scenarios.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yan:2017:HPE,
author = "Chengxin Yan and Ningjiang Chen and Zhang Shuo",
title = "High-Performance Elastic Management for Cloud
Containers Based on Predictive Message Scheduling",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "87",
day = "28",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040087",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/87",
abstract = "Containerized data centers can improve the
computational density of IaaS layers. This intensive
high-concurrency environment has high requirements for
message scheduling and container processing. In the
paper, an elastically scalable strategy for cloud
containers based on predictive message scheduling is
introduced, in order to reduce the delay of messages
and improve the response time of services and the
utilization of container resources. According to the
busy degree of different containers, a management
strategy of multiple containers at message-granularity
level is developed, which gives the containers better
elasticity. The simulation results show that the
proposed strategy improves service processing
efficiency and reduces response latency compared with
existing solutions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mamais:2017:BVP,
author = "Stylianos S. Mamais and George Theodorakopoulos",
title = "Behavioural Verification: Preventing Report Fraud in
Decentralized Advert Distribution Systems",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "88",
day = "20",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040088",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/88",
abstract = "Service commissions, which are claimed by Ad-Networks
and Publishers, are susceptible to forgery as non-human
operators are able to artificially create fictitious
traffic on digital platforms for the purpose of
committing financial fraud. This places a significant
strain on Advertisers who have no effective means of
differentiating fabricated Ad-Reports from those which
correspond to real consumer activity. To address this
problem, we contribute an advert reporting system which
utilizes opportunistic networking and a
blockchain-inspired construction in order to identify
authentic Ad-Reports by determining whether they were
composed by honest or dishonest users. What constitutes
a user's honesty for our system is the manner in which
they access adverts on their mobile device. Dishonest
users submit multiple reports over a short period of
time while honest users behave as consumers who view
adverts at a balanced pace while engaging in typical
social activities such as purchasing goods online,
moving through space and interacting with other users.
We argue that it is hard for dishonest users to fake
honest behaviour and we exploit the behavioural
patterns of users in order to classify Ad-Reports as
real or fabricated. By determining the honesty of the
user who submitted a particular report, our system
offers a more secure reward-claiming model which
protects against fraud while still preserving the
user's anonymity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Wireless and
Mobile Networks.",
}
@Article{Nardini:2017:FRB,
author = "Giovanni Nardini and Giovanni Stea and Antonio
Virdis",
title = "A Fast and Reliable Broadcast Service for
{LTE}-Advanced Exploiting Multihop Device-to-Device
Transmissions",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "89",
day = "25",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040089",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/89",
abstract = "Several applications, from the Internet of Things for
smart cities to those for vehicular networks, need fast
and reliable proximity-based broadcast communications,
i.e., the ability to reach all peers in a geographical
neighborhood around the originator of a message, as
well as ubiquitous connectivity. In this paper, we
point out the inherent limitations of the LTE
(Long-Term Evolution) cellular network, which make it
difficult, if possible at all, to engineer such a
service using traditional infrastructure-based
communications. We argue, instead, that
network-controlled device-to-device (D2D)
communications, relayed in a multihop fashion, can
efficiently support this service. To substantiate the
above claim, we design a proximity-based broadcast
service which exploits multihop D2D. We discuss the
relevant issues both at the UE (User Equipment), which
has to run applications, and within the network (i.e.,
at the eNodeBs), where suitable resource allocation
schemes have to be enforced. We evaluate the
performance of a multihop D2D broadcasting using
system-level simulations, and demonstrate that it is
fast, reliable and economical from a resource
consumption standpoint.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Cellular D2D
Communications.",
}
@Article{Sadik:2017:OBA,
author = "Ahmed R. Sadik and Bodo Urban",
title = "An Ontology-Based Approach to Enable Knowledge
Representation and Reasoning in Worker-Cobot Agile
Manufacturing",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "90",
day = "24",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040090",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/90",
abstract = "There is no doubt that the rapid development in
robotics technology has dramatically changed the
interaction model between the Industrial Robot (IR) and
the worker. As the current robotic technology has
afforded very reliable means to guarantee the physical
safety of the worker during a close proximity
interaction with the IR. Therefore, new forms of
cooperation between the robot and the worker can now be
achieved. Collaborative/Cooperative robotics is the new
branch of industrial robotics which empowers the idea
of cooperative manufacturing. Cooperative manufacturing
significantly depends on the existence of a
collaborative/cooperative robot (cobot). A cobot is
usually a Light-Weight Robot (LWR) which is capable of
operating safely with the human co-worker in a shared
work environment. This is in contrast with the
conventional IR which can only operate in isolation
from the worker workspace, due to the fact that the
conventional IR can manipulate very heavy objects,
which makes it so dangerous to operate in direct
contact with the worker. There is a slight difference
between the definition of collaboration and cooperation
in robotics. In cooperative robotics, both the worker
and the robot are performing tasks over the same
product in the same shared workspace but not
simultaneously. Collaborative robotics has a similar
definition, except that the worker and the robot are
performing a simultaneous task. Gathering the worker
and the cobot in the same manufacturing workcell can
provide an easy and cheap method to flexibly customize
the production. Moreover, to adapt with the production
demands in the real time of production, without the
need to stop or to modify the production operations.
There are many challenges and problems that can be
addressed in the cooperative manufacturing field.
However, one of the most important challenges in this
field is the representation of the cooperative
manufacturing environment and components. Thus, in
order to accomplish the cooperative manufacturing
concept, a proper approach is required to describe the
shared environment between the worker and the cobot.
The cooperative manufacturing shared environment
includes the cobot, the co-worker, and other production
components such as the product itself. Furthermore, the
whole cooperative manufacturing system components need
to communicate and share their knowledge, to reason and
process the shared information, which eventually gives
the control solution the capability of obtaining
collective manufacturing decisions. Putting into
consideration that the control solution should also
provide a natural language which is human readable and
in the same time can be understood by the machine
(i.e., the cobot). Accordingly, a distributed control
solution which combines an ontology-based Multi-Agent
System (MAS) and a Business Rule Management System
(BRMS) is proposed, in order to solve the mentioned
challenges in the cooperative manufacturing, which are:
manufacturing knowledge representation, sharing, and
reasoning.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kuang:2017:HTA,
author = "Zhufang Kuang and Gongqiang Li and Junshan Tan and
Zhigang Chen",
title = "High Throughput and Acceptance Ratio Multipath Routing
Algorithm in Cognitive Wireless Mesh Network",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "91",
day = "25",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040091",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/91",
abstract = "The link failure due to the secondary users exiting
the licensed channels when primary users reoccupy the
licensed channels is very important in cognitive
wireless mesh networks (CWMNs). A multipath routing and
spectrum allocation algorithm based on channel
interference and reusability with Quality of Service
(QoS) constraints in CWMNs (MRIR) was proposed.
Maximizing the throughput and the acceptance ratio of
the wireless service is the objective of the MRIR.
First, a primary path of resource conservation with QoS
constraints was constructed, then, a resource
conservation backup path based on channel interference
and reusability with QoS constraints was constructed.
The MRIR algorithm contains the primary path routing
and spectrum allocation algorithm, and the backup path
routing and spectrum allocation algorithm. The
simulation results showed that the MRIR algorithm could
achieve the expected goals and could achieve a higher
throughput and acceptance ratio.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chiti:2017:SAR,
author = "Francesco Chiti and Romano Fantacci and Laura
Pierucci",
title = "Social-Aware Relay Selection for Cooperative Multicast
Device-to-Device Communications",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "92",
day = "04",
month = dec,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040092",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/92",
abstract = "The increasing use of social networks such as
Facebook, Twitter, and Instagram to share photos, video
streaming, and music among friends has generated a huge
increase in the amount of data traffic over wireless
networks. This social behavior has triggered new
communication paradigms such as device-to-device (D2D)
and relaying communication schemes, which are both
considered as strong drivers for the next
fifth-generation (5G) cellular systems. Recently, the
social-aware layer and its relationship to and
influence on the physical communications layer have
gained great attention as emerging focus points. We
focus here on the case of relaying communications to
pursue the multicast data dissemination to a group of
users forming a social community through a relay node,
according to the extension of the D2D mode to the case
of device-to-many devices. Moreover, in our case, the
source selects the device to act as the relay among
different users of the multicast group by taking into
account both the propagation link conditions and the
relay social-trust level with the constraint of
minimizing the end-to-end content delivery delay. An
optimization procedure is also proposed in order to
achieve the best performance. Finally, numerical
results are provided to highlight the advantages of
considering the impact of social level on the
end-to-end delivery delay in the integrated
social-physical network in comparison with the
classical relay-assisted multicast communications for
which the relay social-trust level is not considered.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Cellular D2D
Communications.",
}
@Article{Latif:2017:HWC,
author = "Siddique Latif and Junaid Qadir and Shahzad Farooq and
Muhammad Ali Imran",
title = "How {5G} Wireless (and Concomitant Technologies) Will
Revolutionize Healthcare?",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "93",
day = "11",
month = dec,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040093",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/93",
abstract = "The need to have equitable access to quality
healthcare is enshrined in the United Nations (UN)
Sustainable Development Goals (SDGs), which defines the
developmental agenda of the UN for the next 15 years.
In particular, the third SDG focuses on the need to
``ensure healthy lives and promote well-being for all
at all ages''. In this paper, we build the case that 5G
wireless technology, along with concomitant emerging
technologies (such as IoT, big data, artificial
intelligence and machine learning), will transform
global healthcare systems in the near future. Our
optimism around 5G-enabled healthcare stems from a
confluence of significant technical pushes that are
already at play: apart from the availability of
high-throughput low-latency wireless connectivity,
other significant factors include the democratization
of computing through cloud computing; the
democratization of Artificial Intelligence (AI) and
cognitive computing (e.g., IBM Watson); and the
commoditization of data through crowdsourcing and
digital exhaust. These technologies together can
finally crack a dysfunctional healthcare system that
has largely been impervious to technological
innovations. We highlight the persistent deficiencies
of the current healthcare system and then demonstrate
how the 5G-enabled healthcare revolution can fix these
deficiencies. We also highlight open technical research
challenges, and potential pitfalls, that may hinder the
development of such a 5G-enabled health revolution.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Communications and Computing for
Sustainable Development Goals.",
}
@Article{Qadir:2017:ANU,
author = "Junaid Qadir and Arjuna Sathiaseelan and Umar Bin
Farooq and Muhammad Usama and Muhammad Ali Imran and
Muhammad Shafique",
title = "Approximate Networking for Universal {Internet}
Access",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "94",
day = "11",
month = dec,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040094",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/94",
abstract = "Despite the best efforts of networking researchers and
practitioners, an ideal Internet experience is
inaccessible to an overwhelming majority of people the
world over, mainly due to the lack of cost-efficient
ways of provisioning high-performance, global Internet.
In this paper, we argue that instead of an exclusive
focus on a utopian goal of universally accessible
``ideal networking'' (in which we have a high
throughput and quality of service as well as low
latency and congestion), we should consider providing
``approximate networking'' through the adoption of
context-appropriate trade-offs. In this regard, we
propose to leverage the advances in the emerging trend
of ``approximate computing'' that rely on relaxing the
bounds of precise/exact computing to provide new
opportunities for improving the area, power, and
performance efficiency of systems by orders of
magnitude by embracing output errors in resilient
applications. Furthermore, we propose to extend the
dimensions of approximate computing towards various
knobs available at network layers. Approximate
networking can be used to provision ``Global Access to
the Internet for All'' (GAIA) in a pragmatically tiered
fashion, in which different users around the world are
provided a different context-appropriate (but still
contextually functional) Internet experience.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Communications and Computing for
Sustainable Development Goals.",
}
@Article{Mahlous:2017:SES,
author = "Ahmed Redha Mahlous",
title = "{SCMC}: An Efficient Scheme for Minimizing Energy in
{WSNs} Using a Set Cover Approach",
journal = j-FUTURE-INTERNET,
volume = "9",
number = "4",
pages = "95",
day = "13",
month = dec,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi9040095",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/9/4/95",
abstract = "Energy-efficient clustering and routing are well known
optimization problems in the study of Wireless Sensor
Network (WSN) lifetime extension. In this paper, we
propose an intelligent hybrid optimization algorithm
based on a Set Cover approach to create clusters, and
min-cost max-flow for routing (SCMC) to increase the
lifetime of WSNs. In our method we used linear
programming (LP) to model the WSN optimization problem.
This model considers minimizing the energy for all
nodes in each set cover (cluster), and then minimizing
the routing energy between the nodes and the base
station through intermediate nodes, namely cluster
heads. To evaluate the performance of our scheme,
extensive simulations were conducted with different
scenarios. The results show that the set cover approach
combined with the min-cost max-flow algorithm reduces
energy consumption and increases the network's lifetime
and throughput.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Shehni:2018:NLW,
author = "Rezvan Almas Shehni and Karim Faez and Farshad Eshghi
and Manoochehr Kelarestaghi",
title = "A New Lightweight Watchdog-Based Algorithm for
Detecting {Sybil} Nodes in Mobile {WSNs}",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "1",
pages = "1",
day = "21",
month = dec,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/1/1",
abstract = "Wide-spread deployment of Wireless Sensor Networks
(WSN) necessitates special attention to security
issues, amongst which Sybil attacks are the most
important ones. As a core to Sybil attacks, malicious
nodes try to disrupt network operations by creating
several fabricated IDs. Due to energy consumption
concerns in WSNs, devising detection algorithms which
release the sensor nodes from high computational and
communicational loads are of great importance. In this
paper, a new computationally lightweight watchdog-based
algorithm is proposed for detecting Sybil IDs in mobile
WSNs. The proposed algorithm employs watchdog nodes for
collecting detection information and a designated
watchdog node for detection information processing and
the final Sybil list generation. Benefiting from a
newly devised co-presence state diagram and adequate
detection rules, the new algorithm features low extra
communication overhead, as well as a satisfactory
compromise between two otherwise contradictory
detection measures of performance, True Detection Rate
(TDR) and False Detection Rate (FDR). Extensive
simulation results illustrate the merits of the new
algorithm compared to a couple of recent watchdog-based
Sybil detection algorithms.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Wireless and
Mobile Networks.",
}
@Article{Zhou:2018:AOR,
author = "Zhibin Zhou and Pin Liu and Qin Liu and Guojun Wang",
title = "An Anonymous Offline {RFID} Grouping-Proof Protocol",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "1",
pages = "2",
day = "01",
month = jan,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10010002",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/1/2",
abstract = "As more and more items are tagged with RFID (Radio
Frequency Identification) tags, grouping-proof
technology is widely utilized to provide a coexistence
evidence for a group of related items. Due to the
wireless channel used in RFID systems, a security risk
exists in the communication between the reader and
tags. How to ensure the tag's information security and
to generate reliable grouping-proof becomes a hot
research topic. To protect the privacy of tags, the
verification of grouping-proof is traditionally
executed by the verifier, and the reader is only used
to collect the proof data. This approach can cause the
reader to submit invalid proof data to the verifier in
the event of DoP (Deny of Proof) attack. In this paper,
an ECC-based, off-line anonymous grouping-proof
protocol (EAGP) is proposed. The protocol authorizes
the reader to examine the validity of grouping-proof
without knowing the identities of tags. From the
security and performance analysis, the EAGP can protect
the security and privacy of RFID tags, and defence
impersonation and replay attacks. Furthermore, it has
the ability to reduce the system overhead caused by the
invalid submission of grouping-proofs. As a result, the
proposed EAGP equips practical application values.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Wireless and
Mobile Networks.",
}
@Article{Hoyhtya:2018:RLA,
author = "Marko H{\"o}yhty{\"a} and Olli Apilo and Mika
Lasanen",
title = "Review of Latest Advances in {3GPP} Standardization:
{D2D} Communication in {5G} Systems and Its Energy
Consumption Models",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "1",
pages = "3",
day = "03",
month = jan,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10010003",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/1/3",
abstract = "Device-to-device (D2D) communication is an essential
part of the future fifth generation (5G) system that
can be seen as a ``network of networks,'' consisting of
multiple seamlessly-integrated radio access
technologies (RATs). Public safety communications,
autonomous driving, socially-aware networking, and
infotainment services are example use cases of D2D
technology. High data rate communications and use of
several active air interfaces in the described network
create energy consumption challenges for both base
stations and the end user devices. In this paper, we
review the status of 3rd Generation Partnership Project
(3GPP) standardization, which is the most important
standardization body for 5G systems. We define a set of
application scenarios for D2D communications in 5G
networks. We use the recent models of 3GPP long term
evolution (LTE) and WiFi interfaces in analyzing the
power consumption from both the infrastructure and user
device perspectives. The results indicate that with the
latest radio interfaces, the best option for energy
saving is the minimization of active interfaces and
sending the data with the best possible data rate.
Multiple recommendations on how to exploit the results
in future networks are given.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Cellular D2D
Communications.",
}
@Article{Pecori:2018:VLA,
author = "Riccardo Pecori",
title = "A Virtual Learning Architecture Enhanced by Fog
Computing and Big Data Streams",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "1",
pages = "4",
day = "03",
month = jan,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10010004",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/1/4",
abstract = "In recent years, virtual learning environments are
gaining more and more momentum, considering both the
technologies deployed in their support and the sheer
number of terminals directly or indirectly interacting
with them. This essentially means that every day, more
and more smart devices play an active role in this
exemplary Web of Things scenario. This digital
revolution, affecting education, appears clearly
intertwined with the earliest forecasts of the Internet
of Things, envisioning around 50 billions heterogeneous
devices and gadgets to be active by 2020, considering
also the deployment of the fog computing paradigm,
which moves part of the computational power to the edge
of the network. Moreover, these interconnected objects
are expected to produce more and more significant
streams of data, themselves generated at unprecedented
rates, sometimes to be analyzed almost in real time.
Concerning educational environments, this translates to
a new type of big data stream, which can be labeled as
educational big data streams. Here, pieces of
information coming from different sources (such as
communications between students and instructors, as
well as students' tests, etc.) require accurate
analysis and mining techniques in order to retrieve
fruitful and well-timed insights from them. This
article presents an overview of the current state of
the art of virtual learning environments and their
limitations; then, it explains the main ideas behind
the paradigms of big data streams and of fog computing,
in order to introduce an e-learning architecture
integrating both of them. Such an action aims to
enhance the ability of virtual learning environments to
be closer to the needs of all the actors in an
educational scenario, as demonstrated by a preliminary
implementation of the envisioned architecture. We
believe that the proposed big stream and fog-based
educational framework may pave the way towards a better
understanding of students' educational behaviors and
foster new research directions in the field.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Big Data and Internet of Thing.",
}
@Article{Anwar:2018:ESS,
author = "Nazia Anwar and Huifang Deng",
title = "Elastic Scheduling of Scientific Workflows under
Deadline Constraints in Cloud Computing Environments",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "1",
pages = "5",
day = "07",
month = jan,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10010005",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/10/1/5",
abstract = "Scientific workflow applications are collections of
several structured activities and fine-grained
computational tasks. Scientific workflow scheduling in
cloud computing is a challenging research topic due to
its distinctive features. In cloud environments, it has
become critical to perform efficient task scheduling
resulting in reduced scheduling overhead, minimized
cost and maximized resource utilization while still
meeting the user-specified overall deadline. This paper
proposes a strategy, Dynamic Scheduling of Bag of Tasks
based workflows (DSB), for scheduling scientific
workflows with the aim to minimize financial cost of
leasing Virtual Machines (VMs) under a user-defined
deadline constraint. The proposed model groups the
workflow into Bag of Tasks (BoTs) based on data
dependency and priority constraints and thereafter
optimizes the allocation and scheduling of BoTs on
elastic, heterogeneous and dynamically provisioned
cloud resources called VMs in order to attain the
proposed method's objectives. The proposed approach
considers pay-as-you-go Infrastructure as a Service
(IaaS) clouds having inherent features such as
elasticity, abundance, heterogeneity and VM
provisioning delays. A trace-based simulation using
benchmark scientific workflows representing real world
applications, demonstrates a significant reduction in
workflow computation cost while the workflow deadline
is met. The results validate that the proposed model
produces better success rates to meet deadlines and
cost efficiencies in comparison to adapted
state-of-the-art algorithms for similar problems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2018:IIS,
author = "Wenjuan Li and Weizhi Meng and Lam For Kwok",
title = "Investigating the Influence of Special On-Off Attacks
on Challenge-Based Collaborative Intrusion Detection
Networks",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "1",
pages = "6",
day = "08",
month = jan,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10010006",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/1/6",
abstract = "Intrusions are becoming more complicated with the
recent development of adversarial techniques. To boost
the detection accuracy of a separate intrusion
detector, the collaborative intrusion detection network
(CIDN) has thus been developed by allowing intrusion
detection system (IDS) nodes to exchange data with each
other. Insider attacks are a great threat for such
types of collaborative networks, where an attacker has
the authorized access within the network. In
literature, a challenge-based trust mechanism is
effective at identifying malicious nodes by sending
challenges. However, such mechanisms are heavily
dependent on two assumptions, which would cause CIDNs
to be vulnerable to advanced insider attacks in
practice. In this work, we investigate the influence of
advanced on-off attacks on challenge-based CIDNs, which
can respond truthfully to one IDS node but behave
maliciously to another IDS node. To evaluate the attack
performance, we have conducted two experiments under a
simulated and a real CIDN environment. The obtained
results demonstrate that our designed attack is able to
compromise the robustness of challenge-based CIDNs in
practice; that is, some malicious nodes can behave
untruthfully without a timely detection.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Wireless and
Mobile Networks.",
}
@Article{Office:2018:ARF,
author = "Future Internet Editorial Office",
title = "Acknowledgement to Reviewers of {{\booktitle{Future
Internet}}} in 2017",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "1",
pages = "7",
day = "12",
month = jan,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10010007",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/1/7",
abstract = "Remote areas with sparse population, disaster areas in
the aftermath, and refugee camps all require
communication that is not forthcoming from commercial
vendors. Numerous communication system options are
available, but with widely varying cost and efficacy.
The goal of this work is to discuss a framework in
which to consider appropriate telecommunications
technology. The framework approaches sustainable
development as a business, under the assumption that
social/technical/environmental sustainability requires
economic sustainability. The framework incorporates
well known and accepted business canvas as a roadmap.
Information and Communication Technology (ICT)
interventions are then considered in terms of their
value proposition, markets, and perhaps most important
for the realm of sustainable development, the key
partners. To illustrate how the framework applies, we
consider three case studies and then apply the
resultant principles to the consideration of these ICT
projects. The case studies are chosen for their
diversity. Furthermore, after verifying the decision
framework, recommendations are made for three ongoing
intervention projects in limited-resource settings.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Brown:2018:DFC,
author = "Suzana Brown and Alan Mickelson",
title = "A Decision Framework for Choosing Telecommunication
Technologies in Limited-Resource Settings",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "1",
pages = "8",
day = "12",
month = jan,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10010008",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/1/8",
abstract = "Remote areas with sparse population, disaster areas in
the aftermath, and refugee camps all require
communication that is not forthcoming from commercial
vendors. Numerous communication system options are
available, but with widely varying cost and efficacy.
The goal of this work is to discuss a framework in
which to consider appropriate telecommunications
technology. The framework approaches sustainable
development as a business, under the assumption that
social/technical/environmental sustainability requires
economic sustainability. The framework incorporates
well known and accepted business canvas as a roadmap.
Information and Communication Technology (ICT)
interventions are then considered in terms of their
value proposition, markets, and perhaps most important
for the realm of sustainable development, the key
partners. To illustrate how the framework applies, we
consider three case studies and then apply the
resultant principles to the consideration of these ICT
projects. The case studies are chosen for their
diversity. Furthermore, after verifying the decision
framework, recommendations are made for three ongoing
intervention projects in limited-resource settings.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Inequality in the Digital Environment
2017.",
}
@Article{Mansour:2018:VAH,
author = "Asmae Ait Mansour and Nourddine Enneya and Mohamed
Ouadou",
title = "A Velocity-Aware Handover Trigger in Two-Tier
Heterogeneous Networks",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "1",
pages = "9",
day = "15",
month = jan,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10010009",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/1/9",
abstract = "The unexpected change in user equipment (UE) velocity
is recognized as the primary explanation for poor
handover quality. In order to resolve this issue, while
limiting ping-pong (PP) events we carefully and
dynamically optimized handover parameters for each UE
unit according to its velocity and the coverage area of
the access point (AP). In order to recognize any
variations in velocity, we applied Allan variance
(AVAR) to the received signal strength (RSS) from the
serving AP. To assess our approach, it was essential to
configure a heterogeneous network context (LTE-WiFi)
and interconnect Media-Independent Handover (MIH) and
Proxy Mobile IPv6 (PMIPv6) for seamless handover.
Reproduction demonstrated that our approach does not
only result in a gain in relatively accurate velocity
but in addition reduces the number of PP and handover
failures (HOFs).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Seet:2018:RAC,
author = "Boon-Chong Seet and Syed Faraz Hasan and Peter Han-Joo
Chong",
title = "Recent Advances on Cellular {D2D} Communications",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "1",
pages = "10",
day = "17",
month = jan,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10010010",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:58 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/1/10",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in Cellular D2D
Communications.",
}
@Article{Giuli:2018:AFI,
author = "Dino Giuli",
title = "Announcing the 2018 {{\booktitle{Future Internet}}}
Travel Award for {PhD} Students",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "2",
pages = "11",
day = "28",
month = jan,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10020011",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:59 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/2/11",
abstract = "In the field of cognitive radio spectrum sensing, the
adaptive silence period management mechanism (ASPM) has
improved the problem of the low time-resource
utilization rate of the traditional silence period
management mechanism (TSPM). However, in the case of
the low signal-to-noise ratio (SNR), the ASPM algorithm
will increase the probability of missed detection for
the primary user (PU). Focusing on this problem, this
paper proposes an improved adaptive silence period
management (IA-SPM) algorithm which can adaptively
adjust the sensing parameters of the current period in
combination with the feedback information from the data
communication with the sensing results of the previous
period. The feedback information in the channel is
achieved with frequency resources rather than time
resources in order to adapt to the parameter change in
the time-varying channel. The Monte Carlo simulation
results show that the detection probability of the
IA-SPM is 10-15\% higher than that of the ASPM under
low SNR conditions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhang:2018:IAS,
author = "Jingbo Zhang and Zhenyang Sun and Shufang Zhang",
title = "The Improved Adaptive Silence Period Algorithm over
Time-Variant Channels in the Cognitive Radio System",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "2",
pages = "12",
day = "29",
month = jan,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10020012",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:59 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/2/12",
abstract = "In the field of cognitive radio spectrum sensing, the
adaptive silence period management mechanism (ASPM) has
improved the problem of the low time-resource
utilization rate of the traditional silence period
management mechanism (TSPM). However, in the case of
the low signal-to-noise ratio (SNR), the ASPM algorithm
will increase the probability of missed detection for
the primary user (PU). Focusing on this problem, this
paper proposes an improved adaptive silence period
management (IA-SPM) algorithm which can adaptively
adjust the sensing parameters of the current period in
combination with the feedback information from the data
communication with the sensing results of the previous
period. The feedback information in the channel is
achieved with frequency resources rather than time
resources in order to adapt to the parameter change in
the time-varying channel. The Monte Carlo simulation
results show that the detection probability of the
IA-SPM is 10-15\% higher than that of the ASPM under
low SNR conditions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Loreti:2018:PAB,
author = "Pierpaolo Loreti and Lorenzo Bracciale and Alberto
Caponi",
title = "Push Attack: Binding Virtual and Real Identities Using
Mobile Push Notifications",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "2",
pages = "13",
day = "31",
month = jan,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10020013",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:59 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/2/13",
abstract = "Popular mobile apps use push notifications extensively
to offer an ``always connected'' experience to their
users. Social networking apps use them as a real-time
channel to notify users about new private messages or
new social interactions (e.g., friendship request,
tagging, etc.). Despite the cryptography used to
protect these communication channels, the strict
temporal binding between the actions that trigger the
notifications and the reception of the notification
messages in the mobile device may represent a privacy
issue. In this work, we present the push notification
attack designed to bind the physical owners of mobile
devices with their virtual identities, even if
pseudonyms are used. In an online attack, an active
attacker triggers a push notification and captures the
notification packets that transit in the network. In an
offline attack, a passive attacker correlates the
social network activity of a user with the received
push notification. The push notification attack
bypasses the standard ways of protecting user privacy
based on the network layer by operating at the
application level. It requires no additional software
on the victim's mobile device.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Wireless and
Mobile Networks.",
}
@Article{Abbasi:2018:RVV,
author = "Irshad Ahmed Abbasi and Adnan Shahid Khan",
title = "A Review of Vehicle to Vehicle Communication Protocols
for {VANETs} in the Urban Environment",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "2",
pages = "14",
day = "31",
month = jan,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10020014",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:59 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/2/14",
abstract = "Vehicular Ad-hoc Networks (VANETs) have been gaining
significant attention from the research community due
to their increasing importance for building an
intelligent transportation system. The characteristics
of VANETs, such as high mobility, network partitioning,
intermittent connectivity and obstacles in city
environments, make routing a challenging task. Due to
these characteristics of VANETs, the performance of a
routing protocol is degraded. The position-based
routing is considered to be the most significant
approach in VANETs. In this paper, we present a brief
review of most significant position based unicast
routing protocols designed for vehicle to vehicle
communications in the urban environment. We provide
them with their working features for exchanging
information between vehicular nodes. We describe their
pros and cons. This study also provides a comparison of
the vehicle to vehicle communication based routing
protocols. The comparative study is based on some
significant factors such as mobility, traffic density,
forwarding techniques and method of junction selection
mechanism, and strategy used to handle a local optimum
situation. It also provides the simulation based study
of existing dynamic junction selection routing
protocols and a static junction selection routing
protocol. It provides a profound insight into the
routing techniques suggested in this area and the most
valuable solutions to advance VANETs. More importantly,
it can be used as a source of references to other
researchers in finding literature that is relevant to
routing in VANETs.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue New Perspectives in Intelligent
Transportation Systems and Mobile Communications
towards a Smart Cities Context.",
}
@Article{Pau:2018:SPC,
author = "Giovanni Pau and Tiziana Campisi and Antonino Canale
and Alessandro Severino and Mario Collotta and Giovanni
Tesoriere",
title = "Smart Pedestrian Crossing Management at Traffic Light
Junctions through a Fuzzy-Based Approach",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "2",
pages = "15",
day = "01",
month = feb,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10020015",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:59 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/2/15",
abstract = "In the last few years, numerous research efforts have
been conducted to merge the Internet of Things (IoT)
with smart city environments. The goal to make a city
``smart'' is arising as a possible solution to lessen
the issues caused by the urban population growth and
fast urbanization. Attention also has focused on the
pedestrian crossings because they are one of the most
dangerous places in the transport field. Information
and Communications Technologies (ICT) can undoubtedly
be an excellent support in developing infrastructures
that can best manage pedestrian crossing. For this
reason, this paper introduces a fuzzy logic-based
solution able to manage dynamically the traffic lights'
phases in signalized pedestrian crossings. The proposed
approach provides the possibility to change the phases
of the traffic light taking into account the time of
the day and the number of pedestrians about to cross
the road. The paper presents a thorough description of
the fuzzy logic controller configuration, an in-depth
analysis of the application scenario and simulative
assessments obtained through Vissim simulations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pathan:2018:ETB,
author = "Muhammad Salman Pathan and Nafei Zhu and Jingsha He
and Zulfiqar Ali Zardari and Muhammad Qasim Memon and
Muhammad Iftikhar Hussain",
title = "An Efficient Trust-Based Scheme for Secure and Quality
of Service Routing in {MANETs}",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "2",
pages = "16",
day = "05",
month = feb,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10020016",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:59 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/2/16",
abstract = "Due to the dynamism of topology, sharing of bandwidth
and constraint of resources in wireless nodes, the
provision of quality of service (QoS) for routing in
mobile ad hoc networks (MANETs) presents a great
challenge. Security is another crucial aspect of
providing QoS since the existence of malicious nodes
present all kinds of threats to MANETs. Although a
number of mechanisms have been proposed for protecting
MANETs, most of the solutions are only effective for a
particular kind of attacks or provide security at the
cost of sacrificing QoS. In this paper, we propose a
trust-based secure QoS routing scheme by combining
social and QoS trust. The primary approach of the
proposed scheme relies on mitigating nodes that exhibit
various packet forwarding misbehavior and on
discovering the path that ensures reliable
communication through the trust mechanism. The scheme
would select the best forwarding node based on packet
forwarding behavior as well as capability in terms of
QoS parameters, such as residual energy, channel
quality, link quality, etc. We will present an
adversary model for packet dropping attack against
which we evaluate the proposed scheme. Simulation
experiment using Network Simulator-2 (NS2) and under
various network conditions show that mixing social and
QoS trust parameters can greatly improve security and
quality of service routing in terms of overhead, packet
delivery ratio and energy consumption.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rexha:2018:ITF,
author = "Blerim Rexha and Gresa Shala and Valon Xhafa",
title = "Increasing Trustworthiness of Face Authentication in
Mobile Devices by Modeling Gesture Behavior and
Location Using Neural Networks",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "2",
pages = "17",
day = "05",
month = feb,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10020017",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:59 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/2/17",
abstract = "Personal mobile devices currently have access to a
significant portion of their user's private sensitive
data and are increasingly used for processing mobile
payments. Consequently, securing access to these mobile
devices is a requirement for securing access to the
sensitive data and potentially costly services. Face
authentication is one of the promising biometrics-based
user authentication mechanisms that has been widely
available in this era of mobile computing. With a
built-in camera capability on smartphones, tablets, and
laptops, face authentication provides an attractive
alternative of legacy passwords for its memory-less
authentication process, which is so sophisticated that
it can unlock the device faster than a fingerprint.
Nevertheless, face authentication in the context of
smartphones has proven to be vulnerable to attacks. In
most current implementations, a sufficiently
high-resolution face image displayed on another mobile
device will be enough to circumvent security measures
and bypass the authentication process. In order to
prevent such bypass attacks, gesture recognition
together with location is proposed to be additionally
modeled. Gestures provide a faster and more convenient
method of authentication compared to a complex
password. The focus of this paper is to build a secure
authentication system with face, location and gesture
recognition as components. User gestures and location
data are a sequence of time series; therefore, in this
paper we propose to use unsupervised learning in the
long short-term memory recurrent neural network to
actively learn to recognize, group and discriminate
user gestures and location. Moreover, a
clustering-based technique is also implemented for
recognizing gestures and location.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kambourakis:2018:SPW,
author = "Georgios Kambourakis and Felix Gomez Marmol and Guojun
Wang",
title = "Security and Privacy in Wireless and Mobile Networks",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "2",
pages = "18",
day = "09",
month = feb,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10020018",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:59 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/2/18",
abstract = "The present work introduces virtual fairs,
particularly the perceived benefits, challenges, and
relevance of such fairs for recruitment and employer
branding. These aspects were explored in a
semi-structured interview with an organizer of virtual
fairs across Scandinavia, and a focus group composed of
Norwegian recruiters and exhibitors. The results of the
data collection can be summarized in the form of themes
that relate to web analytics, web services and
optimization. The benefits of virtual fairs pertain to
the (a) visibility and branding; (b) costs; and (c)
analytics-based customization. Challenges of virtual
career fairs pertain to the (a) lack of online
engagement, (b) preparation and staffing costs; (c)
lack of guidelines; (d) talent access and
identification; (e) security and infrastructure; (f)
long-term planning; (g) and inter-dependencies. The
discussion summarizes the implications of branding and
recruitment and the value they add to business, also
noting how context effects may come into play. The
article concludes by exploring the possibility that
virtual fairs will complement or become the new
standard in recruitment and outlines future avenues for
research and practice.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Wireless and
Mobile Networks.",
}
@Article{Vik:2018:VCF,
author = "{\AA}dne Stenberg Vik and Bj{\o}rn Christian
N{\o}rbech and Debora Jeske",
title = "Virtual Career Fairs: Perspectives from {Norwegian}
Recruiters and Exhibitors",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "2",
pages = "19",
day = "12",
month = feb,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10020019",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:59 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/2/19",
abstract = "The present work introduces virtual fairs,
particularly the perceived benefits, challenges, and
relevance of such fairs for recruitment and employer
branding. These aspects were explored in a
semi-structured interview with an organizer of virtual
fairs across Scandinavia, and a focus group composed of
Norwegian recruiters and exhibitors. The results of the
data collection can be summarized in the form of themes
that relate to web analytics, web services and
optimization. The benefits of virtual fairs pertain to
the (a) visibility and branding; (b) costs; and (c)
analytics-based customization. Challenges of virtual
career fairs pertain to the (a) lack of online
engagement, (b) preparation and staffing costs; (c)
lack of guidelines; (d) talent access and
identification; (e) security and infrastructure; (f)
long-term planning; (g) and inter-dependencies. The
discussion summarizes the implications of branding and
recruitment and the value they add to business, also
noting how context effects may come into play. The
article concludes by exploring the possibility that
virtual fairs will complement or become the new
standard in recruitment and outlines future avenues for
research and practice.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue u- and e- Service, Science and
Technology.",
}
@Article{Gatteschi:2018:BSC,
author = "Valentina Gatteschi and Fabrizio Lamberti and Claudio
Demartini and Chiara Pranteda and V{\'\i}ctor
Santamar{\'\i}a",
title = "Blockchain and Smart Contracts for Insurance: Is the
Technology Mature Enough?",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "2",
pages = "20",
day = "20",
month = feb,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10020020",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:59 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/2/20",
abstract = "Blockchain is receiving increasing attention from
academy and industry, since it is considered a
breakthrough technology that could bring huge benefits
to many different sectors. In 2017, Gartner positioned
blockchain close to the peak of inflated expectations,
acknowledging the enthusiasm for this technology that
is now largely discussed by media. In this scenario,
the risk to adopt it in the wake of enthusiasm, without
objectively judging its actual added value is rather
high. Insurance is one the sectors that, among others,
started to carefully investigate the possibilities of
blockchain. For this specific sector, however, the hype
cycle shows that the technology is still in the
innovation trigger phase, meaning that the spectrum of
possible applications has not been fully explored yet.
Insurers, as with many other companies not necessarily
active only in the financial sector, are currently
requested to make a hard decision, that is, whether to
adopt blockchain or not, and they will only know if
they were right in 3-5 years. The objective of this
paper is to support actors involved in this decision
process by illustrating what a blockchain is, analyzing
its advantages and disadvantages, as well as discussing
several use cases taken from the insurance sector,
which could easily be extended to other domains.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{DAmico:2018:RCK,
author = "Antonella D'Amico and Domenico Guastella",
title = "Robotics Construction Kits: From {``Objects} to Think
with'' to {``Objects} to Think and to Emote with''",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "2",
pages = "21",
day = "24",
month = feb,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10020021",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:59 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/2/21",
abstract = "This paper discusses new ideas about the use of
educational robotics in social-emotional learning. In
particular, educational robotics could be a tool
intended to allow children to acquire some of the basic
aspects of human emotions and emotional functioning,
and to understand how these relate to the mind and
body. More specifically, by using robots such as the
LEGO Mindstorm construction kits-which allow users to
both construct the body of the robot and to provide it
with a behavioural repertory-children have the
opportunity to visualize (and manipulate) the
relationship between the robot's body and mind. This
allows them to simulate ``embodied emotional minds''
and to reflect on new neuroscientific concepts
regarding body-mind and cognition-emotion
relationships.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Engaging in Interaction with Robots.",
}
@Article{Oliveira:2018:LMP,
author = "Ewerton L. S. Oliveira and Davide Orr{\`u} and Luca
Morreale and Tiago P. Nascimento and Andrea Bonarini",
title = "Learning and Mining Player Motion Profiles in
Physically Interactive Robogames",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "3",
pages = "22",
day = "26",
month = feb,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10030022",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:59 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/3/22",
abstract = "Physically-Interactive RoboGames (PIRG) are an
emerging application whose aim is to develop robotic
agents able to interact and engage humans in a game
situation. In this framework, learning a model of
players' activity is relevant both to understand their
engagement, as well as to understand specific
strategies they adopted, which in turn can foster game
adaptation. Following such directions and given the
lack of quantitative methods for player modeling in
PIRG, we propose a methodology for representing players
as a mixture of existing player's types uncovered from
data. This is done by dealing both with the intrinsic
uncertainty associated with the setting and with the
agent necessity to act in real time to support the game
interaction. Our methodology first focuses on encoding
time series data generated from player-robot
interaction into images, in particular Gramian angular
field images, to represent continuous data. To these,
we apply latent Dirichlet allocation to summarize the
player's motion style as a probabilistic mixture of
different styles discovered from data. This approach
has been tested in a dataset collected from a real,
physical robot game, where activity patterns are
extracted by using a custom three-axis accelerometer
sensor module. The obtained results suggest that the
proposed system is able to provide a robust description
for the player interaction.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Engaging in Interaction with Robots.",
}
@Article{Hameed:2018:SBC,
author = "Sufian Hameed and Hassan Ahmed Khan",
title = "{SDN} Based Collaborative Scheme for Mitigation of
{DDoS} Attacks",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "3",
pages = "23",
day = "27",
month = feb,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10030023",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:59 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/3/23",
abstract = "Software Defined Networking (SDN) has proved itself to
be a backbone in the new network design and is quickly
becoming an industry standard. The idea of separation
of control plane and data plane is the key concept
behind SDN. SDN not only allows us to program and
monitor our networks but it also helps in mitigating
some key network problems. Distributed denial of
service (DDoS) attack is among them. In this paper we
propose a collaborative DDoS attack mitigation scheme
using SDN. We design a secure controller-to-controller
(C-to-C) protocol that allows SDN-controllers lying in
different autonomous systems (AS) to securely
communicate and transfer attack information with each
other. This enables efficient notification along the
path of an ongoing attack and effective filtering of
traffic near the source of attack, thus saving valuable
time and network resources. We also introduced three
different deployment approaches i.e., linear, central
and mesh in our testbed. Based on the experimental
results we demonstrate that our SDN based collaborative
scheme is fast and reliable in efficiently mitigating
DDoS attacks in real time with very small computational
footprints.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{Pilloni:2018:HDW,
author = "Virginia Pilloni",
title = "How Data Will Transform Industrial Processes:
Crowdsensing, Crowdsourcing and Big Data as Pillars of
{Industry 4.0}",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "3",
pages = "24",
day = "01",
month = mar,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10030024",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:59 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/3/24",
abstract = "We are living in the era of the fourth industrial
revolution, namely Industry 4.0. This paper presents
the main aspects related to Industry 4.0, the
technologies that will enable this revolution, and the
main application domains that will be affected by it.
The effects that the introduction of Internet of Things
(IoT), Cyber-Physical Systems (CPS), crowdsensing,
crowdsourcing, cloud computing and big data will have
on industrial processes will be discussed. The main
objectives will be represented by improvements in:
production efficiency, quality and cost-effectiveness;
workplace health and safety, as well as quality of
working conditions; products' quality and availability,
according to mass customisation requirements. The paper
will further discuss the common denominator of these
enhancements, i.e., data collection and analysis. As
data and information will be crucial for Industry 4.0,
crowdsensing and crowdsourcing will introduce new
advantages and challenges, which will make most of the
industrial processes easier with respect to traditional
technologies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Big Data and Internet of Thing.",
}
@Article{Hassan:2018:IMF,
author = "Tehseen {Ul Hassan} and Fei Gao and Babur Jalal and
Sheeraz Arif",
title = "Interference Management in Femtocells by the Adaptive
Network Sensing Power Control Technique",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "3",
pages = "25",
day = "01",
month = mar,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10030025",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:59 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/3/25",
abstract = "The overlay integration of low-power femtocells over
macrocells in a heterogeneous network (HetNet) plays an
important role in dealing with the increasing demand of
spectral efficiency, coverage and higher data rates, at
a nominal cost to network operators. However, the
downlink (DL) transmission power of an inadequately
deployed femtocell causes inter-cell interference
(ICI), which leads to severe degradation and sometimes
link failure for nearby macrocell users. In this paper,
we propose an adaptive network sensing (ANS) technique
for downlink power control to obviate the ICI. The
simulation results have shown that the ANS power
control technique successfully decreases the cell-edge
macro user's interference and enhances the throughput
performance of macro users, while also optimizing the
coverage and capacity of the femtocell. When compared
with the Femto User Equipment (FUE)-assisted and Macro
User Equipment (MUE)-assisted power control technique,
the proposed technique offers a good tradeoff in
reducing interference to macro users, while maintaining
the quality of service (QoS) requirement of the
femtocell users.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Massive MIMO Communication and
Networking Systems.",
}
@Article{Ruan:2018:TDS,
author = "Yibin Ruan and Jiazhu Dai",
title = "{TwinNet}: a Double Sub-Network Framework for
Detecting Universal Adversarial Perturbations",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "3",
pages = "26",
day = "06",
month = mar,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10030026",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:59 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/3/26",
abstract = "Deep neural network has achieved great progress on
tasks involving complex abstract concepts. However,
there exist adversarial perturbations, which are
imperceptible to humans, which can tremendously
undermine the performance of deep neural network
classifiers. Moreover, universal adversarial
perturbations can even fool classifiers on almost all
examples with just a single perturbation vector. In
this paper, we propose TwinNet, a framework for neural
network classifiers to detect such adversarial
perturbations. TwinNet makes no modification of the
protected classifier. It detects adversarially
perturbated examples by enhancing different types of
features in dedicated networks and fusing the output of
the networks later. The paper empirically shows that
our framework can identify adversarial perturbations
effectively with a slight loss in accuracy when
predicting normal examples, which outperforms
state-of-the-art works.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Suomalainen:2018:SAS,
author = "Jani Suomalainen and Kimmo Ahola and Mikko Majanen and
Olli M{\"a}mmel{\"a} and Pekka Ruuska",
title = "Security Awareness in Software-Defined Multi-Domain
{5G} Networks",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "3",
pages = "27",
day = "08",
month = mar,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10030027",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:59 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/3/27",
abstract = "Fifth generation (5G) technologies will boost the
capacity and ease the management of mobile networks.
Emerging virtualization and softwarization technologies
enable more flexible customization of network services
and facilitate cooperation between different actors.
However, solutions are needed to enable users,
operators, and service providers to gain an up-to-date
awareness of the security and trustworthiness of 5G
systems. We describe a novel framework and enablers for
security monitoring, inferencing, and trust measuring.
The framework leverages software-defined networking and
big data technologies to customize monitoring for
different applications. We present an approach for
sharing security measurements across administrative
domains. We describe scenarios where the correlation of
multi-domain information improves the accuracy of
security measures with respect to two threats: end-user
location tracking and Internet of things (IoT)
authentication storms. We explore the security
characteristics of data flows in software networks
dedicated to different applications with a mobile
network testbed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Giuli:2018:EEF,
author = "Dino Giuli",
title = "Ecosystemic Evolution {Fed} by Smart Systems",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "3",
pages = "28",
day = "10",
month = mar,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10030028",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:59 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/3/28",
abstract = "In recent years, software developers have started to
appropriate GitHub repositories to curate resources, in
order to systematically select, evaluate, and organize
existing artifacts for preservation and future use.
Curation behaviors in social media sites, such as
users' experiences to curate tweets from Twitter and
pins on Pinterest, are well documented. However,
GitHub, as a social coding platform, presents a new
context for this activity, raising questions about the
nature of curation on this task-driven online work
site. To explore and understand curation on GitHub, we
compared and contrasted curation repositories with
software repositories using activity logs and analyzed
the content of popular curation repositories. Our
results show that: (1) curation repositories have
become a favorite category of repositories in GitHub;
(2) curation repositories leverage collaborative
features and practices native to GitHub in new ways;
(3) curation repositories collect and preserve
high-quality resources for the software developers'
community. Our results suggest that curation is
becoming increasingly important to the software
developers' community, and current practices can be
better supported with tools designed specifically for
curation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Ecosystemic Evolution Feeded by Smart
Systems.",
}
@Article{Wu:2018:UHG,
author = "Yu Wu and Jessica Kropczynski and Raquel Prates and
John M. Carroll",
title = "Understanding How {GitHub} Supports Curation
Repositories",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "3",
pages = "29",
day = "10",
month = mar,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10030029",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:59 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/3/29",
abstract = "In recent years, software developers have started to
appropriate GitHub repositories to curate resources, in
order to systematically select, evaluate, and organize
existing artifacts for preservation and future use.
Curation behaviors in social media sites, such as
users' experiences to curate tweets from Twitter and
pins on Pinterest, are well documented. However,
GitHub, as a social coding platform, presents a new
context for this activity, raising questions about the
nature of curation on this task-driven online work
site. To explore and understand curation on GitHub, we
compared and contrasted curation repositories with
software repositories using activity logs and analyzed
the content of popular curation repositories. Our
results show that: (1) curation repositories have
become a favorite category of repositories in GitHub;
(2) curation repositories leverage collaborative
features and practices native to GitHub in new ways;
(3) curation repositories collect and preserve
high-quality resources for the software developers'
community. Our results suggest that curation is
becoming increasingly important to the software
developers' community, and current practices can be
better supported with tools designed specifically for
curation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sun:2018:ODD,
author = "Bo Sun and Ming Wei and Senlai Zhu",
title = "Optimal Design of Demand-Responsive Feeder Transit
Services with Passengers' Multiple Time Windows and
Satisfaction",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "3",
pages = "30",
day = "12",
month = mar,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10030030",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:59 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/3/30",
abstract = "This paper presents a mixed-integer linear programming
model for demand-responsive feeder transit services to
assign vehicles located at different depots to pick up
passengers at the demand points and transport them to
the rail station. The proposed model features
passengers' one or several preferred time windows for
boarding vehicles at the demand point and their
expected ride time. Moreover, passenger satisfaction
that was related only to expected ride time is fully
accounted for in the model. The objective is to
simultaneously minimize the operation costs of total
mileage and maximize passenger satisfaction. As the
problem is an extension of the nondeterministic
polynomial problem with integration of the vehicle
route problem, this study further develops an improved
bat algorithm to yield meta-optimal solutions for the
model in a reasonable amount of time. When this was
applied to a case study in Nanjing City, China, the
mileage and satisfaction of the proposed model were
reduced by 1.4 km and increased by 7.1\%, respectively,
compared with the traditional model. Sensitivity
analyses were also performed to investigate the impact
of the number of designed bus routes and weights of
objective functions on the model performance. Finally,
a comparison of Cplex, standard bat algorithm, and
group search optimizer is analyzed to verify the
validity of the proposed algorithm.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue New Perspectives in Intelligent
Transportation Systems and Mobile Communications
towards a Smart Cities Context.",
}
@Article{Chang:2018:SAI,
author = "Chia-Lin Chang and Michael McAleer and Yu-Chieh Wu",
title = "A Statistical Analysis of Industrial Penetration and
{Internet} Intensity in {Taiwan}",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "3",
pages = "31",
day = "16",
month = mar,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10030031",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:50:59 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/3/31",
abstract = "This paper is the first to investigate the effect of
industrial penetration (geographic concentration of
industries) and internet intensity (the proportion of
enterprises that uses the internet) for Taiwan
manufacturing firms, and analyses whether the
relationships are substitutes or complements. The
sample observations are based on a unique set of data,
namely 153,081 manufacturing plants, and covers 26
two-digit industry categories and 358 geographical
townships in Taiwan. The Heckman sample selection model
is used to accommodate sample selectivity for
unobservable data for firms that use the internet. The
empirical results from Heckman's two-stage estimation
show that: (1) a higher degree of industrial
penetration will not affect the probability that firms
will use the internet, but it will affect the total
expenditure on internet intensity; (2) for two-digit
SIC (Standard Industrial Classification) industries,
industrial penetration generally decreases the total
expenditure on internet intensity; and, (3) industrial
penetration and internet intensity are substitutes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Takasuka:2018:DSD,
author = "Hidenori Takasuka and Koichi Hirai and Kazumasa
Takami",
title = "Development of a Social {DTN} for Message
Communication between {SNS} Group Members",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "4",
pages = "32",
day = "04",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10040032",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/4/32",
abstract = "Smartphones have the ability to communicate with other
terminals through ad hoc connections. A variety of
applications have been developed to exploit this
ability. The authors have developed an Android OS
(operating system) application (called ``social DTN
manager'') that builds a DTN (delay, disruption,
disconnection tolerant networking) among members of a
social networking service (SNS) community using a
community token. The members can exchange messages over
this network. Control messages for building a DTN are
forwarded to only those nodes that use the same
community token in order to reduce flooding of message
copies. When a source node sends a communication
request to its destination node, they exchange control
messages to establish a communication route. Relay
nodes use these messages to create and hold routing
information for these nodes in their routing tables.
Thereafter, relay nodes can forward data messages based
on their routing tables. This again reduces flooding of
message copies. The social DTN manager incorporates
these functions, Facebook Graph API and Google Nearby
Connections API. The authors have installed it in
Android terminals and confirmed that a social DTN can
successfully be built using this application and that
data messages can be exchanged between terminals via
reactive routes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Safitri:2018:ICP,
author = "Cutifa Safitri and Yoshihide Yamada and Sabariah
Baharun and Shidrokh Goudarzi and Quang Ngoc Nguyen and
Keping Yu and Takuro Sato",
title = "An Intelligent Content Prefix Classification Approach
for Quality of Service Optimization in
Information-Centric Networking",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "4",
pages = "33",
day = "09",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10040033",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/4/33",
abstract = "This research proposes an intelligent classification
framework for quality of service (QoS) performance
improvement in information-centric networking (ICN).
The proposal works towards keyword classification
techniques to obtain the most valuable information via
suitable content prefixes in ICN. In this study, we
have achieved the intelligent function using Artificial
Intelligence (AI) implementation. Particularly, to find
the most suitable and promising intelligent approach
for maintaining QoS matrices, we have evaluated various
AI algorithms, including evolutionary algorithms (EA),
swarm intelligence (SI), and machine learning (ML) by
using the cost function to assess their classification
performances. With the goal of enabling a complete ICN
prefix classification solution, we also propose a
hybrid implementation to optimize classification
performances by integration of relevant AI algorithms.
This hybrid mechanism searches for a final minimum
structure to prevent the local optima from happening.
By simulation, the evaluation results show that the
proposal outperforms EA and ML in terms of network
resource utilization and response delay for QoS
performance optimization.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2018:RSC,
author = "Rongheng Li and Jian Zhang and Wenfeng Shen",
title = "Replicas Strategy and Cache Optimization of Video
Surveillance Systems Based on Cloud Storage",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "4",
pages = "34",
day = "10",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10040034",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/4/34",
abstract = "With the rapid development of video surveillance
technology, especially the popularity of cloud-based
video surveillance applications, video data begins to
grow explosively. However, in the cloud-based video
surveillance system, replicas occupy an amount of
storage space. Also, the slow response to video
playback constrains the performance of the system. In
this paper, considering the characteristics of video
data comprehensively, we propose a dynamic redundant
replicas mechanism based on security levels that can
dynamically adjust the number of replicas. Based on the
location correlation between cameras, this paper also
proposes a data cache strategy to improve the response
speed of data reading. Experiments illustrate that: (1)
our dynamic redundant replicas mechanism can save
storage space while ensuring data security; (2) the
cache mechanism can predict the playback behaviors of
the users in advance and improve the response speed of
data reading according to the location and time
correlation of the front-end cameras; and (3) in terms
of cloud-based video surveillance, our proposed
approaches significantly outperform existing methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mansour:2018:EMG,
author = "Asmae Ait Mansour and Nourddine Enneya and Mohamed
Ouadou",
title = "Enhanced Matching Game for Decoupled Uplink Downlink
Context-Aware Handover",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "4",
pages = "35",
day = "15",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10040035",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/4/35",
abstract = "In this paper, we address the problem of cell
association during a handover performed in a dense
heterogeneous network, where the preference of a mobile
user's equipment in terms of uplink traffic is not the
same as for the downlink traffic. Therefore, since
mobility is an intrinsic element of cellular networks,
designing a handover from the perspective of the uplink
and downlink is mandatory in the context of 5G cellular
networks. Based on this arena, we propose a decoupled
uplink-downlink handover scheme while making use of
femtocells in order to maximize the overall network
entity utilities and avoid overloading macrocells.
However, the fact that the handover process is
performed in a dense heterogeneous network makes the
issue NP-hard. Therefore, taking into account the need
for self-organizing solutions, we modeled the handover
process as a matching game with externalities. Thus, we
will provide an aspect of intelligence for the
execution of the handover process to mobile user's
equipment (UE). To make the proposition more efficient,
we integrate an assignment step to assist the matching
game. Hence, the base stations will be investigated and
filtered, keeping only the helpful base stations as the
players in terms of the quality of service for the
uplink and downlink. The numerical results verify the
superiority of the proposed context-aware algorithm
over traditional downlink handover and traditional
decoupled uplink and downlink handover schemes, by
improving the load balancing, increasing rates and
reducing delays.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Roffia:2018:DLD,
author = "Luca Roffia and Paolo Azzoni and Cristiano Aguzzi and
Fabio Viola and Francesco Antoniazzi and Tullio Salmon
Cinotti",
title = "Dynamic Linked Data: a {SPARQL} Event Processing
Architecture",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "4",
pages = "36",
day = "20",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10040036",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/4/36",
abstract = "This paper presents a decentralized Web-based
architecture designed to support the development of
distributed, dynamic, context-aware and interoperable
services and applications. The architecture enables the
detection and notification of changes over the Web of
Data by means of a content-based publish-subscribe
mechanism where the W3C SPARQL 1.1 Update and Query
languages are fully supported and used respectively by
publishers and subscribers. The architecture is built
on top of the W3C SPARQL 1.1 Protocol and introduces
the SPARQL 1.1 Secure Event protocol and the SPARQL 1.1
Subscribe Language as a means for conveying and
expressing subscription requests and notifications. The
reference implementation of the architecture offers to
developers a design pattern for a modular, scalable and
effective application development.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Big Data and Augmented Intelligence.",
}
@Article{Lettieri:2018:EMA,
author = "Nicola Lettieri and Antonio Altamura and Rosalba
Giugno and Alfonso Guarino and Delfina Malandrino and
Alfredo Pulvirenti and Francesco Vicidomini and Rocco
Zaccagnino",
title = "Ex Machina: Analytical platforms, Law and the
Challenges of Computational Legal Science",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "5",
pages = "37",
day = "26",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10050037",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/5/37",
abstract = "Over the years, computation has become a fundamental
part of the scientific practice in several research
fields that goes far beyond the boundaries of natural
sciences. Data mining, machine learning, simulations
and other computational methods lie today at the hearth
of the scientific endeavour in a growing number of
social research areas from anthropology to economics.
In this scenario, an increasingly important role is
played by analytical platforms: integrated environments
allowing researchers to experiment cutting-edge
data-driven and computation-intensive analyses. The
paper discusses the appearance of such tools in the
emerging field of computational legal science. After a
general introduction to the impact of computational
methods on both natural and social sciences, we
describe the concept and the features of an analytical
platform exploring innovative cross-methodological
approaches to the academic and investigative study of
crime. Stemming from an ongoing project involving
researchers from law, computer science and
bioinformatics, the initiative is presented and
discussed as an opportunity to raise a debate about the
future of legal scholarship and, inside of it, about
the challenges of computational legal science.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computation, Law and the Net-The Future
of Law in the Computational Social Science Era.",
}
@Article{He:2018:MBF,
author = "Jingsha He and Jianan Wu and Nafei Zhu and Muhammad
Salman Pathan",
title = "{MinHash}-Based Fuzzy Keyword Search of Encrypted Data
across Multiple Cloud Servers",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "5",
pages = "38",
day = "01",
month = may,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10050038",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/hash.bib",
URL = "https://www.mdpi.com/1999-5903/10/5/38",
abstract = "To enhance the efficiency of data searching, most data
owners store their data files in different cloud
servers in the form of cipher-text. Thus, efficient
search using fuzzy keywords becomes a critical issue in
such a cloud computing environment. This paper proposes
a method that aims at improving the efficiency of
cipher-text retrieval and lowering storage overhead for
fuzzy keyword search. In contrast to traditional
approaches, the proposed method can reduce the
complexity of Min-Hash-based fuzzy keyword search by
using Min-Hash fingerprints to avoid the need to
construct the fuzzy keyword set. The method will
utilize Jaccard similarity to rank the results of
retrieval, thus reducing the amount of calculation for
similarity and saving a lot of time and space overhead.
The method will also take consideration of multiple
user queries through re-encryption technology and
update user permissions dynamically. Security analysis
demonstrates that the method can provide better privacy
preservation and experimental results show that
efficiency of cipher-text using the proposed method can
improve the retrieval time and lower storage overhead
as well.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mousavi:2018:FCM,
author = "Seyed Davoud Mousavi and Rasool Sadeghi and
Mohamadreza Karimi and Erfan Karimian and Mohammad Reza
Soltan Aghaei",
title = "A Fair Cooperative {MAC} Protocol in {IEEE 802.11}
{WLAN}",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "5",
pages = "39",
day = "03",
month = may,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10050039",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/5/39",
abstract = "Cooperative communication techniques have recently
enabled wireless technologies to overcome their
challenges. The main objective of these techniques is
to improve resource allocation. In this paper, we
propose a new protocol in medium access control (MAC)
of the IEEE 802.11 standard. In our new protocol, which
is called Fair Cooperative MAC (FC-MAC), every relay
node participates in cooperation proportionally to its
provided cooperation gain. This technique improves
network resource allocation by exploiting the potential
capacity of all relay candidates. Simulation results
demonstrate that the FC-MAC protocol presents better
performance in terms of throughput, fairness, and
network lifetime.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2018:ECS,
author = "Baocheng Wang and Yafei Hu and Yu Xiao and Yi Li",
title = "An {EV} Charging Scheduling Mechanism Based on Price
Negotiation",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "5",
pages = "40",
day = "03",
month = may,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10050040",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/5/40",
abstract = "Scheduling EV user's charging behavior based on
charging price and applying renewable energy resources
are the effective methods to release the load pressure
of power grids brought about by the large-scale
popularity of electric vehicles (EVs). This paper
presents a novel approach for EV charging scheduling
based on price negotiation. Firstly, the EV charging
system framework based on price negotiation and
renewable energy resources is discussed. Secondly, the
price negotiation model is presented, including the
initial price models and the conditions of
transactions. Finally, an EV charging scheduling
mechanism based on price negotiation (CSM-PN),
including the price adjustment strategies of both the
operator and EV users is proposed to seek a final
transaction during multi-round price negotiation.
Simulation results show that this novel approach can
effectively improve the charging station operator's
income, reduce the EV users' costs, and balance the
load of the power grid while improving the efficiency
of the EV charging system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yashima:2018:RAC,
author = "Tamotsu Yashima and Kazumasa Takami",
title = "Route Availability as a Communication Quality Metric
of a Mobile Ad Hoc Network",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "5",
pages = "41",
day = "04",
month = may,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10050041",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/5/41",
abstract = "Using ad hoc communication between mobile terminals,
MANETs (mobile ad hoc networks) are independent of any
communication infrastructure but their communication
quality can degrade because, as terminals move about in
the service area, routes are constantly disconnected
and then re-established. There has been no proposal for
a quality metric that models this unstable state, i.e.,
route nonuniformity. This paper proposes a new concept
of route availability (RA) as a metric of route
nonuniformity in a MANET and verifies how effectively
it represents the quality of service (QoS) of a network
or the quality of experience (QoE) of video streaming.
We have built an environment that emulates a MANET
capable of video streaming, and developed a method of
measuring RA for two representative MANET routing
methods: AODV (Ad hoc On-Demand Distance Vector) and
OLSR (Optimized Link State Routing). We have examined
the relationship between RA and conventional network
QoS metrics: packet loss rate and throughput. We have
also checked RA using a subjective quality assessment
test.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Guerrero-Narvaez:2018:TBS,
author = "Santiago Guerrero-Narv{\'a}ez and Miguel-{\'A}ngel
Ni{\~n}o-Zambrano and Dalila-Jhoana Riobamba-Calvache
and Gustavo-Adolfo Ram{\'\i}rez-Gonz{\'a}lez",
title = "Test Bed of Semantic Interaction of Smart Objects in
the {Web} of Things",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "5",
pages = "42",
day = "09",
month = may,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10050042",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/5/42",
abstract = "Semantic interaction in the Internet of Things (IoT)
is an important concept within current IoT development,
given that smart things require further autonomy with
greater processing, storage, and communication
capacities. The problem is now becoming one of how to
get these things to interact and collaborate with each
other; to form intelligent environments amongst
themselves and thus generate better services for users.
This article explores a solution approach that consists
in providing collaborative behavior to smart things,
through the incorporation of an ontology and an
architecture. It makes possible things that can
communicate and collaborate with each other, allowing
the generation of new services of interaction according
to user needs. For this task, a real test bed of smart
things was created, in which the proposed solution was
deployed (Smart Room). Finally, it was concluded that
the creation of these types of test bed is feasible,
taking into account that response times and the
information delivered by the different managed
processes are acceptable. New challenges were
encountered, however, such as problems of critical
region in test beds with conflicting services and
management of multiple users.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Big Data and Internet of Thing.",
}
@Article{Hoang:2018:BDB,
author = "Xuan Dau Hoang and Quynh Chi Nguyen",
title = "Botnet Detection Based On Machine Learning Techniques
Using {DNS} Query Data",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "5",
pages = "43",
day = "18",
month = may,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10050043",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/5/43",
abstract = "In recent years, botnets have become one of the major
threats to information security because they have been
constantly evolving in both size and sophistication. A
number of botnet detection measures, such as
honeynet-based and Intrusion Detection System
(IDS)-based, have been proposed. However, IDS-based
solutions that use signatures seem to be ineffective
because recent botnets are equipped with sophisticated
code update and evasion techniques. A number of studies
have shown that abnormal botnet detection methods are
more effective than signature-based methods because
anomaly-based botnet detection methods do not require
pre-built botnet signatures and hence they have the
capability to detect new or unknown botnets. In this
direction, this paper proposes a botnet detection model
based on machine learning using Domain Name Service
query data and evaluates its effectiveness using
popular machine learning techniques. Experimental
results show that machine learning algorithms can be
used effectively in botnet detection and the random
forest algorithm produces the best overall detection
accuracy of over 90\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Big Data and Augmented Intelligence.",
}
@Article{Zhou:2018:SST,
author = "Liang Zhou and Sheng-Ming Jiang and Chen-Lin Xiong",
title = "Studying Semi-{TCP} and Its Application in Marine
{Internet}",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "6",
pages = "44",
day = "25",
month = may,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10060044",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/6/44",
abstract = "TCP protocol has good performance on the Internet, but
its performance is significantly reduced when it is
applied to Marine Internet (MI). How to improve the
performance of TCP protocol in Marine Internet has
become an important research topic. In this paper, an
improved Semi-TCP is adopted for Marine Internet, and
the implementation scheme of Semi-TCP congestion
control is introduced. The exposed terminal problem and
congestion control problem of high load networks are
analyzed in detail. By using a timer, the congestion
control algorithm is improved. Performance analysis and
comparison of TCP-Lite, Semi-TCP-RTS, and improved
Semi-TCP (Semi-TCP-RTS-V2) are carried out on Exata
simulation platform, and the experimental results show
that Semi-TCP-RTS-V2 has better transmission
performance in ship ad hoc networks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue WSN and IoT in Smart Agriculture.",
}
@Article{Han:2018:MAP,
author = "Chong Han and Zilong Li and Jian Zhou and Lijuan Sun
and Siyu Chen",
title = "A Multiple Access Protocol Based on Gray Forecast for
Satellite Network",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "6",
pages = "45",
day = "01",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10060045",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/6/45",
abstract = "A satellite network's multiple access protocol must be
well designed to efficiently occupy channel resources
and meet various qualities of service requirements. In
this paper, a combined free/demand assignment multiple
access protocol based on gray forecast is proposed. In
terms of access, the adoption of the gray forecast
method allows the user to book the number of timeslots
to have more than the existing number of burst of
packets. In terms of bandwidth allocation, a user
priority allocation method is used to prioritize users
with high needs and focus on the allocation of
satellite resources. Experimental results show that the
proposed protocol can effectively improve the channel
utilization of the entire system. Thus, this protocol
has some advantages over existing protocols in network
throughput and end-to-end delay.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gunleifsen:2018:TCP,
author = "H{\aa}kon Gunleifsen and Vasileios Gkioulos and Thomas
Kemmerich",
title = "A Tiered Control Plane Model for Service Function
Chaining Isolation",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "6",
pages = "46",
day = "04",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10060046",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/10/6/46",
abstract = "This article presents an architecture for encryption
automation in interconnected Network Function
Virtualization (NFV) domains. Current NFV
implementations are designed for deployment within
trusted domains, where overlay networks with static
trusted links are utilized for enabling network
security. Nevertheless, within a Service Function Chain
(SFC), Virtual Network Function (VNF) flows cannot be
isolated and end-to-end encrypted because each VNF
requires direct access to the overall SFC data-flow.
This restricts both end-users and Service Providers
from enabling end-to-end security, and in extended VNF
isolation within the SFC data traffic. Encrypting data
flows on a per-flow basis results in an extensive
amount of secure tunnels, which cannot scale
efficiently in manual configurations. Additionally,
creating secure data plane tunnels between NFV
providers requires secure exchange of key parameters,
and the establishment of an east--west control plane
protocol. In this article, we present an architecture
focusing on these two problems, investigating how
overlay networks can be created, isolated, and secured
dynamically. Accordingly, we propose an architecture
for automated establishment of encrypted tunnels in
NFV, which introduces a novel, tiered east--west
communication channel between network controllers in a
multi-domain environment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Software Defined Networking (SDN) and
Network Function Virtualization (NFV).",
}
@Article{Lee:2018:SIF,
author = "Il-Gu Lee",
title = "Secure Inter-Frame Space Communications for Wireless
{LANs}",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "6",
pages = "47",
day = "04",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10060047",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/6/47",
abstract = "The internet of things (IoTs) offers a wide range of
consumer benefits, from personal portable devices to
internet-connected infrastructure. The wireless local
area network (WLAN) is one of the potential candidates
for IoTs technology to connect billions of smart
devices. Long-range WLAN is widely deployed in dense
networks as an alternative to cellular networks or
satellite internet access because of its low cost, high
performance, and existing ecosystem. However, due to
the nature of unregulated communications in industrial,
scientific, and medical (ISM) bands, WLANs experience
interferences from other radios such as radars and
frequency hopping devices. Once interference is
detected at a WLAN device, the channel is avoided and
other channels become crowded. Thus, it degrades
network throughput and channel utilization. In this
paper, a secure inter-frame space communication system
design is proposed for WLANs to share the ISM bands
with other radio systems that generate periodic radio
signals. The proposed secure inter-frame communication
scheme achieves the goal by designing accurate radar
detection and secure inter-frame space communication.
The simulation results demonstrate that the proposed
scheme significantly increases the receiver sensitivity
and user datagram protocol throughput.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Francesconi:2018:FLP,
author = "Enrico Francesconi",
title = "On the Future of Legal Publishing Services in the
{Semantic Web}",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "6",
pages = "48",
day = "05",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10060048",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/6/48",
abstract = "The development of the Semantic Web represents an
essential precondition to the definition of new
scenarios for the future Internet. This perspective is
of particular interest in the legal information domain
for the specialized nature of legal information and the
peculiarities of the legal users' information needs. In
this paper, the evolution in recent years of the
Semantic Web in the legal domain is reviewed, with
particular emphasis to the most recent developments
related to Linked Open Data initiative and to the role,
in the legal Semantic Web, of the Publications Office
of the European Union in its two-fold role of public
institution and legal publisher.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computation, Law and the Net-The Future
of Law in the Computational Social Science Era.",
}
@Article{Yang:2018:CPG,
author = "Hongbin Yang and Shuxiong Jiang and Wenfeng Shen and
Zhou Lei",
title = "Certificateless Provable Group Shared Data Possession
with Comprehensive Privacy Preservation for Cloud
Storage",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "6",
pages = "49",
day = "07",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10060049",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/6/49",
abstract = "Provable Data Possession (PDP) protocol makes it
possible for cloud users to check whether the cloud
servers possess their original data without downloading
all the data. However, most of the existing PDP schemes
are based on either public key infrastructure (PKI) or
identity-based cryptography, which will suffer from
issues of expensive certificate management or key
escrow. In this paper, we propose a new construction of
certificateless provable group shared data possession
(CL-PGSDP) protocol by making use of certificateless
cryptography, which will eliminate the above issues.
Meanwhile, by taking advantage of zero-knowledge
protocol and randomization method, the proposed
CL-PGSDP protocol leaks no information of the stored
data and the group user's identity to the verifiers
during the verifying process, which is of the property
of comprehensive privacy preservation. In addition, our
protocol also supports efficient user revocation from
the group. Security analysis and experimental
evaluation indicate that our CL-PGSDP protocol provides
strong security with desirable efficiency.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Big Data and Internet of Thing.",
}
@Article{Duradoni:2018:FTV,
author = "Mirko Duradoni and Mario Paolucci and Franco Bagnoli
and Andrea Guazzini",
title = "Fairness and Trust in Virtual Environments: The
Effects of Reputation",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "6",
pages = "50",
day = "09",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10060050",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/6/50",
abstract = "Reputation supports pro-social behaviors in a variety
of social settings and across different ages. When
re-encounters are possible, developing a positive
reputation can be a valuable asset that will result in
better outcomes. However, in real life, cooperative
acts are ambiguous and happen in noisy environments in
which individuals can have multiple goals, visibility
is reduced, and reputation systems may differ. This
study examined how reputation within a virtual
environment affects fairness in material allocations
and trust in information exchange, in a three-actors
interaction game in which each player had an incentive
to deceive the others. We compared the results of two
experimental conditions, one in which informers could
be evaluated, and one without reputational
opportunities. A reputational system appeared to
enhance both trust and fairness even within a virtual
environment under anonymous condition. We tested
adolescents and adults finding that they were
consistently more generous when visibility was
increased, but they showed significantly different
patterns in resources allocation and information
exchange. Male and female participants, across ages,
showed other interesting differences. These findings
suggest that reputational effects increase fairness and
trust even in a noisy, ambiguous and uncertain
environment, but this effect is modulated by age and
gender.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Yu:2018:DBP,
author = "Lingli Yu and Decheng Kong and Xiaoxin Yan",
title = "A Driving Behavior Planning and Trajectory Generation
Method for Autonomous Electric Bus",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "6",
pages = "51",
day = "10",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10060051",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/6/51",
abstract = "A framework of path planning for autonomous electric
bus is presented. ArcGIS platform is utilized for
map-building and global path planning. Firstly, a
high-precision map is built based on GPS in ArcGIS for
global planning. Then the global optimal path is
obtained by network analysis tool in ArcGIS. To
facilitate local planning, WGS-84 coordinates in the
map are converted to local coordinates. Secondly, a
double-layer finite state machine (FSM) is devised to
plan driving behavior under different driving
scenarios, such as structured driving, lane changing,
turning, and so on. Besides, local optimal trajectory
is generated by cubic polynomial, which takes full
account of the safety and kinetics of the electric bus.
Finally, the simulation results show that the framework
is reliable and feasible for driving behavior planning
and trajectory generation. Furthermore, its validity is
proven with an autonomous bus platform 12 m in
length.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Xie:2018:NSA,
author = "Lei Xie and Shengbo Chen and Wenfeng Shen and Huaikou
Miao",
title = "A Novel Self-Adaptive {VM} Consolidation Strategy
Using Dynamic Multi-Thresholds in {IaaS} Clouds",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "6",
pages = "52",
day = "13",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10060052",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/10/6/52",
abstract = "With the rapid development of cloud computing, the
demand for infrastructure resources in cloud data
centers has further increased, which has already led to
enormous amounts of energy costs. Virtual machine (VM)
consolidation as one of the important techniques in
Infrastructure as a Service clouds (IaaS) can help
resolve energy consumption by reducing the number of
active physical machines (PMs). However, the necessity
of considering energy-efficiency and the obligation of
providing high quality of service (QoS) to customers is
a trade-off, as aggressive consolidation may lead to
performance degradation. Moreover, most of the existing
works of threshold-based VM consolidation strategy are
mainly focused on single CPU utilization, although the
resource request on different VMs are very diverse.
This paper proposes a novel self-adaptive VM
consolidation strategy based on dynamic
multi-thresholds (DMT) for PM selection, which can be
dynamically adjusted by considering future utilization
on multi-dimensional resources of CPU, RAM and
Bandwidth. Besides, the VM selection and placement
algorithm of VM consolidation are also improved by
utilizing each multi-dimensional parameter in DMT. The
experiments show that our proposed strategy has a
better performance than other strategies, not only in
high QoS but also in less energy consumption. In
addition, the advantage of its reduction on the number
of active hosts is much more obvious, especially when
it is under extreme workloads.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dai:2018:PPF,
author = "Jiazhu Dai and Keke Qiao",
title = "A Privacy Preserving Framework for Worker's Location
in Spatial Crowdsourcing Based on Local Differential
Privacy",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "6",
pages = "53",
day = "14",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10060053",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/6/53",
abstract = "With the development of the mobile Internet,
location-based services are playing an important role
in everyday life. As a new location-based service,
Spatial Crowdsourcing (SC) involves collecting and
analyzing environmental, social, and other
spatiotemporal information of individuals, increasing
convenience for users. In SC, users (called requesters)
publish tasks and other users (called workers) are
required to physically travel to specified locations to
perform the tasks. However, with SC services, the
workers have to disclose their locations to untrusted
third parties, such as the Spatial Crowdsourcing Server
(SC-server), which could pose a considerable threat to
the privacy of workers. In this paper, we propose a new
location privacy protection framework based on local
difference privacy for spatial crowdsourcing, which
does not require the participation of trusted third
parties by adding noises locally to workers' locations.
The noisy locations of workers are submitted to the
SC-server rather than the real locations. Therefore,
the protection of workers' locations is achieved.
Experiments showed that this framework not only
preserves the privacy of workers in SC, but also has
modest overhead performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wu:2018:SMI,
author = "Pin Wu and Yang Yang and Xiaoqiang Li",
title = "{StegNet}: Mega Image Steganography Capacity with Deep
Convolutional Network",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "6",
pages = "54",
day = "15",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10060054",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/6/54",
abstract = "Traditional image steganography often leans interests
towards safely embedding hidden information into cover
images with payload capacity almost neglected. This
paper combines recent deep convolutional neural network
methods with image-into-image steganography. It
successfully hides the same size images with a decoding
rate of 98.2\% or bpp (bits per pixel) of 23.57 by
changing only 0.76\% of the cover image on average. Our
method directly learns end-to-end mappings between the
cover image and the embedded image and between the
hidden image and the decoded image. We further show
that our embedded image, while with mega payload
capacity, is still robust to statistical analysis.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Guazzini:2018:SCC,
author = "Andrea Guazzini and Mirko Duradoni and Alessandro
Lazzeri and Giorgio Gronchi",
title = "Simulating the Cost of Cooperation: a Recipe for
Collaborative Problem-Solving",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "6",
pages = "55",
day = "19",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10060055",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:00 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/6/55",
abstract = "Collective problem-solving and decision-making, along
with other forms of collaboration online, are central
phenomena within ICT. There had been several attempts
to create a system able to go beyond the passive
accumulation of data. However, those systems often
neglect important variables such as group size, the
difficulty of the tasks, the tendency to cooperate, and
the presence of selfish individuals (free riders).
Given the complex relations among those variables,
numerical simulations could be the ideal tool to
explore such relationships. We take into account the
cost of cooperation in collaborative problem solving by
employing several simulated scenarios. The role of two
parameters was explored: the capacity, the group's
capability to solve increasingly challenging tasks
coupled with the collective knowledge of a group, and
the payoff, an individual's own benefit in terms of new
knowledge acquired. The final cooperation rate is only
affected by the cost of cooperation in the case of
simple tasks and small communities. In contrast, the
fitness of the community, the difficulty of the task,
and the groups sizes interact in a non-trivial way,
hence shedding some light on how to improve
crowdsourcing when the cost of cooperation is high.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Sultan:2018:BDP,
author = "Kashif Sultan and Hazrat Ali and Zhongshan Zhang",
title = "Big Data Perspective and Challenges in Next Generation
Networks",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "7",
pages = "56",
day = "21",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10070056",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/7/56",
abstract = "With the development towards the next generation
cellular networks, i.e., 5G, the focus has shifted
towards meeting the higher data rate requirements,
potential of micro cells and millimeter wave spectrum.
The goals for next generation networks are very high
data rates, low latency and handling of big data. The
achievement of these goals definitely require newer
architecture designs, upgraded technologies with
possible backward support, better security algorithms
and intelligent decision making capability. In this
survey, we identify the opportunities which can be
provided by 5G networks and discuss the underlying
challenges towards implementation and realization of
the goals of 5G. This survey also provides a discussion
on the recent developments made towards
standardization, the architectures which may be
potential candidates for deployment and the energy
concerns in 5G networks. Finally, the paper presents a
big data perspective and the potential of machine
learning for optimization and decision making in 5G
networks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Big Data and Augmented Intelligence.",
}
@Article{Velusamy:2018:DCA,
author = "Gandhimathi Velusamy and Ricardo Lent",
title = "Dynamic Cost-Aware Routing of {Web} Requests",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "7",
pages = "57",
day = "21",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10070057",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/7/57",
abstract = "Work within next generation networks considers
additional network convergence possibilities and the
integration of new services to the web. This trend
responds to the ongoing growth of end-user demand for
services that can be delivered anytime, anywhere, on
any web-capable device, and of traffic generated by new
applications, e.g., the Internet of Things. To support
the massive traffic generated by the enormous user base
and number of devices with reliability and high
quality, web services run from redundant servers. As
new servers need to be regularly deployed at different
geographical locations, energy costs have become a
source of major concern for operators. We propose a
cost aware method for routing web requests across
replicated and distributed servers that can exploit the
spatial and temporal variations of both electricity
prices and the server network. The method relies on a
learning automaton that makes per-request decisions,
which can be computed much faster than regular global
optimization methods. Using simulation and testbed
measurements, we show the cost reductions that are
achievable with minimal impact on performance compared
to standard web routing algorithms.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dechouniotis:2018:FMC,
author = "Dimitrios Dechouniotis and Ioannis Dimolitsas and
Konstantinos Papadakis-Vlachopapadopoulos and Symeon
Papavassiliou",
title = "Fuzzy Multi-Criteria Based Trust Management in
Heterogeneous Federated Future {Internet} Testbeds",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "7",
pages = "58",
day = "25",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10070058",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/7/58",
abstract = "A federation of heterogeneous testbeds, which provides
a wide range of services, attracts many experimenters
from academia and industry to evaluate novel future
Internet architectures and network protocols. The
candidate experimenter reserves the appropriate
testbeds' resources based on various diverse criteria.
Since several testbeds offer similar resources, a trust
mechanism between the users and the providers will
facilitate the proper selection of testbeds. This paper
proposes a fuzzy reputation-based trust framework that
is based on a modification of the fuzzy VIKOR
multi-criteria decision making method and combines the
user's opinion from previously-conducted experiments
with retrieved monitoring data from the utilized
testbeds, in order to quantify the reputation of each
testbed and the credibility of the experimenter. The
proposed framework can process various types of numeric
and linguistic data in an on-line fashion and can be
easily extended for new types of testbeds and services.
Data from active federated testbeds are used to
evaluate the performance of the fuzzy reputation-based
trust framework under dynamic conditions. Furthermore,
a comparison of the proposed framework with another
existing state of the art trust framework for federated
testbeds is presented, and its superiority is
demonstrated.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Diniz:2018:CRC,
author = "J{\'u}lio C{\'e}sar Medeiros Diniz and Francesco {Da
Ros} and Darko Zibar",
title = "Clock Recovery Challenges in {DSP}-Based Coherent
Single-Mode and Multi-Mode Optical Systems",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "7",
pages = "59",
day = "26",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10070059",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/7/59",
abstract = "We present an analysis of clock recovery algorithms in
both polarization division multiplexing systems and
mode division multiplexing systems. The impact of
inter-polarization time skew and polarization mode
dispersion in single-mode fibers, as well as the
combined impact of mode mixing and mode group delay
spread in multi-mode fibers under different coupling
regimes are investigated. Results show that although
the clock tone vanishing has a known solution for
single-mode systems, in multi-mode systems even for low
group delay spread, strong coupling will cause clock
tone extinction, making it harder to implement an
effective clock recovery scheme.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in DSP-Based Optical
Communications.",
}
@Article{Quan:2018:NTL,
author = "Li Quan and Zhiliang Wang and Fuji Ren",
title = "A Novel Two-Layered Reinforcement Learning for Task
Offloading with Tradeoff between Physical Machine
Utilization Rate and Delay",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "7",
pages = "60",
day = "01",
month = jul,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10070060",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/7/60",
abstract = "Mobile devices could augment their ability via cloud
resources in mobile cloud computing environments. This
paper developed a novel two-layered reinforcement
learning (TLRL) algorithm to consider task offloading
for resource-constrained mobile devices. As opposed to
existing literature, the utilization rate of the
physical machine and the delay for offloaded tasks are
taken into account simultaneously by introducing a
weighted reward. The high dimensionality of the state
space and action space might affect the speed of
convergence. Therefore, a novel reinforcement learning
algorithm with a two-layered structure is presented to
address this problem. First, k clusters of the physical
machines are generated based on the k-nearest neighbors
algorithm (k-NN). The first layer of TLRL is
implemented by a deep reinforcement learning to
determine the cluster to be assigned for the offloaded
tasks. On this basis, the second layer intends to
further specify a physical machine for task execution.
Finally, simulation examples are carried out to verify
that the proposed TLRL algorithm is able to speed up
the optimal policy learning and can deal with the
tradeoff between physical machine utilization rate and
delay.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sun:2018:PCD,
author = "Bo Sun and Ming Wei and Chunfeng Yang and Zhihuo Xu
and Han Wang",
title = "Personalised and Coordinated Demand-Responsive Feeder
Transit Service Design: a Genetic Algorithms Approach",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "7",
pages = "61",
day = "01",
month = jul,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10070061",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/7/61",
abstract = "The purpose of this work is to create an efficient
optimization framework for demand-responsive feeder
transit services to assign vehicles to cover all pickup
locations to transport passengers to a rail station.
The proposed methodology features passengers placing a
personalized travel order involving the subway schedule
chosen by passengers and windows of service time, etc.
Moreover, synchronous transfer between the shuttle and
feeder bus is fully accounted for in the problem. A
mixed-integer linear programming model is formulated to
minimize the total travel time for all passengers,
which consists of ride-time for vehicles from the
pickup locations to the rail station and wait-time for
passengers taking the subway beforehand. Different from
conventional methods, the proposed model benefits from
using a real distribution of passenger demand
aggregated from cellular data and travel time or the
distance matrix obtained from an open GIS tool. A
distributed genetic algorithm is further designed to
obtain meta-optimal solutions in a reasonable amount of
time. When applied to design a feeder bus system in
Nanjing City, China, case study results reveal that the
total travel time of the proposed model was reduced by
2.46\% compared to the traditional model. Sensitivity
analyses were also further performed to investigate the
impact of the number of vehicles on the output.
Finally, the difference in results of Cplex, standard
GA, and the proposed algorithm were compared to prove
the validity of the algorithm.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vestoso:2018:GBP,
author = "Margherita Vestoso",
title = "The {GDPR} beyond Privacy: Data-Driven Challenges for
Social Scientists, Legislators and Policy-Makers",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "7",
pages = "62",
day = "06",
month = jul,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10070062",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/7/62",
abstract = "While securing personal data from privacy violations,
the new General Data Protection Regulation (GDPR)
explicitly challenges policymakers to exploit evidence
from social data-mining in order to build better
policies. Against this backdrop, two issues become
relevant: the impact of Big Data on social research,
and the potential intersection between social data
mining, rulemaking and policy modelling. The work aims
at contributing to the reflection on some of the
implications of the \‘knowledge-based' policy
recommended by the GDPR. The paper is thus split into
two parts: the first describes the data-driven
evolution of social sciences, raising methodological
and epistemological issues; the second focuses on the
interplay between data-driven social research,
rule-making and policy modelling, in the light of the
policy model fostered by GDPR. Some theoretical
reflections about the role of evidence in rule-making
will be considered to introduce a discussion on the
intersection between data-driven social research and
policy modelling and to sketch hypotheses on its future
evolutions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computation, Law and the Net-The Future
of Law in the Computational Social Science Era.",
}
@Article{Karembai:2018:TPI,
author = "Anil Kumar Karembai and Jeffrey Thompson and Patrick
Seeling",
title = "Towards Prediction of Immersive Virtual Reality Image
Quality of Experience and Quality of Service",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "7",
pages = "63",
day = "07",
month = jul,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10070063",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/7/63",
abstract = "In this article, we evaluate the Quality of Service
(QoS) through media impairment levels and device
operators' subjective Quality of Experience (QoE). The
human-centered QoE determination commonly requires
human subject experimentation, which we combine with
Electroencephalography (EEG) measurements to move
towards automatized and generalized possibilities of
determining the QoE. We evaluate the prediction
performance for spherical/immersive images displayed
with a mobile device VR viewer (Spherical Virtual
Reality (SVR)) with the help of only four-position EEG
data gathered at the forehead, which correlates well
with practical applicability. We find that QoS levels
can be predicted more reliably (directly with R2=0.68
or based on profiles with R2=0.9) than the QoE, which
exhibits significant error levels. Additional
comparison with previous approaches for the Spherical
Augmented Reality (SAR) QoE indicates better
predictability in AR scenarios over VR.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sun:2018:DTS,
author = "Dong Sun and Kaixin Zhao and Yaming Fang and Jie Cui",
title = "Dynamic Traffic Scheduling and Congestion Control
across Data Centers Based on {SDN}",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "7",
pages = "64",
day = "09",
month = jul,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10070064",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/7/64",
abstract = "Software-defined Networking (SDN) and Data Center
Network (DCN) are receiving considerable attention and
eliciting widespread interest from both academia and
industry. When the traditionally shortest path routing
protocol among multiple data centers is used,
congestion will frequently occur in the shortest path
link, which may severely reduce the quality of network
services due to long delay and low throughput. The
flexibility and agility of SDN can effectively
ameliorate the aforementioned problem. However, the
utilization of link resources across data centers is
still insufficient, and has not yet been well
addressed. In this paper, we focused on this issue and
proposed an intelligent approach of real-time
processing and dynamic scheduling that could make full
use of the network resources. The traffic among the
data centers could be classified into different types,
and different strategies were proposed for these types
of real-time traffic. Considering the prolonged
occupation of the bandwidth by malicious flows, we
employed the multilevel feedback queue mechanism and
proposed an effective congestion control algorithm.
Simulation experiments showed that our scheme exhibited
the favorable feasibility and demonstrated a better
traffic scheduling effect and great improvement in
bandwidth utilization across data centers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lodovisi:2018:PAH,
author = "Chiara Lodovisi and Pierpaolo Loreti and Lorenzo
Bracciale and Silvello Betti",
title = "Performance Analysis of Hybrid Optical-Acoustic {AUV}
Swarms for Marine Monitoring",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "7",
pages = "65",
day = "10",
month = jul,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10070065",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/7/65",
abstract = "Autonomous Underwater Vehicles (AUVs) are assuming an
important role in the monitoring and mapping of marine
ecosystems, especially for their ability to explore
harsh environments. AUV swarm can collect data
operating autonomously for long periods enabling new
applications in this field. However, the mission
duration is usually limited also by the high power
consumption required for acoustic transmissions. A new
generation of devices complements the acoustic modem
with an optical modem that can provide a communication
channel with higher capacity and lower power
consumption with respect to the acoustic channel.
However, the optical link that uses the visible light
is very sensitive to the water turbidity that can
strongly limit the link coverage. In this paper, we
evaluate the networking performances of the Venus
vessel, a real AUV prototype equipped with an
acoustical modem and an optical modem. The presented
analysis aims to evaluate key system parameters
allowing to select the best way to set up network
communications according to the surrounding conditions
(e.g., quality of water) and to the application
requirements. Simulation results account for the case
of ports or basins, where the water quality is poor and
the use of the optical modem is strongly limited by
distance. We evaluate system performance in terms of
transmission delay in the network and we also provide a
power--capacity trade-off.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pizzi:2018:ETM,
author = "Sara Pizzi and Chiara Suraci and Leonardo Militano and
Antonino Orsino and Antonella Molinaro and Antonio Iera
and Giuseppe Araniti",
title = "Enabling Trustworthy Multicast Wireless Services
through {D2D} Communications in {5G} Networks",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "7",
pages = "66",
day = "11",
month = jul,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10070066",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/7/66",
abstract = "Device-to-device (D2D) communication is considered as
one of the key enabling technologies for
fifth-generation (5G) networks as it allows data
offloading generated by the huge number of connected
devices. In this respect, group-oriented services are
among the most interesting usage scenarios. Indeed, D2D
can improve the performance of the conventional
multicast scheme (CMS) in cellular networks, which is
known to suffer from low spectral efficiency. Security
is a further key field of investigation for 5G systems,
as any threat to privacy and security may lead to both
deteriorated user experience and inefficient network
resources' utilization. Security issues are even more
in focus for D2D connections between devices that are
in mutual proximity. To improve the CMS performance and
also sustain security requirements of the 5G network,
this work proposes a secure D2D data transmission
algorithm. Making use of mechanisms such as encryption
and signature, this algorithm aims to protect the
exchanged data and the privacy of the devices involved
in the communication. A simulation campaign conducted
using MATLAB shows the ability of the proposed solution
to take advantage of the establishment of secure D2D
communications and efficiently utilize network
resources.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Peng:2018:NMP,
author = "Guang-Qian Peng and Guangtao Xue and Yi-Chao Chen",
title = "Network Measurement and Performance Analysis at Server
Side",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "7",
pages = "67",
day = "16",
month = jul,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10070067",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/7/67",
abstract = "Network performance diagnostics is an important topic
that has been studied since the Internet was invented.
However, it remains a challenging task, while the
network evolves and becomes more and more complicated
over time. One of the main challenges is that all
network components (e.g., senders, receivers, and relay
nodes) make decision based only on local information
and they are all likely to be performance bottlenecks.
Although Software Defined Networking (SDN) proposes to
embrace a centralize network intelligence for a better
control, the cost to collect complete network states in
packet level is not affordable in terms of collection
latency, bandwidth, and processing power. With the
emergence of the new types of networks (e.g., Internet
of Everything, Mission-Critical Control, data-intensive
mobile apps, etc.), the network demands are getting
more diverse. It is critical to provide finer
granularity and real-time diagnostics to serve various
demands. In this paper, we present EVA, a network
performance analysis tool that guides developers and
network operators to fix problems in a timely manner.
EVA passively collects packet traces near the server
(hypervisor, NIC, or top-of-rack switch), and pinpoints
the location of the performance bottleneck (sender,
network, or receiver). EVA works without detailed
knowledge of application or network stack and is
therefore easy to deploy. We use three types of
real-world network datasets and perform trace-driven
experiments to demonstrate EVA's accuracy and
generality. We also present the problems observed in
these datasets by applying EVA.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Miraz:2018:INT,
author = "Mahdi H. Miraz and Maaruf Ali and Peter S. Excell and
Richard Picking",
title = "{Internet of Nano-Things}, Things and Everything:
Future Growth Trends",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "8",
pages = "68",
day = "28",
month = jul,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10080068",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/8/68",
abstract = "The current statuses and future promises of the
Internet of Things (IoT), Internet of Everything (IoE)
and Internet of Nano-Things (IoNT) are extensively
reviewed and a summarized survey is presented. The
analysis clearly distinguishes between IoT and IoE,
which are wrongly considered to be the same by many
commentators. After evaluating the current trends of
advancement in the fields of IoT, IoE and IoNT, this
paper identifies the 21 most significant current and
future challenges as well as scenarios for the possible
future expansion of their applications. Despite
possible negative aspects of these developments, there
are grounds for general optimism about the coming
technologies. Certainly, many tedious tasks can be
taken over by IoT devices. However, the dangers of
criminal and other nefarious activities, plus those of
hardware and software errors, pose major challenges
that are a priority for further research. Major
specific priority issues for research are identified.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Internet of Things.",
}
@Article{Guo:2018:WBS,
author = "Jinyi Guo and Wei Ren and Yi Ren and Tianqing Zhu",
title = "A Watermark-Based In-Situ Access Control Model for
Image Big Data",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "8",
pages = "69",
day = "29",
month = jul,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10080069",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/8/69",
abstract = "When large images are used for big data analysis, they
impose new challenges in protecting image privacy. For
example, a geographic image may consist of several
sensitive areas or layers. When it is uploaded into
servers, the image will be accessed by diverse
subjects. Traditional access control methods regulate
access privileges to a single image, and their access
control strategies are stored in servers, which imposes
two shortcomings: (1) fine-grained access control is
not guaranteed for areas/layers in a single image that
need to maintain secret for different roles; and (2)
access control policies that are stored in servers
suffers from multiple attacks (e.g., transferring
attacks). In this paper, we propose a novel
watermark-based access control model in which access
control policies are associated with objects being
accessed (called an in-situ model). The proposed model
integrates access control policies as watermarks within
images, without relying on the availability of servers
or connecting networks. The access control for images
is still maintained even though images are
redistributed again to further subjects. Therefore,
access control policies can be delivered together with
the big data of images. Moreover, we propose a
hierarchical key-role-area model for fine-grained
encryption, especially for large size images such as
geographic maps. The extensive analysis justifies the
security and performance of the proposed model.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Big Data and Augmented Intelligence.",
}
@Article{Zhang:2018:MIP,
author = "Lijun Zhang and Kai Liu and Jian Liu",
title = "Multidiscipline Integrated Platform Based on
Probabilistic Analysis for Manufacturing Engineering
Processes",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "8",
pages = "70",
day = "30",
month = jul,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10080070",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/8/70",
abstract = "Researchers from different disciplines, such as
materials science, computer science, safety science,
mechanical engineering and controlling engineering,
have aimed to improve the quality of manufacturing
engineering processes. Considering the requirements of
research and development of advanced materials,
reliable manufacturing and collaborative innovation, a
multidiscipline integrated platform framework based on
probabilistic analysis for manufacturing engineering
processes is proposed. The proposed platform consists
of three logical layers: The requirement layer, the
database layer and the application layer. The platform
is intended to be a scalable system to gradually
supplement related data, models and approaches. The
main key technologies of the platform, encapsulation
methods, information fusion approaches and the
collaborative mechanism are also discussed. The
proposed platform will also be gradually improved in
the future. In order to exchange information for
manufacturing engineering processes, scientists and
engineers of different institutes of materials science
and manufacturing engineering should strengthen their
cooperation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Big Data and Augmented Intelligence.",
}
@Article{Johnson:2018:HAI,
author = "Shardrom Johnson and Jinwu Han and Yuanchen Liu and Li
Chen and Xinlin Wu",
title = "Hybrid Approach with Improved Genetic Algorithm and
Simulated Annealing for Thesis Sampling",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "8",
pages = "71",
day = "30",
month = jul,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10080071",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/8/71",
abstract = "Sampling inspection uses the sample characteristics to
estimate that of the population, and it is an important
method to describe the population, which has the
features of low cost, strong applicability and high
scientificity. This paper aims at the sampling
inspection of the master's degree thesis to ensure
their quality, which is commonly estimated by random
sampling. Since there are disadvantages in random
sampling, a hybrid algorithm combined with an improved
genetic algorithm and a simulated annealing algorithm
is proposed in this paper. Furthermore, a novel
mutation strategy is introduced according to the
specialty of Shanghai's thesis sampling to improve the
efficiency of sampling inspection; the acceleration of
convergence of the algorithm can also take advantage of
this. The new algorithm features the traditional
genetic algorithm, and it can obtain the global optimum
in the optimization process and provide the fairest
sampling plan under the constraint of multiple sampling
indexes. The experimental results on the master's
thesis dataset of Shanghai show that the proposed
algorithm well meets the requirements of the sampling
inspection in Shanghai with a lower time-complexity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Goeke:2018:CAC,
author = "Ludger Goeke and Nazila Gol Mohammadi and Maritta
Heisel",
title = "Context Analysis of Cloud Computing Systems Using a
Pattern-Based Approach",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "8",
pages = "72",
day = "31",
month = jul,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10080072",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/8/72",
abstract = "Cloud computing services bring new capabilities for
hosting and offering complex collaborative business
operations. However, these advances might bring
undesirable side-effects, e.g., introducing new
vulnerabilities and threats caused by collaboration and
data exchange over the Internet. Hence, users have
become more concerned about security and privacy
aspects. For secure provisioning of a cloud computing
service, security and privacy issues must be addressed
by using a risk assessment method. To perform a risk
assessment, it is necessary to obtain all relevant
information about the context of the considered cloud
computing service. The context analysis of a cloud
computing service and its underlying system is a
difficult task because of the variety of different
types of information that have to be considered. This
context information includes (i) legal, regulatory
and/or contractual requirements that are relevant for a
cloud computing service (indirect stakeholders); (ii)
relations to other involved cloud computing services;
(iii) high-level cloud system components that support
the involved cloud computing services; (iv) data that
is processed by the cloud computing services; and (v)
stakeholders that interact directly with the cloud
computing services and/or the underlying cloud system
components. We present a pattern for the contextual
analysis of cloud computing services and demonstrate
the instantiation of our proposed pattern with
real-life application examples. Our pattern contains
elements that represent the above-mentioned types of
contextual information. The elements of our pattern
conform to the General Data Protection Regulation.
Besides the context analysis, our pattern supports the
identification of high-level assets. Additionally, our
proposed pattern supports the documentation of the
scope and boundaries of a cloud computing service
conforming to the requirements of the ISO 27005
standard (information security risk management). The
results of our context analysis contribute to the
transparency of the achieved security and privacy level
of a cloud computing service. This transparency can
increase the trust of users in a cloud computing
service. We present results of the RestAssured project
related to the context analysis regarding cloud
computing services and their underlying cloud computing
systems. The context analysis is the prerequisite to
threat and control identification that are performed
later in the risk management process. The focus of this
paper is the use of a pattern at the time of design
systematic context analysis and scope definition for
risk management methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security Patterns in Industry.",
}
@Article{Lei:2018:JAA,
author = "Jianjun Lei and Jiarui Tao and Shanshan Yang",
title = "Joint {AP} Association and Bandwidth Allocation
Optimization Algorithm in High-Dense {WLANs}",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "8",
pages = "73",
day = "06",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10080073",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/8/73",
abstract = "Regarding access point (AP) overload and performance
anomaly which is caused by mobile terminals with
different bitrates, a joint AP association and
bandwidth allocation optimization algorithm is
presented in this paper. Meanwhile, load balancing and
proportional fairness are analyzed and formulated as an
optimization model. Then, we present a Fair Bandwidth
Allocation algorithm based on clients' Business
Priority (FBA-BP), which allocates bandwidth based on
the bandwidth demand of clients and their business
priority. Furthermore, we propose a Categorized AP
Association algorithm based on clients' demands
(CAA-BD), which classifies APs by different types of
clients and chooses an optimal associating AP for a new
client according to AP categories and the aggregated
demand transmission time that are calculated by the
FBA-BP algorithm. The CAA-BD can achieve load balance
and solve the performance anomaly caused by multi-rate
clients coexisting. The simulation results show that
our proposed algorithm obtains significant performance
in terms of AP utilization, throughput, transmission
delay and channel fairness in different client density
levels compared with the categorized and Strong Signal
First (SSF) algorithms.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Internet of Things.",
}
@Article{Liu:2018:PFE,
author = "Kanghuai Liu and Zhigang Chen and Jia Wu and Yutong
Xiao and Heng Zhang",
title = "Predict and Forward: An Efficient Routing-Delivery
Scheme Based on Node Profile in Opportunistic
Networks",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "8",
pages = "74",
day = "06",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10080074",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/8/74",
abstract = "In the social scene of opportunistic networks, message
applications find suitable relay nodes or certain
transmission destinations from the surrounding
neighbors through specific network addresses of users.
However, at the dawn of big data and 5G networks, the
variational location information of nodes is difficult
to be available to mobile devices all the time, and a
long wait for the destination may cause severe
end-to-end delay. To improve the transmission
environment, this study constructs an efficient
routing-delivery scheme (Predict and Forward) based on
node profile for the opportunistic networks. The node
profile effectively characterizes nodes by analyzing
and comparing their attributes instead of network
addresses, such as physical characteristics, places of
residence, workplaces, occupations or hobbies.
According to the optimal stopping theory, this
algorithm implements the optimal transmission for
Prelearn messages by dividing the complex data
transmission process into two different phases (Predict
and Forward). Through simulations and the comparison of
routing algorithms in opportunistic networks, the
proposed strategy increases the delivery ratio by 80\%
with the traditional methods on average, and the
average end-to-end delay in this algorithm is the
lowest.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2018:HMS,
author = "Jianqiang Liu and Shuai Huo and Yi Wang",
title = "A Hierarchical Mapping System for Flat Identifier to
Locator Resolution Based on Active Degree",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "8",
pages = "75",
day = "08",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10080075",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/8/75",
abstract = "Overloading of IP address semantics appeals for a new
network architecture based on Identifier (ID)/Locator
separation. The challenge of Identifier (ID)/Locator
separation is how to solve the scalability and
efficiency challenges of identity-to-location
resolution. By analyzing the requirements of the
Identifier (ID)/Locator separation protocol, this paper
proposes a hierarchical mapping architecture on
active-degree (HMAA). This HMAA was divided into three
levels: active local level, neutral transfer level, and
inert global level. Each mapping item is dynamically
allocated to different levels to ensure minimizing
delay according to its activity characteristics. The
top layer CHORD is constructed by the Markov Decision
Process, which can keep consistency between the
physical topology and the logical topology. The
simulation results on delay time show that HMAA can
satisfy the scalability and efficiency requirements of
an Identifier (ID)/Locator separation network.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Teixeira:2018:SST,
author = "Marcio Andrey Teixeira and Tara Salman and Maede
Zolanvari and Raj Jain and Nader Meskin and Mohammed
Samaka",
title = "{SCADA} System Testbed for Cybersecurity Research
Using Machine Learning Approach",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "8",
pages = "76",
day = "09",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10080076",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/8/76",
abstract = "This paper presents the development of a Supervisory
Control and Data Acquisition (SCADA) system testbed
used for cybersecurity research. The testbed consists
of a water storage tank's control system, which is a
stage in the process of water treatment and
distribution. Sophisticated cyber-attacks were
conducted against the testbed. During the attacks, the
network traffic was captured, and features were
extracted from the traffic to build a dataset for
training and testing different machine learning
algorithms. Five traditional machine learning
algorithms were trained to detect the attacks: Random
Forest, Decision Tree, Logistic Regression, Na{\"\i}ve
Bayes and KNN. Then, the trained machine learning
models were built and deployed in the network, where
new tests were made using online network traffic. The
performance obtained during the training and testing of
the machine learning models was compared to the
performance obtained during the online deployment of
these models in the network. The results show the
efficiency of the machine learning models in detecting
the attacks in real time. The testbed provides a good
understanding of the effects and consequences of
attacks on real SCADA environments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Huang:2018:MIU,
author = "Yi-Ting Huang and Sheng-Fang Su",
title = "Motives for {Instagram} Use and Topics of Interest
among Young Adults",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "8",
pages = "77",
day = "09",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10080077",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/8/77",
abstract = "Instagram is currently the most popular social media
app among young people around the world. More than 70\%
of people between the ages of 12 and 24 are Instagram
users. The research framework of this study was
constructed based on smartphone addiction and the uses
and gratifications theory. We used 27 question items
divided into five factors, namely social interaction,
documentation, diversion, self-promotion, and
creativity, to investigate the motives for Instagram
use and topics of interest among university students in
Taiwan. A total of 307 valid questionnaires were
obtained. The results revealed that on the whole, the
motives for Instagram use were mostly to look at posts,
particularly involving social interaction and diversion
motives. The level of agreement expressed toward
motives for creating posts was lower. Gender,
professional training background, and level of
addiction to Instagram all exert influence on motives
for Instagram use. Over half of the students majoring
in design followed artisans and celebrities (including
designers), and female students noticed ads on
Instagram more than male students did.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Ibadah:2018:SCR,
author = "Nisrine Ibadah and Khalid Minaoui and Mohammed Rziza
and Mohammed Oumsis and C{\'e}sar Benavente-Peces",
title = "Smart Collection of Real-Time Vehicular Mobility
Traces",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "8",
pages = "78",
day = "09",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10080078",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/8/78",
abstract = "Mobility trace techniques makes possible drawing the
behaviors of real-life movement which shape wireless
networks mobility whereabouts. In our investigation,
several trace mobility models have been collected after
the devices' deployment. The main issue of this
classical procedure is that it produces uncompleted
records due to several unpredictable problems occurring
during the deployment phase. In this paper, we propose
a new procedure aimed at collecting traces while
deployment phase failures are avoided, which improves
the reliability of data. The introduced procedure makes
possible the complete generation of traces with a
minimum amount of damage without the need to recover
mobile devices or lose them, as it is the case in
previous mobility traces techniques. Based on detecting
and correcting all accidental issues in real time, the
proposed trace scanning offers a set of relevant
information about the vehicle status which was
collected during seven months. Furthermore, the
proposed procedure could be applied to generate
vehicular traces. Likewise, it is suitable to
record/generate human and animal traces. The research
outcomes demonstrate the effectiveness and robustness
of the smart collection algorithm based on the proposed
trace mobility model.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ren:2018:QSM,
author = "Chuanxiang Ren and Wenbo Zhang and Lingqiao Qin and Bo
Sun",
title = "Queue Spillover Management in a Connected Vehicle
Environment",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "8",
pages = "79",
day = "10",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10080079",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/8/79",
abstract = "To alleviate the queue spillovers at intersections of
urban roads during rush hours, a solution to the
cross-spill problem based on vehicle networking
technologies is proposed. This involves using connected
vehicle technology, to realize the interactive
information on vehicle and intersection signal control.
The maximum control distance between intersections is
determined by how vehicles are controlled and would
travel in that connected environment. A method of
calculating overflow tendency towards intersection
queuing is also proposed, based on the maximum phase
control distance. By this method, the intersection
overflow is identified, and then the signal phases are
re-optimized according to the requirements of different
phases. Finally, overflow prevention control was also
performed in this study. The VISSIM simulation results
show that the method can better prevent the overflow of
queues at intersections.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhang:2018:FLM,
author = "Lei Zhang and Xiaoli Zhi",
title = "A Fast and Lightweight Method with Feature Fusion and
Multi-Context for Face Detection",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "8",
pages = "80",
day = "17",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10080080",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/8/80",
abstract = "Convolutional neural networks (CNN for short) have
made great progress in face detection. They mostly take
computation intensive networks as the backbone in order
to obtain high precision, and they cannot get a good
detection speed without the support of high-performance
GPUs (Graphics Processing Units). This limits CNN-based
face detection algorithms in real applications,
especially in some speed dependent ones. To alleviate
this problem, we propose a lightweight face detector in
this paper, which takes a fast residual network as
backbone. Our method can run fast even on cheap and
ordinary GPUs. To guarantee its detection precision,
multi-scale features and multi-context are fully
exploited in efficient ways. Specifically, feature
fusion is used to obtain semantic strongly multi-scale
features firstly. Then multi-context including both
local and global context is added to these multi-scale
features without extra computational burden. The local
context is added through a depthwise separable
convolution based approach, and the global context by a
simple global average pooling way. Experimental results
show that our method can run at about 110 fps on VGA
(Video Graphics Array)-resolution images, while still
maintaining competitive precision on WIDER FACE and
FDDB (Face Detection Data Set and Benchmark) datasets
as compared with its state-of-the-art counterparts.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Viola:2018:IER,
author = "Fabio Viola and Luca Roffia and Francesco Antoniazzi
and Alfredo D'Elia and Cristiano Aguzzi and Tullio
Salmon Cinotti",
title = "Interactive {3D} Exploration of {RDF} Graphs through
Semantic Planes",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "8",
pages = "81",
day = "17",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10080081",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:01 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/8/81",
abstract = "This article presents Tarsier, a tool for the
interactive 3D visualization of RDF graphs. Tarsier is
mainly intended to support teachers introducing
students to Semantic Web data representation formalisms
and developers in the debugging of applications based
on Semantic Web knowledge bases. The tool proposes the
metaphor of semantic planes as a way to visualize an
RDF graph. A semantic plane contains all the RDF terms
sharing a common concept; it can be created, and
further split into several planes, through a set of UI
controls or through SPARQL 1.1 queries, with the full
support of OWL and RDFS. Thanks to the 3D
visualization, links between semantic planes can be
highlighted and the user can navigate within the 3D
scene to find the better perspective to analyze data.
Data can be gathered from generic SPARQL 1.1 protocol
services. We believe that Tarsier will enhance the
human friendliness of semantic technologies by: (1)
helping newcomers assimilate new data representation
formats; and (2) increasing the capabilities of
inspection to detect relevant situations even in
complex RDF graphs.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Safkhani:2018:SRO,
author = "Masoumeh Safkhani and Nasour Bagheri and Mahyar
Shariat",
title = "On the Security of Rotation Operation Based
Ultra-Lightweight Authentication Protocols for {RFID}
Systems",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "9",
pages = "82",
day = "21",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10090082",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:02 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/9/82",
abstract = "Passive Radio Frequency IDentification (RFID) tags are
generally highly constrained and cannot support
conventional encryption systems to meet the required
security. Hence, designers of security protocols may
try to achieve the desired security only using limited
ultra-lightweight operations. In this paper, we show
that the security of such protocols is not provided by
using rotation functions. In the following, for an
example, we investigate the security of an RFID
authentication protocol that has been recently
developed using rotation function named ULRAS, which
stands for an Ultra-Lightweight RFID Authentication
Scheme and show its security weaknesses. More
precisely, we show that the ULRAS protocol is
vulnerable against de-synchronization attack. The given
attack has the success probability of almost
\‘1', with the complexity of only one session of
the protocol. In addition, we show that the given
attack can be used as a traceability attack against the
protocol if the parameters' lengths are an integer
power of 2, e.g., 128. Moreover, we propose a new
authentication protocol named UEAP, which stands for an
Ultra-lightweight Encryption based Authentication
Protocol, and then informally and formally, using
Scyther tool, prove that the UEAP protocol is secure
against all known active and passive attacks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue New Developments in RFID Technologies
and Applications and Their Integration into IoT.",
}
@Article{Wang:2018:HRA,
author = "Wentao Wang and Xuan Ke and Lingxia Wang",
title = "A {HMM-R} Approach to Detect {L-DDoS} Attack
Adaptively on {SDN} Controller",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "9",
pages = "83",
day = "23",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10090083",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:02 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/9/83",
abstract = "A data center network is vulnerable to suffer from
concealed low-rate distributed denial of service
(L-DDoS) attacks because its data flow has the
characteristics of data flow delay, diversity, and
synchronization. Several studies have proposed
addressing the detection of L-DDoS attacks, most of
them are only detect L-DDoS attacks at a fixed rate.
These methods cause low true positive and high false
positive in detecting multi-rate L-DDoS attacks.
Software defined network (SDN) is a new network
architecture that can centrally control the network. We
use an SDN controller to collect and analyze data
packets entering the data center network and calculate
the Renyi entropies base on IP of data packets, and
then combine them with the hidden Markov model to get a
probability model HMM-R to detect L-DDoS attacks at
different rates. Compared with the four common attack
detection algorithms (KNN, SVM, SOM, BP), HMM-R is
superior to them in terms of the true positive rate,
the false positive rate, and the adaptivity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2018:UNL,
author = "Yanli Li and Lala Mei and Ran Li and Changan Wu",
title = "Using Noise Level to Detect Frame Repetition Forgery
in Video Frame Rate Up-Conversion",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "9",
pages = "84",
day = "24",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10090084",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:02 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/9/84",
abstract = "Frame repetition (FR) is a common temporal-domain
tampering operator, which is often used to increase the
frame rate of video sequences. Existing methods detect
FR forgery by analyzing residual variation or
similarity between video frames; however, these methods
are easily interfered with by noise, affecting the
stability of detection performance. This paper proposes
a noise-level based detection method which detects the
varying noise level over time to determine whether the
video is forged by FR. Wavelet coefficients are first
computed for each video frame, and median absolute
deviation (MAD) of wavelet coefficients is used to
estimate the standard deviation of Gaussian noise mixed
in each video frame. Then, fast Fourier transform (FFT)
is used to calculate the amplitude spectrum of the
standard deviation curve of the video sequence, and to
provide the peak-mean ratio (PMR) of the amplitude
spectrum. Finally, according to the PMR obtained, a
hard threshold decision is taken to determine whether
the standard deviation bears periodicity in the
temporal domain, in which way FR forgery can be
automatically identified. The experimental results show
that the proposed method ensures a large PMR for the
forged video, and presents a better detection
performance when compared with the existing detection
methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{Wu:2018:PPM,
author = "Yin Wu and Bowen Li and Fuquan Zhang",
title = "Predictive Power Management for Wind Powered Wireless
Sensor Node",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "9",
pages = "85",
day = "06",
month = sep,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10090085",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:02 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/9/85",
abstract = "A conventional Wireless Sensor Network (WSN) cannot
have an infinite lifetime without a battery recharge or
replacement. Energy Harvesting (EH), from environmental
energy sources, is a promising technology to provide
sustainable powering for a WSN. In this paper, we
propose and investigate a novel predictive energy
management framework that combines the Maximal Power
Transferring Tracking (MPTT) algorithm, a predictive
energy allocation strategy, and a high efficiency
transmission power control mechanism: First, the MPTT
optimal working point guarantees minimum power loss of
the EH-WSN system; Then, by exactly predicting the
upcoming available energy, the power allocation
strategy regulates EH-nodes' duty cycle accurately to
minimize the power failure time; Ultimately, the
transmission power control module further improves
energy efficiency by dynamically selecting the optimum
matching transmission power level with minimum energy
consumption. A wind energy powered wireless sensor
system has been equipped and tested to validate the
effectiveness of the proposed scheme. Results indicate
that compared with other predictive energy managers,
the proposed mechanism incurs relatively low power
failure time while maintaining a high-energy conversion
rate.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Internet of Things.",
}
@Article{Alshathri:2018:SLM,
author = "Samah Alshathri and Bogdan Ghita and Nathan Clarke",
title = "Sharing with Live Migration Energy Optimization
Scheduler for Cloud Computing Data Centers",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "9",
pages = "86",
day = "06",
month = sep,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10090086",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:02 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/10/9/86",
abstract = "The cloud-computing concept has emerged as a powerful
mechanism for data storage by providing a suitable
platform for data centers. Recent studies show that the
energy consumption of cloud computing systems is a key
issue. Therefore, we should reduce the energy
consumption to satisfy performance requirements,
minimize power consumption, and maximize resource
utilization. This paper introduces a novel algorithm
that could allocate resources in a cloud-computing
environment based on an energy optimization method
called Sharing with Live Migration (SLM). In this
scheduler, we used the Cloud-Sim toolkit to manage the
usage of virtual machines (VMs) based on a novel
algorithm that learns and predicts the similarity
between the tasks, and then allocates each of them to a
suitable VM. On the other hand, SLM satisfies the
Quality of Services (QoS) constraints of the hosted
applications by adopting a migration process. The
experimental results show that the algorithm exhibits
better performance, while saving power and minimizing
the processing time. Therefore, the SLM algorithm
demonstrates improved virtual machine efficiency and
resource utilization compared to an adapted
state-of-the-art algorithm for a similar problem.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sahajwani:2018:LLR,
author = "Manish Sahajwani and Alok Jain and Radheyshyam Gamad",
title = "Log Likelihood Ratio Based Relay Selection Scheme for
Amplify and Forward Relaying with Three State {Markov}
Channel",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "9",
pages = "87",
day = "06",
month = sep,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10090087",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:02 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/9/87",
abstract = "This paper presents log likelihood ratio (LLR) based
relay selection scheme for a cooperative amplify and
forward relaying system. To evaluate the performance of
the aforementioned system model, a three state Markov
chain based fading environment has been presented to
toggle among Rayleigh, Rician, and Nakagami-m fading
environment. A simulation is carried out while assuming
that there is no possibility of direct transmission
from the source and destination terminal. Simulation
results on the basis of Bit Error Rate (BER),
Instantaneous Channel Capacity, and Outage probability
have been presented and compared for different cases.
In each case, the best performance of the proposed
algorithm is obtained with a Binary Phase Shift Keying
(BPSK) modulation scheme.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gkioulos:2018:SLR,
author = "Vasileios Gkioulos and H{\aa}kon Gunleifsen and Goitom
Kahsay Weldehawaryat",
title = "A Systematic Literature Review on Military Software
Defined Networks",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "9",
pages = "88",
day = "12",
month = sep,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10090088",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:02 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/9/88",
abstract = "Software Defined Networking (SDN) is an evolving
network architecture paradigm that focuses on the
separation of control and data planes. SDN receives
increasing attention both from academia and industry,
across a multitude of application domains. In this
article, we examine the current state of obtained
knowledge on military SDN by conducting a systematic
literature review (SLR). Through this work, we seek to
evaluate the current state of the art in terms of
research tracks, publications, methods, trends, and
most active research areas. Accordingly, we utilize
these findings for consolidating the areas of past and
current research on the examined application domain,
and propose directions for future research.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Software Defined Networking (SDN) and
Network Function Virtualization (NFV).",
}
@Article{Mambou:2018:NCV,
author = "Sebastien Mambou and Ondrej Krejcar and Kamil Kuca and
Ali Selamat",
title = "Novel Cross-View Human Action Model Recognition Based
on the Powerful View-Invariant Features Technique",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "9",
pages = "89",
day = "13",
month = sep,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10090089",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:02 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/9/89",
abstract = "One of the most important research topics nowadays is
human action recognition, which is of significant
interest to the computer vision and machine learning
communities. Some of the factors that hamper it include
changes in postures and shapes and the memory space and
time required to gather, store, label, and process the
pictures. During our research, we noted a considerable
complexity to recognize human actions from different
viewpoints, and this can be explained by the position
and orientation of the viewer related to the position
of the subject. We attempted to address this issue in
this paper by learning different special view-invariant
facets that are robust to view variations. Moreover, we
focused on providing a solution to this challenge by
exploring view-specific as well as view-shared facets
utilizing a novel deep model called the sample-affinity
matrix (SAM). These models can accurately determine the
similarities among samples of videos in diverse angles
of the camera and enable us to precisely fine-tune
transfer between various views and learn more detailed
shared facets found in cross-view action
identification. Additionally, we proposed a novel
view-invariant facets algorithm that enabled us to
better comprehend the internal processes of our
project. Using a series of experiments applied on INRIA
Xmas Motion Acquisition Sequences (IXMAS) and the
Northwestern--UCLA Multi-view Action 3D (NUMA)
datasets, we were able to show that our technique
performs much better than state-of-the-art
techniques.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Abbasi:2018:VMA,
author = "Aaqif Afzaal Abbasi and Hai Jin",
title = "{v-Mapper}: An Application-Aware Resource
Consolidation Scheme for Cloud Data Centers",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "9",
pages = "90",
day = "15",
month = sep,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10090090",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:02 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/10/9/90",
abstract = "Cloud computing systems are popular in computing
industry for their ease of use and wide range of
applications. These systems offer services that can be
used over the Internet. Due to their wide popularity
and usage, cloud computing systems and their services
often face issues resource management related
challenges. In this paper, we present v-Mapper, a
resource consolidation scheme which implements network
resource management concepts through software-defined
networking (SDN) control features. The paper makes
three major contributions: (1) We propose a virtual
machine (VM) placement scheme that can effectively
mitigate the VM placement issues for data-intensive
applications; (2) We propose a validation scheme that
will ensure that a cloud service is entertained only if
there are sufficient resources available for its
execution and (3) We present a scheduling policy that
aims to eliminate network load constraints. We tested
our scheme with other techniques in terms of average
task processing time, service delay and bandwidth
usage. Our results demonstrate that v-Mapper
outperforms other techniques and delivers significant
improvement in system's performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Software Defined Networking (SDN) and
Network Function Virtualization (NFV).",
}
@Article{Bendjima:2018:ICW,
author = "Mostefa Bendjima and Mohammed Feham",
title = "Intelligent Communication in Wireless Sensor
Networks",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "9",
pages = "91",
day = "15",
month = sep,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10090091",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:02 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/9/91",
abstract = "Wireless sensor networks (WSN) are designed to collect
information by means of a large number of
energy-limited battery sensor nodes. Therefore, it is
important to minimize the energy consumed by each
sensor, in order to extend the network life. The goal
of this work is to design an intelligent WSN that
collects as much information as possible to process it
intelligently. To achieve this goal, an agent is sent
to each sensor in order to process the information and
to cooperate with neighboring sensors while mobile
agents (MA) can be used to reduce information shared
between source nodes (SN) and send them to the base
station (Sink). This work proposes to use communication
architecture for wireless sensor networks based on the
multi-agent system (MAS) to ensure optimal information
collection. The collaboration of these agents generates
a simple message that summarizes the important
information in order to transmit it by a mobile agent.
To reduce the size of the MA, the sensors of the
network have been grouped into sectors. For each MA, we
have established an optimal itinerary, consuming a
minimum amount of energy with data aggregation
efficiency in a minimum time. Successive simulations in
large-scale wireless sensor networks through the
SINALGO (published under a BSD license) simulator show
the performance of the proposed method, in terms of
energy consumption and package delivery rate.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Teng:2018:OAU,
author = "Qianru Teng and Yimin Chen and Chen Huang",
title = "Occlusion-Aware Unsupervised Learning of Monocular
Depth, Optical Flow and Camera Pose with Geometric
Constraints",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "10",
pages = "92",
day = "21",
month = sep,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10100092",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:02 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/10/92",
abstract = "We present an occlusion-aware unsupervised neural
network for jointly learning three low-level vision
tasks from monocular videos: depth, optical flow, and
camera motion. The system consists of three different
predicting sub-networks simultaneously coupled by
combined loss terms and is capable of computing each
task independently on test samples. Geometric
constraints extracted from scene geometry which have
traditionally been used in bundle adjustment or
pose-graph optimization are formed as various
self-supervisory signals during our end-to-end learning
approach. Different from prior works, our image
reconstruction loss also takes account of optical flow.
Moreover, we impose novel 3D flow consistency
constraints over the predictions of all the three
tasks. By explicitly modeling occlusion and taking
utilization of both 2D and 3D geometry relationships,
abundant geometric constraints are formed over
estimated outputs, enabling the system to capture both
low-level representations and high-level cues to infer
thinner scene structures. Empirical evaluation on the
KITTI dataset demonstrates the effectiveness and
improvement of our approach: (1) monocular depth
estimation outperforms state-of-the-art unsupervised
methods and is comparable to stereo supervised ones;
(2) optical flow prediction ranks top among prior works
and even beats supervised and traditional ones
especially in non-occluded regions; (3) pose estimation
outperforms established SLAM systems under comparable
input settings with a reasonable margin.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Said:2018:PCE,
author = "Anwar Said and Syed Waqas Haider Shah and Hasan Farooq
and Adnan Noor Mian and Ali Imran and Jon Crowcroft",
title = "Proactive Caching at the Edge Leveraging Influential
User Detection in Cellular {D2D} Networks",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "10",
pages = "93",
day = "21",
month = sep,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10100093",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:02 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/10/93",
abstract = "Caching close to users in a radio access network (RAN)
has been identified as a promising method to reduce a
backhaul traffic load and minimize latency in 5G and
beyond. In this paper, we investigate a novel community
detection inspired by a proactive caching scheme for
device-to-device (D2D) enabled networks. The proposed
scheme builds on the idea that content
generated/accessed by influential users is more
probable to become popular and thus can be exploited
for pro-caching. We use a Clustering Coefficient based
Genetic Algorithm (CC-GA) for community detection to
discover a group of cellular users present in close
vicinity. We then use an Eigenvector Centrality measure
to identify the influential users with respect to the
community structure, and the content associated to it
is then used for pro-active caching using D2D
communications. The numerical results show that,
compared to reactive caching, where historically
popular content is cached, depending on cache size,
load and number of requests, up to 30\% more users can
be satisfied using a proposed scheme while achieving
significant reduction in backhaul traffic load.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yuan:2018:ICP,
author = "Peiyan Yuan and Xiaoxiao Pang and Xiaoyan Zhao",
title = "Influence of Crowd Participation Features on Mobile
Edge Computing",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "10",
pages = "94",
day = "25",
month = sep,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10100094",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:02 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/10/94",
abstract = "Mobile edge computing is a new communication paradigm,
which stores content close to the end users, so as to
reduce the backhaul delay and alleviate the traffic
load of the backbone networks. Crowd participation is
one of the most striking features of this technology,
and it enables numerous interesting applications. The
dynamics of crowd participation offer unprecedented
opportunities for both content caching and data
forwarding. In this paper, we investigate the influence
of the dynamics of crowd participation, from the
perspective of opportunistic caching and forwarding,
and discuss how we can exploit such opportunities to
allocate content and select relays efficiently. Some
existing issues in this emerging research area are also
discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wu:2018:CEE,
author = "Yue Wu and Junyi Zhang",
title = "{Chinese} Event Extraction Based on Attention and
Semantic Features: a Bidirectional Circular Neural
Network",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "10",
pages = "95",
day = "26",
month = sep,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10100095",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:02 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/10/95",
abstract = "Chinese event extraction uses word embedding to
capture similarity, but suffers when handling
previously unseen or rare words. From the test, we know
that characters may provide some information that we
cannot obtain in words, so we propose a novel
architecture for combining word representations:
character--word embedding based on attention and
semantic features. By using an attention mechanism, our
method is able to dynamically decide how much
information to use from word or character level
embedding. With the semantic feature, we can obtain
some more information about a word from the sentence.
We evaluate different methods on the CEC Corpus, and
this method is found to improve performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Big Data and Augmented Intelligence.",
}
@Article{Hussein:2018:MBA,
author = "Isam A. Hussein and Basil H. Jasim and Ramzy S. Ali",
title = "A Modified {BA} Anti-Collision Protocol for Coping
with Capture Effect and Interference in {RFID}
Systems",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "10",
pages = "96",
day = "01",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10100096",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:02 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/10/96",
abstract = "Radio frequency identification (RFID) technology has
widely been used in the last few years. Its
applications focus on auto identification, tracking,
and data capturing issues. However, RFID suffers from
the main problem of tags collision when multiple tags
simultaneously respond to the reader request. Many
protocols were proposed to solve the collision problems
with good identification efficiency and an acceptable
time delay, such as the blocking anti-collision
protocol (BA). Nevertheless, most of these protocols
assumed that the RFID reader could decode the tag's
signal only when there was one tag responding to the
reader request once each time. Hence, they ignored the
phenomenon of the capture effect, which results in
identifying the tag with the stronger signal as the
multiple tags simultaneously respond. As a result, many
tags will not be identified under the capture effect.
Therefore, the purpose of this paper is to take the
capture effect phenomenon into consideration in order
to modify the blocking BA protocol to ensure a full
read rate, i.e., identifying all the tags in the frame
without losing any tag. Moreover, the modifications
include distinguishing between collision and
interference responses (for the period of staying tags)
in the noisy environments, for the purpose of enhancing
the efficiency of the identification. Finally, the
simulation and analytical results show that our
modifications and MBA protocol outperform the previous
protocols in the same field, such as generalized query
tree protocols (GQT1 and GQT2), general binary tree
(GBT), and tweaked binary tree (TBT).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue New Developments in RFID Technologies
and Applications and Their Integration into IoT.",
}
@Article{Zhang:2018:ECP,
author = "Yu Zhang and Bingjia Shao",
title = "The Effect of Customer Participation Types on Online
Recovery Satisfaction: a Mental Accounting
Perspective",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "10",
pages = "97",
day = "03",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10100097",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:02 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/10/97",
abstract = "With the high popularity of the Internet, online
trading has gradually replaced the traditional shopping
model and extended to every corner of social life.
However, online trading cannot avoid failures; thus,
understanding how firms can best recover customers in
online contexts to keep customer loyalty is very
important. This study investigates the mechanisms by
which customer participation types (physical, mental,
and emotional) promote customers' perceived justice and
post-recovery satisfaction from a mental accounting
perspective. Furthermore, the moderating effects of two
modes of online apology speech acts (direct and
indirect) on customer participation and perceived
justice are investigated. A total of 1083 Chinese
tourists who have purchased a Wi-Fi rental service in
the past year were contacted according to the database
provided by two travel agencies, and 329 stated having
experienced an online recovery service and participated
in the survey; 297 valid questionnaires were collected.
Among them, 48.82\% were males and 51.18\% females.
Most of the respondents were aged 20--35 years. By
carrying out data analysis by partial least squares
structural equation modeling (PLS-SEM) using SmartPLS,
the results show that, first, only mental and physical
participation can enhance perceived justice, while
emotional participation does not influence perceived
justice. Second, the positive influence of mental
participation on perceived justice is most significant.
Third, only when the service staff adopts the indirect
mode to express an online apology, mental and physical
participation can enhance perceived justice.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Hardaha:2018:SDR,
author = "Prakash Narayan Hardaha and Shailendra Singh",
title = "Structured Data {REST} Protocol for End to End Data
Mashup",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "10",
pages = "98",
day = "04",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10100098",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:02 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/10/98",
abstract = "Due to the exponential growth of the data and its
services, visiting multiple webs/apps by a user raises
three issues-(1) consumption of extra bytes; (2) time
killing process of surfing inside the webs/apps; (3)
tedious task of remembering address of webs/apps with
their credentials. The data mashup is a set of
techniques and user-friendly approaches which not only
resolves above issues but also allows ordinary user to
fetch required data from multiple disparate data
sources and to create the integrated view in his
defined digital place. In this paper, we have proposed
an extension of existing REST protocol called
Structured Data REST (SDRest) protocol and
user-friendly novel approach which allows even ordinary
users to develop end to end data mashup, using the
innovative concept of Structured Data Mashup Box (SDMB)
and One Time Configuration (OTC)-Any Time Access (ATA)
models. Our implementation shows that pre-mashup
configuration can easily be performed by an ordinary
user and an integrated user interface view of end user
data mashup can be created without any technical
knowledge or programming. We have also evaluated the
proposed work by comparing it with some of the related
works and found that the proposed work has developed
user friendly configurable approach using the current
state of the art techniques to involve not only the
ordinary user but also the mashup service provider and
the data service provider to develop public, private
and hybrid data mashup.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{Tran:2018:OMD,
author = "Tien Anh Tran",
title = "The Optimization of Marine Diesel Engine Rotational
Speed Control Process by Fuzzy Logic Control Based on
Particle Swarm Optimization Algorithm",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "10",
pages = "99",
day = "04",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10100099",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:02 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/10/99",
abstract = "The marine main diesel engine rotational speed
automatic control plays a significant role in
determining the optimal main diesel engine speed under
impacting on navigation environment conditions. In this
article, the application of fuzzy logic control theory
for main diesel engine speed control has been
associated with Particle Swarm Optimization (PSO).
Firstly, the controller is designed according to fuzzy
logic control theory. Secondly, the fuzzy logic
controller will be optimized by Particle Swarm
Optimization (PSO) in order to obtain the optimal
adjustment of the membership functions only. Finally,
the fuzzy logic controller has been completely
innovated by Particle Swarm Optimization algorithm. The
study results will be represented under digital
simulation form, as well as comparison between
traditional fuzzy logic controller with fuzzy logic
control-particle swarm optimization speed controller
being obtained.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue New Perspectives in Intelligent
Transportation Systems and Mobile Communications
towards a Smart Cities Context.",
}
@Article{Uslander:2018:ASE,
author = "Thomas Usl{\"a}nder and Thomas Batz",
title = "Agile Service Engineering in the Industrial {Internet
of Things}",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "10",
pages = "100",
day = "09",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10100100",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:02 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/10/100",
abstract = "The emerging Industrial Internet of Things (IIoT) will
not only leverage new and potentially disruptive
business models but will also change the way software
applications will be analyzed and designed. Agility is
a need in a systematic service engineering as well as a
co-design of requirements and architectural artefacts.
Functional and non-functional requirements of IT users
(in smart manufacturing mostly from the disciplines of
mechanical engineering and electrical engineering) need
to be mapped to the capabilities and interaction
patterns of emerging IIoT service platforms, not to
forget the corresponding information models. The
capabilities of such platforms are usually described,
structured, and formalized by software architects and
software engineers. However, their technical
descriptions are far away from the thinking and the
thematic terms of end-users. This complicates the
transition from requirements analysis to system design,
and hence the re-use of existing and the design of
future platform capabilities. Current software
engineering methodologies do not systematically cover
these interlinked and two-sided aspects. The article
describes in a comprehensive manner how to close this
gap with the help of a service-oriented analysis and
design methodology entitled SERVUS (also mentioned in
ISO 19119 Annex D) and a corresponding Web-based
Platform Engineering Information System (PEIS).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Khan:2018:RHD,
author = "Sara Khan and Claudio Germak",
title = "Reframing {HRI} Design Opportunities for Social
Robots: Lessons Learnt from a Service Robotics Case
Study Approach Using {UX} for {HRI}",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "10",
pages = "101",
day = "10",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10100101",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:02 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/10/101",
abstract = "Over the last few decades, semi-autonomous machine's
technology started to promote awareness towards the
importance of human--robot interaction (HRI) for
improving daily activities. More affordable social
robots are being commercially released and in order to
implement viable applications of HRI, a combination
human-computer interaction and user experience
methodologies could play a pivotal role in assessing
new scenarios and evaluating new investigations.
However, literature shows that it is still challenging
to reach an optimal user experience with robotic
companions. The aim of the study was to determine the
chance to enhance the user experience with a
semi-autonomous social robot, using user experience and
human--computer interaction methodologies. In this
study, a social robotic companion has been developed
and prototyped in order to be adopted in a specific
public environment such as a company workspace. The
challenges emerged from this peculiar environment
triggered the need for a more productive and
comfortable office for the employees, and, at the same
time, the usability, acceptance and likeability of the
robotic companion have been evaluated. The results
emphasize that, since HRI is highly interdisciplinary,
the benefits of combining approaches from other fields
could positively benefit from a meaningful social
interaction with the users.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Xu:2018:EAS,
author = "Yi-Han Xu and Qiu-Ya Sun and Yu-Tong Xiao",
title = "An Environmentally Aware Scheme of Wireless Sensor
Networks for Forest Fire Monitoring and Detection",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "10",
pages = "102",
day = "19",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10100102",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:02 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/10/102",
abstract = "Forest fires are a fatal threat to environmental
degradation. Wireless sensor networks (WSNs) are
regarded as a promising candidate for forest fire
monitoring and detection since they enable real-time
monitoring and early detection of fire threats in an
efficient way. However, compared to conventional
surveillance systems, WSNs operate under a set of
unique resource constraints, including limitations with
respect to transmission range, energy supply and
computational capability. Considering that long
transmission distance is inevitable in harsh
geographical features such as woodland and shrubland,
energy-efficient designs of WSNs are crucial for
effective forest fire monitoring and detection systems.
In this paper, we propose a novel framework that
harnesses the benefits of WSNs for forest fire
monitoring and detection. The framework employs random
deployment, clustered hierarchy network architecture
and environmentally aware protocols. The goal is to
accurately detect a fire threat as early as possible
while maintaining a reasonable energy consumption
level. ns-2-based simulation validates that the
proposed framework outperforms the conventional schemes
in terms of detection delay and energy consumption.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ibba:2018:ICO,
author = "Simona Ibba and Andrea Pinna and Maria Ilaria Lunesu
and Michele Marchesi and Roberto Tonelli",
title = "Initial Coin Offerings and Agile Practices",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "11",
pages = "103",
day = "23",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10110103",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/11/103",
abstract = "An ICO (Initial Coin Offering) is an innovative way to
fund projects based on blockchain. The funding is based
on the selling of tokens by means of decentralized
applications called smart contracts written in
Solidity, a programming language specific for Ethereum
blockchain. The ICOs work in a volatile context and it
is crucial that the team is capable of handling
constant changes. The Agile methods, proven practices
enabling to develop software in presence of changing
requirements, could be a means for managing
uncertainty. The main goals of this work are to
understand software engineering activities related to
ICOs, recognize the ICOs developed using Agile methods,
and make a comparison between ICOs and Agile ICOs. In
addition, we perform a deeper analysis of Agile ICOs
concerning project planning, software development, and
code features. Our work shows that the roles of the
people involved in an ICO can be compared to the
typical roles of the SCRUM methodology. The majority of
Agile ICOs use tool of testing before storing smart
contract on blockchain. Finally, the application of
volumetric and complexity software metrics shows that
the files of Agile ICOs is on average shorter and less
complex than in other smart contracts.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2018:RBM,
author = "Chuang Wang and Xu'nan Chen and Abdel-Hamid Ali
Soliman and Zhixiang Zhu",
title = "{RFID} Based Manufacturing Process of Cloud {MES}",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "11",
pages = "104",
day = "30",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10110104",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/11/104",
abstract = "RFID (radio frequency identification) is widely used
in the manufacturing processes of enterprises. At the
same time, with the advent of the Industry 4.0 era,
Manufacturing Execution System (MES) systems began to
evolve into cloud MES systems. In this paper, a
RFID-based manufacturing process for cloud MES is
proposed and a framework manufacturing process for a
cloud MES system centered on machine tools is
constructed. The process division of the manufacturing
process, RFID configuration and cloud processing are
analyzed, and other key technologies involved in
implementing the framework are briefly discussed.
Finally, the effectiveness of a RFID-based
manufacturing process of cloud MES is verified by two
different types of case analysis namely photovoltaic
slice production and garment outsourcing processing.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue New Developments in RFID Technologies
and Applications and Their Integration into IoT.",
}
@Article{Li:2018:IPI,
author = "YangQun Li",
title = "An Integrated Platform for the {Internet of Things}
Based on an Open Source Ecosystem",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "11",
pages = "105",
day = "31",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10110105",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/gnu.bib",
URL = "https://www.mdpi.com/1999-5903/10/11/105",
abstract = "The Internet of Things (IoT) is increasingly part of
daily life. However, the development of IoT
applications still faces many problems, such as
heterogeneity, complex management, and other
difficulties. In this paper, first, the open source
technologies of IoT are surveyed. We compare these
technologies from the point of view of different levels
of technical requirements, such as device management,
data management, communication, intelligent data
processing, security and privacy protection; we also
look at requirements of application development and
deployment. Second, an IoT integrated development
platform architecture for IoT applications based on
open source ecosystem is proposed and evaluated in an
industrial setting. We applied P2P technology to
distributed resource management and blockchain-based
smart contract mechanics for resource billing
management. The results show that the IoT gateway based
on an open source ecosystem had a stable and reliable
system performance with a certain data size and
concurrency scale. These conditions satisfy the
application requirements of the IoT in most sensing
environments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Internet of Things.",
}
@Article{Ji:2018:DIR,
author = "Wusheng Ji and Li Li and Weiwei Zhou",
title = "Design and Implementation of a {RFID} Reader\slash
Router in {RFID-WSN} Hybrid System",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "11",
pages = "106",
day = "03",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10110106",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/11/106",
abstract = "In order to put Radio Frequency Identification (RFID)
and Wireless Sensor Network (WSN) in a hybrid system,
this paper presents the design and implementation of a
RFID reader/router that can obtain information of both
RFID tags and WSN sensor nodes and transmit the
information through the WSN to the PC server. The RFID
reader and WSN router are combined with both hardware
and software. In hardware structure, CC2530 is used as
micro controller and RF module for ZigBee wireless
communication, and MF RC522 is used as reader RF chip.
The software deals with both identity and sensing
information and controls the routing. Experiment
results show that the RFID reader/router achieves long
distance identification, flexibility, scalability, and
low cost. It also provides reliable and secured data
transmission and broadens the communication range and
application scope of RFID readers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Nikoloudakis:2018:CSR,
author = "Yannis Nikoloudakis and Spyridon Panagiotakis and
Thrasivoulos Manios and Evangelos Markakis and
Evangelos Pallis",
title = "Composting as a Service: a Real-World {IoT}
Implementation",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "11",
pages = "107",
day = "05",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10110107",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/11/107",
abstract = "Composting is the delicate procedure of supervised
decomposition of organic waste, which gradually
transforms waste to nutrient-rich manure. It requires
deep knowledge and constant attention by experts to
achieve a quality outcome in a timely fashion.
Nevertheless, due to the bizarre nature of the
materials and the overall procedure, along with the
space required and emitted odors, it is required that
composting infrastructures and machinery are installed
away from residential areas, rendering supervision a
very tedious task. Automatic composting machinery is a
promising new idea, but still cannot substitute the
insightfulness of a human supervisor. In this paper, we
introduce COMPosting as a Service (COMPaaS). COMPaaS is
a novel cloud service in composition with specialized
Internet of Things (IoT)-based composting machinery
that allows for unsupervised composting. The focus of
this work is on the tiered IT approach that is adopted
following the edge-computing paradigm. More
specifically, composting machinery, enriched with
several sensors and actuators, performs a set of basic
routine tasks locally and sends sensor values to a
cloud service which performs real-time data analysis
and instructs the composting machinery to perform the
appropriate actions based on the outcome of the
analysis. The overall composting procedure is performed
in a completely unsupervised manner, and field
evaluation has shown an up to 30\% faster outcome in
comparison to traditional supervised composting.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Internet of Things.",
}
@Article{Tsiropoulou:2018:QEC,
author = "Eirini Eleni Tsiropoulou and George Kousis and Athina
Thanou and Ioanna Lykourentzou and Symeon
Papavassiliou",
title = "Quality of Experience in Cyber-Physical Social Systems
Based on Reinforcement Learning and Game Theory",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "11",
pages = "108",
day = "07",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10110108",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/11/108",
abstract = "This paper addresses the problem of museum visitors'
Quality of Experience (QoE) optimization by viewing and
treating the museum environment as a cyber-physical
social system. To achieve this goal, we harness
visitors' internal ability to intelligently sense their
environment and make choices that improve their QoE in
terms of which the museum touring option is the best
for them and how much time to spend on their visit. We
model the museum setting as a distributed
non-cooperative game where visitors selfishly maximize
their own QoE. In this setting, we formulate the
problem of Recommendation Selection and Visiting Time
Management (RSVTM) and propose a two-stage distributed
algorithm based on game theory and reinforcement
learning, which learns from visitor behavior to make
on-the-fly recommendation selections that maximize
visitor QoE. The proposed framework enables autonomic
visitor-centric management in a personalized manner and
enables visitors themselves to decide on the best
visiting strategies. Experimental results evaluating
the performance of the proposed RSVTM algorithm under
realistic simulation conditions indicate the high
operational effectiveness and superior performance when
compared to other recommendation approaches. Our
results constitute a practical alternative for museums
and exhibition spaces meant to enhance visitor QoE in a
flexible, efficient, and cost-effective manner.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Giddings:2018:RDB,
author = "Roger Giddings and Xiao Duan and Ehab Al-Rawachy and
Mingzhi Mao",
title = "A Review of {DSP}-Based Enabling Technologies for
Cloud Access Networks",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "11",
pages = "109",
day = "15",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10110109",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/11/109",
abstract = "Optical access networks, metro networks and mobile
data networks are facing rapidly evolving demands, not
only is it essential to satisfy the unyielding need for
increased user bandwidths, but future networks must
also support the growing wide variation in traffic
dynamics and characteristics, due to various emerging
technologies, such as cloud-based services, the
Internet-of-Things (IoT) and 5G mobile systems, and due
to growing trends, such as the proliferation of mobile
devices and the rapidly increasing popularity of
video-on-demand services. To be cost-effective and
commercially sustainable, future optical networks must
offer features, such as, dynamic reconfigurability,
highly efficient use of network resources, elastic
bandwidth provisioning with fine granularity, network
sliceabilty and software defined networking (SDN). To
meet these requirements Cloud Access Networks (CANs)
are proposed which require a number of flexible,
adaptive and reconfigurable networking elements. By
exploiting digital signal processing (DSP) we have
proposed a digital orthogonal filter-based multiplexing
technique to implement CANs with multiplexed,
independent optical channels at the wavelength,
sub-wavelength, and orthogonal sub-band levels. This
paper reviews the overall CAN concept, the operating
principles of the various CAN network elements and
presents an overview of the research work we have
undertaken in order to validate the feasibility of the
proposed technologies which includes real-time
DSP-based demonstrations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in DSP-Based Optical
Communications.",
}
@Article{Zhai:2018:IEM,
author = "Linbo Zhai and Wenwen Jiang",
title = "Intelligent Environment Monitoring System for
University Laboratories",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "11",
pages = "110",
day = "16",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10110110",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/11/110",
abstract = "In recent years, the laboratory security of
universities has become an important issue for students
and devices. To solve this security issue, this paper
proposes an intelligent monitoring system to realize
environment detection in university laboratories. The
main purpose of this system is to monitor the
laboratory environment data in time and improve the
laboratory inspection efficiency. The system consists
of a single chip microcomputer, which is the core of
this system, a sensor function module and GPRS wireless
communication, realizing data monitoring and short
message warning. Therefore, three features, front-end
data acquisition, data wireless transmission and a
security alarm, are achieved by the proposed system.
The real experiments show that front-end data
acquisition is effective, data transmission is
reliable, and the alarm message is received in time.
Furthermore, the system, with the modified function
modules, can be used in other scenarios to detect
environments, and thus has a significant applied value
in other areas.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Internet of Things.",
}
@Article{Song:2018:NSC,
author = "Anping Song and Zuoyu Wu and Xuehai Ding and Qian Hu
and Xinyi Di",
title = "Neurologist Standard Classification of Facial Nerve
Paralysis with Deep Neural Networks",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "11",
pages = "111",
day = "16",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10110111",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/11/111",
abstract = "Facial nerve paralysis (FNP) is the most common form
of facial nerve damage, which leads to significant
physical pain and abnormal function in patients.
Traditional FNP detection methods are based on visual
diagnosis, which relies solely on the physician's
assessment. The use of objective measurements can
reduce the frequency of errors which are caused by
subjective methods. Hence, a fast, accurate, and
objective computer method for FNP classification is
proposed that uses a single Convolutional neural
network (CNN), trained end-to-end directly from images,
with only pixels and disease labels as inputs. We
trained the CNN using a dataset of 1049 clinical images
and divided the dataset into 7 categories based on
classification standards with the help of neurologists.
We tested its performance against the neurologists'
ground truth, and our results matched the neurologists'
level with 97.5\% accuracy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Innovative Topologies and Algorithms for
Neural Networks.",
}
@Article{Xu:2018:QRU,
author = "Jialu Xu and Feiyue Ye",
title = "Query Recommendation Using Hybrid Query Relevance",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "11",
pages = "112",
day = "19",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10110112",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/11/112",
abstract = "With the explosion of web information, search engines
have become main tools in information retrieval.
However, most queries submitted in web search are
ambiguous and multifaceted. Understanding the queries
and mining query intention is critical for search
engines. In this paper, we present a novel query
recommendation algorithm by combining query information
and URL information which can get wide and accurate
query relevance. The calculation of query relevance is
based on query information by query co-concurrence and
query embedding vector. Adding the ranking to query-URL
pairs can calculate the strength between query and URL
more precisely. Empirical experiments are performed
based on AOL log. The results demonstrate the
effectiveness of our proposed query recommendation
algorithm, which achieves superior performance compared
to other algorithms.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Big Data and Augmented Intelligence.",
}
@Article{Li:2018:CTC,
author = "Yue Li and Xutao Wang and Pengjian Xu",
title = "{Chinese} Text Classification Model Based on Deep
Learning",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "11",
pages = "113",
day = "20",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10110113",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/11/113",
abstract = "Text classification is of importance in natural
language processing, as the massive text information
containing huge amounts of value needs to be classified
into different categories for further use. In order to
better classify text, our paper tries to build a deep
learning model which achieves better classification
results in Chinese text than those of other
researchers' models. After comparing different methods,
long short-term memory (LSTM) and convolutional neural
network (CNN) methods were selected as deep learning
methods to classify Chinese text. LSTM is a special
kind of recurrent neural network (RNN), which is
capable of processing serialized information through
its recurrent structure. By contrast, CNN has shown its
ability to extract features from visual imagery.
Therefore, two layers of LSTM and one layer of CNN were
integrated to our new model: the BLSTM-C model (BLSTM
stands for bi-directional long short-term memory while
C stands for CNN.) LSTM was responsible for obtaining a
sequence output based on past and future contexts,
which was then input to the convolutional layer for
extracting features. In our experiments, the proposed
BLSTM-C model was evaluated in several ways. In the
results, the model exhibited remarkable performance in
text classification, especially in Chinese texts.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Innovative Topologies and Algorithms for
Neural Networks.",
}
@Article{Ali:2018:PSI,
author = "Shaukat Ali and Naveed Islam and Azhar Rauf and Ikram
Ud Din and Mohsen Guizani and Joel J. P. C. Rodrigues",
title = "Privacy and Security Issues in Online Social
Networks",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "12",
pages = "114",
day = "22",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10120114",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/12/114",
abstract = "The advent of online social networks (OSN) has
transformed a common passive reader into a content
contributor. It has allowed users to share information
and exchange opinions, and also express themselves in
online virtual communities to interact with other users
of similar interests. However, OSN have turned the
social sphere of users into the commercial sphere. This
should create a privacy and security issue for OSN
users. OSN service providers collect the private and
sensitive data of their customers that can be misused
by data collectors, third parties, or by unauthorized
users. In this paper, common security and privacy
issues are explained along with recommendations to OSN
users to protect themselves from these issues whenever
they use social media.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Yang:2018:VBH,
author = "Wanli Yang and Yimin Chen and Chen Huang and Mingke
Gao",
title = "Video-Based Human Action Recognition Using Spatial
Pyramid Pooling and {3D} Densely Convolutional
Networks",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "12",
pages = "115",
day = "22",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10120115",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/12/115",
abstract = "In recent years, the application of deep neural
networks to human behavior recognition has become a hot
topic. Although remarkable achievements have been made
in the field of image recognition, there are still many
problems to be solved in the area of video. It is well
known that convolutional neural networks require a
fixed size image input, which not only limits the
network structure but also affects the recognition
accuracy. Although this problem has been solved in the
field of images, it has not yet been broken through in
the field of video. To address the input problem of
fixed size video frames in video recognition, we
propose a three-dimensional (3D) densely connected
convolutional network based on spatial pyramid pooling
(3D-DenseNet-SPP). As the name implies, the network
structure is mainly composed of three parts: 3DCNN,
DenseNet, and SPPNet. Our models were evaluated on a
KTH dataset and UCF101 dataset separately. The
experimental results showed that our model has better
performance in the field of video-based behavior
recognition in comparison to the existing models.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Zhu:2018:BDL,
author = "Yonghua Zhu and Xun Gao and Weilin Zhang and Shenkai
Liu and Yuanyuan Zhang",
title = "A Bi-Directional {LSTM-CNN} Model with Attention for
Aspect-Level Text Classification",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "12",
pages = "116",
day = "24",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10120116",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/12/116",
abstract = "The prevalence that people share their opinions on the
products and services in their daily lives on the
Internet has generated a large quantity of comment
data, which contain great business value. As for
comment sentences, they often contain several comment
aspects and the sentiment on these aspects are
different, which makes it meaningless to give an
overall sentiment polarity of the sentence. In this
paper, we introduce Attention-based Aspect-level
Recurrent Convolutional Neural Network (AARCNN) to
analyze the remarks at aspect-level. The model
integrates attention mechanism and target information
analysis, which enables the model to concentrate on the
important parts of the sentence and to make full use of
the target information. The model uses bidirectional
LSTM (Bi-LSTM) to build the memory of the sentence, and
then CNN is applied to extracting attention from memory
to get the attentive sentence representation. The model
uses aspect embedding to analyze the target information
of the representation and finally the model outputs the
sentiment polarity through a softmax layer. The model
was tested on multi-language datasets, and demonstrated
that it has better performance than conventional deep
learning methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Big Data Processing and Analytics in the
Era of Extreme Connectivity and Automation.",
}
@Article{Wang:2018:PRA,
author = "Bo Wang and Feiyue Ye and Jialu Xu",
title = "A Personalized Recommendation Algorithm Based on the
User's Implicit Feedback in E-Commerce",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "12",
pages = "117",
day = "29",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10120117",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/12/117",
abstract = "A recommendation system can recommend items of
interest to users. However, due to the scarcity of user
rating data and the similarity of single ratings, the
accuracy of traditional collaborative filtering
algorithms (CF) is limited. Compared with user rating
data, the user's behavior log is easier to obtain and
contains a large amount of implicit feedback
information, such as the purchase behavior, comparison
behavior, and sequences of items (item-sequences). In
this paper, we proposed a personalized recommendation
algorithm based on a user's implicit feedback (BUIF).
BUIF considers not only the user's purchase behavior
but also the user's comparison behavior and
item-sequences. We extracted the purchase behavior,
comparison behavior, and item-sequences from the user's
behavior log; calculated the user's similarity by
purchase behavior and comparison behavior; and extended
word-embedding to item-embedding to obtain the item's
similarity. Based on the above method, we built a
secondary reordering model to generate the
recommendation results for users. The results of the
experiment on the JData dataset show that our algorithm
shows better improvement in regard to recommendation
accuracy over other CF algorithms.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Data Science for Internet of Things.",
}
@Article{Wei:2018:DBG,
author = "Jinlong Wei and Ji Zhou and Elias Giacoumidis and Paul
A. Haigh and Jianming Tang",
title = "{DSP}-Based {40 GB/s} Lane Rate Next-Generation Access
Networks",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "12",
pages = "118",
day = "30",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10120118",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/12/118",
abstract = "To address the continuous growth in high-speed
ubiquitous access required by residential users and
enterprises, Telecommunication operators must upgrade
their networks to higher data rates. For optical fiber
access networks that directly connect end users to
metro/regional network, capacity upgrade must be done
in a cost- and energy-efficient manner. 40 Gb/s is the
possible lane rate for the next generation passive
optical networks (NG-PONs). Ideally, existing 10 G PON
components could be reused to support 40 Gb/s lane-rate
NG-PON transceiver, which requires efficient modulation
format and digital signal processing (DSP) to alleviate
the bandwidth limitation and fiber dispersion. The
major contribution of this work is to offer insight
performance comparisons of 40 Gb/s lane rate electrical
three level Duobinary, optical Duobinary, and
four-level pulse amplitude modulation (PAM-4) for
incorporating low complex DSPs, including linear and
nonlinear Volterra equalization, as well as maximum
likelihood sequence estimation. Detailed analysis and
comparison of the complexity of various DSP algorithms
are performed. Transceiver bandwidth optimization is
also undertaken. The results show that the choices of
proper modulation format and DSP configuration depend
on the transmission distances of interest.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in DSP-Based Optical
Communications.",
}
@Article{R:2018:SDM,
author = "Jithin R and Priya Chandran",
title = "Secure and Dynamic Memory Management Architecture for
Virtualization Technologies in {IoT} Devices",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "12",
pages = "119",
day = "30",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10120119",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/10/12/119",
abstract = "The introduction of the internet in embedded devices
led to a new era of technology --- the Internet of
Things (IoT) era. The IoT technology-enabled device
market is growing faster by the day, due to its
complete acceptance in diverse areas such as domicile
systems, the automobile industry, and beyond. The
introduction of internet connectivity in objects that
are frequently used in daily life raises the question
of security --- how secure is the information and the
infrastructure handled by these devices when they are
connected to the internet? Security enhancements
through standard cryptographic techniques are not
suitable due to the power and performance constraints
of IoT devices. The introduction of virtualization
technology into IoT devices is a recent development,
meant for fulfilling security and performance needs.
However, virtualization augments the vulnerability
present in IoT devices, due to the addition of one more
software layer --- namely, the hypervisor, which
enables the sharing of resources among different users.
This article proposes the adaptation of ASMI
(Architectural Support for Memory Isolation --- a
general architecture available in the literature for
the improvement of the performance and security of
virtualization technology) on the popular MIPS
(Microprocessor without Interlocked Pipeline Stages)
embedded virtualization platform, which could be
adopted in embedded virtualization architectures for
IoT devices. The article illustrates the performance
enhancement achieved by the proposed architecture with
the existing architectures.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue IoT Security and Privacy.",
}
@Article{Collodi:2018:PRC,
author = "Stefania Collodi and Sara Panerati and Enrico Imbimbo
and Federica Stefanelli and Mirko Duradoni and Andrea
Guazzini",
title = "Personality and Reputation: a Complex Relationship in
Virtual Environments",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "12",
pages = "120",
day = "01",
month = dec,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10120120",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/12/120",
abstract = "Online reputational systems are nowadays widely and
effectively adopted by several online platforms to
support and improve peoples' interactions and
communication. Despite the research approached and
modeled social dynamics of reputational systems in
different domains, adopting different frameworks, the
role played by psycho-social factors, and personality
traits, determining the individual susceptibility to
online reputation is still elusive. To study such
mediation effects, we implemented a modified online
version of the Ultimatum Game, in which participants
(215 adolescents) played before as proposers, and then
as responders, always knowing the reputation of their
interactors. Furthermore, after the reception phase,
participants could evaluate the received offers, giving
positive or negative feedback to their proposers.
Despite the participants' belief they were playing with
their schoolmates, the interactors' role was always
fulfilled by bots characterized by standardized
behaviors. Our results show how psychological traits
influence the participants' behavior in all the game
phases, as well as in the rating dynamics. Reputation
seems to have a direct effect only in the allocation
behavior, while, in regards the other dynamics of the
game (i.e., acceptance and rating), it comes into play
in a complex interaction with the psychological
dimensions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vishwakarma:2018:EJM,
author = "Gopal Vishwakarma and Wonjun Lee",
title = "Exploiting {JTAG} and Its Mitigation in {IOT}: a
Survey",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "12",
pages = "121",
day = "03",
month = dec,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10120121",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/12/121",
abstract = "Nowadays, companies are heavily investing in the
development of ``Internet of Things(IoT)'' products.
These companies usually and obviously hunt for
lucrative business models. Currently, each person owns
at least 3-4 devices (such as mobiles, personal
computers, Google Assistant, Alexa, etc.) that are
connected to the Internet 24/7. However, in the future,
there might be hundreds of devices that will be
constantly online behind each person, keeping track of
body health, banking transactions, status of personal
devices, etc. to make one's life more efficient and
streamlined. Thus, it is very crucial that each device
should be highly secure since one's life will become
dependent on these devices. However, the current
security of IoT devices is mainly focused on resiliency
of device. In addition, less complex node devices are
easily accessible to the public resulting in higher
vulnerability. JTAG is an IEEE standard that has been
defined to test proper mounting of components on PCBs
(printed circuit boards) and has been extensively used
by PCB manufacturers to date. This JTAG interface can
be used as a backdoor entry to access and exploit
devices, also defined as a physical attack. This attack
can be used to make products malfunction, modify data,
or, in the worst case, stop working. This paper reviews
previous successful JTAG exploitations of well-known
devices operating online and also reviews some proposed
possible solutions to see how they can affect IoT
products in a broader sense.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue IoT Security and Privacy.",
}
@Article{Chen:2018:CPM,
author = "Zubin Chen and Baijun Lu and Yanzhou Zhu and Hao Lv",
title = "A Compact Printed Monopole Antenna for {WiMAX\slash
WLAN} and {UWB} Applications",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "12",
pages = "122",
day = "13",
month = dec,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10120122",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/12/122",
abstract = "In this paper, a printed monopole antenna design for
WiMAX/WLAN applications in cable-free self-positioning
seismograph nodes is proposed. Great improvements were
achieved in miniaturizing the antenna and in widening
the narrow bandwidth of the high-frequency band. The
antenna was fed by a microstrip gradient line and
consisted of a triangle, an inverted-F shape, and an
M-shaped structure, which was rotated 90\°
counterclockwise to form a surface-radiating patch.
This structure effectively widened the operating
bandwidth of the antenna. Excitation led to the
generation of two impedance bands of 2.39--2.49 and
4.26--7.99 GHz for a voltage standing wave ratio of
less than 2. The two impedance bandwidths were 100 MHz,
i.e., 4.08\% relative to the center frequency of 2.45
GHz, and 3730 MHz, i.e., 64.31\% relative to the center
frequency of 5.80 GHz, covering the WiMAX
high-frequency band (5.25--5.85 GHz) and the WLAN band
(2.4/5.2/5.8). This article describes the design
details of the antenna and presents the results of both
simulations and experiments that show good agreement.
The proposed antenna meets the field-work requirements
of cable-less seismograph nodes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ali:2018:BRN,
author = "Mohammed N. A. Ali and Guanzheng Tan and Aamir
Hussain",
title = "Bidirectional Recurrent Neural Network Approach for
{Arabic} Named Entity Recognition",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "12",
pages = "123",
day = "13",
month = dec,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10120123",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/12/123",
abstract = "Recurrent neural network (RNN) has achieved remarkable
success in sequence labeling tasks with memory
requirement. RNN can remember previous information of a
sequence and can thus be used to solve natural language
processing (NLP) tasks. Named entity recognition (NER)
is a common task of NLP and can be considered a
classification problem. We propose a bidirectional long
short-term memory (LSTM) model for this entity
recognition task of the Arabic text. The LSTM network
can process sequences and relate to each part of it,
which makes it useful for the NER task. Moreover, we
use pre-trained word embedding to train the inputs that
are fed into the LSTM network. The proposed model is
evaluated on a popular dataset called ``ANERcorp.''
Experimental results show that the model with word
embedding achieves a high F-score measure of
approximately 88.01\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Innovative Topologies and Algorithms for
Neural Networks.",
}
@Article{Deng:2018:MFP,
author = "Ziyun Deng and Tingqin He",
title = "A Method for Filtering Pages by Similarity Degree
based on Dynamic Programming",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "12",
pages = "124",
day = "13",
month = dec,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10120124",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/12/124",
abstract = "To obtain the target webpages from many webpages, we
proposed a Method for Filtering Pages by Similarity
Degree based on Dynamic Programming (MFPSDDP). The
method needs to use one of three same relationships
proposed between two nodes, so we give the definition
of the three same relationships. The biggest innovation
of MFPSDDP is that it does not need to know the
structures of webpages in advance. First, we address
the design ideas with queue and double threads. Then, a
dynamic programming algorithm for calculating the
length of the longest common subsequence and a formula
for calculating similarity are proposed. Further, for
obtaining detailed information webpages from 200,000
webpages downloaded from the famous website
``www.jd.com'', we choose the same relationship
Completely Same Relationship (CSR) and set the
similarity threshold to 0.2. The Recall Ratio (RR) of
MFPSDDP is in the middle in the four filtering methods
compared. When the number of webpages filtered is
nearly 200,000, the PR of MFPSDDP is highest in the
four filtering methods compared, which can reach
85.1\%. The PR of MFPSDDP is 13.3 percentage points
higher than the PR of a Method for Filtering Pages by
Containing Strings (MFPCS).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Big Data Processing and Analytics in the
Era of Extreme Connectivity and Automation.",
}
@Article{Pecorella:2018:NSF,
author = "Tommaso Pecorella and Laura Pierucci and Francesca
Nizzi",
title = "''{Network} Sentiment'' Framework to Improve Security
and Privacy for Smart Home",
journal = j-FUTURE-INTERNET,
volume = "10",
number = "12",
pages = "125",
day = "19",
month = dec,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi10120125",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:03 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/10/12/125",
abstract = "A Smart Home is characterized by the presence of a
huge number of small, low power devices, along with
more classical devices. According to the Internet of
Things (IoT) paradigm, all of them are expected to be
always connected to the Internet in order to provide
enhanced services. In this scenario, an attacker can
undermine both the network security and the user's
security/privacy. Traditional security measures are not
sufficient, because they are too difficult to setup and
are either too weak to effectively protect the user or
too limiting for the new services effectiveness. The
paper suggests to dynamically adapt the security level
of the smart home network according to the user
perceived risk level what we have called network
sentiment analysis. The security level is not fixed,
established by a central system (usually by the
Internet Service Provider) but can be changed with the
users cooperation. The security of the smart home
network is improved by a distributed firewalls and
Intrusion Detection Systems both to the smart home side
as to the Internet Service Provider side. These two
parts must cooperate and integrate their actions for
reacting dynamically to new and on going threats.
Moreover, the level of network sentiment detected can
be propagate to nearby home networks (e.g., the smart
home networks of the apartments inside a building) to
increase/decrease their level of security, thus
creating a true in-line Intrusion Prevention System
(IPS). The paper also presents a test bed for Smart
Home to detect and counteract to different attacks
against the IoT sensors, Wi-Fi and Ethernet
connections.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue IoT Security and Privacy.",
}
@Article{Silva:2019:BUM,
author = "Cristiano M. Silva and Lucas D. Silva and Leonardo A.
L. Santos and Jo{\~a}o F. M. Sarubbi and Andreas
Pitsillides",
title = "Broadening Understanding on Managing the Communication
Infrastructure in Vehicular Networks: Customizing the
Coverage Using the Delta Network",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "1",
day = "20",
month = dec,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/1",
abstract = "Over the past few decades, the growth of the urban
population has been remarkable. Nowadays, 50\% of the
population lives in urban areas, and forecasts point
that by 2050 this number will reach 70\%. Today, 64\%
of all travel made is within urban environments and the
total amount of urban kilometers traveled is expected
to triple by 2050. Thus, seeking novel solutions for
urban mobility becomes paramount for 21st century
society. In this work, we discuss the performance of
vehicular networks. We consider the metric Delta
Network. The Delta Network characterizes the
connectivity of the vehicular network through the
percentage of travel time in which vehicles are
connected to roadside units. This article reviews the
concept of the Delta Network and extends its study
through the presentation of a general heuristic based
on the definition of scores to identify the areas of
the road network that should receive coverage. After
defining the general heuristic, we show how small
changes in the score computation can generate very
distinct (and interesting) patterns of coverage, each
one suited to a given scenario. In order to exemplify
such behavior, we propose three deployment strategies
based on simply changing the computation of scores. We
compare the proposed strategies to the intuitive
strategy of allocating communication units at the most
popular zones of the road network. Experiments show
that the strategies derived from the general heuristic
provide higher coverage than the intuitive strategy
when using the same number of communication devices.
Moreover, the resulting pattern of coverage is very
interesting, with roadside units deployed a circle
pattern around the traffic epicenter.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 5G Network Solutions for Automotive
Services.",
}
@Article{Giacoumidis:2019:HML,
author = "Elias Giacoumidis and Yi Lin and Jinlong Wei and Ivan
Aldaya and Athanasios Tsokanos and Liam P. Barry",
title = "Harnessing machine learning for fiber-induced
nonlinearity mitigation in long-haul coherent optical
{OFDM}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "2",
day = "20",
month = dec,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010002",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/2",
abstract = "Coherent optical orthogonal frequency division
multiplexing (CO-OFDM) has attracted a lot of interest
in optical fiber communications due to its simplified
digital signal processing (DSP) units, high
spectral-efficiency, flexibility, and tolerance to
linear impairments. However, CO-OFDM's high
peak-to-average power ratio imposes high vulnerability
to fiber-induced non-linearities. DSP-based machine
learning has been considered as a promising approach
for fiber non-linearity compensation without
sacrificing computational complexity. In this paper, we
review the existing machine learning approaches for
CO-OFDM in a common framework and review the progress
in this area with a focus on practical aspects and
comparison with benchmark DSP solutions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances in DSP-Based Optical
Communications.",
}
@Article{Butun:2019:SRA,
author = "Ismail Butun and Nuno Pereira and Mikael Gidlund",
title = "Security Risk Analysis of {LoRaWAN} and Future
Directions",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "3",
day = "21",
month = dec,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010003",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/3",
abstract = "LoRa (along with its upper layers definition ---
LoRaWAN) is one of the most promising Low Power Wide
Area Network (LPWAN) technologies for implementing
Internet of Things (IoT)-based applications. Although
being a popular technology, several works in the
literature have revealed vulnerabilities and risks
regarding the security of LoRaWAN v1.0 (the official
1st specification draft). The LoRa-Alliance has built
upon these findings and introduced several improvements
in the security and architecture of LoRa. The result of
these efforts resulted in LoRaWAN v1.1, released on 11
October 2017. This work aims at reviewing and
clarifying the security aspects of LoRaWAN v1.1. By
following ETSI guidelines, we provide a comprehensive
Security Risk Analysis of the protocol and discuss
several remedies to the security risks described. A
threat catalog is presented, along with discussions and
analysis in view of the scale, impact, and likelihood
of each threat. To the best of the authors' knowledge,
this work is one of the first of its kind, by providing
a detailed security risk analysis related to the latest
version of LoRaWAN. Our analysis highlights important
practical threats, such as end-device physical capture,
rogue gateway and self-replay, which require particular
attention by developers and organizations implementing
LoRa networks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue IoT Security and Privacy.",
}
@Article{Marabissi:2019:RCI,
author = "Dania Marabissi and Lorenzo Mucchi and Romano Fantacci
and Maria Rita Spada and Fabio Massimiani and Andrea
Fratini and Giorgio Cau and Jia Yunpeng and Lucio
Fedele",
title = "A Real Case of Implementation of the Future {5G}
City",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "4",
day = "22",
month = dec,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010004",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/4",
abstract = "The fifth generation (5G) of wireless communication
systems is considered the key technology to enable a
wide range of application scenarios and the effective
spreading of the smart city concept. Vertical business
use cases, specifically designed for the future 5G
city, will have a strong economical and social impact.
For this reason, ongoing 5G field trials have to test
newly deployed technologies as well as the capability
of 5G to create a new digital economy. This paper
describes the 5G field trial environment that was
launched in Italy at the end of 2017. The aim is to
evaluate the capability of the 5G network of supporting
innovative services with reference to suitably designed
key performance indicators and to evaluate the
opportunities offered by these services. Indeed,
vertical business use cases, specifically designed for
the future 5G city, with a strong economic and social
impact, are under implementation and will be evaluated.
In particular, the paper provides a detailed
description of the deployment of an actual complete
integrated 5G network. It shows how 5G is effective
enabling technology for a wide range of vertical
business and use cases. Indeed, its flexibility allows
to satisfy completely different performance
requirements of real services. Some preliminary
results, obtained during the first phase, are presented
for a smart mobility scenario.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Carta:2019:FCP,
author = "Salvatore Carta and Andrea Medda and Alessio Pili and
Diego Reforgiato Recupero and Roberto Saia",
title = "Forecasting E-Commerce Products Prices by Combining an
Autoregressive Integrated Moving Average {(ARIMA)}
Model and {Google Trends} Data",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "5",
day = "24",
month = dec,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010005",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/5",
abstract = "E-commerce is becoming more and more the main
instrument for selling goods to the mass market. This
led to a growing interest in algorithms and techniques
able to predict products future prices, since they
allow us to define smart systems able to improve the
quality of life by suggesting more affordable goods and
services. The joint use of time series, reputation and
sentiment analysis clearly represents one important
approach to this research issue. In this paper we
present Price Probe, a suite of software tools
developed to perform forecasting on products' prices.
Its primary aim is to predict the future price trend of
products generating a customized forecast through the
exploitation of autoregressive integrated moving
average (ARIMA) model. We experimented the
effectiveness of the proposed approach on one of the
biggest E-commerce infrastructure in the world: Amazon.
We used specific APIs and dedicated crawlers to extract
and collect information about products and their
related prices over time and, moreover, we extracted
information from social media and Google Trends that we
used as exogenous features for the ARIMA model. We
fine-estimated ARIMA's parameters and tried the
different combinations of the exogenous features and
noticed through experimental analysis that the presence
of Google Trends information significantly improved the
predictions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Ali:2019:FIE,
author = "Syed Mustafa Ali and Ana Filomena Curralo and Maged N.
Kamel Boulos and Sara Paiva",
title = "A Framework for Improving the Engagement of Medical
Practitioners in an E-Training Platform for
Tuberculosis Care and Prevention",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "6",
day = "28",
month = dec,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010006",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/6",
abstract = "We propose a new framework to improve the engagement
of medical practitioners in a planned e-training
platform for the successful identification and
effective management of presumptive cases of
tuberculosis (TB) in Pakistan. Our work is aligned with
the World Health Organization's TB-DOTS (Directly
Observed Treatment Short-course) strategy for promoting
the effective management of tuberculosis. We start by
presenting previous work done at Mercy Corps Pakistan
for training medical practitioners, then present the
results of a recent survey we administered to a random
sample of medical practitioners in Pakistan to learn
about their requirements and readiness to embrace a new
e-training platform and methodology. Informed by
feedback from the survey, we formulated a detailed
requirement analysis of the five key learning areas (or
phases) that we believe are fundamental to the success
of a TB e-training platform. Moreover, survey results
revealed that an on-spot, on-demand, and
competency-based learning tool can potentially improve
the engagement of medical practitioners in the process.
Building on the insights gained from the survey, we
finally describe our initial UX (user experience)
prototypes for phase 1, which corresponds to the
identification of presumptive tuberculosis cases.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue New Advances in E-Health.",
}
@Article{Grimaldi:2019:LWC,
author = "Matteo Grimaldi and Valerio Tenace and Andrea
Calimera",
title = "Layer-Wise Compressive Training for Convolutional
Neural Networks",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "7",
day = "28",
month = dec,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010007",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/7",
abstract = "Convolutional Neural Networks (CNNs) are
brain-inspired computational models designed to
recognize patterns. Recent advances demonstrate that
CNNs are able to achieve, and often exceed, human
capabilities in many application domains. Made of
several millions of parameters, even the simplest CNN
shows large model size. This characteristic is a
serious concern for the deployment on
resource-constrained embedded-systems, where
compression stages are needed to meet the stringent
hardware constraints. In this paper, we introduce a
novel accuracy-driven compressive training algorithm.
It consists of a two-stage flow: first, layers are
sorted by means of heuristic rules according to their
significance; second, a modified stochastic gradient
descent optimization is applied on less significant
layers such that their representation is collapsed into
a constrained subspace. Experimental results
demonstrate that our approach achieves remarkable
compression rates with low accuracy loss (\<1\%).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected papers from INTESA Workshop
2018.",
}
@Article{Cocco:2019:ABM,
author = "Luisanna Cocco and Roberto Tonelli and Michele
Marchesi",
title = "An Agent Based Model to Analyze the {Bitcoin} Mining
Activity and a Comparison with the Gold Mining
Industry",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "8",
day = "02",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010008",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/8",
abstract = "In this paper, we present an analysis of the mining
process of two popular assets, Bitcoin and gold. The
analysis highlights that Bitcoin, more specifically its
underlying technology, is a ``safe haven'' that allows
facing the modern environmental challenges better than
gold. Our analysis emphasizes that crypto-currencies
systems have a social and economic impact much smaller
than that of the traditional financial systems. We
present an analysis of the several stages needed to
produce an ounce of gold and an artificial agent-based
market model simulating the Bitcoin mining process and
allowing the quantification of Bitcoin mining costs. In
this market model, miners validate the Bitcoin
transactions using the proof of work as the consensus
mechanism, get a reward in Bitcoins, sell a fraction of
them to cover their expenses, and stay competitive in
the market by buying and divesting hardware units and
adjusting their expenses by turning off/on their
machines according to the signals provided by a
technical analysis indicator, the so-called relative
strength index.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhang:2019:ODN,
author = "Ying Zhang and Yimin Chen and Chen Huang and Mingke
Gao",
title = "Object Detection Network Based on Feature Fusion and
Attention Mechanism",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "9",
day = "02",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010009",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/9",
abstract = "In recent years, almost all of the current
top-performing object detection networks use CNN
(convolutional neural networks) features.
State-of-the-art object detection networks depend on
CNN features. In this work, we add feature fusion in
the object detection network to obtain a better CNN
feature, which incorporates well deep, but semantic,
and shallow, but high-resolution, CNN features, thus
improving the performance of a small object. Also, the
attention mechanism was applied to our object detection
network, AF R-CNN (attention mechanism and convolution
feature fusion based object detection), to enhance the
impact of significant features and weaken background
interference. Our AF R-CNN is a single end to end
network. We choose the pre-trained network, VGG-16, to
extract CNN features. Our detection network is trained
on the dataset, PASCAL VOC 2007 and 2012. Empirical
evaluation of the PASCAL VOC 2007 dataset demonstrates
the effectiveness and improvement of our approach. Our
AF R-CNN achieves an object detection accuracy of
75.9\% on PASCAL VOC 2007, six points higher than
Faster R-CNN.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Innovative Topologies and Algorithms for
Neural Networks.",
}
@Article{Qin:2019:TCB,
author = "Jiwei Qin and Liangli Ma and Jinghua Niu",
title = "{THBase}: a Coprocessor-Based Scheme for Big
Trajectory Data Management",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "10",
day = "03",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010010",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/10",
abstract = "The rapid development of distributed technology has
made it possible to store and query massive trajectory
data. As a result, a variety of schemes for big
trajectory data management have been proposed. However,
the factor of data transmission is not considered in
most of these, resulting in a certain impact on query
efficiency. In view of that, we present THBase, a
coprocessor-based scheme for big trajectory data
management in HBase. THBase introduces a segment-based
data model and a moving-object-based partition model to
solve massive trajectory data storage, and exploits a
hybrid local secondary index structure based on
Observer coprocessor to accelerate spatiotemporal
queries. Furthermore, it adopts certain maintenance
strategies to ensure the colocation of relevant data.
Based on these, THBase designs node-locality-based
parallel query algorithms by Endpoint coprocessor to
reduce the overhead caused by data transmission, thus
ensuring efficient query performance. Experiments on
datasets of ship trajectory show that our schemes can
significantly outperform other schemes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Big Data Processing and Analytics in the
Era of Extreme Connectivity and Automation.",
}
@Article{Fahim:2019:ANI,
author = "Mohamed Fahim and Brahim Ouchao and Abdeslam Jakimi
and Lahcen {El Bermi}",
title = "Application of a Non-Immersive {VR}, {IoT} Based
Approach to Help {Moroccan} Students Carry Out
Practical Activities in a Personal Learning Style",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "11",
day = "04",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010011",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/11",
abstract = "In the last few years, the evolution of new
Information and Communication Technologies (ICT) and
networks has enabled the appearance and development of
several platforms and tools that serve to operate and
distribute the learning content. In some particular
domains, especially the scientific one, learners need
to work on practical activities, using specific
products and equipment to complete, consolidate, or
verify their conceptual acquisitions. However, facing
the increasing number of learners in Moroccan
institutions, it becomes hard and expensive for
developing countries, like Morocco, to ensure the
appropriate conditions for each learner to perform such
activities. The majority of the suggested platforms and
tools cannot solve this issue, because of their
inefficiency regarding offering students good
interactive practical activities. Virtual Reality (VR)
and the Internet of Things (IoT), as the two most
incredible technologies of the last few decades, can be
used as an alternative to create a virtual environment
where the learner can carry out practical activities
like in the real world. In such an environment,
learners interact with both virtual and physical
objects. In this research paper, we propose a new
approach based on VR and IoT to enhance learning by
providing learners with an educational space where they
can perform some practical activities. The hybrid
proposed approach has been used to create a virtual
environment where learners (the final year of high
school) can measure ultrasonic velocity in the air. The
evaluation results show that the manipulation and
coupling of real objects with virtual 3D objects
increases in a striking way the learning outcomes of
learners, as this allows them to feel linked to the
real context.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Internet of Things.",
}
@Article{Song:2019:JUD,
author = "Xin Song and Xiuwei Han and Yue Ni and Li Dong and Lei
Qin",
title = "Joint Uplink and Downlink Resource Allocation for
{D2D} Communications System",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "12",
day = "06",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010012",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/12",
abstract = "In cellular networks, device-to-device communications
can increase the spectrum efficiency, but some
conventional schemes only consider uplink or downlink
resource allocation. In this paper, we propose the
joint uplink and downlink resource allocation scheme
which maximizes the system capacity and guarantees the
signal-to-noise-and-interference ratio of both cellular
users and device-to-device pairs. The optimization
problem is formulated as a mixed integer nonlinear
problem that is usually NP hard. To achieve the
reasonable resource allocation, the optimization
problem is divided into two sub-problems including
power allocation and channel assignment. It is proved
that the objective function of power control is a
convex function, in which the optimal transmission
power can be obtained. The Hungarian algorithm is
developed to achieve joint uplink and downlink channel
assignment. The proposed scheme can improve the system
capacity performance and increase the spectrum
efficiency. Numerical results reveal that the
performance of the proposed scheme of jointly uplink
and downlink is better than that of the schemes for
independent allocation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Silva:2019:CPM,
author = "Marianne Silva and Gabriel Signoretti and Julio
Oliveira and Ivanovitch Silva and Daniel G. Costa",
title = "A Crowdsensing Platform for Monitoring of Vehicular
Emissions: a Smart City Perspective",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "13",
day = "08",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010013",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/13",
abstract = "Historically, cities follow reactive planning models
where managers make decisions as problems occur. On the
other hand, the exponential growth of Information and
Communication Technologies (ICT) has allowed the
connection of a diverse array of sensors, devices,
systems, and objects. These objects can then generate
data that can be transformed into information and used
in a more efficient urban planning paradigm, one that
allows decisions to be made before the occurrence of
problems and emergencies. Therefore, this article aims
to propose a platform capable of estimating the amount
of carbon dioxide based on sensor readings in vehicles,
indirectly contributing to a more proactive city
planning based on the monitoring of vehicular
pollution. Crowdsensing techniques and an On-Board
Diagnostic (OBD-II) reader are used to extract data
from vehicles in real time, which are then stored
locally on the devices used to perform data collection.
With the performed experiments, it was possible to
extract information about the operation of the vehicles
and their dynamics when moving in a city, providing
valuable information that can support auxiliary tools
for the management of urban centers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue New Perspectives in Intelligent
Transportation Systems and Mobile Communications
towards a Smart Cities Context.",
}
@Article{Office:2019:ARF,
author = "Future Internet Editorial Office",
title = "Acknowledgement to Reviewers of {{\booktitle{Future
Internet}}} in 2018",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "14",
day = "10",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010014",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/14",
abstract = "Aiming at the complex structure of the space
information networks (SIN) and the dynamic change of
network topology, in order to design an efficient
routing strategy, this paper establishes a SIN
management architecture based on Software-defined
Networking (SDN). A routing algorithm flow of the
spatial information network based on a snapshot
sequence is designed. For different spatial tasks with
different Quality of Service (QoS) requirements, the
concept of integrated link weight is proposed. The
Warshall--Floyd algorithm is used to design the optimal
routing strategy. A Task-oriented Bandwidth Resource
Allocation (TBA) algorithm is proposed for multiple
spatial tasks in the same link. Simulation results show
that the algorithm can effectively guarantee the
priority transmission of important tasks and avoid the
unnecessary waste of bandwidth resources.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Meng:2019:MTR,
author = "Xiangli Meng and Lingda Wu and Shaobo Yu",
title = "Multi-Topology Routing Algorithms in {SDN}-Based Space
Information Networks",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "15",
day = "12",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010015",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/15",
abstract = "Aiming at the complex structure of the space
information networks (SIN) and the dynamic change of
network topology, in order to design an efficient
routing strategy, this paper establishes a SIN
management architecture based on Software-defined
Networking (SDN). A routing algorithm flow of the
spatial information network based on a snapshot
sequence is designed. For different spatial tasks with
different Quality of Service (QoS) requirements, the
concept of integrated link weight is proposed. The
Warshall--Floyd algorithm is used to design the optimal
routing strategy. A Task-oriented Bandwidth Resource
Allocation (TBA) algorithm is proposed for multiple
spatial tasks in the same link. Simulation results show
that the algorithm can effectively guarantee the
priority transmission of important tasks and avoid the
unnecessary waste of bandwidth resources.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Oliveira:2019:MLP,
author = "Luiz Oliveira and Joel J. P. C. Rodrigues and Sergei
A. Kozlov and Ricardo A. L. Rab{\^e}lo and Victor Hugo
C. de Albuquerque",
title = "{MAC} Layer Protocols for {Internet of Things}: a
Survey",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "16",
day = "14",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010016",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/16",
abstract = "Due to the wide variety of uses and the diversity of
features required to meet an application, Internet of
Things (IoT) technologies are moving forward at a
strong pace to meet this demand while at the same time
trying to meet the time-to-market of these
applications. The characteristics required by
applications, such as coverage area, scalability,
transmission data rate, and applicability, refer to the
Physical and Medium Access Control (MAC) layer designs
of protocols. This paper presents a deep study of
medium access control (MAC) layer protocols that are
used in IoT with a detailed description of such
protocols grouped (by short and long distance
coverage). For short range coverage protocols, the
following are considered: Radio Frequency
Identification (RFID), Near Field Communication (NFC),
Bluetooth IEEE 802.15.1, Bluetooth Low Energy, IEEE
802.15.4, Wireless Highway Addressable Remote
Transducer Protocol (Wireless-HART), Z-Wave,
Weightless, and IEEE 802.11 a/b/g/n/ah. For the long
range group, Narrow Band IoT (NB-IoT), Long Term
Evolution (LTE) CAT-0, LTE CAT-M, LTE CAT-N, Long Range
Protocol (LoRa), and SigFox protocols are studied. A
comparative study is performed for each group of
protocols in order to provide insights and a reference
study for IoT applications, considering their
characteristics, limitations, and behavior. Open
research issues on the topic are also identified.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Xu:2019:FLE,
author = "Dong Xu and Ruping Ge and Zhihua Niu",
title = "Forward-Looking Element Recognition Based on the
{LSTM-CRF} Model with the Integrity Algorithm",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "17",
day = "14",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010017",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/17",
abstract = "A state-of-the-art entity recognition system relies on
deep learning under data-driven conditions. In this
paper, we combine deep learning with linguistic
features and propose the long short-term
memory-conditional random field model (LSTM-CRF model)
with the integrity algorithm. This approach is
primarily based on the use of part-of-speech (POS)
syntactic rules to correct the boundaries of LSTM-CRF
model annotations and improve its performance by
raising the integrity of the elements. The method
incorporates the advantages of the data-driven method
and dependency syntax, and improves the precision rate
of the elements without losing recall rate. Experiments
show that the integrity algorithm is not only easy to
combine with the other neural network model, but the
overall effect is better than several advanced methods.
In addition, we conducted cross-domain experiments
based on a multi-industry corpus in the financial
field. The results indicate that the method can be
applied to other industries.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Innovative Topologies and Algorithms for
Neural Networks.",
}
@Article{Wang:2019:ADU,
author = "Jinpeng Wang and G{\'e}rard Chalhoub and Michel
Misson",
title = "Adaptive Downward\slash Upward Routing Protocol for
Mobile-Sensor Networks",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "18",
day = "15",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010018",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/18",
abstract = "Recently, mobility support has become an important
requirement in various Wireless Sensor Networks (WSNs).
Low-power and Lossy Networks (LLNs) are a special type
of WSNs that tolerate a certain degree of packet loss.
However, due to the strict resource constraints in the
computation, energy, and memory of LLNs, most routing
protocols only support static network topologies. Data
collection and data dissemination are two basic traffic
modes in LLNs. Unlike data collection, data
dissemination is less investigated in LLNs. There are
two sorts of data-dissemination methods:
point-to-multipoint and point-to-point. In this paper,
we focus on the point-to-point method, which requires
the source node to build routes to reach the
destination node. We propose an adaptive routing
protocol that integrates together point-to-point
traffic and data-collection traffic, and supports
highly mobile scenarios. This protocol quickly reacts
to the movement of nodes to make faster decisions for
the next-hop selection in data collection and
dynamically build routes for point-to-point traffic.
Results obtained through simulation show that our work
outperforms two generic ad hoc routing protocols AODV
and flooding on different performance metrics. Results
also show the efficiency of our work in highly mobile
scenarios with multiple traffic patterns.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Temoa:2019:RLB,
author = "Djorw{\'e} T{\'e}moa and Anna F{\"o}rster and Kolyang
and Serge Doka Yamigno",
title = "A Reinforcement Learning Based Intercell Interference
Coordination in {LTE} Networks",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "19",
day = "17",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010019",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/19",
abstract = "Long Term Evolution networks, which are cellular
networks, are subject to many impairments due to the
nature of the transmission channel used, i.e. the air.
Intercell interference is the main impairment faced by
Long Term Evolution networks as it uses frequency reuse
one scheme, where the whole bandwidth is used in each
cell. In this paper, we propose a full dynamic
intercell interference coordination scheme with no
bandwidth partitioning for downlink Long Term Evolution
networks. We use a reinforcement learning approach. The
proposed scheme is a joint resource allocation and
power allocation scheme and its purpose is to minimize
intercell interference in Long Term Evolution networks.
Performances of proposed scheme shows quality of
service improvement in terms of SINR, packet loss and
delay compared to other algorithms.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fragkos:2019:EES,
author = "Georgios Fragkos and Pavlos Athanasios Apostolopoulos
and Eirini Eleni Tsiropoulou",
title = "{ESCAPE}: Evacuation Strategy through Clustering and
Autonomous Operation in Public Safety Systems",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "20",
day = "17",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010020",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/20",
abstract = "Natural disasters and terrorist attacks pose a
significant threat to human society, and have stressed
an urgent need for the development of comprehensive and
efficient evacuation strategies. In this paper, a novel
evacuation-planning mechanism is introduced to support
the distributed and autonomous evacuation process
within the operation of a public safety system, where
the evacuees exploit the capabilities of the proposed
ESCAPE service, towards making the most beneficial
actions for themselves. The ESCAPE service was
developed based on the principles of reinforcement
learning and game theory, and is executed at two
decision-making layers. Initially, evacuees are modeled
as stochastic learning automata that select an
evacuation route that they want to go based on its
physical characteristics and past decisions during the
current evacuation. Consequently, a cluster of evacuees
is created per evacuation route, and the evacuees
decide if they will finally evacuate through the
specific evacuation route at the current time slot or
not. The evacuees' competitive behavior is modeled as a
non-co-operative minority game per each specific
evacuation route. A distributed and low-complexity
evacuation-planning algorithm (i.e., ESCAPE) is
introduced to implement both the aforementioned evacuee
decision-making layers. Finally, the proposed framework
is evaluated through modeling and simulation under
several scenarios, and its superiority and benefits are
revealed and demonstrated.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Guazzini:2019:EMA,
author = "Andrea Guazzini and Mirko Duradoni and Ambra Capelli
and Patrizia Meringolo",
title = "An Explorative Model to Assess Individuals' Phubbing
Risk",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "21",
day = "18",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010021",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/21",
abstract = "Phubbing could be defined as a new form of addiction;
however, checking the phone and ignoring the speaker
could also be linked to the increased availability of
virtual social environments. We developed a
multidimensional model for phubbing considering
psychological dimensions and information and
communication technology related habits. We collected
data through online questionnaires and surveys. The
best model obtained from our data was constituted by
Information and Communication Technologies' (ICTs)
usage behaviours, Trait Anxiety, Virtual Sense of
Community and Neuroticism. Finally, our study confirmed
a strong connection between phubbing and online
addiction behaviours.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Aqlan:2019:IAC,
author = "Fares Aqlan and Xiaoping Fan and Abdullah Alqwbani and
Akram Al-Mansoub",
title = "Improved {Arabic--Chinese} Machine Translation with
Linguistic Input Features",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "22",
day = "19",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010022",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/22",
abstract = "This study presents linguistically augmented models of
phrase-based statistical machine translation (PBSMT)
using different linguistic features (factors) on the
top of the source surface form. The architecture
addresses two major problems occurring in machine
translation, namely the poor performance of direct
translation from a highly-inflected and morphologically
complex language into morphologically poor languages,
and the data sparseness issue, which becomes a
significant challenge under low-resource conditions. We
use three factors (lemma, part-of-speech tags, and
morphological features) to enrich the input side with
additional information to improve the quality of direct
translation from Arabic to Chinese, considering the
importance and global presence of this language pair as
well as the limitation of work on machine translation
between these two languages. In an effort to deal with
the issue of the out of vocabulary (OOV) words and
missing words, we propose the best combination of
factors and models based on alternative paths. The
proposed models were compared with the standard PBSMT
model which represents the baseline of this work, and
two enhanced approaches tokenized by a state-of-the-art
external tool that has been proven to be useful for
Arabic as a morphologically rich and complex language.
The experiment was performed with a Moses decoder on
freely available data extracted from a multilingual
corpus from United Nation documents (MultiUN). Results
of a preliminary evaluation in terms of BLEU scores
show that the use of linguistic features on the Arabic
side considerably outperforms baseline and tokenized
approaches, the system can consistently reduce the OOV
rate as well.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Big Data and Augmented Intelligence.",
}
@Article{Leotta:2019:SHH,
author = "Francesco Leotta and Massimo Mecella and Daniele Sora
and Tiziana Catarci",
title = "Surveying Human Habit Modeling and Mining Techniques
in Smart Spaces",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "23",
day = "19",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010023",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/23",
abstract = "A smart space is an environment, mainly equipped with
Internet-of-Things (IoT) technologies, able to provide
services to humans, helping them to perform daily tasks
by monitoring the space and autonomously executing
actions, giving suggestions and sending alarms.
Approaches suggested in the literature may differ in
terms of required facilities, possible applications,
amount of human intervention required, ability to
support multiple users at the same time adapting to
changing needs. In this paper, we propose a Systematic
Literature Review (SLR) that classifies most
influential approaches in the area of smart spaces
according to a set of dimensions identified by
answering a set of research questions. These dimensions
allow to choose a specific method or approach according
to available sensors, amount of labeled data, need for
visual analysis, requirements in terms of enactment and
decision-making on the environment. Additionally, the
paper identifies a set of challenges to be addressed by
future research in the field.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Aboagye:2019:SEC,
author = "Emelia Opoku Aboagye and Rajesh Kumar",
title = "Simple and Efficient Computational Intelligence
Strategies for Effective Collaborative Decisions",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "24",
day = "21",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010024",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/24",
abstract = "We approach scalability and cold start problems of
collaborative recommendation in this paper. An
intelligent hybrid filtering framework that maximizes
feature engineering and solves cold start problem for
personalized recommendation based on deep learning is
proposed in this paper. Present e-commerce sites mainly
recommend pertinent items or products to a lot of users
through personalized recommendation. Such
personalization depends on large extent on scalable
systems which strategically responds promptly to the
request of the numerous users accessing the site (new
users). Tensor Factorization (TF) provides scalable and
accurate approach for collaborative filtering in such
environments. In this paper, we propose a hybrid-based
system to address scalability problems in such
environments. We propose to use a multi-task approach
which represent multiview data from users, according to
their purchasing and rating history. We use a Deep
Learning approach to map item and user
inter-relationship to a low dimensional feature space
where item-user resemblance and their preferred items
is maximized. The evaluation results from real world
datasets show that, our novel deep learning multitask
tensor factorization (NeuralFil) analysis is
computationally less expensive, scalable and addresses
the cold-start problem through explicit multi-task
approach for optimal recommendation decision making.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dorgham:2019:SSP,
author = "Osama Dorgham and Ibrahim Al-Mherat and Jawdat
Al-Shaer and Sulieman Bani-Ahmad and Stephen Laycock",
title = "Smart System for Prediction of Accurate Surface
Electromyography Signals Using an Artificial Neural
Network",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "1",
pages = "25",
day = "21",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11010025",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/1/25",
abstract = "Bioelectric signals are used to measure electrical
potential, but there are different types of signals.
The electromyography (EMG) is a type of bioelectric
signal used to monitor and recode the electrical
activity of the muscles. The current work aims to model
and reproduce surface EMG (SEMG) signals using an
artificial neural network. Such research can aid
studies into life enhancement for those suffering from
damage or disease affecting their nervous system. The
SEMG signal is collected from the surface above the
bicep muscle through dynamic (concentric and eccentric)
contraction with various loads. In this paper, we use
time domain features to analyze the relationship
between the amplitude of SEMG signals and the load. We
extract some features (e.g., mean absolute value, root
mean square, variance and standard deviation) from the
collected SEMG signals to estimate the bicep' muscle
force for the various loads. Further, we use the
R-squared value to depict the correlation between the
SEMG amplitude and the muscle loads by linear fitting.
The best performance the ANN model with 60 hidden
neurons for three loads used (3 kg, 5 kg and 7 kg) has
given a mean square error of 1.145, 1.3659 and 1.4238,
respectively. The R-squared observed are 0.9993,
0.99999 and 0.99999 for predicting (reproduction step)
of smooth SEMG signals.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Information and
Communication Systems.",
}
@Article{Li:2019:SPB,
author = "Yanli Li and Wendan Ma and Yue Han",
title = "A Spatial Prediction-Based Motion-Compensated Frame
Rate Up-Conversion",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "26",
day = "23",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020026",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/26",
abstract = "In Multimedia Internet of Things (IoT), in order to
reduce the bandwidth consumption of wireless channels,
Motion-Compensated Frame Rate Up-Conversion (MC-FRUC)
is often used to support the low-bitrate video
communication. In this paper, we propose a spatial
predictive algorithm which is used to improve the
performance of MC-FRUC. The core of the proposed
algorithm is a predictive model to split a frame into
two kinds of blocks: basic blocks and absent blocks.
Then an improved bilateral motion estimation is
proposed to compute the Motion Vectors (MVs) of basic
blocks. Finally, with the spatial correlation of Motion
Vector Field (MVF), the MV of an absent block is
predicted based on the MVs of its neighboring basic
blocks. Experimental results show that the proposed
spatial prediction algorithm can improve both the
objective and the subjective quality of the
interpolated frame, with a low computational
complexity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Multimedia Internet of Things (IoT) in
Smart Environment.",
}
@Article{Arena:2019:OVC,
author = "Fabio Arena and Giovanni Pau",
title = "An Overview of Vehicular Communications",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "27",
day = "24",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020027",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/27",
abstract = "The transport sector is commonly subordinate to
several issues, such as traffic congestion and
accidents. Despite this, in recent years, it is also
evolving with regard to cooperation between vehicles.
The fundamental objective of this trend is to increase
road safety, attempting to anticipate the circumstances
of potential danger. Vehicle-to-Vehicle (V2V),
Vehicle-to-Infrastructure (V2I) and
Vehicle-to-Everything (V2X) technologies strive to give
communication models that can be employed by vehicles
in different application contexts. The resulting
infrastructure is an ad-hoc mesh network whose nodes
are not only vehicles but also all mobile devices
equipped with wireless modules. The interaction between
the multiple connected entities consists of information
exchange through the adoption of suitable communication
protocols. The main aim of the review carried out in
this paper is to examine and assess the most relevant
systems, applications, and communication protocols that
will distinguish the future road infrastructures used
by vehicles. The results of the investigation reveal
the real benefits that technological cooperation can
involve in road safety.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Korla:2019:MLW,
author = "Swaroopa Korla and Shanti Chilukuri",
title = "{T-Move}: a Light-Weight Protocol for Improved {QoS}
in Content-Centric Networks with Producer Mobility",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "28",
day = "27",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020028",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/28",
abstract = "Recent interest in applications where content is of
primary interest has triggered the exploration of a
variety of protocols and algorithms. For such networks
that are information-centric, architectures such as the
Content-Centric Networking have been proven to result
in good network performance. However, such
architectures are still evolving to cater for
application-specific requirements. This paper proposes
T-Move, a light-weight solution for producer mobility
and caching at the edge that is especially suitable for
content-centric networks with mobile content producers.
T-Move introduces a novel concept called trendiness of
data for Content-Centric Networking (CCN)/Named Data
Networking (NDN)-based networks. It enhances network
performance and quality of service (QoS) using two
strategies --- cache replacement and proactive
content-pushing for handling producer mobility --- both
based on trendiness. It uses simple operations and
smaller control message overhead and is suitable for
networks where the response needs to be quick.
Simulation results using ndnSIM show reduced traffic,
content retrieval time, and increased cache hit ratio
with T-Move, when compared to MAP-Me and plain NDN for
networks of different sizes and mobility rates.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Big Data and Augmented Intelligence.",
}
@Article{Udugama:2019:MST,
author = "Asanga Udugama and Jens Dede and Anna F{\"o}rster and
Vishnupriya Kuppusamy and Koojana Kuladinithi and
Andreas Timm-Giel and Zeynep Vatandas",
title = "My {Smartphone} tattles: Considering Popularity of
Messages in Opportunistic Data Dissemination",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "29",
day = "29",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020029",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/29",
abstract = "Opportunistic networks have recently seen increasing
interest in the networking community. They can serve a
range of application scenarios, most of them being
destination-less, i.e., without a-priori knowledge of
who is the final destination of a message. In this
paper, we explore the usage of data popularity for
improving the efficiency of data forwarding in
opportunistic networks. Whether a message will become
popular or not is not known before disseminating it to
users. Thus, popularity needs to be estimated in a
distributed manner considering a local context. We
propose Keetchi, a data forwarding protocol based on
Q-Learning to give more preference to popular data
rather than less popular data. Our extensive simulation
comparison between Keetchi and the well known Epidemic
protocol shows that the network overhead of data
forwarding can be significantly reduced while keeping
the delivery rate the same.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Opportunistic Networks in Urban
Environment.",
}
@Article{Boddy:2019:IHD,
author = "Aaron Boddy and William Hurst and Michael Mackay and
Abdennour {El Rhalibi} and Thar Baker and Casimiro A.
Curbelo Monta{\~n}ez",
title = "An Investigation into Healthcare-Data Patterns",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "30",
day = "30",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020030",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/30",
abstract = "Visualising complex data facilitates a more
comprehensive stage for conveying knowledge. Within the
medical data domain, there is an increasing requirement
for valuable and accurate information. Patients need to
be confident that their data is being stored safely and
securely. As such, it is now becoming necessary to
visualise data patterns and trends in real-time to
identify erratic and anomalous network access
behaviours. In this paper, an investigation into
modelling data flow within healthcare infrastructures
is presented; where a dataset from a Liverpool-based
(UK) hospital is employed for the case study.
Specifically, a visualisation of transmission control
protocol (TCP) socket connections is put forward, as an
investigation into the data complexity and user
interaction events within healthcare networks. In
addition, a filtering algorithm is proposed for noise
reduction in the TCP dataset. Positive results from
using this algorithm are apparent on visual inspection,
where noise is reduced by up to 89.84\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Smart Systems for Healthcare.",
}
@Article{Parchin:2019:DBM,
author = "Naser Ojaroudi Parchin and Haleh Jahanbakhsh Basherlou
and Raed A. Abd-Alhameed and James M. Noras",
title = "Dual-Band Monopole Antenna for {RFID} Applications",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "31",
day = "30",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020031",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/31",
abstract = "Over the past decade, radio-frequency identification
(RFID) technology has attracted significant attention
and become very popular in different applications, such
as identification, management, and monitoring. In this
study, a dual-band microstrip-fed monopole antenna has
been introduced for RFID applications. The antenna is
designed to work at the frequency ranges of 2.2--2.6
GHz and 5.3--6.8 GHz, covering 2.4/5.8 GHz RFID
operation bands. The antenna structure is like a
modified F-shaped radiator. It is printed on an FR-4
dielectric with an overall size of 38 \× 45
\× 1.6 mm 3. Fundamental characteristics of the
antenna in terms of return loss, Smith Chart, phase,
radiation pattern, and antenna gain are investigated
and good results are obtained. Simulations have been
carried out using computer simulation technology (CST)
software. A prototype of the antenna was fabricated and
its characteristics were measured. The measured results
show good agreement with simulations. The structure of
the antenna is planar, simple to design and fabricate,
easy to integrate with RF circuit, and suitable for use
in RFID systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue New Developments in RFID Technologies
and Applications and Their Integration into IoT.",
}
@Article{Ziakis:2019:IFI,
author = "Christos Ziakis and Maro Vlachopoulou and Theodosios
Kyrkoudis and Makrina Karagkiozidou",
title = "Important Factors for Improving {Google} Search Rank",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "32",
day = "30",
month = jan,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020032",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/32",
abstract = "The World Wide Web has become an essential modern tool
for people's daily routine. The fact that it is a
convenient means for communication and information
search has made it extremely popular. This fact led
companies to start using online advertising by creating
corporate websites. With the rapid increase in the
number of websites, search engines had to come up with
a solution of algorithms and programs to qualify the
results of a search and provide the users with relevant
content to their search. On the other side, developers,
in pursuit of the highest rankings in the search engine
result pages (SERPs), began to study and observe how
search engines work and which factors contribute to
higher rankings. The knowledge that has been extracted
constituted the base for the creation of the profession
of Search Engine Optimization (SEO). This paper
consists of two parts. The first part aims to perform a
literature review of the factors that affect the
ranking of websites in the SERPs and to highlight the
top factors that contribute to better ranking. To
achieve this goal, a collection and analysis of
academic papers was conducted. According to our
research, 24 website characteristics came up as factors
affecting any website's ranking, with the most
references mentioning quality and quantity of
backlinks, social media support, keyword in title tag,
website structure, website size, loading time, domain
age, and keyword density. The second part consists of
our research which was conducted manually using the
phrases ``hotel Athens'', ``email marketing'', and
``casual shoes''. For each one of these keywords, the
first 15 Google results were examined considering the
factors found in the literature review. For the
measurement of the significance of each factor, the
Spearman correlation was calculated and every factor
was compared with the ranking of the results
individually. The findings of the research showed us
that the top factors that contribute to higher rankings
are the existence of website SSL certificate as well as
keyword in URL, the quantity of backlinks pointing to a
website, the text length, and the domain age, which is
not perfectly aligned with what the literature review
showed us.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Search Engine Optimization.",
}
@Article{Touseau:2019:CWT,
author = "Lionel Touseau and Nicolas {Le Sommer}",
title = "Contribution of the {Web} of Things and of the
Opportunistic Computing to the Smart Agriculture: a
Practical Experiment",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "33",
day = "01",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020033",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/33",
abstract = "With the emergence of the Internet of Things,
environmental sensing has been gaining interest,
promising to improve agricultural practices by
facilitating decision-making based on gathered
environmental data (i.e., weather forecasting, crop
monitoring, and soil moisture sensing). Environmental
sensing, and by extension what is referred to as
precision or smart agriculture, pose new challenges,
especially regarding the collection of environmental
data in the presence of connectivity disruptions, their
gathering, and their exploitation by end-users or by
systems that must perform actions according to the
values of those collected data. In this paper, we
present a middleware platform for the Internet of
Things that implements disruption tolerant
opportunistic networking and computing techniques, and
that makes it possible to expose and manage physical
objects through Web-based protocols, standards and
technologies, thus providing interoperability between
objects and creating a Web of Things (WoT). This
WoT-based opportunistic computing approach is backed up
by a practical experiment whose outcomes are presented
in this article.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue WSN and IoT in Smart Agriculture.",
}
@Article{Pisani:2019:FVC,
author = "Fl{\'a}via Pisani and Vanderson Martins do Rosario and
Edson Borin",
title = "Fog vs. Cloud Computing: Should {I} Stay or Should {I}
Go?",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "34",
day = "02",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020034",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/34",
abstract = "In this article, we work toward the answer to the
question ``is it worth processing a data stream on the
device that collected it or should we send it somewhere
else?''. As it is often the case in computer science,
the response is ``it depends''. To find out the cases
where it is more profitable to stay in the device
(which is part of the fog) or to go to a different one
(for example, a device in the cloud), we propose two
models that intend to help the user evaluate the cost
of performing a certain computation on the fog or
sending all the data to be handled by the cloud. In our
generic mathematical model, the user can define a cost
type (e.g., number of instructions, execution time,
energy consumption) and plug in values to analyze test
cases. As filters have a very important role in the
future of the Internet of Things and can be implemented
as lightweight programs capable of running on
resource-constrained devices, this kind of procedure is
the main focus of our study. Furthermore, our visual
model guides the user in their decision by aiding the
visualization of the proposed linear equations and
their slope, which allows them to find if either fog or
cloud computing is more profitable for their specific
scenario. We validated our models by analyzing four
benchmark instances (two applications using two
different sets of parameters each) being executed on
five datasets. We use execution time and energy
consumption as the cost types for this investigation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected papers from INTESA Workshop
2018.",
}
@Article{Bagnoli:2019:PIS,
author = "Franco Bagnoli and Emanuele Bellini and Emanuele
Massaro and Ra{\'u}l Rechtman",
title = "Percolation and {Internet} Science",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "35",
day = "02",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020035",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/35",
abstract = "Percolation, in its most general interpretation,
refers to the ``flow'' of something (a physical agent,
data or information) in a network, possibly accompanied
by some nonlinear dynamical processes on the network
nodes (sometimes denoted reaction--diffusion systems,
voter or opinion formation models, etc.). Originated in
the domain of theoretical and matter physics, it has
many applications in epidemiology, sociology and, of
course, computer and Internet sciences. In this review,
we illustrate some aspects of percolation theory and
its generalization, cellular automata and briefly
discuss their relationship with equilibrium systems
(Ising and Potts models). We present a model of opinion
spreading, the role of the topology of the network to
induce coherent oscillations and the influence (and
advantages) of risk perception for stopping epidemics.
The models and computational tools that are briefly
presented here have an application to the filtering of
tainted information in automatic trading. Finally, we
introduce the open problem of controlling percolation
and other processes on distributed systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Lelli:2019:ITI,
author = "Francesco Lelli",
title = "Interoperability of the Time of {Industry 4.0} and the
{Internet of Things}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "36",
day = "03",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020036",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/36",
abstract = "Industry 4.0 demands a dynamic optimization of
production lines. They are formed by sets of
heterogeneous devices that cooperate towards a shared
goal. The Internet of Things can serve as a technology
enabler for implementing such a vision. Nevertheless,
the domain is struggling in finding a shared
understanding of the concepts for describing a device.
This aspect plays a fundamental role in enabling an
``intelligent interoperability'' among sensor and
actuators that will constitute a dynamic Industry 4.0
production line. In this paper, we summarize the
efforts of academics and practitioners toward
describing devices in order to enable dynamic
reconfiguration by machines or humans. We also propose
a set of concepts for describing devices, and we
analyze how present initiatives are covering these
aspects.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Stamou:2019:ANM,
author = "Adamantia Stamou and Grigorios Kakkavas and
Konstantinos Tsitseklis and Vasileios Karyotis and
Symeon Papavassiliou",
title = "Autonomic Network Management and Cross-Layer
Optimization in Software Defined Radio Environments",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "37",
day = "03",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020037",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/37",
abstract = "The demand for Autonomic Network Management (ANM) and
optimization is as intense as ever, even though
significant research has been devoted towards this
direction. This paper addresses such need in Software
Defined (SDR) based Cognitive Radio Networks (CRNs). We
propose a new framework for ANM and network
reconfiguration combining Software Defined Networks
(SDN) with SDR via Network Function Virtualization
(NFV) enabled Virtual Utility Functions (VUFs). This is
the first approach combining ANM with SDR and SDN via
NFV, demonstrating how these state-of-the-art
technologies can be effectively combined to achieve
reconfiguration flexibility, improved performance and
efficient use of available resources. In order to show
the feasibility of the proposed framework, we
implemented its main functionalities in a cross-layer
resource allocation mechanism for CRNs over real SDR
testbeds provided by the Orchestration and
Reconfiguration Control Architecture (ORCA) EU project.
We demonstrate the efficacy of our framework, and based
on the obtained results, we identify aspects that can
be further investigated for improving the applicability
and increasing performance of our broader framework.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Software Defined Networking (SDN) and
Network Function Virtualization (NFV).",
}
@Article{Nguyen:2019:RSS,
author = "Van Suong Nguyen",
title = "Research on a Support System for Automatic Ship
Navigation in Fairway",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "38",
day = "03",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020038",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/38",
abstract = "In previous investigations, controllers for the
track-keeping of ships were designed with the
assumption of constant ship speed. However, when
navigating in a fairway area, the ship's speed is
usually decreased to prepare for berthing. The existing
track-keeping systems, which are applied when the ship
navigates in the open sea with a constant ship speed,
cannot be used to navigate the ship in the fairway. In
this article, a support system is proposed for ship
navigation in the fairway. This system performs three
tasks. First, the ship is automatically controlled by
regulating the rudder to follow planned tracks. Second,
the ship's speed is reduced step by step to approach
the berth area at a low speed. Finally, at low speed,
when the ship's rudder is not effective enough to
control the ship's heading to a desired angle, the
ship's heading is adjusted appropriately by the bow
thruster before changing the control mode into the
automatic berthing system. By the proposed system, the
automatic systems can be combined to obtain a fully
automatic system for ship control. To validate the
effectiveness of this proposed system for automatic
ship navigation in the fairway, numerical simulations
were conducted with a training ship model.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue New Perspectives in Intelligent
Transportation Systems and Mobile Communications
towards a Smart Cities Context.",
}
@Article{Konsgen:2019:MME,
author = "Andreas K{\"o}nsgen and Md. Shahabuddin and Amanpreet
Singh and Anna F{\"o}rster",
title = "A Mathematical Model for Efficient and Fair Resource
Assignment in Multipath Transport",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "39",
day = "10",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020039",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/39",
abstract = "Multipath transport protocols are aimed at increasing
the throughput of data flows as well as maintaining
fairness between users, which are both crucial factors
to maximize user satisfaction. In this paper, a mixed
(non)linear programming (MINLP) solution is developed
which provides an optimum solution to allocate link
capacities in a network to a number of given traffic
demands considering both the maximization of link
utilization as well as fairness between transport layer
data flows or subflows. The solutions of the MINLP
formulation are evaluated w. r. t. their throughput and
fairness using well-known metrics from the literature.
It is shown that network flow fairness based capacity
allocation achieves better fairness results than the
bottleneck-based methods in most cases while yielding
the same capacity allocation performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hortelano:2019:AVG,
author = "Lorenzo J. Torres Hortelano",
title = "Audio-Visual Genres and Polymediation in Successful
{Spanish} {YouTubers}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "40",
day = "11",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020040",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/40",
abstract = "This paper is part of broader research entitled
``Analysis of the YouTuber Phenomenon in Spain: An
Exploration to Identify the Vectors of Change in the
Audio-Visual Market''. My main objective was to
determine the predominant audio-visual genres among the
10 most influential Spanish YouTubers in 2018. Using a
quantitative extrapolation method, I extracted these
data from SocialBlade, an independent website, whose
main objective is to track YouTube statistics. Other
secondary objectives in this research were to analyze:
(1) Gender visualization, (2) the originality of these
YouTube audio-visual genres with respect to others, and
(3) to answer the question as to whether YouTube
channels form a new audio-visual genre. I
quantitatively analyzed these data to determine how
these genres are influenced by the presence of
polymediation as an integrated communicative
environment working in relational terms with other
media. My conclusion is that we can talk about a new
audio-visual genre. When connected with polymediation,
this may present an opportunity that has not yet been
fully exploited by successful Spanish YouTubers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Intelligent Systems and Networks
2019.",
}
@Article{Lu:2019:SDC,
author = "Haoye Lu and Amiya Nayak",
title = "A Scheme to Design Community Detection Algorithms in
Various Networks",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "41",
day = "12",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020041",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/41",
abstract = "Network structures, consisting of nodes and edges,
have applications in almost all subjects. A set of
nodes is called a community if the nodes have strong
interrelations. Industries (including cell phone
carriers and online social media companies) need
community structures to allocate network resources and
provide proper and accurate services. However, most
detection algorithms are derived independently, which
is arduous and even unnecessary. Although recent
research shows that a general detection method that
serves all purposes does not exist, we believe that
there is some general procedure of deriving detection
algorithms. In this paper, we represent such a general
scheme. We mainly focus on two types of networks:
transmission networks and similarity networks. We
reduce them to a unified graph model, based on which we
propose a method to define and detect community
structures. Finally, we also give a demonstration to
show how our design scheme works.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Arif:2019:CBF,
author = "Sheeraz Arif and Jing Wang and Tehseen {Ul Hassan} and
Zesong Fei",
title = "{3D-CNN}-Based Fused Feature Maps with {LSTM} Applied
to Action Recognition",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "42",
day = "13",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020042",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/42",
abstract = "Human activity recognition is an active field of
research in computer vision with numerous applications.
Recently, deep convolutional networks and recurrent
neural networks (RNN) have received increasing
attention in multimedia studies, and have yielded
state-of-the-art results. In this research work, we
propose a new framework which intelligently combines
3D-CNN and LSTM networks. First, we integrate
discriminative information from a video into a map
called a \‘motion map' by using a deep
3-dimensional convolutional network (C3D). A motion map
and the next video frame can be integrated into a new
motion map, and this technique can be trained by
increasing the training video length iteratively; then,
the final acquired network can be used for generating
the motion map of the whole video. Next, a linear
weighted fusion scheme is used to fuse the network
feature maps into spatio-temporal features. Finally, we
use a Long-Short-Term-Memory (LSTM) encoder-decoder for
final predictions. This method is simple to implement
and retains discriminative and dynamic information. The
improved results on benchmark public datasets prove the
effectiveness and practicability of the proposed
method.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Innovative Topologies and Algorithms for
Neural Networks.",
}
@Article{Diogo:2019:CMN,
author = "Miguel Diogo and Bruno Cabral and Jorge Bernardino",
title = "Consistency Models of {NoSQL} Databases",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "43",
day = "14",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020043",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/43",
abstract = "Internet has become so widespread that most popular
websites are accessed by hundreds of millions of people
on a daily basis. Monolithic architectures, which were
frequently used in the past, were mostly composed of
traditional relational database management systems, but
quickly have become incapable of sustaining high data
traffic very common these days. Meanwhile, NoSQL
databases have emerged to provide some missing
properties in relational databases like the schema-less
design, horizontal scaling, and eventual consistency.
This paper analyzes and compares the consistency model
implementation on five popular NoSQL databases: Redis,
Cassandra, MongoDB, Neo4j, and OrientDB. All of which
offer at least eventual consistency, and some have the
option of supporting strong consistency. However,
imposing strong consistency will result in less
availability when subject to network partition
events.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Hall:2019:BIA,
author = "Calum C. Hall and Lynsay A. Shepherd and Natalie
Coull",
title = "{BlackWatch}: Increasing Attack Awareness within {Web}
Applications",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "44",
day = "15",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020044",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/44",
abstract = "Web applications are relied upon by many for the
services they provide. It is essential that
applications implement appropriate security measures to
prevent security incidents. Currently, web applications
focus resources towards the preventative side of
security. While prevention is an essential part of the
security process, developers must also implement a
level of attack awareness into their web applications.
Being able to detect when an attack is occurring
provides applications with the ability to execute
responses against malicious users in an attempt to slow
down or deter their attacks. This research seeks to
improve web application security by identifying
malicious behavior from within the context of web
applications using our tool BlackWatch. The tool is a
Python-based application which analyzes suspicious
events occurring within client web applications, with
the objective of identifying malicious patterns of
behavior. This approach avoids issues typically
encountered with traditional web application firewalls.
Based on the results from a preliminary study,
BlackWatch was effective at detecting attacks from both
authenticated and unauthenticated users. Furthermore,
user tests with developers indicated BlackWatch was
user-friendly, and was easy to integrate into existing
applications. Future work seeks to develop the
BlackWatch solution further for public release.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sun:2019:TMT,
author = "Yue Sun and Songmin Dai and Jide Li and Yin Zhang and
Xiaoqiang Li",
title = "Tooth-Marked Tongue Recognition Using
Gradient-Weighted Class Activation Maps",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "45",
day = "15",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020045",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/45",
abstract = "The tooth-marked tongue is an important indicator in
traditional Chinese medicinal diagnosis. However, the
clinical competence of tongue diagnosis is determined
by the experience and knowledge of the practitioners.
Due to the characteristics of different tongues, having
many variations such as different colors and shapes,
tooth-marked tongue recognition is challenging. Most
existing methods focus on partial concave features and
use specific threshold values to classify the
tooth-marked tongue. They lose the overall tongue
information and lack the ability to be generalized and
interpretable. In this paper, we try to solve these
problems by proposing a visual explanation method which
takes the entire tongue image as an input and uses a
convolutional neural network to extract features
(instead of setting a fixed threshold artificially)
then classifies the tongue and produces a coarse
localization map highlighting tooth-marked regions
using Gradient-weighted Class Activation Mapping.
Experimental results demonstrate the effectiveness of
the proposed method.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Innovative Topologies and Algorithms for
Neural Networks.",
}
@Article{Xu:2019:ETS,
author = "Da Xu and Tao Zhang",
title = "Efficient Tensor Sensing for {RF} Tomographic Imaging
on {GPUs}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "46",
day = "15",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020046",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/46",
abstract = "Radio-frequency (RF) tomographic imaging is a
promising technique for inferring multi-dimensional
physical space by processing RF signals traversed
across a region of interest. Tensor-based approaches
for tomographic imaging are superior at detecting the
objects within higher dimensional spaces. The
recently-proposed tensor sensing approach based on the
transform tensor model achieves a lower error rate and
faster speed than the previous tensor-based compress
sensing approach. However, the running time of the
tensor sensing approach increases exponentially with
the dimension of tensors, thus not being very practical
for big tensors. In this paper, we address this problem
by exploiting massively-parallel GPUs. We design,
implement, and optimize the tensor sensing approach on
an NVIDIA Tesla GPU and evaluate the performance in
terms of the running time and recovery error rate.
Experimental results show that our GPU tensor sensing
is as accurate as the CPU counterpart with an average
of 44.79 \× and up to 84.70 \× speedups for
varying-sized synthetic tensor data. For IKEA Model 3D
model data of a smaller size, our GPU algorithm
achieved 15.374\× speedup over the CPU tensor
sensing. We further encapsulate the GPU algorithm into
an open-source library, called cuTensorSensing (CUDA
Tensor Sensing), which can be used for efficient RF
tomographic imaging.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Big Data and Augmented Intelligence.",
}
@Article{Song:2019:JOP,
author = "Xin Song and Siyang Xu and Zhigang Xie and Xiuwei
Han",
title = "Joint Optimal Power Allocation and Relay Selection
Scheme in Energy Harvesting Two-Way Relaying Network",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "47",
day = "15",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020047",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/47",
abstract = "In this paper, we propose a joint power allocation,
time switching (TS) factor and relay selection scheme
for an energy harvesting two-way relaying communication
network (TWRN), where two transceivers exchange
information with the help of a wireless-powered relay.
By exploiting the TS architecture at the relay node,
the relay node needs to use additional time slots for
energy transmission, reducing the transmission rate.
Thus, we propose a joint resource allocation algorithm
to maximize the max-min bidirectional instantaneous
information rate. To solve the original non-convex
optimization problem, the objective function is
decomposed into three sub-problems and solved
sequentially. The closed-form solution of the transmit
power of two sources and the optimal TS factor can be
obtained by the information rate balancing technology
and the proposed time allocation scheme, respectively.
At last, the optimal relay node can be obtained.
Simulation results show that the performance of the
proposed algorithm is better than the traditional
schemes and power-splitting (PS) scheme.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lee:2019:VPD,
author = "Jae-Gil Lee and Kwan Min Lee and Seoung-Ho Ryu",
title = "Vehicle Politeness in Driving Situations",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "48",
day = "16",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020048",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/48",
abstract = "Future vehicles are becoming more like driving
partners instead of mere machines. With the application
of advanced information and communication technologies
(ICTs), vehicles perform driving tasks while drivers
monitor the functioning states of vehicles. This change
in interaction requires a deliberate consideration of
how vehicles should present driving-related
information. As a way of encouraging drivers to more
readily accept instructions from vehicles, we suggest
the use of social rules, such as politeness, in
human-vehicle interaction. In a 2 \× 2
between-subjects experiment, we test the effects of
vehicle politeness (plain vs. polite) on drivers'
interaction experiences in two operation situations
(normal vs. failure). The results indicate that vehicle
politeness improves interaction experience in normal
working situations but impedes the experience in
failure situations. Specifically, in normal situations,
vehicles with polite instructions are highly evaluated
for social presence, politeness, satisfaction and
intention to use. Theoretical and practical
implications on politeness research and speech
interaction design are discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Lombardo:2019:MAA,
author = "Gianfranco Lombardo and Paolo Fornacciari and Monica
Mordonini and Michele Tomaiuolo and Agostino Poggi",
title = "A Multi-Agent Architecture for Data Analysis",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "49",
day = "18",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020049",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/49",
abstract = "ActoDatA (Actor Data Analysis) is an actor-based
software library for the development of distributed
data mining applications. It provides a multi-agent
architecture with a set of predefined and configurable
agents performing the typical tasks of data mining
applications. In particular, its architecture can
manage different users' applications; it maintains a
high level of execution quality by distributing the
agents of the applications on a dynamic set of
computational nodes. Moreover, it provides reports
about the analysis results and the collected data,
which can be accessed through either a web browser or a
dedicated mobile APP. After an introduction about the
actor model and the software framework used for
implementing the software library, this article
underlines the main features of ActoDatA and presents
its experimentation in some well-known data analysis
domains.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Nguyen-Duc:2019:MVP,
author = "Anh Nguyen-Duc and Khan Khalid and Sohaib Shahid Bajwa
and Tor L{\o}nnestad",
title = "Minimum Viable Products for {Internet of Things}
Applications: Common Pitfalls and Practices",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "50",
day = "18",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020050",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/50",
abstract = "Internet of Things applications are not only the new
opportunity for digital businesses but also a major
driving force for the modification and creation of
software systems in all industries and businesses.
Compared to other types of software-intensive products,
the development of Internet of Things applications
lacks a systematic approach and guidelines. This paper
aims at understanding the common practices and
challenges among start-up companies who are developing
Internet of Things products. A qualitative research is
conducted with data from twelve semi-structured
interviews. A thematic analysis reveals common types of
Minimum Viable Products, prototyping techniques and
production concerns among early stage hardware
start-ups. We found that hardware start-ups go through
an incremental prototyping process toward production.
The progress associates with the transition from
speed-focus to quality-focus. Hardware start-ups
heavily rely on third-party vendors in term of
development speed and final product quality. We
identified 24 challenges related to management,
requirement, design, implementation and testing.
Internet of Things entrepreneurs should be aware of
relevant pitfalls and managing both internal and
external risks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Internet of Things.",
}
@Article{Yuan:2019:FLD,
author = "Quanbo Yuan and Huijuan Wang and Botao Wu and Yaodong
Song and Hejia Wang",
title = "A Fusion Load Disaggregation Method Based on
Clustering Algorithm and Support Vector Regression
Optimization for Low Sampling Data",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "51",
day = "19",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020051",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/51",
abstract = "In order to achieve more efficient energy consumption,
it is crucial that accurate detailed information is
given on how power is consumed. Electricity details
benefit both market utilities and also power consumers.
Non-intrusive load monitoring (NILM), a novel and
economic technology, obtains single-appliance power
consumption through a single total power meter. This
paper, focusing on load disaggregation with low
hardware costs, proposed a load disaggregation method
for low sampling data from smart meters based on a
clustering algorithm and support vector regression
optimization. This approach combines the k-median
algorithm and dynamic time warping to identify the
operating appliance and retrieves single energy
consumption from an aggregate smart meter signal via
optimized support vector regression (OSVR). Experiments
showed that the technique can recognize multiple
devices switching on at the same time using
low-frequency data and achieve a high load
disaggregation performance. The proposed method employs
low sampling data acquired by smart meters without
installing extra measurement equipment, which lowers
hardware cost and is suitable for applications in smart
grid environments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhao:2019:SAB,
author = "Lingling Zhao and Anping Zhao",
title = "Sentiment Analysis Based Requirement Evolution
Prediction",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "52",
day = "21",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020052",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/52",
abstract = "To facilitate product developers capturing the varying
requirements from users to support their feature
evolution process, requirements evolution prediction
from massive review texts is in fact of great
importance. The proposed framework combines a
supervised deep learning neural network with an
unsupervised hierarchical topic model to analyze user
reviews automatically for product feature requirements
evolution prediction. The approach is to discover
hierarchical product feature requirements from the
hierarchical topic model and to identify their
sentiment by the Long Short-term Memory (LSTM) with
word embedding, which not only models hierarchical
product requirement features from general to specific,
but also identifies sentiment orientation to better
correspond to the different hierarchies of product
features. The evaluation and experimental results show
that the proposed approach is effective and feasible.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Intelligent Systems and Networks
2019.",
}
@Article{Zhao:2019:EDL,
author = "Hongwei Zhao and Weishan Zhang and Haoyun Sun and Bing
Xue",
title = "Embedded Deep Learning for Ship Detection and
Recognition",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "2",
pages = "53",
day = "21",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11020053",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:04 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/2/53",
abstract = "Ship detection and recognition are important for smart
monitoring of ships in order to manage port resources
effectively. However, this is challenging due to
complex ship profiles, ship background, object
occlusion, variations of weather and light conditions,
and other issues. It is also expensive to transmit
monitoring video in a whole, especially if the port is
not in a rural area. In this paper, we propose an
on-site processing approach, which is called Embedded
Ship Detection and Recognition using Deep Learning
(ESDR-DL). In ESDR-DL, the video stream is processed
using embedded devices, and we design a two-stage
neural network named DCNet, which is composed of a DNet
for ship detection and a CNet for ship recognition,
running on embedded devices. We have extensively
evaluated ESDR-DL, including performance of accuracy
and efficiency. The ESDR-DL is deployed at the Dongying
port of China, which has been running for over a year
and demonstrates that it can work reliably for
practical usage.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Innovative Topologies and Algorithms for
Neural Networks.",
}
@Article{Sacco:2019:SIS,
author = "Giovanni Maria Sacco",
title = "{SAES}: An Introduction to Self-Adapting Exploratory
Structures",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "54",
day = "26",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030054",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/54",
abstract = "Self-adapting exploratory structures (SAESs) are the
basic components of exploratory search. They are
abstract structures which allow searching or querying
of an information base and summarizing of results using
a uniform representation. A definition and a
characterization of SAES is given, as well as a
discussion of structures that are SAES or can be
modified in order to become SAES. These include dynamic
taxonomies (also known as faceted search), tag clouds,
continuous sliders, geographic maps, and dynamic
clustering methods, such as Scatter-Gather. Finally,
the integration of these structures into a single
interface is discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Svorobej:2019:SFE,
author = "Sergej Svorobej and Patricia Takako Endo and Malika
Bendechache and Christos Filelis-Papadopoulos and
Konstantinos M. Giannoutakis and George A. Gravvanis
and Dimitrios Tzovaras and James Byrne and Theo Lynn",
title = "Simulating Fog and Edge Computing Scenarios: An
Overview and Research Challenges",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "55",
day = "26",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030055",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/55",
abstract = "The fourth industrial revolution heralds a paradigm
shift in how people, processes, things, data and
networks communicate and connect with each other.
Conventional computing infrastructures are struggling
to satisfy dramatic growth in demand from a deluge of
connected heterogeneous end points located at the edge
of networks while, at the same time, meeting quality of
service levels. The complexity of computing at the edge
makes it increasingly difficult for infrastructure
providers to plan for and provision resources to meet
this demand. While simulation frameworks are used
extensively in the modelling of cloud computing
environments in order to test and validate technical
solutions, they are at a nascent stage of development
and adoption for fog and edge computing. This paper
provides an overview of challenges posed by fog and
edge computing in relation to simulation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cloud Computing and Internet of
Things.",
}
@Article{LoIacono:2019:NGR,
author = "Luigi {Lo Iacono} and Hoai Viet Nguyen and Peter Leo
Gorski",
title = "On the Need for a General {REST}-Security Framework",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "56",
day = "27",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030056",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/56",
abstract = "Contemporary software is inherently distributed. The
principles guiding the design of such software have
been mainly manifested by the service-oriented
architecture (SOA) concept. In a SOA, applications are
orchestrated by software services generally operated by
distinct entities. Due to the latter fact, service
security has been of importance in such systems ever
since. A dominant protocol for implementing SOA-based
systems is SOAP, which comes with a well-elaborated
security framework. As an alternative to SOAP, the
architectural style representational state transfer
(REST) is gaining traction as a simple, lightweight and
flexible guideline for designing distributed service
systems that scale at large. This paper starts by
introducing the basic constraints representing REST.
Based on these foundations, the focus is afterwards
drawn on the security needs of REST-based service
systems. The limitations of transport-oriented
protection means are emphasized and the demand for
specific message-oriented safeguards is assessed. The
paper then reviews the current activities in respect to
REST-security and finds that the available schemes are
mostly HTTP-centered and very heterogeneous. More
importantly, all of the analyzed schemes contain
vulnerabilities. The paper contributes a methodology on
how to establish REST-security as a general security
framework for protecting REST-based service systems of
any kind by consistent and comprehensive protection
means. First adoptions of the introduced approach are
presented in relation to REST message authentication
with instantiations for REST-ful HTTP (web/cloud
services) and REST-ful constraint application protocol
(CoAP) (internet of things (IoT) services).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Vangelista:2019:WCI,
author = "Lorenzo Vangelista and Marco Centenaro",
title = "Worldwide Connectivity for the {Internet of Things}
Through {LoRaWAN}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "57",
day = "02",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030057",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/57",
abstract = "The low-power wide-area network (LPWAN) paradigm is
gradually gaining market acceptance. In particular,
three prominent LPWAN technologies are emerging at the
moment: LoRaWAN\™ and SigFox\™, which
operate on unlicensed frequency bands, and NB-IoT,
operating on licensed frequency bands. This paper deals
with LoRaWAN\™, and has the aim of describing a
particularly interesting feature provided by the latest
LoRaWAN\™ specification --- often neglected in
the literature --- i.e., the roaming capability between
different operators of LoRaWAN\™ networks, across
the same country or even different countries. Recalling
that LoRaWAN\™ devices do not have a subscriber
identification module (SIM) like cellular network
terminals, at a first glance the implementation of
roaming in LoRaWAN\™ networks could seem
intricate. The contribution of this paper consists in
explaining the principles behind the implementation of
a global LoRaWAN network, with particular focus on how
to cope with the lack of the SIM in the architecture
and how to realize roaming.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Gomes:2019:IPI,
author = "Luis Gomes and Carlos Ramos and Aria Jozi and Bruno
Serra and Lucas Paiva and Zita Vale",
title = "{IoH}: a Platform for the Intelligence of Home with a
Context Awareness and Ambient Intelligence Approach",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "58",
day = "02",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030058",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/58",
abstract = "This paper presents IoH (Intelligence of Home), a
platform developed to test some basic intelligent
behaviors in Home context. Internet of Things, ambient
intelligence and context awareness approaches motivated
the development of IoH. The platform involves six
layers, responsible by connectivity, persistency,
unification, Internet of Things integration, subsystems
integration and user interface. The integrated
subsystems involve intelligent systems for light
control, television brightness control, desk light
control, persons counting and air conditioner control.
The IoH platform is then tested for a real building,
and results and conclusions are obtained. Different
intelligent methods and technologies are used, form the
use of a diversity of sensors, actuators, and
controllers and processing units to a set of artificial
intelligence approaches varying from machine learning
and optimization algorithms to the use of sensor fusion
and computer vision. The use of IoH day-by-day
demonstrated an intelligent performance for the real
building occupants.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Kejriwal:2019:MPI,
author = "Mayank Kejriwal and Pedro Szekely",
title = "{myDIG}: Personalized Illicit Domain-Specific
Knowledge Discovery with No Programming",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "59",
day = "04",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030059",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/59",
abstract = "With advances in machine learning, knowledge discovery
systems have become very complicated to set up,
requiring extensive tuning and programming effort.
Democratizing such technology so that non-technical
domain experts can avail themselves of these advances
in an interactive and personalized way is an important
problem. We describe myDIG, a highly modular, open
source pipeline-construction system that is
specifically geared towards investigative users (e.g.,
law enforcement) with no programming abilities. The
myDIG system allows users both to build a knowledge
graph of entities, relationships, and attributes for
illicit domains from a raw HTML corpus and also to set
up a personalized search interface for analyzing the
structured knowledge. We use qualitative and
quantitative data from five case studies involving
investigative experts from illicit domains such as
securities fraud and illegal firearms sales to
illustrate the potential of myDIG.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue New Perspectives on Semantic Web
Technologies and Applications.",
}
@Article{Wang:2019:HTC,
author = "Xuan Wang and Bofeng Zhang and Furong Chang",
title = "Hot Topic Community Discovery on Cross Social
Networks",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "60",
day = "04",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030060",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/60",
abstract = "The rapid development of online social networks has
allowed users to obtain information, communicate with
each other and express different opinions. Generally,
in the same social network, users tend to be influenced
by each other and have similar views. However, on
another social network, users may have opposite views
on the same event. Therefore, research undertaken on a
single social network is unable to meet the needs of
research on hot topic community discovery. ``Cross
social network'' refers to multiple social networks.
The integration of information from multiple social
network platforms forms a new unified dataset. In the
dataset, information from different platforms for the
same event may contain similar or unique topics. This
paper proposes a hot topic discovery method on cross
social networks. Firstly, text data from different
social networks are fused to build a unified model.
Then, we obtain latent topic distributions from the
unified model using the Labeled Biterm Latent Dirichlet
Allocation (LB-LDA) model. Based on the distributions,
similar topics are clustered to form several topic
communities. Finally, we choose hot topic communities
based on their scores. Experiment result on data from
three social networks prove that our model is effective
and has certain application value.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Zardari:2019:DAD,
author = "Zulfiqar Ali Zardari and Jingsha He and Nafei Zhu and
Khalid Hussain Mohammadani and Muhammad Salman Pathan
and Muhammad Iftikhar Hussain and Muhammad Qasim
Memon",
title = "A Dual Attack Detection Technique to Identify Black
and {Gray} Hole Attacks Using an Intrusion Detection
System and a Connected Dominating Set in {MANETs}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "61",
day = "05",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030061",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/61",
abstract = "A mobile ad-hoc network (MANET) is a temporary network
of wireless mobile nodes. In a MANET, it is assumed
that all of the nodes cooperate with each other to
transfer data packets in a multi-hop fashion. However,
some malicious nodes don't cooperate with other nodes
and disturb the network through false routing
information. In this paper, we propose a prominent
technique, called dual attack detection for black and
gray hole attacks (DDBG), for MANETs. The proposed DDBG
technique selects the intrusion detection system (IDS)
node using the connected dominating set (CDS) technique
with two additional features; the energy and its
nonexistence in the blacklist are also checked before
putting the nodes into the IDS set. The CDS is an
effective, distinguished, and localized approach for
detecting nearly-connected dominating sets of nodes in
a small range in mobile ad hoc networks. The selected
IDS nodes broadcast a kind of status packet within a
size of the dominating set for retrieving the complete
behavioral information from their nodes. Later, IDS
nodes use our DDBG technique to analyze the collected
behavioral information to detect the malicious nodes
and add them to the blacklist if the behavior of the
node is suspicious. Our experimental results show that
the quality of the service parameters of the proposed
technique outperforms the existing routing schemes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Geyda:2019:MIO,
author = "Alexander Geyda and Igor Lysenko",
title = "Modeling of Information Operations Effects:
Technological Systems Example",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "62",
day = "05",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030062",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/62",
abstract = "The article outlines conceptual and corresponding
formal models of system functioning. Models provide
means for estimation of information operation effects
and the operational properties of systems and their
functioning. Such systems are changed due to
information operations. Examples of operational
properties are efficiency, the effectiveness of system
functioning, system capabilities and system potential.
Operational properties are estimated based on
functioning effects. Such effects of information
operations are manifested through a system functioning
under the conditions of a changing environment. An
estimation of effects and operational properties is
fulfilled analytically. It is made through plotting the
dependences of the predicted values of effects and
operational properties of information operations and
corresponding IT usage against the variables and
options of problems solved. To develop this type of
model, the use of information operations during system
functioning is analyzed through an example of a
technological system. General concepts and principles
of the modeling of information operations during the
operation of such systems are defined. An exemplary
modeling of the effects of technological information,
and the related technological non-information
operations of technological systems operation is
provided. Based on concept models of information
operations of technological systems, functioning
set-theoretical models followed by functional models
are introduced. An example of operational properties
indicators estimation is considered. It is based on
Architecture of Integrated Information Systems (ARIS)
diagramming tools' usage. Use cases of such indicators
include choosing optimal information operations
characteristics.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yeboah-Ofori:2019:CST,
author = "Abel Yeboah-Ofori and Shareeful Islam",
title = "Cyber Security Threat Modeling for Supply Chain
Organizational Environments",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "63",
day = "05",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030063",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/63",
abstract = "Cyber security in a supply chain (SC) provides an
organization the secure network facilities to meet its
overall business objectives. The integration of
technologies has improved business processes, increased
production speed, and reduced distribution costs.
However, the increased interdependencies among various
supply chain stakeholders have brought many challenges
including lack of third party audit mechanisms and
cascading cyber threats. This has led to attacks such
as the manipulation of the design specifications,
alterations, and manipulation during distribution. The
aim of this paper is to investigate and understand
supply chain threats. In particular, the paper
contributes towards modeling and analyzing CSC attacks
and cyber threat reporting among supply chain
stakeholders. We consider concepts such as goal, actor,
attack, TTP, and threat actor relevant to the supply
chain, threat model, and requirements domain, and
modeled the attack using the widely known STIX threat
model. The proposed model was analyzed using a running
example of a smart grid case study and an algorithm to
model the attack. A discrete probability method for
calculating the conditional probabilities was used to
determine the attack propagation and cascading effects,
and the results showed that our approach effectively
analyzed the threats. We have recommended a list of CSC
controls to improve the overall security of the studied
organization.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Zheng:2019:CPS,
author = "Xin Zheng and Gaocai Wang and Qifei Zhao",
title = "A Cache Placement Strategy with Energy Consumption
Optimization in Information-Centric Networking",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "64",
day = "05",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030064",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/64",
abstract = "With the rapid development of cloud computing, big
data, and Internet of Things, Information-Centric
Networking (ICN) has become a novel hotspot in the
field of future Internet architecture, and new problems
have appeared. In particular, more researchers consider
information naming, delivery, mobility, and security in
ICN. In this paper, we mainly focus on the cache
placement strategy and network performance of ICN, and
propose a cache placement strategy with energy
consumption optimization. In order to optimize the
energy consumption of the ICN, the best cache placement
node is selected from the view of users. First of all,
the distance sequence of different nodes arriving at
each user is obtained in terms of detection results of
network distribution channels, and the corresponding
energy consumption of information distribution is
obtained from the distance sequence. Secondly, the
reward function of the cache node is derived using two
factors of energy consumption, which includes the
additional energy consumed by the change of the cache
node and the energy consumption of the content
distribution. Finally, we construct the optimal
stopping theory problem to solve the maximum expected
energy saving. In simulations, we give the comparison
results of energy savings, caching benefit, and
delivery success rate. The results show that the
strategy proposed by this paper has higher delivery
success rate and lower energy consumption than other
strategies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Information-Centric Networking (ICN).",
}
@Article{Li:2019:GTA,
author = "Yang Li and Leyi Shi and Haijie Feng",
title = "A Game-Theoretic Analysis for Distributed Honeypots",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "65",
day = "05",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030065",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/65",
abstract = "A honeypot is a decoy tool for luring an attacker and
interacting with it, further consuming its resources.
Due to its fake property, a honeypot can be recognized
by the adversary and loses its value. Honeypots
equipped with dynamic characteristics are capable of
deceiving intruders. However, most of their dynamic
properties are reflected in the system configuration,
rather than the location. Dynamic honeypots are faced
with the risk of being identified and avoided. In this
paper, we focus on the dynamic locations of honeypots
and propose a distributed honeypot scheme. By
periodically changing the services, the attacker cannot
distinguish the real services from honeypots, and the
illegal attack flow can be recognized. We adopt game
theory to illustrate the effectiveness of our system.
Gambit simulations are conducted to validate our
proposed scheme. The game-theoretic reasoning shows
that our system comprises an innovative system defense.
Further simulation results prove that the proposed
scheme improves the server's payoff and that the
attacker tends to abandon launching attacks. Therefore,
the proposed distributed honeypot scheme is effective
for network security.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jaloudi:2019:CPI,
author = "Samer Jaloudi",
title = "Communication Protocols of an Industrial {Internet of
Things} Environment: a Comparative Study",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "66",
day = "07",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030066",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/66",
abstract = "Most industrial and SCADA-like (supervisory control
and data acquisition) systems use proprietary
communication protocols, and hence interoperability is
not fulfilled. However, the MODBUS TCP is an open de
facto standard, and is used for some automation and
telecontrol systems. It is based on a polling mechanism
and follows the synchronous request--response pattern,
as opposed to the asynchronous publish--subscribe
pattern. In this study, polling-based and event-based
protocols are investigated to realize an open and
interoperable Industrial Internet of Things (IIoT)
environment. Many Internet of Things (IoT) protocols
are introduced and compared, and the message queuing
telemetry transport (MQTT) is chosen as the
event-based, publish--subscribe protocol. The study
shows that MODBUS defines an optimized message
structure in the application layer, which is dedicated
to industrial applications. In addition, it shows that
an event-oriented IoT protocol complements the MODBUS
TCP but cannot replace it. Therefore, two scenarios are
proposed to build the IIoT environment. The first
scenario is to consider the MODBUS TCP as an IoT
protocol, and build the environment using the MODBUS
TCP on a standalone basis. The second scenario is to
use MQTT in conjunction with the MODBUS TCP. The first
scenario is efficient and complies with most industrial
applications where the request--response pattern is
needed only. If the publish--subscribe pattern is
needed, the MQTT in the second scenario complements the
MODBUS TCP and eliminates the need for a gateway;
however, MQTT lacks interoperability. To maintain a
homogeneous message structure for the entire
environment, industrial data are organized using the
structure of MODBUS messages, formatted in the UTF-8,
and then transferred in the payload of an MQTT publish
message. The open and interoperable environment can be
used for Internet SCADA, Internet-based monitoring, and
industrial control systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Internet of Things.",
}
@Article{Mavroeidi:2019:GVP,
author = "Aikaterini-Georgia Mavroeidi and Angeliki Kitsiou and
Christos Kalloniatis and Stefanos Gritzalis",
title = "Gamification vs. Privacy: Identifying and Analysing
the Major Concerns",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "67",
day = "07",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030067",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/67",
abstract = "Gamification, the use of game design elements in
applications that are not games, has been developed to
provide attractive environments and maintain user
interest in several domains. In domains such as
education, marketing and health, where gamification
techniques are applied, user engagement in applications
has increased. In these applications the protection of
users' privacy is an important aspect to consider, due
to the applications obtaining a record of the personal
information of their users. Thus, the purpose of this
paper is to identify if applications where gamification
is applied do respect users' privacy. For the
accomplishment of this aim, two main steps have been
implemented. Since the main principle of gamification
is the existence of game elements, the first step was
to identify the set of game elements recorded in the
literature that are commonly applied in various
applications. Afterwards, an examination of the
relationship between these elements and privacy
requirements was implemented in order to identify which
elements conflict with the privacy requirements leading
to potential privacy violations and which elements do
not. \Α conceptual model according to the results
of this examination was designed, which presents how
elements conflict with requirements. Based on the
results, there are indeed game elements which can lead
to privacy violations. The results of this work provide
valuable guidance to software developers, especially
during the design stages of gamified applications since
it helps them to consider the protection of users'
privacy in parallel from the early stages of the
application development onwards.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Kato:2019:STE,
author = "Shigeru Kato and Naoki Wada and Ryuji Ito and Takaya
Shiozaki and Yudai Nishiyama and Tomomichi Kagawa",
title = "Snack Texture Estimation System Using a Simple
Equipment and Neural Network Model",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "68",
day = "08",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030068",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/68",
abstract = "Texture evaluation is manually performed in general,
and such analytical tasks can get cumbersome. In this
regard, a neural network model is employed in this
study. This paper describes a system that can estimate
the food texture of snacks. The system comprises a
simple equipment unit and an artificial neural network
model. The equipment simultaneously examines the load
and sound when a snack is pressed. The neural network
model analyzes the load change and sound signals and
then outputs a numerical value within the range (0,1)
to express the level of textures such as
``crunchiness'' and ``crispness''. Experimental results
validate the model's capacity to output moderate
texture values of the snacks. In addition, we applied
the convolutional neural network (CNN) model to
classify snacks and the capability of the CNN model for
texture estimation is discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Advanced Techniques for Internet, P2P
and Cloud Computing-selected papers from 3PGCIC-2018.",
}
@Article{Leivadeas:2019:VPO,
author = "Aris Leivadeas and George Kesidis and Mohamed Ibnkahla
and Ioannis Lambadaris",
title = "{VNF} Placement Optimization at the Edge and Cloud",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "69",
day = "09",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030069",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/69",
abstract = "Network Function Virtualization (NFV) has
revolutionized the way network services are offered to
end users. Individual network functions are decoupled
from expensive and dedicated middleboxes and are now
provided as software-based virtualized entities called
Virtualized Network Functions (VNFs). NFV is often
complemented with the Cloud Computing paradigm to
provide networking functions to enterprise customers
and end-users remote from their premises. NFV along
with Cloud Computing has also started to be seen in
Internet of Things (IoT) platforms as a means to
provide networking functions to the IoT traffic. The
intermix of IoT, NFV, and Cloud technologies, however,
is still in its infancy creating a rich and open future
research area. To this end, in this paper, we propose a
novel approach to facilitate the placement and
deployment of service chained VNFs in a network cloud
infrastructure that can be extended using the Mobile
Edge Computing (MEC) infrastructure for accommodating
mission critical and delay sensitive traffic. Our aim
is to minimize the end-to-end communication delay while
keeping the overall deployment cost to minimum. Results
reveal that the proposed approach can significantly
reduce the delay experienced, while satisfying the
Service Providers' goal of low deployment costs.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Software Defined Networking (SDN) and
Network Function Virtualization (NFV).",
}
@Article{Mahmood:2019:SDH,
author = "Adnan Mahmood and Wei Emma Zhang and Quan Z. Sheng",
title = "Software-Defined Heterogeneous Vehicular Networking:
The Architectural Design and Open Challenges",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "70",
day = "11",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030070",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/70",
abstract = "The promising advancements in the telecommunications
and automotive sectors over the years have empowered
drivers with highly innovative communication and
sensing capabilities, in turn paving the way for the
next-generation connected and autonomous vehicles.
Today, vehicles communicate wirelessly with other
vehicles and vulnerable pedestrians in their immediate
vicinity to share timely safety-critical information
primarily for collision mitigation. Furthermore,
vehicles connect with the traffic management entities
via their supporting network infrastructure to become
more aware of any potential hazards on the roads and
for guidance pertinent to their current and anticipated
speeds and travelling course to ensure more efficient
traffic flows. Therefore, a secure and low-latency
communication is highly indispensable in order to meet
the stringent performance requirements of such
safety-critical vehicular applications. However, the
heterogeneity of diverse radio access technologies and
inflexibility in their deployment results in network
fragmentation and inefficient resource utilization, and
these, therefore, act as bottlenecks in realizing the
aims for a highly efficient vehicular networking
architecture. In order to overcome such sorts of
bottlenecks, this article brings forth the current
state-of-the-art in the context of intelligent
transportation systems (ITS) and subsequently proposes
a software-defined heterogeneous vehicular networking
(SDHVNet) architecture for ensuring a highly agile
networking infrastructure to ensure rapid network
innovation on-demand. Finally, a number of potential
architectural challenges and their probable solutions
are discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Eramo:2019:ESR,
author = "Vincenzo Eramo and Francesco G. Lavacca and Tiziana
Catena and Marco Polverini and Antonio Cianfrani",
title = "Effectiveness of Segment Routing Technology in
Reducing the Bandwidth and Cloud Resources Provisioning
Times in Network Function Virtualization
Architectures",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "71",
day = "12",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030071",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/71",
abstract = "Network Function Virtualization is a new technology
allowing for a elastic cloud and bandwidth resource
allocation. The technology requires an orchestrator
whose role is the service and resource orchestration.
It receives service requests, each one characterized by
a Service Function Chain, which is a set of service
functions to be executed according to a given order. It
implements an algorithm for deciding where both to
allocate the cloud and bandwidth resources and to route
the SFCs. In a traditional orchestration algorithm, the
orchestrator has a detailed knowledge of the cloud and
network infrastructures and that can lead to high
computational complexity of the SFC Routing and Cloud
and Bandwidth resource Allocation (SRCBA) algorithm. In
this paper, we propose and evaluate the effectiveness
of a scalable orchestration architecture inherited by
the one proposed within the European Telecommunications
Standards Institute (ETSI) and based on the functional
separation of an NFV orchestrator in Resource
Orchestrator (RO) and Network Service Orchestrator
(NSO). Each cloud domain is equipped with an RO whose
task is to provide a simple and abstract representation
of the cloud infrastructure. These representations are
notified of the NSO that can apply a simplified and
less complex SRCBA algorithm. In addition, we show how
the segment routing technology can help to simplify the
SFC routing by means of an effective addressing of the
service functions. The scalable orchestration solution
has been investigated and compared to the one of a
traditional orchestrator in some network scenarios and
varying the number of cloud domains. We have verified
that the execution time of the SRCBA algorithm can be
drastically reduced without degrading the performance
in terms of cloud and bandwidth resource costs.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Software Defined Networking (SDN) and
Network Function Virtualization (NFV).",
}
@Article{Croft:2019:EHC,
author = "Paul J. Croft",
title = "Environmental Hazards: a Coverage Response Approach",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "72",
day = "14",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030072",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/72",
abstract = "The rapid rise and implementation of Smart Systems
(i.e., multi-functional observation and platform
systems that depict settings and/or identify situations
or features of interest, often in real-time) has
inversely paralleled and readily exposed the reduced
capacity of human and societal systems to effectively
respond to environmental hazards. This overarching
review and essay explores the complex set of
interactions found among Smart, Societal, and
Environmental Systems. The resulting rise in the poorly
performing response solutions to environmental hazards
that has occurred despite best practices, detailed
forecast information, and the use and application of
real-time in situ observational platforms are
considered. The application of Smart Systems, relevant
architectures, and ever-increasing numbers of
applications and tools development by individuals as
they interact with Smart Systems offers a means to
ameliorate and resolve confounding found among all of
the interdependent Systems. The interactions of human
systems with environmental hazards further expose
society's complex operational vulnerabilities and gaps
in response to such threats. An examination of
decision-making, the auto-reactive nature of responses
before, during, and after environmental hazards; and
the lack of scalability and comparability are presented
with regard to the prospects of applying probabilistic
methods, cross-scale time and space domains;
anticipated impacts, and the need to account for
multimodal actions and reactions --- including
psycho-social contributions. Assimilation of these
concepts and principles in Smart System architectures,
applications, and tools is essential to ensure future
viability and functionalities with regard to
environmental hazards and to produce an effective set
of societal engagement responses. Achieving the promise
of Smart Systems relative to environmental hazards will
require an extensive transdisciplinary approach to tie
psycho-social behaviors directly with non-human
components and systems in order to close actionable
gaps in response. Pathways to achieve a more
comprehensive understanding are given for consideration
by the wide diversity of disciplines necessary to move
forward in Smart Systems as tied with the societal
response to environmental hazards.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Aldawood:2019:RCS,
author = "Hussain Aldawood and Geoffrey Skinner",
title = "Reviewing Cyber Security Social Engineering Training
and Awareness Programs-Pitfalls and Ongoing Issues",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "73",
day = "18",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030073",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/73",
abstract = "The idea and perception of good cyber security
protection remains at the forefront of many
organizations' information and communication technology
strategy and investment. However, delving deeper into
the details of its implementation reveals that
organizations' human capital cyber security knowledge
bases are very low. In particular, the lack of social
engineering awareness is a concern in the context of
human cyber security risks. This study highlights
pitfalls and ongoing issues that organizations
encounter in the process of developing the human
knowledge to protect from social engineering attacks. A
detailed literature review is provided to support these
arguments with analysis of contemporary approaches. The
findings show that despite state-of-the-art cyber
security preparations and trained personnel, hackers
are still successful in their malicious acts of
stealing sensitive information that is crucial to
organizations. The factors influencing users'
proficiency in threat detection and mitigation have
been identified as business environmental, social,
political, constitutional, organizational, economical,
and personal. Challenges with respect to both
traditional and modern tools have been analyzed to
suggest the need for profiling at-risk employees
(including new hires) and developing training programs
at each level of the hierarchy to ensure that the
hackers do not succeed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Information and
Communication Systems.",
}
@Article{Sofia:2019:OPB,
author = "Rute C. Sofia and Paulo M. Mendes",
title = "An Overview on Push-Based Communication Models for
Information-Centric Networking",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "74",
day = "21",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030074",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/74",
abstract = "Information-centric networking integrates by design a
pull-based model which brings in advantages in terms of
control as well as of in-network caching strategies.
Currently, ICN main areas of action concern content
distribution and IoT, both of which are environments
that often require support for periodic and
even-triggered data transmission. Such environments can
benefit from push-based communication to achieve faster
data forwarding. This paper provides an overview on the
current push-based mechanisms that can be applied to
information-centric paradigms, explaining the trade-off
associated with the different approaches. Moreover, the
paper provides design guidelines for integrating push
communications in information-centric networking,
having as example the application of this networking
architecture in IoT environments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Information-Centric Networking (ICN).",
}
@Article{Sufiev:2019:DSC,
author = "Hadar Sufiev and Yoram Haddad and Leonid Barenboim and
Jos{\'e} Soler",
title = "Dynamic {SDN} Controller Load Balancing",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "75",
day = "21",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030075",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/75",
abstract = "The software defined networking (SDN) paradigm
separates the control plane from the data plane, where
an SDN controller receives requests from its connected
switches and manages the operation of the switches
under its control. Reassignments between switches and
their controllers are performed dynamically, in order
to balance the load over SDN controllers. In order to
perform load balancing, most dynamic assignment
solutions use a central element to gather information
requests for reassignment of switches. Increasing the
number of controllers causes a scalability problem,
when one super controller is used for all controllers
and gathers information from all switches. In a large
network, the distances between the controllers is
sometimes a constraint for assigning them switches. In
this paper, a new approach is presented to solve the
well-known load balancing problem in the SDN control
plane. This approach implies less load on the central
element and meeting the maximum distance constraint
allowed between controllers. An architecture with two
levels of load balancing is defined. At the top level,
the main component called Super Controller, arranges
the controllers in clusters, so that there is a balance
between the loads of the clusters. At the bottom level,
in each cluster there is a dedicated controller called
Master Controller, which performs a reassignment of the
switches in order to balance the loads between the
controllers. We provide a two-phase algorithm, called
Dynamic Controllers Clustering algorithm, for the top
level of load balancing operation. The load balancing
operation takes place at regular intervals. The length
of the cycle in which the operation is performed can be
shorter, since the top-level operation can run
independently of the bottom level operation. Shortening
cycle time allows for more accurate results of load
balancing. Theoretical analysis demonstrates that our
algorithm provides a near-optimal solution. Simulation
results show that our dynamic clustering improves fixed
clustering by a multiplicative factor of 5.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Content Centric Future Internet
Architectures.",
}
@Article{Hyla:2019:EIM,
author = "Tomasz Hyla and Jerzy Peja{\'s}",
title = "{eHealth} Integrity Model Based on Permissioned
Blockchain",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "76",
day = "24",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030076",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/76",
abstract = "(1) Background: Large eHealth systems should have a
mechanism to detect unauthorized changes in patients'
medical documentation, access permissions, and logs.
This is due to the fact that modern eHealth systems are
connected with many healthcare providers and sites. (2)
Methods: Design-science methodology was used to create
an integrity-protection service model based on
blockchain technology. Based on the problem of
transactional transparency, requirements were specified
and a model was designed. After that, the model's
security and performance were evaluated. (3) Results: a
blockchain-based eHealth integrity model for ensuring
information integrity in eHealth systems that uses a
permissioned blockchain with off-chain information
storage was created. In contrast to existing solutions,
the proposed model allows information removal, which in
many countries' eHealth systems is a legal requirement,
and is based on a blockchain using the Practical
Byzantine Fault Tolerant algorithm. (4) Conclusion: a
blockchain can be used to store medical data or only
security-related data. In the proposed model, a
blockchain is mainly used to implement a data-integrity
service. This service can be implemented using other
mechanisms, but a blockchain provides a solution that
does not require trusted third parties, works in a
distributed eHealth environment, and supports document
removal.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Information and
Communication Systems.",
}
@Article{Corrales-Garay:2019:ODO,
author = "Diego Corrales-Garay and Eva-Mar{\'\i}a
Mora-Valent{\'\i}n and Marta Ortiz-de-Urbina-Criado",
title = "Open Data for Open Innovation: An Analysis of
Literature Characteristics",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "77",
day = "24",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030077",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/77",
abstract = "In this paper, we review some characteristics of the
literature that studies the uses and applications of
open data for open innovation. Three research questions
are proposed about both topics: (1) What journals,
conferences and authors have published papers about the
use of open data for open innovation? (2) What
knowledge areas have been analysed in research on open
data for open innovation? and (3) What are the
methodological characteristics of the papers on open
data for open innovation? To answer the first question,
we use a descriptive analysis to identify the relevant
journals and authors. To address the second question,
we identify the knowledge areas of the studies about
open data for open innovation. Finally, we analyse the
methodological characteristics of the literature (type
of study, analytical techniques, sources of information
and geographical area). Our results show that the
applications of open data for open innovation are
interesting but their multidisciplinary nature makes
the context complex and diverse, opening up many future
avenues for research. To develop a future research
agenda, we propose a theoretical model and some
research questions to analyse the open data impact
process for open innovation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Intelligent Systems and Networks
2019.",
}
@Article{Galanis:2019:EBS,
author = "Ioannis Galanis and Iraklis Anagnostopoulos and Priyaa
Gurunathan and Dona Burkard",
title = "Environmental-Based Speed Recommendation for Future
Smart Cars",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "78",
day = "24",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030078",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/78",
abstract = "Modern vehicles are enhanced with increased
computation, communication and sensing capabilities,
providing a variety of new features that pave the way
for the deployment of more sophisticated services.
Specifically, smart cars employ hundreds of sensors and
electronic systems in order to obtain situational and
environmental information. This rapid growth of
on-vehicle multi-sensor inputs along with off-vehicle
data streams introduce the smart car era. Thus,
systematic techniques for combining information
provided by on- and off-vehicle car connectivity are of
remarkable importance for the availability and
robustness of the overall system. This paper presents a
new method to employ service oriented agents that
cohesively align on- and off-vehicle information in
order to estimate the current status of the car. In
particular, this work combines, integrates, and
evaluates multiple information sources targeting future
smart cars. Specifically, the proposed methodology
leverages weather-based, on-route, and on-vehicle
information. As a use case, the presented work informs
the driver about the recommended speed that the car
should adapt to, based on the current status of the
car. It also validates the proposed speed with
real-time vehicular measurements.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Luo:2019:TSE,
author = "Xiangfeng Luo and Yawen Yi",
title = "Topic-Specific Emotion Mining Model for Online
Comments",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "79",
day = "24",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030079",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/79",
abstract = "Nowadays, massive texts are generated on the web,
which contain a variety of viewpoints, attitudes, and
emotions for products and services. Subjective
information mining of online comments is vital for
enterprises to improve their products or services and
for consumers to make purchase decisions. Various
effective methods, the mainstream one of which is the
topic model, have been put forward to solve this
problem. Although most of topic models can mine the
topic-level emotion of the product comments, they do
not consider interword relations and the number of
topics determined adaptively, which leads to poor
comprehensibility, high time requirement, and low
accuracy. To solve the above problems, this paper
proposes an unsupervised Topic-Specific Emotion Mining
Model (TSEM), which adds corresponding relationship
between aspect words and opinion words to express
comments as a bag of aspect--opinion pairs. On one
hand, the rich semantic information obtained by adding
interword relationship can enhance the
comprehensibility of results. On the other hand, text
dimensions reduced by adding relationships can cut the
computation time. In addition, the number of topics in
our model is adaptively determined by calculating
perplexity to improve the emotion accuracy of the topic
level. Our experiments using Taobao commodity comments
achieve better results than baseline models in terms of
accuracy, computation time, and comprehensibility.
Therefore, our proposed model can be effectively
applied to online comment emotion mining tasks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fondevila-Gascon:2019:ESU,
author = "Joan-Francesc Fondevila-Gasc{\'o}n and Gaspar Berbel
and M{\`o}nica Mu{\~n}oz-Gonz{\'a}lez",
title = "Experimental Study on the Utility and Future of
Collaborative Consumption Platforms Offering Tourism
Related Services",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "80",
day = "25",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030080",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/80",
abstract = "The present study analyzes four well-known online
platforms used in the tourist industry for travelling,
accommodation, eating, and touring (Blablacar, Airbnb,
Eatwith, and Trip4real). The objective is to analyze
the utility of the portals, intentions for future use
and recommendation (prospective), and reputation. The
method is an experimental design with a control group
and experimental group. Within both groups, three
scales were applied. The results indicate clear
differences between the control and experimental
groups, valuing above all the utility and the intent to
use again when the group is exposed to the portals from
a needs-based situation (experimental group). The
analysis demonstrates a factorial structure that
validates the model. At the same time, the results
indicate a greater interest in using Trip4Real over
BlaBlaCar. Generation Z, the youngest generation, shows
greater confidence in the services and greater interest
in using tourism related collaborative consumption
platforms in the future.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Zhao:2019:NAB,
author = "Ning Zhao and Yuhe Liu and Junjie Shen",
title = "Nonlinear Analysis of Built-in Sensor in Smart Device
under the Condition of Voice Actuating",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "81",
day = "26",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030081",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/81",
abstract = "A built-in sensor in a smart device, such as the
accelerometer and the gyroscope, will produce an
obvious nonlinear output when it receives voice signal.
In this paper, based on the chaotic theory, the
nonlinearity of smartphone built-in accelerometer is
revealed by phase space reconstructing after we
calculate several nonlinearity characteristics, such as
best delay time, embedding dimension, and the attractor
of accelerometer system, under the condition of voice
commands inputting. The results of theoretical
calculation and experiments show that this specific
nonlinearity could lay a foundation for further signal
extraction and analysis.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Information and
Communication Systems.",
}
@Article{Dong:2019:ACM,
author = "Ying Dong and Zhou Lei",
title = "An Access Control Model for Preventing Virtual Machine
Hopping Attack",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "3",
pages = "82",
day = "26",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11030082",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/11/3/82",
abstract = "As a new type of service computing model, cloud
computing provides various services through the
Internet. Virtual machine (VM) hopping is a security
issue often encountered in the virtualization layer.
Once it occurs, it directly affects the reliability of
the entire computing platform. Therefore, we have
thoroughly studied the virtual machine hopping attack.
In addition, we designed the access control model PVMH
(Prevent VM hopping) to prevent VM hopping attacks
based on the BLP model and the Biba model. Finally, we
implemented the model on the Xen platform. The
experiments demonstrate that our PVMH module succeeds
in preventing VM hopping attack with acceptable loss to
virtual machine performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Celesti:2019:SJO,
author = "Antonio Celesti and Maria Fazio and Massimo Villari",
title = "A Study on Join Operations in {MongoDB} Preserving
Collections Data Models for Future {Internet}
Applications",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "4",
pages = "83",
day = "27",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11040083",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/4/83",
abstract = "Presently, we are observing an explosion of data that
need to be stored and processed over the Internet, and
characterized by large volume, velocity and variety.
For this reason, software developers have begun to look
at NoSQL solutions for data storage. However,
operations that are trivial in traditional Relational
DataBase Management Systems (DBMSs) can become very
complex in NoSQL DBMSs. This is the case of the join
operation to establish a connection between two or more
DB structures, whose construct is not explicitly
available in many NoSQL databases. As a consequence,
the data model has to be changed or a set of operations
have to be performed to address particular queries on
data. Thus, open questions are: how do NoSQL solutions
work when they have to perform join operations on data
that are not natively supported? What is the quality of
NoSQL solutions in such cases? In this paper, we deal
with such issues specifically considering one of the
major NoSQL document oriented DB available on the
market: MongoDB. In particular, we discuss an approach
to perform join operations at application layer in
MongoDB that allows us to preserve data models. We
analyse performance of the proposes approach discussing
the introduced overhead in comparison with SQL-like
DBs.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Villora:2019:CDA,
author = "Beatriz Villora and Santiago Yubero and Ra{\'u}l
Navarro",
title = "Cyber Dating Abuse and Masculine Gender Norms in a
Sample of Male Adults",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "4",
pages = "84",
day = "28",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11040084",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/4/84",
abstract = "Gender role norms have been widely studied in the
offline partner violence context. Different studies
have indicated that internalizing these norms was
associated with dating violence. However, very few
research works have analyzed this relation in forms of
aggression against partners and former partners using
information and communication technologies (ICT). The
objective of the present study was to examine the
co-occurrence of cyber dating abuse by analyzing the
extent to which victimization and perpetration overlap,
and by analyzing the differences according to
conformity to the masculine gender norms between men
who are perpetrators or victims of cyber dating abuse.
The participants were 614 male university students, and
26.5\% of the sample reported having been a victim and
perpetrator of cyber dating abuse. Nonetheless, the
regression analyses did not reveal any statistically
significant association between conformity to masculine
gender norms and practicing either perpetration or
victimization by cyber dating abuse.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Yao:2019:RSA,
author = "Jiaying Yao and Zhigeng Han and Muhammad Sohail and
Liangmin Wang",
title = "A Robust Security Architecture for {SDN}-Based {5G}
Networks",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "4",
pages = "85",
day = "28",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11040085",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/4/85",
abstract = "5G is the latest generation of cellular mobile
communications. Due to its significant advantage in
high data rate, reduced latency and massive device
connectivity, the 5G network plays a vital role in
today's commercial telecommunications networks.
However, the 5G network also faces some challenges when
used in practice. This is because it consists of
various diverse ingredients, termed heterogeneity. The
heterogeneity of the 5G network has two consequences:
first, it prevents us to use this technology in a
uniform way, preventing the wide use of 5G technology;
second, it complicates the structure of the 5G network,
making it hard to monitor what is going on in a 5G
network. To break through this limitation, researchers
have worked in this field and design their own
protocol, in which software-defined networking (SDN) is
one key design concept. By separating control and data
plane, SDN can make the 5G network functional and
programmable, such that we can handle the heterogeneity
in traditional 5G networks. In light of this, we say
that SDN-5G network is attractive, but its advantages
are not free. The intelligence centralization used in
SDN has its own drawbacks when it comes to security. To
break through this limitation, we propose a robust
security architecture for SDN-based 5G Networks. To
find the illegal request from malicious attackers, we
add extra cryptographic authentication, termed
synchronize secret. The basic idea of our scheme is
leveraging preload secrets to differ attacks from
regular network communications. The simulation results
indicate that our work can completely handle the
security problem from SDN with a low disconnect rate of
0.01\%, which is much better than that from state of
the art.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Software Defined Networking (SDN) and
Network Function Virtualization (NFV).",
}
@Article{Lopez:2019:TFD,
author = "C{\'e}sar P{\'e}rez L{\'o}pez and Mar{\'\i}a Jes{\'u}s
Delgado Rodr{\'\i}guez and Sonia de Lucas Santos",
title = "Tax Fraud Detection through Neural Networks: An
Application Using a Sample of Personal Income
Taxpayers",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "4",
pages = "86",
day = "30",
month = mar,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11040086",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/4/86",
abstract = "The goal of the present research is to contribute to
the detection of tax fraud concerning personal income
tax returns (IRPF, in Spanish) filed in Spain, through
the use of Machine Learning advanced predictive tools,
by applying Multilayer Perceptron neural network (MLP)
models. The possibilities springing from these
techniques have been applied to a broad range of
personal income return data supplied by the Institute
of Fiscal Studies (IEF). The use of the neural networks
enabled taxpayer segmentation as well as calculation of
the probability concerning an individual taxpayer's
propensity to attempt to evade taxes. The results
showed that the selected model has an efficiency rate
of 84.3\%, implying an improvement in relation to other
models utilized in tax fraud detection. The proposal
can be generalized to quantify an individual's
propensity to commit fraud with regards to other kinds
of taxes. These models will support tax offices to help
them arrive at the best decisions regarding action
plans to combat tax fraud.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Intelligent Systems and Networks
2019.",
}
@Article{Zhao:2019:IQE,
author = "Haichuan Zhao",
title = "Information Quality or Entities' Interactivity?
{Understanding} the Determinants of Social
Network-Based Brand Community Participation",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "4",
pages = "87",
day = "01",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11040087",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/4/87",
abstract = "The customer's participation is important to the
survival of a brand community. By drawing on flow
theory, this research identified the most important
factors that motivate the customers' participation
intention than others in a social network-based brand
community. Data were collected from the Sina
micro-blog. This study adopted two different but
complementary methods to analyse the conceptual model:
Structure equation model (SEM) and fuzzy set
qualitative analysis (fsQCA). Results support most of
the research hypothesis. Specifically, the findings
obtained from the fsQCA indicate that information
quality and platform-interactivity are necessary
conditions that encourage the customers' participation
in a brand community.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Lin:2019:OES,
author = "Guoying Lin and Yuyao Yang and Feng Pan and Sijian
Zhang and Fen Wang and Shuai Fan",
title = "An Optimal Energy-Saving Strategy for Home Energy
Management Systems with Bounded Customer Rationality",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "4",
pages = "88",
day = "02",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11040088",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/4/88",
abstract = "With the development of techniques, such as the
Internet of Things (IoT) and edge computing, home
energy management systems (HEMS) have been widely
implemented to improve the electric energy efficiency
of customers. In order to automatically optimize
electric appliances' operation schedules, this paper
considers how to quantitatively evaluate a customer's
comfort satisfaction in energy-saving programs, and how
to formulate the optimal energy-saving model based on
this satisfaction evaluation. First, the paper
categorizes the utility functions of current electric
appliances into two types; time-sensitive utilities and
temperature-sensitive utilities, which cover nearly all
kinds of electric appliances in HEMS. Furthermore,
considering the bounded rationality of customers, a
novel concept called the energy-saving cost is defined
by incorporating prospect theory in behavioral
economics into general utility functions. The proposed
energy-saving cost depicts the comfort loss risk for
customers when their HEMS schedules the operation
status of appliances, which is able to be set by
residents as a coefficient in the automatic
energy-saving program. An optimization model is
formulated based on minimizing energy consumption.
Because the energy-saving cost has already been
evaluated in the context of the satisfaction of
customers, the formulation of the optimization program
is very simple and has high computational efficiency.
The case study included in this paper is first
performed on a general simulation system. Then, a case
study is set up based on real field tests from a pilot
project in Guangdong province, China, in which
air-conditioners, lighting, and some other popular
electric appliances were included. The total
energy-saving rate reached 65.5\% after the proposed
energy-saving program was deployed in our project. The
benchmark test shows our optimal strategy is able to
considerably save electrical energy for residents while
ensuring customers' comfort satisfaction is
maintained.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Salahdine:2019:SEA,
author = "Fatima Salahdine and Naima Kaabouch",
title = "Social Engineering Attacks: a Survey",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "4",
pages = "89",
day = "02",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11040089",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/4/89",
abstract = "The advancements in digital communication technology
have made communication between humans more accessible
and instant. However, personal and sensitive
information may be available online through social
networks and online services that lack the security
measures to protect this information. Communication
systems are vulnerable and can easily be penetrated by
malicious users through social engineering attacks.
These attacks aim at tricking individuals or
enterprises into accomplishing actions that benefit
attackers or providing them with sensitive data such as
social security number, health records, and passwords.
Social engineering is one of the biggest challenges
facing network security because it exploits the natural
human tendency to trust. This paper provides an
in-depth survey about the social engineering attacks,
their classifications, detection strategies, and
prevention procedures.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Signal Processing for Next Generation
Wireless Networks.",
}
@Article{Li:2019:ACO,
author = "Gang Li and Zhijun Wu",
title = "Ant Colony Optimization Task Scheduling Algorithm for
{SWIM} Based on Load Balancing",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "4",
pages = "90",
day = "02",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11040090",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/4/90",
abstract = "This paper focuses on the load imbalance problem in
System Wide Information Management (SWIM) task
scheduling. In order to meet the quality requirements
of users for task completion, we studied large-scale
network information system task scheduling methods.
Combined with the traditional ant colony optimization
(ACO) algorithm, using the hardware performance quality
index and load standard deviation function of SWIM
resource nodes to update the pheromone, a SWIM ant
colony task scheduling algorithm based on load
balancing (ACTS-LB) is presented in this paper. The
experimental simulation results show that the ACTS-LB
algorithm performance is better than the traditional
min-min algorithm, ACO algorithm and particle swarm
optimization (PSO) algorithm. It not only reduces the
task execution time and improves the utilization of
system resources, but also can maintain SWIM in a more
load balanced state.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Information and
Communication Systems.",
}
@Article{Zhang:2019:DGR,
author = "Xinyu Zhang and Xiaoqiang Li",
title = "Dynamic Gesture Recognition Based on {MEMP} Network",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "4",
pages = "91",
day = "03",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11040091",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/4/91",
abstract = "In recent years, gesture recognition has been used in
many fields, such as games, robotics and sign language
recognition. Human computer interaction (HCI) has been
significantly improved by the development of gesture
recognition, and now gesture recognition in video is an
important research direction. Because each kind of
neural network structure has its limitation, we
proposed a neural network with alternate fusion of 3D
CNN and ConvLSTM, which we called the Multiple
extraction and Multiple prediction (MEMP) network. The
main feature of the MEMP network is to extract and
predict the temporal and spatial feature information of
gesture video multiple times, which enables us to
obtain a high accuracy rate. In the experimental part,
three data sets (LSA64, SKIG and Chalearn 2016) are
used to verify the performance of network. Our approach
achieved high accuracy on those data sets. In the
LSA64, the network achieved an identification rate of
99.063\%. In SKIG, this network obtained the
recognition rates of 97.01\% and 99.02\% in the RGB
part and the rgb-depth part. In Chalearn 2016, the
network achieved 74.57\% and 78.85\% recognition rates
in RGB part and rgb-depth part respectively.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Innovative Topologies and Algorithms for
Neural Networks.",
}
@Article{Hackl:2019:ESU,
author = "J{\"u}rgen Hackl and Thibaut Dubernet",
title = "Epidemic Spreading in Urban Areas Using Agent-Based
Transportation Models",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "4",
pages = "92",
day = "08",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11040092",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/4/92",
abstract = "Human mobility is a key element in the understanding
of epidemic spreading. Thus, correctly modeling and
quantifying human mobility is critical for studying
large-scale spatial transmission of infectious diseases
and improving epidemic control. In this study, a
large-scale agent-based transport simulation (MATSim)
is linked with a generic epidemic spread model to
simulate the spread of communicable diseases in an
urban environment. The use of an agent-based model
allows reproduction of the real-world behavior of
individuals' daily path in an urban setting and allows
the capture of interactions among them, in the form of
a spatial-temporal social network. This model is used
to study seasonal influenza outbreaks in the
metropolitan area of Zurich, Switzerland. The
observations of the agent-based models are compared
with results from classical SIR models. The model
presented is a prototype that can be used to analyze
multiple scenarios in the case of a disease spread at
an urban scale, considering variations of different
model parameters settings. The results of this
simulation can help to improve comprehension of the
disease spread dynamics and to take better steps
towards the prevention and control of an epidemic.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected papers from The 7th
International Conference on Complex Networks and Their
Applications.",
}
@Article{Barro:2019:SCL,
author = "Pape Abdoulaye Barro and Marco Zennaro and Jules
Degila and Ermanno Pietrosemoli",
title = "A Smart Cities {LoRaWAN} Network Based on Autonomous
Base Stations {(BS)} for Some Countries with Limited
{Internet} Access",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "4",
pages = "93",
day = "08",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11040093",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/4/93",
abstract = "An increasing number of implementations of IoT for
development use the LoRaWAN protocol as many of them
leverage the free network and application servers
provided by The Things Networks (TTN) to fulfill their
needs. Unfortunately, in some countries in Sub-Saharan
Africa and South Asia, Internet access cannot be taken
for granted, therefore, TTN might not be available.
Moreover, low-cost and low-power consumption options
devices are the most sustainable ones. In this paper,
we propose a LoRaWAN network with autonomous base
stations that can work without Internet connectivity
for essential services, while being able to provide
additional features whenever Internet access becomes
available, even in an intermittent fashion. Security
and privacy are preserved, with support for mobile
nodes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue IoT for Development (IoT4D).",
}
@Article{Zantalis:2019:RML,
author = "Fotios Zantalis and Grigorios Koulouras and Sotiris
Karabetsos and Dionisis Kandris",
title = "A Review of Machine Learning and {IoT} in Smart
Transportation",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "4",
pages = "94",
day = "10",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11040094",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/4/94",
abstract = "With the rise of the Internet of Things (IoT),
applications have become smarter and connected devices
give rise to their exploitation in all aspects of a
modern city. As the volume of the collected data
increases, Machine Learning (ML) techniques are applied
to further enhance the intelligence and the
capabilities of an application. The field of smart
transportation has attracted many researchers and it
has been approached with both ML and IoT techniques. In
this review, smart transportation is considered to be
an umbrella term that covers route optimization,
parking, street lights, accident prevention/detection,
road anomalies, and infrastructure applications. The
purpose of this paper is to make a self-contained
review of ML techniques and IoT applications in
Intelligent Transportation Systems (ITS) and obtain a
clear view of the trends in the aforementioned fields
and spot possible coverage needs. From the reviewed
articles it becomes profound that there is a possible
lack of ML coverage for the Smart Lighting Systems and
Smart Parking applications. Additionally, route
optimization, parking, and accident/detection tend to
be the most popular ITS applications among
researchers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Wang:2019:IMS,
author = "Fei Wang and Zhenfang Zhu and Peiyu Liu and Peipei
Wang",
title = "Influence Maximization in Social Network Considering
Memory Effect and Social Reinforcement Effect",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "4",
pages = "95",
day = "11",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11040095",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/4/95",
abstract = "Social networks have attracted a lot of attention as
novel information or advertisement diffusion media for
viral marketing. Influence maximization describes the
problem of finding a small subset of seed nodes in a
social network that could maximize the spread of
influence. A lot of algorithms have been proposed to
solve this problem. Recently, in order to achieve more
realistic viral marketing scenarios, some constrained
versions of influence maximization, which consider time
constraints, budget constraints and so on, have been
proposed. However, none of them considers the memory
effect and the social reinforcement effect, which are
ubiquitous properties of social networks. In this
paper, we define a new constrained version of the
influence maximization problem that captures the social
reinforcement and memory effects. We first propose a
novel propagation model to capture the dynamics of the
memory and social reinforcement effects. Then, we
modify two baseline algorithms and design a new
algorithm to solve the problem under the model.
Experiments show that our algorithm achieves the best
performance with relatively low time complexity. We
also demonstrate that the new version captures some
important properties of viral marketing in social
networks, such as such as social reinforcements, and
could explain some phenomena that cannot be explained
by existing influence maximization problem
definitions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Multi-Agent Systems for Social Media
Analysis.",
}
@Article{Li:2019:IAT,
author = "Wenkuan Li and Peiyu Liu and Qiuyue Zhang and Wenfeng
Liu",
title = "An Improved Approach for Text Sentiment Classification
Based on a Deep Neural Network via a Sentiment
Attention Mechanism",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "4",
pages = "96",
day = "11",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11040096",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/4/96",
abstract = "Text sentiment analysis is an important but
challenging task. Remarkable success has been achieved
along with the wide application of deep learning
methods, but deep learning methods dealing with text
sentiment classification tasks cannot fully exploit
sentiment linguistic knowledge, which hinders the
development of text sentiment analysis. In this paper,
we propose a sentiment-feature-enhanced deep neural
network (SDNN) to address the problem by integrating
sentiment linguistic knowledge into a deep neural
network via a sentiment attention mechanism.
Specifically, first we introduce a novel sentiment
attention mechanism to help select the crucial
sentiment-word-relevant context words by leveraging the
sentiment lexicon in an attention mechanism, which
bridges the gap between traditional sentiment
linguistic knowledge and current popular deep learning
methods. Second, we develop an improved deep neural
network to extract sequential correlation information
and text local features by combining bidirectional
gated recurrent units with a convolutional neural
network, which further enhances the ability of
comprehensive text representation learning. With this
design, the SDNN model can generate a powerful semantic
representation of text to improve the performance of
text sentiment classification tasks. Extensive
experiments were conducted to evaluate the
effectiveness of the proposed SDNN model on two
real-world datasets with a binary-sentiment-label and a
multi-sentiment-label. The experimental results
demonstrated that the SDNN achieved substantially
better performance than the strong competitors for text
sentiment classification tasks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Innovative Topologies and Algorithms for
Neural Networks.",
}
@Article{Dong:2019:MBN,
author = "Peixin Dong and Dongyuan Li and Jianping Xing and
Haohui Duan and Yong Wu",
title = "A Method of Bus Network Optimization Based on Complex
Network and Beidou Vehicle Location",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "4",
pages = "97",
day = "15",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11040097",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/4/97",
abstract = "Aiming at the problems of poor time performance and
accuracy in bus stops network optimization, this paper
proposes an algorithm based on complex network and
graph theory and Beidou Vehicle Location to measure the
importance of bus stops. This method narrows the scope
of points and edges to be optimized and is applied to
the Jinan bus stop network. In this method, the bus
driving efficiency, which can objectively reflect
actual road conditions, is taken as the weight of the
connecting edges in the network, and the network is
optimized through the network efficiency. The
experimental results show that, compared with the
original network, the optimized network time
performance is good and the optimized network bus
driving efficiency is improved.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yuan:2019:FOS,
author = "Peiyan Yuan and Xiaoxiao Pang and Ping Liu and En
Zhang",
title = "{FollowMe}: One Social Importance-Based Collaborative
Scheme in {MONs}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "4",
pages = "98",
day = "17",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11040098",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/4/98",
abstract = "The performance of mobile opportunistic networks
mainly relies on collaboration among nodes. Thus far,
researchers have ignored the influence of node
sociality on the incentive process, leading to poor
network performance. Considering the fact that
followers always imitate the behavior of superstars,
this paper proposes FollowMe, which integrates the
social importance of nodes with evolutionary game
theory to improve the collaborative behavior of nodes.
First, we use the prisoner's dilemma model to establish
the matrix of game gains between nodes. Second, we
introduce the signal reference as a game rule between
nodes. The number of nodes choosing different
strategies in a game round is used to calculate the
cumulative income of the node in combination with the
probability formula. Finally, the Fermi function is
used to determine whether the node updates the
strategy. The simulation results show that, compared
with the random update rule, the proposed strategy is
more capable of promoting cooperative behavior between
nodes to improve the delivery rate of data packets.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Cilfone:2019:WMN,
author = "Antonio Cilfone and Luca Davoli and Laura Belli and
Gianluigi Ferrari",
title = "Wireless Mesh Networking: An {IoT}-Oriented
Perspective Survey on Relevant Technologies",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "4",
pages = "99",
day = "17",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11040099",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/4/99",
abstract = "The Internet of Things (IoT), being a ``network of
networks'', promises to allow billions of humans and
machines to interact with each other. Owing to this
rapid growth, the deployment of IoT-oriented networks
based on mesh topologies is very attractive, thanks to
their scalability and reliability (in the presence of
failures). In this paper, we provide a comprehensive
survey of the following relevant wireless technologies:
IEEE 802.11, Bluetooth, IEEE 802.15.4-oriented, and
Sub-GHz-based LoRa. Our goal is to highlight how
various communication technologies may be suitable for
mesh networking, either providing a native support or
being adapted subsequently. Hence, we discuss how these
wireless technologies, being either standard or
proprietary, can adapt to IoT scenarios (e.g., smart
cities and smart agriculture) in which the
heterogeneity of the involved devices is a key feature.
Finally, we provide reference use cases involving all
the analyzed mesh-oriented technologies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Capra:2019:ECS,
author = "Maurizio Capra and Riccardo Peloso and Guido Masera
and Massimo Ruo Roch and Maurizio Martina",
title = "Edge Computing: a Survey On the Hardware Requirements
in the {Internet of Things} World",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "4",
pages = "100",
day = "23",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11040100",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/4/100",
abstract = "In today's world, ruled by a great amount of data and
mobile devices, cloud-based systems are spreading all
over. Such phenomenon increases the number of connected
devices, broadcast bandwidth, and information exchange.
These fine-grained interconnected systems, which enable
the Internet connectivity for an extremely large number
of facilities (far beyond the current number of
devices) go by the name of Internet of Things (IoT). In
this scenario, mobile devices have an operating time
which is proportional to the battery capacity, the
number of operations performed per cycle and the amount
of exchanged data. Since the transmission of data to a
central cloud represents a very energy-hungry
operation, new computational paradigms have been
implemented. The computation is not completely
performed in the cloud, distributing the power load
among the nodes of the system, and data are compressed
to reduce the transmitted power requirements. In the
edge-computing paradigm, part of the computational
power is moved toward data collection sources, and,
only after a first elaboration, collected data are sent
to the central cloud server. Indeed, the ``edge'' term
refers to the extremities of systems represented by IoT
devices. This survey paper presents the hardware
architectures of typical IoT devices and sums up many
of the low power techniques which make them appealing
for a large scale of applications. An overview of the
newest research topics is discussed, besides a final
example of a complete functioning system, embedding all
the introduced features.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Ciuffoletti:2019:DOR,
author = "Augusto Ciuffoletti",
title = "Design of an Open Remote Electrocardiogram {(ECG)}
Service",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "4",
pages = "101",
day = "24",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11040101",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:05 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/4/101",
abstract = "Currently, the deployment of services for real-time
delivery of an electrocardiogram to a remote site has a
cost that prevents its widespread diffusion, which
would contribute to saving lives with prevention,
assistance and rescue efficiency. To fill this gap, we
introduce the design of a remote electrocardiogram
service that privileges open, low-cost options. The
architecture is based on the HyperText Transfer
Protocol (HTTP) and uses commercial off-the-shelf
devices to implement the sensor on the patient's side.
The doctor uses a laptop browser to display the
tracing, and a cloud computing instance connects the
two using WebSockets. A prototype is built to evaluate
overall performance, the power consumption of the
patient's side device, and the quality of rendering on
doctor's browser. The patient's sensor prototype device
is portable, and its power consumption is below 1 Watt,
thus allowing a daylong autonomy when operated on
batteries. Its cost is below 50\$, and the required
hardware is commercially available. The whole design is
ready for on-field evaluation, and it is available in a
public repository.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Vila:2019:RTM,
author = "Ga{\"e}l Vila and Christelle Godin and Oumayma Sakri
and Etienne Labyt and Audrey Vidal and Sylvie
Charbonnier and Simon Ollander and Aur{\'e}lie
Campagne",
title = "Real-Time Monitoring of Passenger's Psychological
Stress",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "5",
pages = "102",
day = "26",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11050102",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/5/102",
abstract = "This article addresses the question of passengers'
experience through different transport modes. It
presents the main results of a pilot study, for which
stress levels experienced by a traveller were assessed
and predicted over two long journeys. Accelerometer
measures and several physiological signals
(electrodermal activity, blood volume pulse and skin
temperature) were recorded using a smart wristband
while travelling from Grenoble to Bilbao. Based on
user's feedback, three events of high stress and one
period of moderate activity with low stress were
identified offline. Over these periods, feature
extraction and machine learning were performed from the
collected sensor data to build a personalized
regressive model, with user's stress levels as output.
A smartphone application has been developed on its
basis, in order to record and visualize a timely
estimated stress level using traveler's physiological
signals. This setting was put on test during another
travel from Grenoble to Brussels, where the same user's
stress levels were predicted in real time by the
smartphone application. The number of correctly
classified stress-less time windows ranged from 92.6\%
to 100\%, depending on participant's level of activity.
By design, this study represents a first step for
real-life, ambulatory monitoring of passenger's stress
while travelling.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet of Things for Smart City
Applications.",
}
@Article{Burger:2019:CSS,
author = "Annetta Burger and Talha Oz and William G. Kennedy and
Andrew T. Crooks",
title = "Computational Social Science of Disasters:
Opportunities and Challenges",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "5",
pages = "103",
day = "26",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11050103",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/5/103",
abstract = "Disaster events and their economic impacts are
trending, and climate projection studies suggest that
the risks of disaster will continue to increase in the
near future. Despite the broad and increasing social
effects of these events, the empirical basis of
disaster research is often weak, partially due to the
natural paucity of observed data. At the same time,
some of the early research regarding social responses
to disasters have become outdated as social, cultural,
and political norms have changed. The digital
revolution, the open data trend, and the advancements
in data science provide new opportunities for social
science disaster research. We introduce the term
computational social science of disasters (CSSD), which
can be formally defined as the systematic study of the
social behavioral dynamics of disasters utilizing
computational methods. In this paper, we discuss and
showcase the opportunities and the challenges in this
new approach to disaster research. Following a brief
review of the fields that relate to CSSD, namely
traditional social sciences of disasters, computational
social science, and crisis informatics, we examine how
advances in Internet technologies offer a new lens
through which to study disasters. By identifying gaps
in the literature, we show how this new field could
address ways to advance our understanding of the social
and behavioral aspects of disasters in a digitally
connected world. In doing so, our goal is to bridge the
gap between data science and the social sciences of
disasters in rapidly changing environments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Tejedor:2019:ASU,
author = "Santiago Tejedor and Laura Cervi and Gerard Gordon",
title = "Analysis of the Structure and Use of Digital Resources
on the {Websites} of the Main Football Clubs in
{Europe}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "5",
pages = "104",
day = "29",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11050104",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/5/104",
abstract = "Football clubs can be considered global brands, and
exactly as any other brand, they need to face the
challenge of adapting to digital communications.
Nevertheless, communication sciences research in this
field is scarce, so the main purpose of this work is to
analyze digital communication of the main football
clubs in Europe to identify and describe what
strategies they follow to make themselves known on the
internet and to interact with their users.
Specifically, the article studies the characteristics
of web pages --- considered as the main showcase of a
brand/team in the digital environment --- of the
fifteen best teams in the UEFA ranking to establish
what type of structure and what online communication
resources they use. Through a descriptive and
comparative analysis, the study concludes, among other
aspects, that the management of communication is
effective, but also warns that none of the analyzed
team takes full advantage of the possibilities of
interaction with the user offered by the digital
scenario.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Intelligent Systems and Networks
2019.",
}
@Article{Huang:2019:CFE,
author = "Yongrui Huang and Jianhao Yang and Siyu Liu and Jiahui
Pan",
title = "Combining Facial Expressions and
Electroencephalography to Enhance Emotion Recognition",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "5",
pages = "105",
day = "02",
month = may,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11050105",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/5/105",
abstract = "Emotion recognition plays an essential role in
human--computer interaction. Previous studies have
investigated the use of facial expression and
electroencephalogram (EEG) signals from single modal
for emotion recognition separately, but few have paid
attention to a fusion between them. In this paper, we
adopted a multimodal emotion recognition framework by
combining facial expression and EEG, based on a
valence-arousal emotional model. For facial expression
detection, we followed a transfer learning approach for
multi-task convolutional neural network (CNN)
architectures to detect the state of valence and
arousal. For EEG detection, two learning targets
(valence and arousal) were detected by different
support vector machine (SVM) classifiers, separately.
Finally, two decision-level fusion methods based on the
enumerate weight rule or an adaptive boosting technique
were used to combine facial expression and EEG. In the
experiment, the subjects were instructed to watch clips
designed to elicit an emotional response and then
reported their emotional state. We used two emotion
datasets --- a Database for Emotion Analysis using
Physiological Signals (DEAP) and MAHNOB-human computer
interface (MAHNOB-HCI) --- to evaluate our method. In
addition, we also performed an online experiment to
make our method more robust. We experimentally
demonstrated that our method produces state-of-the-art
results in terms of binary valence/arousal
classification, based on DEAP and MAHNOB-HCI data sets.
Besides this, for the online experiment, we achieved
69.75\% accuracy for the valence space and 70.00\%
accuracy for the arousal space after fusion, each of
which has surpassed the highest performing single
modality (69.28\% for the valence space and 64.00\% for
the arousal space). The results suggest that the
combination of facial expressions and EEG information
for emotion recognition compensates for their defects
as single information sources. The novelty of this work
is as follows. To begin with, we combined facial
expression and EEG to improve the performance of
emotion recognition. Furthermore, we used transfer
learning techniques to tackle the problem of lacking
data and achieve higher accuracy for facial expression.
Finally, in addition to implementing the widely used
fusion method based on enumerating different weights
between two models, we also explored a novel fusion
method, applying boosting technique.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Special Issue on the Future of
Intelligent Human-Computer Interface.",
}
@Article{Karagiannis:2019:DLS,
author = "Georgios A. Karagiannis and Athanasios D.
Panagopoulos",
title = "Dynamic Lognormal Shadowing Framework for the
Performance Evaluation of Next Generation Cellular
Systems",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "5",
pages = "106",
day = "02",
month = may,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11050106",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/5/106",
abstract = "Performance evaluation tools for wireless cellular
systems are very important for the establishment and
testing of future internet applications. As the
complexity of wireless networks keeps growing, wireless
connectivity becomes the most critical requirement in a
variety of applications (considered also complex and
unfavorable from propagation point of view environments
and paradigms). Nowadays, with the upcoming 5G cellular
networks the development of realistic and more accurate
channel model frameworks has become more important
since new frequency bands are used and new
architectures are employed. Large scale fading known
also as shadowing, refers to the variations of the
received signal mainly caused by obstructions that
significantly affect the available signal power at a
receiver's position. Although the variability of
shadowing is considered mostly spatial for a given
propagation environment, moving obstructions may
significantly impact the received signal's strength,
especially in dense environments, inducing thus a
temporal variability even for the fixed users. In this
paper, we present the case of lognormal shadowing, a
novel engineering model based on stochastic
differential equations that models not only the spatial
correlation structure of shadowing but also its
temporal dynamics. Based on the proposed
spatio-temporal shadowing field we present a
computationally efficient model for the dynamics of
shadowing experienced by stationary or mobile users. We
also present new analytical results for the average
outage duration and hand-offs based on
multi-dimensional level crossings. Numerical results
are also presented for the validation of the model and
some important conclusions are drawn.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Pelle:2019:EAF,
author = "Istv{\'a}n Pelle and Andr{\'a}s Guly{\'a}s",
title = "An Extensible Automated Failure Localization Framework
Using {NetKAT}, {Felix}, and {SDN} Traceroute",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "5",
pages = "107",
day = "04",
month = may,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11050107",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/5/107",
abstract = "Designing, implementing, and maintaining network
policies that protect from internal and external
threats is a highly non-trivial task. Often,
troubleshooting networks consisting of diverse entities
realizing complex policies is even harder.
Software-defined networking (SDN) enables networks to
adapt to changing scenarios, which significantly
lessens human effort required for constant manual
modifications of device configurations. Troubleshooting
benefits SDN's method of accessing forwarding devices
as well, since monitoring is made much easier via
unified control channels. However, by making policy
changes easier, the job of troubleshooting operators is
made harder too: For humans, finding, analyzing, and
fixing network issues becomes almost intractable. In
this paper, we present a failure localization framework
and its proof-of-concept prototype that helps in
automating the investigation of network issues. Like a
controller for troubleshooting tools, our framework
integrates the formal specification (expected behavior)
and network monitoring (actual behavior) and
automatically gives hints about the location and type
of network issues by comparing the two types of
information. By using NetKAT (Kleene algebra with
tests) for formal specification and Felix and SDN
traceroute for network monitoring, we show that the
integration of these tools in a single framework can
significantly ease the network troubleshooting
process.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Abro:2019:LEE,
author = "Adeel Abro and Zhongliang Deng and Kamran Ali Memon",
title = "A Lightweight Elliptic-{Elgamal}-Based Authentication
Scheme for Secure Device-to-Device Communication",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "5",
pages = "108",
day = "07",
month = may,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11050108",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/5/108",
abstract = "Device-to-Device (D2D) is a major part of 5G that will
facilitate deployments with extended coverage where
devices can act as users or relays. These relays
normally act as decode and forward relays
(semi-intelligent devices) with limited computational
and storage capabilities. However, introducing such a
technology, where users can act as relays, presents a
wide range of security threats, in particular, rogue
relay devices or man in the middle attacks (M-I-T-M).
Second, passing fewer control messages is always
advisable when considering authenticity and secrecy. To
mitigate M-I-T-M and to reduce communication costs,
this paper presents a lightweight
elliptic-ElGamal-based authentication scheme using PKI
(FHEEP) in D2D communication. Pollard's rho and Baby
Step, Giant Step (BSGS) methods are used to evaluate
the authenticity and secrecy of our proposed scheme.
The communication cost is calculated based on the
comparative analysis indicating that our proposed
scheme outperforms the baseline protocol. The proposed
scheme can be used for any infrastructure architecture
that will enhance the security of any D2D settings with
better performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Internet of Things.",
}
@Article{Al-Rahayfeh:2019:NAT,
author = "Amer Al-Rahayfeh and Saleh Atiewi and Abdullah
Abuhussein and Muder Almiani",
title = "Novel Approach to Task Scheduling and Load Balancing
Using the Dominant Sequence Clustering and Mean Shift
Clustering Algorithms",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "5",
pages = "109",
day = "08",
month = may,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11050109",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/11/5/109",
abstract = "Cloud computing (CC) is fast-growing and frequently
adopted in information technology (IT) environments due
to the benefits it offers. Task scheduling and load
balancing are amongst the hot topics in the realm of
CC. To overcome the shortcomings of the existing task
scheduling and load balancing approaches, we propose a
novel approach that uses dominant sequence clustering
(DSC) for task scheduling and a weighted least
connection (WLC) algorithm for load balancing. First,
users' tasks are clustered using the DSC algorithm,
which represents user tasks as graph of one or more
clusters. After task clustering, each task is ranked
using Modified Heterogeneous Earliest Finish Time
(MHEFT) algorithm. where the highest priority task is
scheduled first. Afterwards, virtual machines (VM) are
clustered using a mean shift clustering (MSC) algorithm
using kernel functions. Load balancing is subsequently
performed using a WLC algorithm, which distributes the
load based on server weight and capacity as well as
client connectivity to server. A highly weighted or
least connected server is selected for task allocation,
which in turn increases the response time. Finally, we
evaluate the proposed architecture using metrics such
as response time, makespan, resource utilization, and
service reliability.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cloud Computing and Internet of
Things.",
}
@Article{Yajima:2019:YPU,
author = "Hayato Yajima and Kazumasa Takami",
title = "A Yielding Protocol that Uses Inter-Vehicle
Communication to Improve the Traffic of Vehicles on a
Low-Priority Road at an Unsignalized Intersection",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "5",
pages = "110",
day = "09",
month = may,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11050110",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/5/110",
abstract = "Self-driven vehicles are being actively developed.
When widespread, they will help reduce the number of
traffic accidents and ease traffic congestion. They
will coexist with human-driven vehicles for years. If
there is a mismatch between human drivers' operations
and the judgments of self-driven vehicles, congestion
may arise at an unsignalized intersection, in
particular, where roads are prioritized. Vehicles on
the low-priority road attempting to cross, or turn to,
the priority road can significantly reduce the traffic
flow. We have proposed a yielding protocol to deal with
this problem and evaluated it using a simulation that
focused on traffic flow efficiency at an intersection.
In the simulation, we have varied the number of
vehicles coming into the roads and the percentage of
self-driven vehicles and confirmed that the proposed
yielding protocol could improve the traffic flow of
vehicles on the low-priority road.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Advances in Internet of Vehicles
(IoV).",
}
@Article{Sofia:2019:GTI,
author = "Rute C. Sofia",
title = "Guidelines towards Information-Driven Mobility
Management",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "5",
pages = "111",
day = "10",
month = may,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11050111",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/5/111",
abstract = "The architectural semantics of Information-Centric
Networking bring in interesting features in regards to
mobility management: Information-Centric Networking is
content-oriented, connection-less, and receiver-driven.
Despite such intrinsic advantages, the support for node
movement is being based on the principles of IP
solutions. IP-based solutions are, however,
host-oriented, and Information-Centric Networking
paradigms are information-oriented. By following IP
mobility management principles, some of the natural
mobility support advantages of Information-Centric
Networking are not being adequately explored. This
paper contributes with an overview on how
Information-Centric Networking paradigms handle
mobility management as of today, highlighting current
challenges and proposing a set of design guidelines to
overcome them, thus steering a vision towards a
content-centric mobility management approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Information-Centric Networking (ICN).",
}
@Article{Rao:2019:SSN,
author = "Xuli Rao and Jiaxu Zhao and Zhide Chen and Feng Lin",
title = "Substitute Seed Nodes Mining Algorithms for Influence
Maximization in Multi-Social Networks",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "5",
pages = "112",
day = "10",
month = may,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11050112",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/5/112",
abstract = "Due to the growing interconnections of social
networks, the problem of influence maximization has
been extended from a single social network to multiple
social networks. However, a critical challenge of
influence maximization in multi-social networks is that
some initial seed nodes may be unable to be active,
which obviously leads to a low performance of influence
spreading. Therefore, finding substitute nodes for
mitigating the influence loss of uncooperative nodes is
extremely helpful in influence maximization. In this
paper, we propose three substitute mining algorithms
for influence maximization in multi-social networks,
namely for the Greedy-based substitute mining
algorithm, pre-selected-based substitute mining
algorithm, and similar-users-based substitute mining
algorithm. The simulation results demonstrate that the
existence of the uncooperative seed nodes leads to the
range reduction of information influence. Furthermore,
the viability and performance of the proposed
algorithms are presented, which show that three
substitute node mining algorithms can find suitable
substitute nodes for multi-social networks influence
maximization, thus achieves better influence.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Kuppusamy:2019:EFP,
author = "Vishnupriya Kuppusamy and Udaya Miriya Thanthrige and
Asanga Udugama and Anna F{\"o}rster",
title = "Evaluating Forwarding Protocols in Opportunistic
Networks: Trends, Advances, Challenges and Best
Practices",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "5",
pages = "113",
day = "11",
month = may,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11050113",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/5/113",
abstract = "A variety of applications and forwarding protocols
have been proposed for opportunistic networks (OppNets)
in the literature. However, the methodology of
evaluation, testing and comparing these forwarding
protocols are not standardized yet, which leads to
large levels of ambiguity in performance evaluation
studies. Performance results depend largely on the
evaluation environment, and on the used parameters and
models. More comparability in evaluation scenarios and
methodologies would largely improve also the
availability of protocols and the repeatability of
studies, and thus would accelerate the development of
this research topic. In this survey paper, we focus our
attention on how various OppNets data forwarding
protocols are evaluated rather than what they actually
achieve. We explore the models, parameters and the
evaluation environments and make observations about
their scalability, realism and comparability. Finally,
we deduce some best practices on how to achieve the
largest impact of future evaluation studies of OppNets
data dissemination/forwarding protocols.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Orkphol:2019:WSD,
author = "Korawit Orkphol and Wu Yang",
title = "Word Sense Disambiguation Using Cosine Similarity
Collaborates with {Word2vec} and {WordNet}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "5",
pages = "114",
day = "12",
month = may,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11050114",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/5/114",
abstract = "Words have different meanings (i.e., senses) depending
on the context. Disambiguating the correct sense is
important and a challenging task for natural language
processing. An intuitive way is to select the highest
similarity between the context and sense definitions
provided by a large lexical database of English,
WordNet. In this database, nouns, verbs, adjectives,
and adverbs are grouped into sets of cognitive synonyms
interlinked through conceptual semantics and lexicon
relations. Traditional unsupervised approaches compute
similarity by counting overlapping words between the
context and sense definitions which must match exactly.
Similarity should compute based on how words are
related rather than overlapping by representing the
context and sense definitions on a vector space model
and analyzing distributional semantic relationships
among them using latent semantic analysis (LSA). When a
corpus of text becomes more massive, LSA consumes much
more memory and is not flexible to train a huge corpus
of text. A word-embedding approach has an advantage in
this issue. Word2vec is a popular word-embedding
approach that represents words on a fix-sized vector
space model through either the skip-gram or continuous
bag-of-words (CBOW) model. Word2vec is also effectively
capturing semantic and syntactic word similarities from
a huge corpus of text better than LSA. Our method used
Word2vec to construct a context sentence vector, and
sense definition vectors then give each word sense a
score using cosine similarity to compute the similarity
between those sentence vectors. The sense definition
also expanded with sense relations retrieved from
WordNet. If the score is not higher than a specific
threshold, the score will be combined with the
probability of that sense distribution learned from a
large sense-tagged corpus, SEMCOR. The possible answer
senses can be obtained from high scores. Our method
shows that the result (50.9\% or 48.7\% without the
probability of sense distribution) is higher than the
baselines (i.e., original, simplified, adapted and LSA
Lesk) and outperforms many unsupervised systems
participating in the SENSEVAL-3 English lexical sample
task.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Big Data Analytics and Artificial
Intelligence.",
}
@Article{Liu:2019:CTS,
author = "Weihuang Liu and Jinhao Qian and Zengwei Yao and
Xintao Jiao and Jiahui Pan",
title = "Convolutional Two-Stream Network Using Multi-Facial
Feature Fusion for Driver Fatigue Detection",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "5",
pages = "115",
day = "14",
month = may,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11050115",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/5/115",
abstract = "Road traffic accidents caused by fatigue driving are
common causes of human casualties. In this paper, we
present a driver fatigue detection algorithm using
two-stream network models with multi-facial features.
The algorithm consists of four parts: (1) Positioning
mouth and eye with multi-task cascaded convolutional
neural networks (MTCNNs). (2) Extracting the static
features from a partial facial image. (3) Extracting
the dynamic features from a partial facial optical
flow. (4) Combining both static and dynamic features
using a two-stream neural network to make the
classification. The main contribution of this paper is
the combination of a two-stream network and
multi-facial features for driver fatigue detection.
Two-stream networks can combine static and dynamic
image information, while partial facial images as
network inputs can focus on fatigue-related
information, which brings better performance. Moreover,
we applied gamma correction to enhance image contrast,
which can help our method achieve better results, noted
by an increased accuracy of 2\% in night environments.
Finally, an accuracy of 97.06\% was achieved on the
National Tsing Hua University Driver Drowsiness
Detection (NTHU-DDD) dataset.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Special Issue on the Future of
Intelligent Human-Computer Interface.",
}
@Article{Vo:2019:ISA,
author = "Tri Hoang Vo and Woldemar Fuhrmann and Klaus-Peter
Fischer-Hellmann and Steven Furnell",
title = "Identity-as-a-Service: An Adaptive Security
Infrastructure and Privacy-Preserving User Identity for
the Cloud Environment",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "5",
pages = "116",
day = "15",
month = may,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11050116",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/5/116",
abstract = "In recent years, enterprise applications have begun to
migrate from a local hosting to a cloud provider and
may have established a business-to-business
relationship with each other manually. Adaptation of
existing applications requires substantial
implementation changes in individual architectural
components. On the other hand, users may store their
Personal Identifiable Information (PII) in the cloud
environment so that cloud services may access and use
it on demand. Even if cloud services specify their
privacy policies, we cannot guarantee that they follow
their policies and will not (accidentally) transfer PII
to another party. In this paper, we present
Identity-as-a-Service (IDaaS) as a trusted Identity and
Access Management with two requirements: Firstly, IDaaS
adapts trust between cloud services on demand. We move
the trust relationship and identity propagation out of
the application implementation and model them as a
security topology. When the business comes up with a
new e-commerce scenario, IDaaS uses the security
topology to adapt a platform-specific security
infrastructure for the given business scenario at
runtime. Secondly, we protect the confidentiality of
PII in federated security domains. We propose our
Purpose-based Encryption to protect the disclosure of
PII from intermediary entities in a business
transaction and from untrusted hosts. Our solution is
compliant with the General Data Protection Regulation
and involves the least user interaction to prevent
identity theft via the human link. The implementation
can be easily adapted to existing Identity Management
systems, and the performance is fast.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Information and
Communication Systems.",
}
@Article{Bellini:2019:EID,
author = "Alessandro Bellini and Emanuele Bellini and Monica
Gherardelli and Franco Pirri",
title = "Enhancing {IoT} Data Dependability through a
Blockchain Mirror Model",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "5",
pages = "117",
day = "21",
month = may,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11050117",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/5/117",
abstract = "The Internet of Things (IoT) is a remarkable data
producer and these data may be used to prevent or
detect security vulnerabilities and increase
productivity by the adoption of statistical and
Artificial Intelligence (AI) techniques. However, these
desirable benefits are gained if data from IoT networks
are dependable --- this is where blockchain comes into
play. In fact, through blockchain, critical IoT data
may be trusted, i.e., considered valid for any
subsequent processing. A simple formal model named
``the Mirror Model'' is proposed to connect IoT data
organized in traditional models to assets of trust in a
blockchain. The Mirror Model sets some formal
conditions to produce trusted data that remain trusted
over time. A possible practical implementation of an
application programming interface (API) is proposed,
which keeps the data and the trust model in synch.
Finally, it is noted that the Mirror Model enforces a
top-down approach from reality to implementation
instead of going the opposite way as it is now the
practice when referring to blockchain and the IoT.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Mitsis:2019:IDD,
author = "Giorgos Mitsis and Pavlos Athanasios Apostolopoulos
and Eirini Eleni Tsiropoulou and Symeon Papavassiliou",
title = "Intelligent Dynamic Data Offloading in a Competitive
Mobile Edge Computing Market",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "5",
pages = "118",
day = "21",
month = may,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11050118",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/5/118",
abstract = "Software Defined Networks (SDN) and Mobile Edge
Computing (MEC), capable of dynamically managing and
satisfying the end-users computing demands, have
emerged as key enabling technologies of 5G networks. In
this paper, the joint problem of MEC server selection
by the end-users and their optimal data offloading, as
well as the optimal price setting by the MEC servers is
studied in a multiple MEC servers and multiple
end-users environment. The flexibility and
programmability offered by the SDN technology enables
the realistic implementation of the proposed framework.
Initially, an SDN controller executes a reinforcement
learning framework based on the theory of stochastic
learning automata towards enabling the end-users to
select a MEC server to offload their data. The discount
offered by the MEC server, its congestion and its
penetration in terms of serving end-users' computing
tasks, and its announced pricing for its computing
services are considered in the overall MEC selection
process. To determine the end-users' data offloading
portion to the selected MEC server, a non-cooperative
game among the end-users of each server is formulated
and the existence and uniqueness of the corresponding
Nash Equilibrium is shown. An optimization problem of
maximizing the MEC servers' profit is formulated and
solved to determine the MEC servers' optimal pricing
with respect to their offered computing services and
the received offloaded data. To realize the proposed
framework, an iterative and low-complexity algorithm is
introduced and designed. The performance of the
proposed approach was evaluated through modeling and
simulation under several scenarios, with both
homogeneous and heterogeneous end-users.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Software Defined Networking (SDN) and
Network Function Virtualization (NFV).",
}
@Article{Mimidis-Kentis:2019:NGP,
author = "Angelos Mimidis-Kentis and Jose Soler and Paul Veitch
and Adam Broadbent and Marco Mobilio and Oliviero
Riganelli and Steven {Van Rossem} and Wouter Tavernier
and Bessem Sayadi",
title = "The Next Generation Platform as A Service: Composition
and Deployment of Platforms and Services",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "5",
pages = "119",
day = "21",
month = may,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11050119",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/5/119",
abstract = "The emergence of widespread cloudification and
virtualisation promises increased flexibility,
scalability, and programmability for the deployment of
services by Vertical Service Providers (VSPs). This
cloudification also improves service and network
management, reducing the Capital and Operational
Expenses (CAPEX, OPEX). A truly cloud-native approach
is essential, since 5G will provide a diverse range of
services - many requiring stringent performance
guarantees while maximising flexibility and agility
despite the technological diversity. This paper
proposes a workflow based on the principles of
build-to-order, Build-Ship-Run, and automation;
following the Next Generation Platform as a Service
(NGPaaS) vision. Through the concept of Reusable
Functional Blocks (RFBs), an enhancement to Virtual
Network Functions, this methodology allows a VSP to
deploy and manage platforms and services, agnostic to
the underlying technologies, protocols, and APIs. To
validate the proposed workflow, a use case is also
presented herein, which illustrates both the deployment
of the underlying platform by the Telco operator and of
the services that run on top of it. In this use case,
the NGPaaS operator facilitates a VSP to provide
Virtual Network Function as a Service (VNFaaS)
capabilities for its end customers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Software Defined Networking (SDN) and
Network Function Virtualization (NFV).",
}
@Article{Begotti:2019:CCB,
author = "Tatiana Begotti and Daniela Acquadro Maran",
title = "Characteristics of Cyberstalking Behavior,
Consequences, and Coping Strategies: a Cross-Sectional
Study in a Sample of {Italian} University Students",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "5",
pages = "120",
day = "22",
month = may,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11050120",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/5/120",
abstract = "Aims: The aim of this study was to compare victims of
one type of cyberstalking (OneType) with victims of
more than one type of cyberstalking (MoreType)
regarding (1) the impact of cyberstalking and (2)
attitudes related to telling someone about the
experience of cyberstalking and the coping strategies
used by victims. Methods: a self-administered
questionnaire was distributed to over 250 students at
the University of Torino. Results: About half of the
participants experienced at least one incident of
cyberstalking. Among them, more than half experienced
more than one type of cyberstalking. Victims suffered
from depression more than those who had never
experienced cyberstalking. No statistically significant
difference emerged for anxiety. The coping strategies
used by MoreType were more varied than those used by
OneType victims of cyberstalking. Moreover, MoreType
victims told someone about their victimization more
than OneType victims. Conclusion: The work presented
suggests implications for health care professionals,
police officers, and government. For example, our
suggestion is to pay attention to cyberstalking victims
and provide flyers in schools, universities, and
cafeterias that explain the risk of certain online
behaviors and their consequences in physical and
emotional spheres.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Xu:2019:DTS,
author = "Ling Xu and Jianzhong Qiao and Shukuan Lin and Wanting
Zhang",
title = "Dynamic Task Scheduling Algorithm with Deadline
Constraint in Heterogeneous Volunteer Computing
Platforms",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "6",
pages = "121",
day = "28",
month = may,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11060121",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/6/121",
abstract = "Volunteer computing (VC) is a distributed computing
paradigm, which provides unlimited computing resources
in the form of donated idle resources for many
large-scale scientific computing applications. Task
scheduling is one of the most challenging problems in
VC. Although, dynamic scheduling problem with deadline
constraint has been extensively studied in prior
studies in the heterogeneous system, such as cloud
computing and clusters, these algorithms can't be fully
applied to VC. This is because volunteer nodes can get
offline whenever they want without taking any
responsibility, which is different from other
distributed computing. For this situation, this paper
proposes a dynamic task scheduling algorithm for
heterogeneous VC with deadline constraint, called
deadline preference dispatch scheduling (DPDS). The
DPDS algorithm selects tasks with the nearest deadline
each time and assigns them to volunteer nodes (VN),
which solves the dynamic task scheduling problem with
deadline constraint. To make full use of resources and
maximize the number of completed tasks before the
deadline constraint, on the basis of the DPDS
algorithm, improved dispatch constraint scheduling
(IDCS) is further proposed. To verify our algorithms,
we conducted experiments, and the results show that the
proposed algorithms can effectively solve the dynamic
task assignment problem with deadline constraint in
VC.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bazzi:2019:SPV,
author = "Alessandro Bazzi and Giammarco Cecchini and Michele
Menarini and Barbara M. Masini and Alberto Zanella",
title = "Survey and Perspectives of Vehicular Wi-Fi versus
Sidelink Cellular-{V2X} in the {5G} Era",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "6",
pages = "122",
day = "29",
month = may,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11060122",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/6/122",
abstract = "The revolution of cooperative connected and automated
vehicles is about to begin and a key milestone is the
introduction of short range wireless communications
between cars. Given the tremendous expected market
growth, two different technologies have been
standardized by international companies and consortia,
namely IEEE 802.11p, out for nearly a decade, and short
range cellular-vehicle-to-anything (C-V2X), of recent
definition. In both cases, evolutions are under
discussion. The former is only decentralized and based
on a sensing before transmitting access, while the
latter is based on orthogonal resources that can be
also managed by an infrastructure. Although studies
have been conducted to highlight advantages and
drawbacks of both, doubts still remain. In this work,
with a reference to the literature and the aid of large
scale simulations in realistic urban and highway
scenarios, we provide an insight in such a comparison,
also trying to isolate the contribution of the physical
and medium access control layers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 5G-V2X Communications and Networking for
Connected and Autonomous Vehicles.",
}
@Article{Dong:2019:VSE,
author = "Huanan Dong and Ming Wen and Zhouwang Yang",
title = "Vehicle Speed Estimation Based on {3D ConvNets} and
Non-Local Blocks",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "6",
pages = "123",
day = "30",
month = may,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11060123",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/6/123",
abstract = "Vehicle speed estimation is an important problem in
traffic surveillance. Many existing approaches to this
problem are based on camera calibration. Two
shortcomings exist for camera calibration-based
methods. First, camera calibration methods are
sensitive to the environment, which means the accuracy
of the results are compromised in some situations where
the environmental condition is not satisfied.
Furthermore, camera calibration-based methods rely on
vehicle trajectories acquired by a two-stage tracking
and detection process. In an effort to overcome these
shortcomings, we propose an alternate end-to-end method
based on 3-dimensional convolutional networks (3D
ConvNets). The proposed method bases average vehicle
speed estimation on information from video footage. Our
methods are characterized by the following three
features. First, we use non-local blocks in our model
to better capture spatial--temporal long-range
dependency. Second, we use optical flow as an input in
the model. Optical flow includes the information on the
speed and direction of pixel motion in an image. Third,
we construct a multi-scale convolutional network. This
network extracts information on various characteristics
of vehicles in motion. The proposed method showcases
promising experimental results on commonly used dataset
with mean absolute error (MAE) as 2.71 km/h and mean
square error (MSE) as 14.62.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Big Data and Augmented Intelligence.",
}
@Article{Manzoni:2019:IVG,
author = "Pietro Manzoni and Carlos T. Calafate and Juan-Carlos
Cano and Enrique Hern{\'a}ndez-Orallo",
title = "Indoor Vehicles Geolocalization Using {LoRaWAN}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "6",
pages = "124",
day = "31",
month = may,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11060124",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/6/124",
abstract = "One of the main drawbacks of Global Navigation
Satellite Sytems (GNSS) is that they do not work
indoors. When inside, there is often no direct line
from the satellite signals to the device and the ultra
high frequency (UHF) used is blocked by thick, solid
materials such as brick, metal, stone or wood. In this
paper, we describe a solution based on the Long Range
Wide Area Network (LoRaWAN) technology to geolocalise
vehicles indoors. Through estimation of the behaviour
of a LoRaWAN channel and using trilateration, the
localisation of a vehicle can be obtained within a
20--30 m range. Indoor geolocation for Intelligent
Transporation Systems (ITS) can be used to locate
vehicles of any type in underground parkings, keep a
platoon of trucks in formation or create geo-fences,
that is, sending an alert if an object moves outside a
defined area, like a bicycle being stolen. Routing of
heavy vehicles within an industrial setting is another
possibility.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 5G-V2X Communications and Networking for
Connected and Autonomous Vehicles.",
}
@Article{Jin:2019:JLD,
author = "Mingshuang Jin and Hongbin Luo and Shuai Gao and Bohao
Feng",
title = "Joint Location-Dependent Pricing and Request Mapping
in {ICN}-Based Telco {CDNs} For {5G}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "6",
pages = "125",
day = "03",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11060125",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/6/125",
abstract = "Telco content delivery networks (CDNs) have envisioned
building highly distributed and cloudified sites to
provide a high-quality CDN service in the 5G era.
However, there are still two open problems to be
addressed. First, telco CDNs are operated upon the
underlay network evolving towards information-centric
networking (ICN). Different from CDNs that perform on
the application layer, ICN enables information-centric
forwarding to the network layer. Thus, it is
challenging to take advantage of the benefits of both
ICN and CDN to provide a high-quality content delivery
service in the context of ICN-based telco CDNs. Second,
bandwidth pricing and request mapping issues in
ICN-based telco CDNs have not been thoroughly studied.
In this paper, we first propose an ICN-based telco CDN
framework that integrates the information-centric
forwarding enabled by ICN and the powerful edge caching
enabled by telco CDNs. Then, we propose a
location-dependent pricing (LDP) strategy, taking into
consideration the congestion level of different sites.
Furthermore, on the basis of LDP, we formulate a
price-aware request mapping (PARM) problem, which can
be solved by existing linear programming solvers.
Finally, we conduct extensive simulations to evaluate
the effectiveness of our design.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Information-Centric Networking (ICN).",
}
@Article{C:2019:CCK,
author = "Pramod T. C. and Thejas G. S. and S. S. Iyengar and N.
R. Sunitha",
title = "{CKMI}: Comprehensive Key Management Infrastructure
Design for Industrial Automation and Control Systems",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "6",
pages = "126",
day = "04",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11060126",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/6/126",
abstract = "Industrial Automation and Control Systems (IACS) are
broadly utilized in critical infrastructures for
monitoring and controlling the industrial processes
remotely. The real-time transmissions in such systems
provoke security breaches. Many security breaches have
been reported impacting society severely. Hence, it is
essential to achieve secure communication between the
devices for creating a secure environment. For this to
be effective, the keys used for secure communication
must be protected against unauthorized disclosure,
misuse, alteration or loss, which can be taken care of
by a Key Management Infrastructure. In this paper, by
considering the generic industrial automation network,
a comprehensive key management infrastructure (CKMI) is
designed for IACS. To design such an infrastructure,
the proposed scheme employs ECDH, matrix method, and
polynomial crypto mechanisms. The proposed design
handles all the standard key management operations,
viz. key generation, device registration, key
establishment, key storage, device addition, key
revocation, key update, key recovery, key archival, and
key de-registration and destruction. The design
supports secure communication between the same and
different levels of IACS devices. The proposed design
can be applied for major industrial automation networks
to handle the key management operations. The
performance analysis and implementation results
highlight the benefits of the proposed design.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Next-Generation Public-Key
Infrastructures.",
}
@Article{DeDonno:2019:CSC,
author = "Michele {De Donno} and Alberto Giaretta and Nicola
Dragoni and Antonio Bucchiarone and Manuel Mazzara",
title = "Cyber-Storms Come from Clouds: Security of Cloud
Computing in the {IoT} Era",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "6",
pages = "127",
day = "04",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11060127",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/6/127",
abstract = "The Internet of Things (IoT) is rapidly changing our
society to a world where every ``thing'' is connected
to the Internet, making computing pervasive like never
before. This tsunami of connectivity and data
collection relies more and more on the Cloud, where
data analytics and intelligence actually reside. Cloud
computing has indeed revolutionized the way
computational resources and services can be used and
accessed, implementing the concept of utility computing
whose advantages are undeniable for every business.
However, despite the benefits in terms of flexibility,
economic savings, and support of new services, its
widespread adoption is hindered by the security issues
arising with its usage. From a security perspective,
the technological revolution introduced by IoT and
Cloud computing can represent a disaster, as each
object might become inherently remotely hackable and,
as a consequence, controllable by malicious actors.
While the literature mostly focuses on the security of
IoT and Cloud computing as separate entities, in this
article we provide an up-to-date and well-structured
survey of the security issues of cloud computing in the
IoT era. We give a clear picture of where security
issues occur and what their potential impact is. As a
result, we claim that it is not enough to secure IoT
devices, as cyber-storms come from Clouds.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cloud Computing and Internet of
Things.",
}
@Article{Vladyko:2019:DEC,
author = "Andrei Vladyko and Abdukodir Khakimov and Ammar
Muthanna and Abdelhamied A. Ateya and Andrey
Koucheryavy",
title = "Distributed Edge Computing to Assist Ultra-Low-Latency
{VANET} Applications",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "6",
pages = "128",
day = "04",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11060128",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/6/128",
abstract = "Vehicular ad hoc networks (VANETs) are a recent class
of peer-to-peer wireless networks that are used to
organize the communication and interaction between cars
(V2V), between cars and infrastructure (V2I), and
between cars and other types of nodes (V2X). These
networks are based on the dedicated short-range
communication (DSRC) IEEE 802.11 standards and are
mainly intended to organize the exchange of various
types of messages, mainly emergency ones, to prevent
road accidents, alert when a road accident occurs, or
control the priority of the roadway. Initially, it was
assumed that cars would only interact with each other,
but later, with the advent of the concept of the
Internet of things (IoT), interactions with surrounding
devices became a demand. However, there are many
challenges associated with the interaction of vehicles
and the interaction with the road infrastructure. Among
the main challenge is the high density and the dramatic
increase of the vehicles' traffic. To this end, this
work provides a novel system based on mobile edge
computing (MEC) to solve the problem of high traffic
density and provides and offloading path to vehicle's
traffic. The proposed system also reduces the total
latency of data communicated between vehicles and
stationary roadside units (RSUs). Moreover, a
latency-aware offloading algorithm is developed for
managing and controlling data offloading from vehicles
to edge servers. The system was simulated over a
reliable environment for performance evaluation, and a
real experiment was conducted to validate the proposed
system and the developed offloading method.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Vehicle-to-Everything (V2X)
Communication for Intelligent Transportation Systems
(ITS).",
}
@Article{Nundloll:2019:DDE,
author = "Vatsala Nundloll and Barry Porter and Gordon S. Blair
and Bridget Emmett and Jack Cosby and Davey L. Jones
and Dave Chadwick and Ben Winterbourn and Philip
Beattie and Graham Dean and Rory Shaw and Wayne Shelley
and Mike Brown and Izhar Ullah",
title = "The Design and Deployment of an End-To-End {IoT}
Infrastructure for the Natural Environment",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "6",
pages = "129",
day = "07",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11060129",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/6/129",
abstract = "Internet of Things (IoT) systems have seen recent
growth in popularity for city and home environments. We
report on the design, deployment, and use of the IoT
infrastructure for environmental monitoring and
management. Working closely with hydrologists, soil
scientists, and animal behaviour scientists, we
successfully deployed and utilised a system to deliver
integrated information across these two fields in the
first such example of real-time multidimensional
environmental science. We describe the design of this
system; its requirements and operational effectiveness
for hydrological, soil, and ethological scientists; and
our experiences from building, maintaining, and using
the deployment at a remote site in difficult
conditions. Based on this experience, we discuss key
future work for the IoT community when working in these
kinds of environmental deployments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cloud Computing and Internet of
Things.",
}
@Article{Garcia:2019:DMA,
author = "Juan Jos{\'e} L{\'o}pez Garc{\'\i}a and David Lizcano
and Celia M. Q. Ramos and Nelson Matos",
title = "Digital Marketing Actions That Achieve a Better
Attraction and Loyalty of Users: An Analytical Study",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "6",
pages = "130",
day = "08",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11060130",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/6/130",
abstract = "Currently, the digital economy contributes decisively
to an increase in competitiveness, especially as a
digital transformation involves migrating to new
technological models where digital marketing is a key
part of growth and user loyalty strategies. Internet
and Digital Marketing have become important factors in
campaigns, which attract and retain Internet users.
This study aims to identify the main ways in which
users can be gained and retained by using Digital
Marketing. The Delphi method with in-depth interviews
was the methodology used in this study. The results of
the research show the most important actions for
achieving user recruitment and loyalty with Digital
Marketing from the opinions of consulted experts. The
limitations of this study are those related to the
number of experts included in the study, and the number
of research papers consulted in the literature review.
The literature review and the results of this research
are used to propose new solid research with a
consolidated critical methodology. This research deals
with a new approach that will optimize web technologies
for the evolution of user trends, and therefore, will
be of academic and professional use for marketing
managers and web solution developers. The conclusions
of the investigation show the key factors, discarding
others that do not affect the optimization of
conversions in B2C businesses such as the duration of
the session and the rebound percentage. Likewise, the
results of the research identify the specific actions
that must be carried out to attract and retain users in
B2C companies that use the Digital Marketing ecosystem
on the Internet. The requirements for companies that
wish to implement a model to optimize conversions using
the current digital economy are also shown.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Kapsis:2019:TSI,
author = "Theodore T. Kapsis and Nikolaos K. Lyras and Charilaos
I. Kourogiorgas and Athanasios D. Panagopoulos",
title = "Time Series Irradiance Synthesizer for Optical {GEO}
Satellite Downlinks in {5G} Networks",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "6",
pages = "131",
day = "13",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11060131",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/6/131",
abstract = "Next generation 5G networks generate a need for
broadband, low latency and power efficient backhauling
and data-relay services. In this paper, optical
satellite communications links, as an integrated
component of 5G networks, are studied. More
specifically, the Geostationary (GEO)
satellite-to-ground optical communication link is
investigated. Long-term irradiance statistics based on
experimental measurements from the ARTEMIS program are
presented and a new time series generator related to
the received irradiance/power fluctuations due to
atmospheric turbulence is reported. The proposed
synthesizer takes into consideration the
turbulence-induced scintillation effects that
deteriorate the laser beam propagation, on the
assumption of the Kolmogorov spectrum. The modeling is
based on Rytov theory regarding weak turbulence
conditions with the incorporation of first order
stochastic differential equations. Summing up, the time
series synthesizer is validated in terms of first and
second order statistics with experimental results from
the European Space Agency\‘s ARTEMIS experimental
optical downlink and simulated received power
statistics for various weather conditions are presented
using the proposed validated methodology. Some
important conclusions are drawn.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Satellite Communications in 5G
Networks.",
}
@Article{Autili:2019:CBC,
author = "Marco Autili and Amleto {Di Salle} and Francesco Gallo
and Claudio Pompilio and Massimo Tivoli",
title = "A Choreography-Based and Collaborative Road Mobility
System for {L'Aquila City}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "6",
pages = "132",
day = "14",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11060132",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/6/132",
abstract = "Next Generation Internet (NGI) is the European
initiative launched to identify the future internet
technologies, designed to serve the needs of the
digitalized society while ensuring privacy, trust,
decentralization, openness, inclusion, and business
cooperation. NGI provides efficient support to promote
diversity, decentralization and the growth of
disruptive innovation envisioned by smart cities. After
the earthquake of 6 April 2009, the city of L'Aquila is
facing a massive and innovative reconstruction process.
As a consequence, nowadays, the L'Aquila city can be
considered as a living laboratory model for
applications within the context of smart cities. This
paper describes and evaluates the realization of a
Collaborative Road Mobility System (CRMS) for L'Aquila
city by using our CHOReVOLUTION approach for the
automated choreography production. The CRMS allows
vehicles and transport infrastructure to interconnect,
share information and use it to coordinate their
actions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Liu:2019:EEM,
author = "Ziqi Liu and Gaochao Xu and Peng Liu and Xiaodong Fu
and Yang Liu",
title = "Energy-Efficient Multi-User Routing in a
Software-Defined Multi-Hop Wireless Network",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "6",
pages = "133",
day = "17",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11060133",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/6/133",
abstract = "Software-defined networking (SDN) is an innovative
architecture that designs a logical controller to
manage and program the network based on the global
view, providing more efficient management, better
performance, and higher flexibility for the network.
Therefore, applying the SDN concept in a multi-hop
wireless network (MWN) has been proposed and
extensively studied to overcome the challenges of MWN.
In this paper, we propose an energy-efficient global
routing algorithm for a software-defined multi-hop
wireless network (SDMWN), which is able to get
transmission paths for several users at the same time
to minimize the global energy consumption with the
premise of satisfying the QoS required by users. To
this end, we firstly propose a Lagrange
relaxation-based aggregated cost (LARAC) and K-Dijkstra
combined algorithm to get the top K energy-minimum
paths that satisfy the QoS in polynomial time. Then, we
combine the alternative paths of each user obtained by
K-LARAC and propose an improved genetic algorithm to
solve the global routing strategy. The simulation
results show that the proposed K-LARAC and genetic
algorithm combined method has the ability to obtain an
approximate optimal solution with lower time cost.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hsu:2019:BUP,
author = "Chien-Lung Hsu and Yi-Chuan Liao",
title = "Bridging User Perception and Stickiness in Business
Microblog Contexts: a Moderated Mediation Model",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "6",
pages = "134",
day = "19",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11060134",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/6/134",
abstract = "This study develops a contingent mediation model to
investigate whether user perception enhances customer
stickiness through emotional connection and further
assess such mediating effect varies with different
adaptivity. A moderated mediation approach is adopted
to test the hypotheses. Findings reveal the mediating
role of emotional connection on the link between
perceived usefulness and customer stickiness, but not
moderated by adaptivity. On the other hand, the results
showed that the relationship between perceived ease of
use and customer stickiness is not mediated by
emotional connection; however, after considering the
moderating effect, our results show that moderated
mediation exists.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Huertas:2019:IET,
author = "Melby Karina Zuniga Huertas and Tarcisio Duarte
Coelho",
title = "The Interaction Effect of Type of Message {X}
{YouTuber's} Media Metrics on Customers' Responses and
the Moderation of Conformity Intention",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "6",
pages = "135",
day = "20",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11060135",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/6/135",
abstract = "This is a study of the way in which YouTubers' media
metrics influence the effect of their one-sided
messages (1SMs) and two-sided messages (2SMs),
providing theoretical explanations based on the
elaboration likelihood model. Its main objective is the
proposition and testing of: (i) the interaction effect
between type of message and media metrics of the
YouTuber on customers' responses, and (ii) the
moderation of individuals' conformity intention for the
interaction effect between type of message and media
metrics on customers' responses. The results of an
experiment showed that high YouTubers' media metrics
have more effect for 1SMs and less effect for 2SMs.
Additionally, conformity intention moderates the effect
of the interaction type of message X media metrics. A
high level of conformity intention neutralizes the
interaction effect between YouTubers' media metrics and
message sidedness. This study makes a theoretical
contribution to research into online content and
information use, providing explanations of how media
metrics of a vlog influence the effect of two types of
messages.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Deindividuation in Online Human Dynamics
Research Advances in the Modern Digital Era.",
}
@Article{Deraman:2019:DIO,
author = "Rafikullah Deraman and Chen Wang and Jeffrey Boon Hui
Yap and Heng Li and Faizul Azli Mohd-Rahim",
title = "Developing {Internet} Online Procurement Frameworks
for Construction Firms",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "6",
pages = "136",
day = "20",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11060136",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/6/136",
abstract = "Electronic purchasing or e-procurement saves millions
of dollars yearly in transaction costs. E-procurement
helps to cut down the supplier base, promotes paperless
transactions, and increases transparency and
accountability in the procurement process. Nonetheless,
studies report that around 80\% of e-procurement
initiatives have met with failure and failed to achieve
the desired results. Although studies to better
understand the Critical Success Factors (CSFs) of
e-procurement implementation involving various
industries have been on the rise, little is known about
architecture engineering and construction (AEC)
practices, which has led to limited development of
pragmatic frameworks to uncover the factors. Thus, this
study aims to identify those CSFs (predicting
variables) which significantly contribute to
e-procurement implementation success in the
construction sector and to put forward for better
implementation. Results from multiple regression
analysis revealed five factors to be statistically
significant predictors of success. Three factors were
determined to be predictors of user satisfaction.
Finally, internet online procurement frameworks were
developed for the success of e-procurement
implementation in the construction sector.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Kim:2019:NIS,
author = "Sanghyun Kim and Hyunsun Park and Moon Jong Choi",
title = "Negative Impact of Social Network Services Based on
Stressor--Stress-Outcome: The Role of Experience of
Privacy Violations",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "6",
pages = "137",
day = "20",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11060137",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
note = "See comment \cite{Fantinelli:2019:SNS}.",
URL = "https://www.mdpi.com/1999-5903/11/6/137",
abstract = "Social network service (SNS) information has benefited
many individuals. However, as such information has
increased exponentially, the number of SNS users has
increased dramatically and negative effects of SNSs on
users have emerged. Many SNS users experience negative
psychological conditions such as fatigue, burnout, and
stress. Thus, in this study, we investigated the SNS
and user characteristics that affect SNS fatigue,
living disorder, and reduced SNS use intention. We
developed a research model to examine the impact of two
SNS characteristics (irrelevant information overload
and open reachability) and two user characteristics
(engagement and maintaining self-reputation) on SNS
fatigue. We also examined the role of the experience of
privacy violations in the relationship between living
disorder and reduced SNS use intention. We collected
data from 579 SNS users and created a partial least
squares structural equation model to test the
hypotheses. The results of the analysis showed that
three factors, other than open reachability, positively
affected SNS fatigue. Furthermore, we found that SNS
fatigue significantly affected living disorder and
reduced SNS use intention, and that experience of
privacy violations significantly affected the
relationship between living disorder and reduced SNS
use intention. These results expand our understanding
of SNS fatigue and users' negative behaviors.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Gunawan:2019:DAH,
author = "Dedi Gunawan and Masahiro Mambo",
title = "Data Anonymization for Hiding Personal Tendency in
Set-Valued Database Publication",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "6",
pages = "138",
day = "20",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11060138",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/6/138",
abstract = "Set-valued database publication has been increasing
its importance recently due to its benefit for various
applications such as marketing analysis and
advertising. However, publishing a raw set-valued
database may cause individual privacy breach such as
the leakage of sensitive information like personal
tendencies when data recipients perform data analysis.
Even though imposing data anonymization methods such as
suppression-based methods and random data swapping
methods to such a database can successfully hide
personal tendency, it induces item loss from records
and causes significant distortion in record structure
that degrades database utility. To avoid the problems,
we proposed a method based on swapping technique where
an individual's items in a record are swapped to items
of the other record. Our swapping technique is distinct
from existing one called random data swapping which
yields much structure distortion. Even though the
technique results in inaccuracy at a record level, it
can preserve every single item in a database from loss.
Thus, data recipients may obtain all the item
information in an anonymized database. In addition, by
carefully selecting a pair of records for item
swapping, we can avoid excessive record structure
distortion that leads to alter database content
immensely. More importantly, such a strategy allows one
to successfully hide personal tendency without
sacrificing a lot of database utility.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Information and
Communication Systems.",
}
@Article{Kuai:2019:LBD,
author = "Meng Kuai and Xiaoyan Hong",
title = "Location-Based Deferred Broadcast for Ad-Hoc Named
Data Networking",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "6",
pages = "139",
day = "24",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11060139",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/6/139",
abstract = "The emerging connected and autonomous vehicles (CAVs)
challenge ad hoc wireless multi-hop communications by
mobility, large-scale, new data acquisition and
computing patterns. The Named Data Networking (NDN) is
suitable for such vehicle ad hoc networks due to its
information centric networking approach. However,
flooding interest packets in ad-hoc NDN can lead to
broadcast storm issue. Existing solutions will either
increase the number of redundant interest packets or
need a global knowledge about data producers. In this
paper, a Location-Based Deferred Broadcast (LBDB)
scheme is introduced to improve the efficiency and
performance of interest broadcast in ad-hoc NDN. The
scheme takes advantage of location information to set
up timers when rebroadcasting an interest. The LBDB is
implemented in V-NDN network architecture using ndnSIM
simulator. Comparisons with several existing protocols
are conducted in simulation. The results show that LBDB
improves the overhead, the average number of hops and
delay while maintaining an average satisfaction ratio
when compared with several other broadcast schemes. The
improvement can help offer timely data acquisition for
quick responses in emergent CAV application
situations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Content Centric Future Internet
Architectures.",
}
@Article{De-Pablos-Heredero:2019:FIS,
author = "Carmen De-Pablos-Heredero",
title = "Future Intelligent Systems and Networks",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "6",
pages = "140",
day = "25",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11060140",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/6/140",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Intelligent Systems and Networks
2019.",
}
@Article{Abro:2019:DAP,
author = "Adeel Abro and Zhongliang Deng and Kamran Ali Memon
and Asif Ali Laghari and Khalid Hussain Mohammadani and
Noor ul Ain",
title = "A Dynamic Application-Partitioning Algorithm with
Improved Offloading Mechanism for Fog Cloud Networks",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "141",
day = "28",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070141",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/141",
abstract = "This paper aims to propose a new fog cloud
architecture that performs a joint energy-efficient
task assignment (JEETA). The proposed JEETA
architecture utilizes the dynamic
application-partitioning algorithm (DAPTS), a novel
algorithm that efficiently decides and switches the
task to be offloaded or not in heterogeneous
environments with minimal energy consumption. The
proposed scheme outperforms baseline approaches such as
MAUI, Think Air and Clone Cloud in many performance
aspects. Results show that for the execution of 1000
Tasks on fog, mobile offloaded nodes, JEETA consumes
the leas, i.e., 23\% of the total energy whereas other
baseline approaches consume in between 50--100\% of the
total energy. Results are validated via real test-bed
experiments and trice are driven efficient
simulations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cloud Computing and Networking 2019.",
}
@Article{Mastroeni:2019:SLA,
author = "Loretta Mastroeni and Alessandro Mazzoccoli and
Maurizio Naldi",
title = "Service Level Agreement Violations in Cloud Storage:
Insurance and Compensation Sustainability",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "142",
day = "30",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070142",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/142",
abstract = "Service Level Agreements are employed to set
availability commitments in cloud services. When a
violation occurs as in an outage, cloud providers may
be called to compensate customers for the losses
incurred. Such compensation may be so large as to erode
cloud providers' profit margins. Insurance may be used
to protect cloud providers against such a danger. In
this paper, closed formulas are provided through the
expected utility paradigm to set the insurance premium
under different outage models and QoS metrics (no. of
outages, no. of long outages, and unavailability). When
the cloud service is paid through a fixed fee, we also
provide the maximum unit compensation that a cloud
provider can offer so as to meet constraints on its
profit loss. The unit compensation is shown to vary
approximately as the inverse square of the service
fee.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Network Virtualization and Edge/Fog
Computing.",
}
@Article{Tanaka:2019:MSA,
author = "Kazuaki Tanaka and Kota Takenouchi and Kohei Ogawa and
Yuichiro Yoshikawa and Shuichi Nishio and Hiroshi
Ishiguro",
title = "Maintaining the Sense of Agency in Semi-Autonomous
Robot Conferencing",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "143",
day = "03",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070143",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/143",
abstract = "In semi-autonomous robot conferencing, not only the
operator controls the robot, but the robot itself also
moves autonomously. Thus, it can modify the operator's
movement (e.g., adding social behaviors). However, the
sense of agency, that is, the degree of feeling that
the movement of the robot is the operator's own
movement, would decrease if the operator is conscious
of the discrepancy between the teleoperation and
autonomous behavior. In this study, we developed an
interface to control the robot head by using an eye
tracker. When the robot autonomously moves its eye-gaze
position, the interface guides the operator's eye
movement towards this autonomous movement. The
experiment showed that our interface can maintain the
sense of agency, because it provided the illusion that
the autonomous behavior of a robot is directed by the
operator's eye movement. This study reports the
conditions of how to provide this illusion in
semi-autonomous robot conferencing.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Advanced Telepresence Technologies and
Applications.",
}
@Article{Roohitavaf:2019:AAF,
author = "Mohammad Roohitavaf and Sandeep Kulkarni",
title = "Automatic Addition of Fault-Tolerance in Presence of
Unchangeable Environment Actions",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "144",
day = "04",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070144",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/java2010.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/144",
abstract = "We focus on the problem of adding fault-tolerance to
an existing concurrent protocol in the presence of
unchangeable environment actions. Such unchangeable
actions occur in cases where a subset of
components/processes cannot be modified since they
represent third-party components or are constrained by
physical laws. These actions differ from faults in that
they are (1) simultaneously collaborative and
disruptive, (2) essential for satisfying the
specification and (3) possibly non-terminating. Hence,
if these actions are modeled as faults while adding
fault-tolerance, it causes existing model repair
algorithms to declare failure to add fault-tolerance.
We present a set of algorithms for adding stabilization
and fault-tolerance for programs that run in the
presence of environment actions. We prove the
soundness, completeness and the complexity of our
algorithms. We have implemented all of our algorithms
using symbolic techniques in Java. The experimental
results of our algorithms for various examples are also
provided.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Dependable Cyber Physical Systems.",
}
@Article{Busanelli:2019:SOO,
author = "Stefano Busanelli and Simone Cirani and Lorenzo
Melegari and Marco Picone and Mirco Rosa and Luca
Veltri",
title = "A Sidecar Object for the Optimized Communication
Between Edge and Cloud in {Internet of Things}
Applications",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "145",
day = "05",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070145",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/145",
abstract = "The internet of things (IoT) is one of the most
disrupting revolutions that is characterizing the
technology ecosystem. In the near future, the IoT will
have a significant impact on people's lives and on the
design and developments of new paradigms and
architectures coping with a completely new set of
challenges and service categories. The IoT can be
described as an ecosystem where a massive number of
constrained devices (denoted as smart objects) will be
deployed and connected to cooperate for multiple
purposes, such a data collection, actuation, and
interaction with people. In order to meet the specific
requirements, IoT services may be deployed leveraging a
hybrid architecture that will involve services deployed
on the edge and the cloud. In this context, one of the
challenges is to create an infrastructure of objects
and microservices operating between both the edge and
in the cloud that can be easily updated and extended
with new features and functionalities without the need
of updating or re-deploying smart objects. This work
introduces a new concept for extending smart objects'
support for cloud services, denoted as a sidecar
object. A sidecar object serves the purpose of being
deployed as additional component of a preexisting
object without interfering with the mechanisms and
behaviors that have already been implemented. In
particular, the sidecar object implementation developed
in this work focuses on the communication with existing
IoT cloud services (namely, AWS IoT and Google Cloud
IoT) to provide a transparent and seamless
synchronization of data, states, and commands between
the object on the edge and the cloud. The proposed
sidecar object implementation has been extensively
evaluated through a detailed set of tests, in order to
analyze the performances and behaviors in real- world
scenarios.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cloud Computing and Internet of
Things.",
}
@Article{Jiang:2019:MII,
author = "Shengming Jiang",
title = "Marine {Internet} for {Internetworking} in Oceans: a
Tutorial",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "146",
day = "05",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070146",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/146",
abstract = "Ever-increasing human activities in oceans require
handy, reliable and cost-effective high-speed network
access similar to terrestrial Internet services to be
available on and under water. However, terrestrial
Internet cannot be extended to oceans seamlessly due to
huge differences between terrestrial and oceanic
environments, while satellite services are still very
expensive especially for ordinary users with
communication quality susceptible to weather
conditions, and cannot cover underwater networks
either. Therefore, marine Internet, proposed about six
years ago, is the earliest scheme that tries to
systematically address the internetworking issue in
oceans and still in its infancy stage. This tutorial
aims to introduce the principle, architecture and
applications of marine Internet, along with discussion
on oceanic environments for communication, currently
available and under developing communication systems in
oceans, as well as challenging issues necessary for
further studies to foster the development of marine
Internet.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Internet of Things.",
}
@Article{Kohana:2019:WBN,
author = "Masaki Kohana and Shinji Sakamoto and Shusuke
Okamoto",
title = "{Web} Browser Network Based on a {BA} Model for a
{Web}-Based Virtual World",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "147",
day = "05",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070147",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/147",
abstract = "Real-time web applications such as a virtual world
require considerable computing resources. However, as
the number of servers increases, so does the
maintenance and financial cost. To share tasks among
web browsers, the browsers must share data. Therefore,
a network must be constructed among the web browsers.
In this paper, we propose the construction of a web
browser network based on the Barabasi--Albert model (BA
model). We focus on a web-based multiplayer online game
that requires higher frequent communication and
significant computing resources. We attempt to optimize
computing resource utilization for web browsers. We
improve upon the method in our previous study, which
constructed a network for a web-based virtual world,
using only location information. When a new user logged
into a world, the web browser connected to two other
browsers whose users had a location close to that of
the user. The experimental results of that method
showed 50\% data coverage, which was insufficient to
display the game screen because the web browser
displays the characters on the virtual world. In this
study, we attempt to use the BA model to construct more
efficient networks than those in the previous study to
increase data coverage. Our new method uses the number
of connections of the web browser and location
information to calculate the probability of web browser
selection. The experimental results show that the data
coverage exceeds 90\%, indicating significant
improvement over the previous method.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Advanced Techniques for Internet, P2P
and Cloud Computing-selected papers from 3PGCIC-2018.",
}
@Article{Pibernik:2019:EFA,
author = "Jesenka Pibernik and Jurica Dolic and Hrvoje Abraham
Milicevic and Bojan Kanizaj",
title = "The Effects of the Floating Action Button on Quality
of Experience",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "148",
day = "06",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070148",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/148",
abstract = "Google's Material Design, created in 2014, led to the
extended application of floating action buttons (FAB)
in user interfaces of web pages and mobile
applications. FAB's roll is to trigger an activity
either on the present screen, or it can play out an
activity that makes another screen. A few specialists
in user experience (UX) and user interface (UI) design
are sceptical regarding the usability of FAB in the
interfaces of both web pages and mobile applications.
They claim that the use of FAB easily distracts users
and that it interferes with using other important
functions of the applications, and it is unusable in
applications designed for iOS systems. The aim of this
paper is to investigate by an experiment the quality of
experience (QoE) of a static and animated FAB and
compare it to the toolbar alternative. The experimental
results of different testing methods rejected the
hypothesis that the usage and animation of this UI
element has a positive influence on the application
usability. However, its static and animated utilization
enhanced the ratings of hedonic and aesthetic features
of the user experience, justifying the usage of this
type of button.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Multimedia Quality of Experience (QoE):
Current Status and Future Direction.",
}
@Article{Chen:2019:IAS,
author = "Yi-Cheng Chen and Yueh-Peng Chou and Yung-Chen Chou",
title = "An Image Authentication Scheme Using {Merkle} Tree
Mechanisms",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "149",
day = "06",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070149",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/149",
abstract = "Research on digital image processing has become quite
popular and rapid in recent years, and scholars have
proposed various image verification mechanisms.
Similarly, blockchain technology has also become very
popular in recent years. This paper proposes a new
image verification mechanism based on the Merkle tree
technique in the blockchain. The Merkle tree root in
the blockchain mechanism provides a reliable
environment for storage of image features. In image
verification, the verification of each image can be
performed by the Merkle tree mechanism to obtain the
hash value of the Merkle tree node on the path. In
addition, the method combines the Inter-Planetary File
System (IPFS) to improve the availability of images.
The main purpose of this paper is to achieve the goal
of image integrity verification. The proposed method
can not only verify the integrity of the image but also
restore the tampered area in the case of image
tampering. Since the proposed method employs the
blockchain mechanism, the image verification mechanism
does not need third party resources. The verification
method is performed by each node in the blockchain
network. The experimental results demonstrate that the
proposed method successfully achieved the goal of image
authentication and tampered area restoration.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Blockchain Theory and Its
Applications.",
}
@Article{Utsu:2019:TWW,
author = "Keisuke Utsu and Shun Ueta and Sachi Tajima and
Yoshitaka Kajita and Yuji Murakami and Osamu Uchida",
title = "Town-Watching Workshop Using Disaster Information
Tweeting and Mapping System",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "150",
day = "07",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070150",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/150",
abstract = "Self- and mutual-help by citizens are important as
well as social-help from the local governments, for
disaster prevention and mitigation. Then, town watching
and disaster prevention map-making workshops are held
to review the town and promote self- and mutual-help by
citizens. On the other hand, the use of social media
for information sharing during and after disasters has
been gaining attention. To facilitate information
sharing in disasters, we developed a web system,
Disaster Information Tweeting and Mapping System
(DITS/DIMS). From the above background, we organized a
town-watching workshop using DITS/DIMS in October 2018
in Minami Ward, Sapporo City, Hokkaido, Japan; affected
area of the Hokkaido Eastern Iburi Earthquake in
September 2018. In this paper, we explain the workshop
procedure, outcome, questionnaire survey results, and
post-meeting. The questionnaire survey result shows
that the workshop educated the participants about
posting useful information on social media during a
disaster. In addition, at the post-meeting, the
participants recognized that they had reviewed the town
only from the perspective of ``daily life'' convenience
before the earthquake, and they had not evaluated the
``emergency viewpoint.'' Therefore, the workshop was a
meaningful opportunity for the participants to review
the town in terms of disaster prevention and
mitigation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from IEEE ICICT 2019.",
}
@Article{Bader:2019:SRA,
author = "Sebastian R. Bader and Maria Maleshkova and Steffen
Lohmann",
title = "Structuring Reference Architectures for the Industrial
{Internet of Things}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "151",
day = "08",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070151",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/151",
abstract = "The ongoing digital transformation has the potential
to revolutionize nearly all industrial manufacturing
processes. However, its concrete requirements and
implications are still not sufficiently investigated.
In order to establish a common understanding, a
multitude of initiatives have published guidelines,
reference frameworks and specifications, all intending
to promote their particular interpretation of the
Industrial Internet of Things (IIoT). As a result of
the inconsistent use of terminology, heterogeneous
structures and proposed processes, an opaque landscape
has been created. The consequence is that both new
users and experienced experts can hardly manage to get
an overview of the amount of information and
publications, and make decisions on what is best to use
and to adopt. This work contributes to the state of the
art by providing a structured analysis of existing
reference frameworks, their classifications and the
concerns they target. We supply alignments of shared
concepts, identify gaps and give a structured mapping
of regarded concerns at each part of the respective
reference architectures. Furthermore, the linking of
relevant industry standards and technologies to the
architectures allows a more effective search for
specifications and guidelines and supports the direct
technology adoption.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Forte:2019:NGC,
author = "Andrea G. Forte and Wei Wang and Luca Veltri and
Gianluigi Ferrari",
title = "A Next-Generation Core Network Architecture for Mobile
Networks",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "152",
day = "09",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070152",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/152",
abstract = "Over the years, the cellular mobile network has
evolved from a wireless plain telephone system to a
very complex system providing telephone service,
Internet connectivity and many interworking
capabilities with other networks. Its air interface
performance has increased drastically over time,
leading to high throughput and low latency. Changes to
the core network, however, have been slow and
incremental, with increased complexity worsened by the
necessity of backwards-compatibility with
older-generation systems such as the Global System for
Mobile communication (GSM). In this paper, a new
virtualized Peer-to-Peer (P2P) core network
architecture is presented. The key idea of our approach
is that each user is assigned a private virtualized
copy of the whole core network. This enables a higher
degree of security and novel services that are not
possible in today's architecture. We describe the new
architecture, focusing on its main elements, IP
addressing, message flows, mobility management, and
scalability. Furthermore, we will show some significant
advantages this new architecture introduces. Finally,
we investigate the performance of our architecture by
analyzing voice-call traffic available in a database of
a large U.S. cellular network provider.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Network Virtualization and Edge/Fog
Computing.",
}
@Article{Alreshidi:2019:ASI,
author = "Abdulrahman Alreshidi and Aakash Ahmad",
title = "Architecting Software for the {Internet} of Thing
Based Systems",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "153",
day = "10",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070153",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/153",
abstract = "Context --- Internet of Thing (IoT) based systems
support any-time/place computations by interconnecting
humans, systems, services, devices, and things that
enabling autonomous systems to shape-up digitized
societies. Software architecture, as the blue-print of
software-intensive systems, abstracts the complexities
of modeling, design, development, and evolution phases
of a software to engineer complex IoT driven systems
effectively and efficiently. Objectives and Method ---
Research and development efforts are required to
exploit architectural principle and practices to design
and develop IoT systems to go beyond the
state-of-the-art for IoTs. The objectives of this
research are to empirically investigate and
systematically classify the state-of-the-art on
architecting IoT based software. We have used the
Evidence Based Software Engineering (EBSE) method to
conduct a mapping study of the existing IoT solutions
by investigating 88 qualitatively selected studies.
Results and Implications --- The results of the mapping
study highlight various research themes that exploit
software architecture models to develop IoT systems.
The identified research themes include, but are not
limited to, cloud-based software ecosystems, software
defined networking, autonomous, and adaptive software
and agent-based systems that IoTs drive. The mapping
study suggests that futuristic research on architecting
IoT software is focused on architectural languages and
patterns that support reusability, automation, and
human decision support to develop and dynamically adapt
IoT software. The mapping study represents a
concentrated knowledge regarding architectural
principle and practices to facilitate knowledge
transfer --- benefiting researchers and practitioners
--- on the role of software architecture for IoT
systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Internet of Things.",
}
@Article{Drozdz:2019:SCC,
author = "Stanis{\l}aw Drozdz and Ludovico Minati and Pawe{\l}
O{\'s}wi{\k{e}}cimka and Marek Stanuszek and Marcin
W{\k{a}}torek",
title = "Signatures of the Crypto-Currency Market Decoupling
from the {Forex}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "154",
day = "10",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070154",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/154",
abstract = "Based on the high-frequency recordings from Kraken, a
cryptocurrency exchange and professional trading
platform that aims to bring Bitcoin and other
cryptocurrencies into the mainstream, the multiscale
cross-correlations involving the Bitcoin (BTC),
Ethereum (ETH), Euro (EUR) and US dollar (USD) are
studied over the period between 1 July 2016 and 31
December 2018. It is shown that the multiscaling
characteristics of the exchange rate fluctuations
related to the cryptocurrency market approach those of
the Forex. This, in particular, applies to the BTC/ETH
exchange rate, whose Hurst exponent by the end of 2018
started approaching the value of 0.5, which is
characteristic of the mature world markets.
Furthermore, the BTC/ETH direct exchange rate has
already developed multifractality, which manifests
itself via broad singularity spectra. A particularly
significant result is that the measures applied for
detecting cross-correlations between the dynamics of
the BTC/ETH and EUR/USD exchange rates do not show any
noticeable relationships. This could be taken as an
indication that the cryptocurrency market has begun
decoupling itself from the Forex.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Blockchain Theory and Its
Applications.",
}
@Article{Wang:2019:SBE,
author = "Yufeng Wang and Shuangrong Liu and Songqian Li and
Jidong Duan and Zhihao Hou and Jia Yu and Kun Ma",
title = "Stacking-Based Ensemble Learning of Self-Media Data
for Marketing Intention Detection",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "155",
day = "10",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070155",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/155",
abstract = "Social network services for self-media, such as Weibo,
Blog, and WeChat Public, constitute a powerful medium
that allows users to publish posts every day. Due to
insufficient information transparency, malicious
marketing of the Internet from self-media posts imposes
potential harm on society. Therefore, it is necessary
to identify news with marketing intentions for life. We
follow the idea of text classification to identify
marketing intentions. Although there are some current
methods to address intention detection, the challenge
is how the feature extraction of text reflects semantic
information and how to improve the time complexity and
space complexity of the recognition model. To this end,
this paper proposes a machine learning method to
identify marketing intentions from large-scale We-Media
data. First, the proposed Latent Semantic Analysis
(LSI)-Word2vec model can reflect the semantic features.
Second, the decision tree model is simplified by
decision tree pruning to save computing resources and
reduce the time complexity. Finally, this paper
examines the effects of classifier associations and
uses the optimal configuration to help people
efficiently identify marketing intention. Finally, the
detailed experimental evaluation on several metrics
shows that our approaches are effective and efficient.
The F1 value can be increased by about 5\%, and the
running time is increased by 20\%, which prove that the
newly-proposed method can effectively improve the
accuracy of marketing news recognition.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Advanced Techniques for Internet, P2P
and Cloud Computing-selected papers from 3PGCIC-2018.",
}
@Article{Al-Zahrani:2019:GTI,
author = "Ali Y. Al-Zahrani",
title = "A Game Theoretic Interference Management Scheme in
Full Duplex Cellular Systems under Infeasible {QoS}
Requirements",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "156",
day = "16",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070156",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/156",
abstract = "Several emerging mobile applications and services
(e.g., autonomous cars) require higher wireless
throughput than ever before. This demand stresses the
need for investigating novel methods that have the
potential to dramatically increase the spectral
efficiency (SE) of wireless systems. An evolving
approach is the Single-channel full duplex (SCFD)
communication where each node may simultaneously
receive and transmit over the same frequency channel,
and, hence, this could potentially double the current
SE figures. In an earlier research work, we derived a
model of the signal to interference plus noise ratio
(SINR) in an SCFD-based cellular system with imperfect
self interference cancellation, and investigated
interference management under feasible QoS
requirements. In this paper, game theoretic results are
exploited to investigate the intercell interference
management in SCFD-based cellular networks under
infeasible QoS requirements. The investigation starts
with a game formulation that captures two different
cases. Then, the existence and uniqueness of the Nash
equilibrium point are established. After that, a
computationally efficient distributed algorithm, which
realizes best effort and fair wireless services, is
designed. The merit of this scheme is that, when the
QoS requirements are feasible, they will be achieved
with minimum energy consumption. Results of extensive
simulation experiments are presented to show the
effectiveness of the proposed schemes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Network Virtualization and Edge/Fog
Computing.",
}
@Article{Zhang:2019:MAN,
author = "Qiuyue Zhang and Ran Lu",
title = "A Multi-Attention Network for Aspect-Level Sentiment
Analysis",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "157",
day = "16",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070157",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/157",
abstract = "Aspect-level sentiment analysis (ASA) aims at
determining the sentiment polarity of specific aspect
term with a given sentence. Recent advances in
attention mechanisms suggest that attention models are
useful in ASA tasks and can help identify focus words.
Or combining attention mechanisms with neural networks
are also common methods. However, according to the
latest research, they often fail to extract text
representations efficiently and to achieve interaction
between aspect terms and contexts. In order to solve
the complete task of ASA, this paper proposes a
Multi-Attention Network (MAN) model which adopts
several attention networks. This model not only
preprocesses data by Bidirectional Encoder
Representations from Transformers (BERT), but a number
of measures have been taken. First, the MAN model
utilizes the partial Transformer after transformation
to obtain hidden sequence information. Second, because
words in different location have different effects on
aspect terms, we introduce location encoding to analyze
the impact on distance from ASA tasks, then we obtain
the influence of different words with aspect terms
through the bidirectional attention network. From the
experimental results of three datasets, we could find
that the proposed model could achieve consistently
superior results.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Network Virtualization and Edge/Fog
Computing.",
}
@Article{Vanneste:2019:DUS,
author = "Simon Vanneste and Jens de Hoog and Thomas Huybrechts
and Stig Bosmans and Reinout Eyckerman and Muddsair
Sharif and Siegfried Mercelis and Peter Hellinckx",
title = "Distributed Uniform Streaming Framework: An Elastic
Fog Computing Platform for Event Stream Processing and
Platform Transparency",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "158",
day = "19",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070158",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/158",
abstract = "The increase of Internet of Things devices and the
rise of more computationally intense applications
presents challenges for future Internet of Things
architectures. We envision a future in which edge, fog,
and cloud devices work together to execute future
applications. Because the entire application cannot run
on smaller edge or fog devices, we will need to split
the application into smaller application components.
These application components will send event messages
to each other to create a single application from
multiple application components. The execution location
of the application components can be optimized to
minimize the resource consumption. In this paper, we
describe the Distributed Uniform Stream (DUST)
framework that creates an abstraction between the
application components and the middleware which is
required to make the execution location transparent to
the application component. We describe a real-world
application that uses the DUST framework for platform
transparency. Next to the DUST framework, we also
describe the distributed DUST Coordinator, which will
optimize the resource consumption by moving the
application components to a different execution
location. The coordinators will use an adapted version
of the Contract Net Protocol to find local minima in
resource consumption.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Advanced Techniques for Internet, P2P
and Cloud Computing-selected papers from 3PGCIC-2018.",
}
@Article{Menth:2019:IEA,
author = "Michael Menth and Habib Mostafaei and Daniel Merling
and Marco H{\"a}berle",
title = "Implementation and Evaluation of Activity-Based
Congestion Management Using {P4 (P4-ABC)}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "159",
day = "19",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070159",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/159",
abstract = "Activity-Based Congestion management (ABC) is a novel
domain-based QoS mechanism providing more fairness
among customers on bottleneck links. It avoids per-flow
or per-customer states in the core network and is
suitable for application in future 5G networks.
However, ABC cannot be configured on standard devices.
P4 is a novel programmable data plane specification
which allows defining new headers and forwarding
behavior. In this work, we implement an ABC prototype
using P4 and point out challenges experienced during
implementation. Experimental validation of ABC using
the P4-based prototype reveals the desired fairness
results.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Network Virtualization and Edge/Fog
Computing.",
}
@Article{Manzoor:2019:CBR,
author = "Hamza Manzoor and Kamil Akhuseyinoglu and Jackson
Wonderly and Peter Brusilovsky and Clifford A.
Shaffer",
title = "Crossing the Borders: Re-Use of Smart Learning Objects
in Advanced Content Access Systems",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "160",
day = "19",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070160",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/160",
abstract = "Researchers in many disciplines are developing novel
interactive smart learning objects like exercises and
visualizations. Meanwhile, Learning Management Systems
(LMS) and eTextbook systems are also becoming more
sophisticated in their ability to use standard
protocols to make use of third party smart learning
objects. But at this time, educational tool developers
do not always make best use of the interoperability
standards and need exemplars to guide and motivate
their development efforts. In this paper we present a
case study where the two large educational ecosystems
use the Learning Tools Interoperability (LTI) standard
to allow cross-sharing of their educational materials.
At the end of our development process, Virginia Tech's
OpenDSA eTextbook system became able to import
materials from Aalto University's ACOS smart learning
content server, such as python programming exercises
and Parsons problems. Meanwhile, University of
Pittsburgh's Mastery Grids (which already uses the ACOS
exercises) was made to support CodeWorkout programming
exercises (a system already used within OpenDSA). Thus,
four major projects in CS Education became
inter-operable.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Trends and Opportunities in Online
Education.",
}
@Article{Rejeb:2019:LIT,
author = "Abderahman Rejeb and John G. Keogh and Horst
Treiblmaier",
title = "Leveraging the {Internet of Things} and Blockchain
Technology in Supply Chain Management",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "161",
day = "20",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070161",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/161",
abstract = "Modern supply chains have evolved into highly complex
value networks and turned into a vital source of
competitive advantage. However, it has become
increasingly challenging to verify the source of raw
materials and maintain visibility of products and
merchandise while they are moving through the value
chain network. The application of the Internet of
Things (IoT) can help companies to observe, track, and
monitor products, activities, and processes within
their respective value chain networks. Other
applications of IoT include product monitoring to
optimize operations in warehousing\‚
manufacturing, and transportation. In combination with
IoT, Blockchain technology can enable a broad range of
different application scenarios to enhance value chain
transparency and to increase B2B trust. When combined,
IoT and Blockchain technology have the potential to
increase the effectiveness and efficiency of modern
supply chains. The contribution of this paper is
twofold. First, we illustrate how the deployment of
Blockchain technology in combination with IoT
infrastructure can streamline and benefit modern supply
chains and enhance value chain networks. Second, we
derive six research propositions outlining how
Blockchain technology can impact key features of the
IoT (i.e., scalability, security, immutability and
auditing, information flows, traceability and
interoperability, quality) and thus lay the foundation
for future research projects.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cloud Computing and Internet of
Things.",
}
@Article{Serketzis:2019:IFT,
author = "Nikolaos Serketzis and Vasilios Katos and Christos
Ilioudis and Dimitrios Baltatzis and Georgios
Pangalos",
title = "Improving Forensic Triage Efficiency through Cyber
Threat Intelligence",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "162",
day = "23",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070162",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/162",
abstract = "The complication of information technology and the
proliferation of heterogeneous security devices that
produce increased volumes of data coupled with the
ever-changing threat landscape challenges have an
adverse impact on the efficiency of information
security controls and digital forensics, as well as
incident response approaches. Cyber Threat Intelligence
(CTI)and forensic preparedness are the two parts of the
so-called managed security services that defendants can
employ to repel, mitigate or investigate security
incidents. Despite their success, there is no known
effort that has combined these two approaches to
enhance Digital Forensic Readiness (DFR) and thus
decrease the time and cost of incident response and
investigation. This paper builds upon and extends a DFR
model that utilises actionable CTI to improve the
maturity levels of DFR. The effectiveness and
applicability of this model are evaluated through a
series of experiments that employ malware-related
network data simulating real-world attack scenarios. To
this extent, the model manages to identify the root
causes of information security incidents with high
accuracy (90.73\%), precision (96.17\%) and recall
(93.61\%), while managing to decrease significantly the
volume of data digital forensic investigators need to
examine. The contribution of this paper is twofold.
First, it indicates that CTI can be employed by digital
forensics processes. Second, it demonstrates and
evaluates an efficient mechanism that enhances
operational DFR.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Information and
Communication Systems.",
}
@Article{Lettieri:2019:PET,
author = "Nicola Lettieri and Alfonso Guarino and Delfina
Malandrino and Rocco Zaccagnino",
title = "Platform Economy and Techno-Regulation-Experimenting
with Reputation and Nudge",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "7",
pages = "163",
day = "23",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11070163",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:06 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/7/163",
abstract = "In the cloud-based society, where the vast majority of
social, economic and personal interactions is mediated
by information communication technology (ICT),
technology is no longer simply a subject of regulation
but is becoming an integral part of the regulatory
process. Techno-regulation, the ``intentional
influencing of individuals' behavior by building norms
into technological devices,'' is inspiring new ways to
support legal safeguards through hardware and software
tools, technical solutions allowing the creation of
legal relations, hampering breaches of law and even
promoting norm compliance. This paper touches on these
issues by focusing on Digital Labor Platforms, one of
the most relevant phenomena in the gig economy. We
present a research project exploring innovative
techno-regulatory solutions to protect gig economy
workers. The idea is to integrate, in the same
strategy, legal principles, regulatory objectives and
software solutions. Our attention focuses on two
results of our activity --- a techno-regulatory model
relying on reputational mechanisms to affect the
behavior of digital labor market operators and
GigAdvisor, a cross-platform experimental application
implementing the model.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Chiti:2019:EEC,
author = "Francesco Chiti and Romano Fantacci and Laura
Pierucci",
title = "Energy Efficient Communications for Reliable {IoT}
Multicast {5G}\slash Satellite Services",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "8",
pages = "164",
day = "25",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11080164",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/8/164",
abstract = "Satellites can provide strong value-add and
complementarity with the new cellular system of the
fifth generation (5G) in cost-effective solutions for a
massive number of users/devices/things. Due to the
inherent broadcast nature of satellite communications,
which assures access to remote areas and the support to
a very large number of devices, satellite systems will
gain a major role in the development of the Internet of
Things (IoT) sector. In this vision, reliable multicast
services via satellite can be provided to deliver the
same content efficiently to multiple devices on the
Earth, or for software updating to groups of cars in
the Machine-to-Machine (M2M) context or for sending
control messages to actuators/IoT embedded devices. The
paper focuses on the Network coding (NC) techniques
applied to a hybrid satellite/terrestrial network to
support reliable multicast services. An energy
optimization method is proposed based on joint
adaptation of: (i) the repetition factor of data
symbols on multiple subcarries of the transmitted
orthogonal frequency division multiplexing (OFDM)
signal; and (ii) the mean number of needed coded
packets according to the requirements of each group and
to the physical satellite links conditions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Satellite Communications in 5G
Networks.",
}
@Article{Yang:2019:SEO,
author = "Jin Sol Yang and Myung-Sook Ko and Kwang Sik Chung",
title = "Social Emotional Opinion Decision with Newly Coined
Words and Emoticon Polarity of Social Networks
Services",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "8",
pages = "165",
day = "25",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11080165",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/8/165",
abstract = "Nowadays, based on mobile devices and internet, social
network services (SNS) are common trends to everyone.
Social opinions as public opinions are very important
to the government, company, and a person. Analysis and
decision of social polarity of SNS about social
happenings, political issues and government policies,
or commercial products is very critical to the
government, company, and a person. Newly coined words
and emoticons on SNS are created every day.
Specifically, emoticons are made and sold by a person
or companies. Newly coined words are mostly made and
used by various kinds of communities. The SNS big data
mainly consist of normal text with newly coined words
and emoticons so that newly coined words and emoticons
analysis is very important to understand the social and
public opinions. Social big data is informally made and
unstructured, and on social network services, many
kinds of newly coined words and various emoticons are
made anonymously and unintentionally by people and
companies. In the analysis of social data, newly coined
words and emoticons limit the guarantee the accuracy of
analysis. The newly coined words implicitly contain the
social opinions and trends of people. The emotional
states of people significantly are expressed by
emoticons. Although the newly coined words and
emoticons are an important part of the social opinion
analysis, they are excluded from the emotional
dictionary and social big data analysis. In this
research, newly coined words and emoticons are
extracted from the raw Twitter's twit messages and
analyzed and included in a pre-built dictionary with
the polarity and weight of the newly coined words and
emoticons. The polarity and weight are calculated for
emotional classification. The proposed emotional
classification algorithm calculates the weight of
polarity (positive or negative) and results in total
polarity weight of social opinion. If the total
polarity weight of social opinion is more than the
pre-fixed threshold value, the twit message is decided
as positive. If it is less than the pre-fixed threshold
value, the twit message is decided as negative and the
other values mean neutral opinion. The accuracy of the
social big data analysis result is improved by
quantifying and analyzing emoticons and newly coined
words.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from IEEE ICICT 2019.",
}
@Article{Elzain:2019:SDW,
author = "Hisham Elzain and Yang Wu",
title = "Software Defined Wireless Mesh Network Flat
Distribution Control Plane",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "8",
pages = "166",
day = "25",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11080166",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/8/166",
abstract = "Wireless Mesh Networks (WMNs), have a potential
offering relatively stable Internet broadband access.
The rapid development and growth of WMNs attract ISPs
to support users' coverage anywhere anytime. To achieve
this goal network architecture must be addressed
carefully. Software Defined Networking (SDN) proposes
new network architecture for wired and wireless
networks. Software Defined Wireless Networking (SDWN)
has a great potential to increase efficiency, ease the
complexity of control and management, and accelerate
technology innovation rate of wireless networking. An
SDN controller is the core component of an SDN network.
It needs to have updated reports of the network status
change, as in network topology and quality of service
(QoS) in order to effectively configure and manage the
network it controls. In this paper, we propose Flat
Distributed Software Defined Wireless Mesh Network
architecture where the controller aggregates entire
topology discovery and monitors QoS properties of
extended WMN nodes using Link Layer Discovery Protocol
(LLDP) protocol, which is not possible in multi-hop
ordinary architectures. The proposed architecture has
been implemented on top of POX controller and Advanced
Message Queuing Protocol (AMQP) protocol. The
experiments were conducted in a Mininet-wifi emulator,
the results present the architecture control plane
consistency and two application cases: topology
discovery and QoS monitoring. The current results push
us to study QoS-routing for video streaming over WMN.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sengupta:2019:HAT,
author = "Saumendra Sengupta and Chen-Fu Chiang and Bruno
Andriamanalimanana and Jorge Novillo and Ali Tekeoglu",
title = "A Hybrid Adaptive Transaction Injection Protocol and
Its Optimization for Verification-Based Decentralized
System",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "8",
pages = "167",
day = "27",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11080167",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/8/167",
abstract = "Latency is a critical issue that impacts the
performance of decentralized systems. Recently we
designed various protocols to regulate the injection
rate of unverified transactions into the system to
improve system performance. Each of the protocols is
designed to address issues related to some particular
network traffic syndrome. In this work, we first
provide the review of our prior protocols. We then
provide a hybrid scheme that combines our transaction
injection protocols and provides an optimal linear
combination of the protocols based on the syndromes in
the network. The goal is to speed up the verification
process of systems that rely on only one single basic
protocol. The underlying basic protocols are Periodic
Injection of Transaction via Evaluation Corridor
(PITEC), Probabilistic Injection of Transactions (PIT),
and Adaptive Semi-synchronous Transaction Injection
(ASTI).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Advanced Techniques for Internet, P2P
and Cloud Computing-selected papers from 3PGCIC-2018.",
}
@Article{Yuan:2019:LBD,
author = "Jie Yuan and Erxia Li and Chaoqun Kang and Fangyuan
Chang and Tingting Yuan and Xiaoyong Li",
title = "Latency-Based Dynamic Controller Assignment in Hybrid
{SDNs}: Considering the Impact of Legacy Routers",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "8",
pages = "168",
day = "28",
month = jul,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11080168",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/8/168",
abstract = "Software-defined networking (SDN) is a modern network
architecture, which separates the network control plane
from the data plane. Considering the gradual migration
from traditional networks to SDNs, the hybrid SDN,
which consists of SDN-enabled devices and legacy
devices, is an intermediate state. For wide-area hybrid
SDNs, to guarantee the control performance, such as low
latency, multi SDN controllers are usually needed to be
deployed at different places. How to assign them to
switches and partition the network into several control
domains is a critical problem. For this problem, the
control latency and the packet loss rate of control
messages are important metrics, which have been
considered in a lot of previous works. However, hybrid
SDNs have their unique characters, which can affect the
assignment scheme and have been ignored by previous
studies. For example, control messages pass through
Legacy Forwarding Devices (LFDs) in hybrid SDNs and
cause more latency and packet loss rate for queuing
compared with SDN-enabled Forwarding Devices (SFDs). In
this paper, we propose a dynamic controller assignment
scheme in hybrid SDNs, which is called the Legacy Based
Assignment (LBA). This scheme can dynamically delegate
each controller with a subset of SFDs in the hybrid
SDNs, whose objective is to minimize average
SFD-to-control latency. We performed some experiments
compared with other schemes, which show that our scheme
has a better performance in terms of the latency and
the packet loss rate.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Network, Compute, and Storage Management
Using Software Defined Environments (SDEs).",
}
@Article{Tatulea:2019:IFB,
author = "Paula Tatulea and Florina Calin and Remus Brad and
Lucian Br{\^a}ncovean and Mircea Greavu",
title = "An Image Feature-Based Method for Parking Lot
Occupancy",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "8",
pages = "169",
day = "01",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11080169",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/8/169",
abstract = "The main scope of the presented research was the
development of an innovative product for the management
of city parking lots. Our application will ensure the
implementation of the Smart City concept by using
computer vision and communication platforms, which
enable the development of new integrated digital
services. The use of video cameras could simplify and
lower the costs of parking lot controls. In the aim of
parking space detection, an aggregated decision was
proposed, employing various metrics, computed over a
sliding window interval provided by the camera. The
history created over 20 images provides an adaptive
method for background and accurate detection. The
system has shown high robustness in two benchmarks,
achieving a recognition rate higher than 93\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Smart System Infrastructure and
Applications.",
}
@Article{Sgantzos:2019:AII,
author = "Konstantinos Sgantzos and Ian Grigg",
title = "Artificial Intelligence Implementations on the
Blockchain. {Use} Cases and Future Applications",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "8",
pages = "170",
day = "02",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11080170",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/8/170",
abstract = "An exemplary paradigm of how an AI can be a disruptive
technological paragon via the utilization of blockchain
comes straight from the world of deep learning. Data
scientists have long struggled to maintain the quality
of a dataset for machine learning by an AI entity.
Datasets can be very expensive to purchase, as,
depending on both the proper selection of the elements
and the homogeneity of the data contained within,
constructing and maintaining the integrity of a dataset
is difficult. Blockchain as a highly secure storage
medium presents a technological quantum leap in
maintaining data integrity. Furthermore, blockchain's
immutability constructs a fruitful environment for
creating high quality, permanent and growing datasets
for deep learning. The combination of AI and blockchain
could impact fields like Internet of things (IoT),
identity, financial markets, civil governance, smart
cities, small communities, supply chains, personalized
medicine and other fields, and thereby deliver benefits
to many people.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Blockchain: Current Challenges and
Future Prospects/Applications.",
}
@Article{Duc:2019:MCQ,
author = "Tho Nguyen Duc and Chanh Minh Tran and Phan Xuan Tan
and Eiji Kamioka",
title = "Modeling of Cumulative {QoE} in On-Demand Video
Services: Role of Memory Effect and Degree of
Interest",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "8",
pages = "171",
day = "04",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11080171",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/8/171",
abstract = "The growing demand on video streaming services
increasingly motivates the development of a reliable
and accurate models for the assessment of Quality of
Experience (QoE). In this duty, human-related factors
which have significant influence on QoE play a crucial
role. However, the complexity caused by multiple
effects of those factors on human perception has
introduced challenges on contemporary studies. In this
paper, we inspect the impact of the human-related
factors, namely perceptual factors, memory effect, and
the degree of interest. Based on our investigation, a
novel QoE model is proposed that effectively
incorporates those factors to reflect the user's
cumulative perception. Evaluation results indicate that
our proposed model performed excellently in predicting
cumulative QoE at any moment within a streaming
session.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Multimedia Quality of Experience (QoE):
Current Status and Future Direction.",
}
@Article{Raviv:2019:SMU,
author = "Li-on Raviv and Amir Leshem",
title = "Scheduling for Multi-User Multi-Input Multi-Output
Wireless Networks with Priorities and Deadlines",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "8",
pages = "172",
day = "05",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11080172",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/8/172",
abstract = "The spectral efficiency of wireless networks can be
significantly improved by exploiting spatial
multiplexing techniques known as multi-user MIMO. These
techniques enable the allocation of multiple users to
the same time-frequency block, thus reducing the
interference between users. There is ample evidence
that user groupings can have a significant impact on
the performance of spatial multiplexing. The situation
is even more complex when the data packets have
priority and deadlines for delivery. Hence, combining
packet queue management and beamforming would
considerably enhance the overall system performance. In
this paper, we propose a combination of beamforming and
scheduling to improve the overall performance of
multi-user MIMO systems in realistic conditions where
data packets have both priority and deadlines beyond
which they become obsolete. This method dubbed Reward
Per Second (RPS), combines advanced matrix
factorization at the physical layer with
recently-developed queue management techniques. We
demonstrate the merits of the this technique compared
to other state-of-the-art scheduling methods through
simulations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Signal Processing for Next Generation
Wireless Networks.",
}
@Article{Bertolazzi:2019:MED,
author = "Marco Bertolazzi and Carlo Caini",
title = "{Mars} to {Earth} Data Downloading: a Directory
Synchronization Approach",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "8",
pages = "173",
day = "08",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11080173",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/11/8/173",
abstract = "This paper aims to present a possible alternative to
direct file transfer in ``challenged networks'', by
using DTNbox, a recent application for peer-to-peer
directory synchronization between DTN nodes. This
application uses the Bundle Protocol (BP) to tackle
long delays and link intermittency typical of
challenged networks. The directory synchronization
approach proposed in the paper consists of delegating
the transmission of bulk data files to DTNbox, instead
of modifying source applications to interface with the
API of a specific BP implementation, or making use of
custom scripts for file transfers. The validity of the
proposed approach is investigated in the paper by
considering a Mars to Earth interplanetary environment.
Experiments are carried out by means of Virtual
Machines running ION, the NASA-JPL implementation of
DTN protocols. The results show that the directory
synchronization approach is a valid alternative to
direct transfer in interplanetary scenarios such as
that considered in the paper.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Delay-Tolerant Networking.",
}
@Article{ODonovan:2019:SAR,
author = "Peter O'Donovan and Dominic T. J. O'Sullivan",
title = "A Systematic Analysis of Real-World Energy Blockchain
Initiatives",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "8",
pages = "174",
day = "10",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11080174",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/8/174",
abstract = "The application of blockchain technology to the energy
sector promises to derive new operating models focused
on local generation and sustainable practices, which
are driven by peer-to-peer collaboration and community
engagement. However, real-world energy blockchains
differ from typical blockchain networks insofar as they
must interoperate with grid infrastructure, adhere to
energy regulations, and embody engineering principles.
Naturally, these additional dimensions make real-world
energy blockchains highly dependent on the
participation of grid operators, engineers, and energy
providers. Although much theoretical and
proof-of-concept research has been published on energy
blockchains, this research aims to establish a lens on
real-world projects and implementations that may inform
the alignment of academic and industry research
agendas. This research classifies 131 real-world energy
blockchain initiatives to develop an understanding of
how blockchains are being applied to the energy domain,
what type of failure rates can be observed from
recently reported initiatives, and what level of
technical and theoretical details are reported for
real-world deployments. The results presented from the
systematic analysis highlight that real-world energy
blockchains are (a) growing exponentially year-on-year,
(b) producing relatively low failure/drop-off rates ($
\approx $7\% since 2015), and (c) demonstrating
information sharing protocols that produce content with
insufficient technical and theoretical depth.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Blockchain: Current Challenges and
Future Prospects/Applications.",
}
@Article{Erabadda:2019:QEQ,
author = "Buddhiprabha Erabadda and Thanuja Mallikarachchi and
Chaminda Hewage and Anil Fernando",
title = "Quality of Experience {(QoE)-Aware} Fast Coding Unit
Size Selection for {HEVC} Intra-Prediction",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "8",
pages = "175",
day = "11",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11080175",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/8/175",
abstract = "The exorbitant increase in the computational
complexity of modern video coding standards, such as
High Efficiency Video Coding (HEVC), is a compelling
challenge for resource-constrained consumer electronic
devices. For instance, the brute force evaluation of
all possible combinations of available coding modes and
quadtree-based coding structure in HEVC to determine
the optimum set of coding parameters for a given
content demand a substantial amount of computational
and energy resources. Thus, the resource requirements
for real time operation of HEVC has become a
contributing factor towards the Quality of Experience
(QoE) of the end users of emerging multimedia and
future internet applications. In this context, this
paper proposes a content-adaptive Coding Unit (CU) size
selection algorithm for HEVC intra-prediction. The
proposed algorithm builds content-specific weighted
Support Vector Machine (SVM) models in real time during
the encoding process, to provide an early estimate of
CU size for a given content, avoiding the brute force
evaluation of all possible coding mode combinations in
HEVC. The experimental results demonstrate an average
encoding time reduction of 52.38\%, with an average
Bj\øntegaard Delta Bit Rate (BDBR) increase of
1.19\% compared to the HM16.1 reference encoder.
Furthermore, the perceptual visual quality assessments
conducted through Video Quality Metric (VQM) show
minimal visual quality impact on the reconstructed
videos of the proposed algorithm compared to
state-of-the-art approaches.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Multimedia Quality of Experience (QoE):
Current Status and Future Direction.",
}
@Article{Yang:2019:RFA,
author = "Keng Yang",
title = "Research on Factors Affecting Solvers' Participation
Time in Online Crowdsourcing Contests",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "8",
pages = "176",
day = "12",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11080176",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/8/176",
abstract = "A crowdsourcing contest is one of the most popular
modes of crowdsourcing and is also an important tool
for an enterprise to implement open innovation. The
solvers' active participation is one of the major
reasons for the success of crowdsourcing contests.
Research on solvers' participation behavior is helpful
in understanding the sustainability and incentives of
solvers' participation in the online crowdsourcing
platform. So, how to attract more solvers to
participate and put in more effort is the focus of
researchers. In this regard, previous studies mainly
used the submission quantity to measure solvers'
participation behavior and lacked an effective measure
on the degree of participation effort expended by a
solver. For the first time, we use solvers'
participation time as a dependent variable to measure
their effort in a crowdsourcing contest. Thus, we
incorporate participation time into the solver's
participation research. With the data from Taskcn.com,
we analyze how participation time is affected four key
factors including task design, task description, task
process, and environment, respectively. We found that,
first, for task design, higher task rewards will
attract solvers to invest more time in the
participation process and the relationship between
participation time and task duration is inverted
U-shaped. Second, for task description, the length of
the task description has a negative impact on
participation time and the task description attachment
will positively influence the participation time.
Third, for the task process, communication and
supplementary explanations in a crowdsourcing process
positively affect participation time. Fourth, for
environmental factors, the task density of the
crowdsourcing platform and the market price of all
crowdsourcing contests have respectively negative and
positive effects on participation time.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Network Economics and Utility
Maximization.",
}
@Article{Fang:2019:ROX,
author = "Yong Fang and Cheng Huang and Yijia Xu and Yang Li",
title = "{RLXSS}: Optimizing {XSS} Detection Model to Defend
Against Adversarial Attacks Based on Reinforcement
Learning",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "8",
pages = "177",
day = "14",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11080177",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/8/177",
abstract = "With the development of artificial intelligence,
machine learning algorithms and deep learning
algorithms are widely applied to attack detection
models. Adversarial attacks against artificial
intelligence models become inevitable problems when
there is a lack of research on the cross-site scripting
(XSS) attack detection model for defense against
attacks. It is extremely important to design a method
that can effectively improve the detection model
against attack. In this paper, we present a method
based on reinforcement learning (called RLXSS), which
aims to optimize the XSS detection model to defend
against adversarial attacks. First, the adversarial
samples of the detection model are mined by the
adversarial attack model based on reinforcement
learning. Secondly, the detection model and the
adversarial model are alternately trained. After each
round, the newly-excavated adversarial samples are
marked as a malicious sample and are used to retrain
the detection model. Experimental results show that the
proposed RLXSS model can successfully mine adversarial
samples that escape black-box and white-box detection
and retain aggressive features. What is more, by
alternately training the detection model and the
confrontation attack model, the escape rate of the
detection model is continuously reduced, which
indicates that the model can improve the ability of the
detection model to defend against attacks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Cybersecurity.",
}
@Article{Cremer:2019:AII,
author = "Stefan Cremer and Claudia Loebbecke",
title = "Artificial Intelligence Imagery Analysis Fostering Big
Data Analytics",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "8",
pages = "178",
day = "15",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11080178",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/8/178",
abstract = "In an era of accelerating digitization and advanced
big data analytics, harnessing quality data and
insights will enable innovative research methods and
management approaches. Among others, Artificial
Intelligence Imagery Analysis has recently emerged as a
new method for analyzing the content of large amounts
of pictorial data. In this paper, we provide background
information and outline the application of Artificial
Intelligence Imagery Analysis for analyzing the content
of large amounts of pictorial data. We suggest that
Artificial Intelligence Imagery Analysis constitutes a
profound improvement over previous methods that have
mostly relied on manual work by humans. In this paper,
we discuss the applications of Artificial Intelligence
Imagery Analysis for research and practice and provide
an example of its use for research. In the case study,
we employed Artificial Intelligence Imagery Analysis
for decomposing and assessing thumbnail images in the
context of marketing and media research and show how
properly assessed and designed thumbnail images promote
the consumption of online videos. We conclude the paper
with a discussion on the potential of Artificial
Intelligence Imagery Analysis for research and practice
across disciplines.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Big Data Analytics and Artificial
Intelligence.",
}
@Article{Kirova:2019:IMV,
author = "Veronika Kirova and Kirill Karpov and Eduard Siemens
and Irina Zander and Oksana Vasylenko and Dmitry Kachan
and Sergii Maksymov",
title = "Impact of Modern Virtualization Methods on Timing
Precision and Performance of High-Speed Applications",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "8",
pages = "179",
day = "16",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11080179",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/11/8/179",
abstract = "The presented work is a result of extended research
and analysis on timing methods precision, their
efficiency in different virtual environments and the
impact of timing precision on the performance of
high-speed networks applications. We investigated how
timer hardware is shared among heavily CPU- and
I/O-bound tasks on a virtualized OS as well as on bare
OS. By replacing the invoked timing methods within a
well-known application for estimation of available path
bandwidth, we provide the analysis of their impact on
estimation accuracy. We show that timer overhead and
precision are crucial for high-performance network
applications, and low-precision timing methods usage,
e.g., the delays and overheads issued by virtualization
result in the degradation of the virtual environment.
Furthermore, in this paper, we provide confirmation
that, by using the methods we intentionally developed
for both precise timing operations and AvB estimation,
it is possible to overcome the inefficiency of standard
time-related operations and overhead that comes with
the virtualization. The impacts of negative
virtualization factors were investigated in five
different environments to define the most optimal
virtual environment for high-speed network
applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Network Virtualization and Edge/Fog
Computing.",
}
@Article{Liao:2019:CSA,
author = "Fei Liao and Liangli Ma and Jingjing Pei and Linshan
Tan",
title = "Combined Self-Attention Mechanism for {Chinese} Named
Entity Recognition in Military",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "8",
pages = "180",
day = "18",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11080180",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/8/180",
abstract = "Military named entity recognition (MNER) is one of the
key technologies in military information extraction.
Traditional methods for the MNER task rely on
cumbersome feature engineering and specialized domain
knowledge. In order to solve this problem, we propose a
method employing a bidirectional long short-term memory
(BiLSTM) neural network with a self-attention mechanism
to identify the military entities automatically. We
obtain distributed vector representations of the
military corpus by unsupervised learning and the BiLSTM
model combined with the self-attention mechanism is
adopted to capture contextual information fully carried
by the character vector sequence. The experimental
results show that the self-attention mechanism can
improve effectively the performance of MNER task. The
F-score of the military documents and network military
texts identification was 90.15\% and 89.34\%,
respectively, which was better than other models.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Network Virtualization and Edge/Fog
Computing.",
}
@Article{Tang:2019:NTC,
author = "Lujie Tang and Bing Tang and Linyao Kang and Li
Zhang",
title = "A Novel Task Caching and Migration Strategy in
Multi-Access Edge Computing Based on the Genetic
Algorithm",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "8",
pages = "181",
day = "20",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11080181",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/8/181",
abstract = "Multi-access edge computing (MEC) brings
high-bandwidth and low-latency access to applications
distributed at the edge of the network. Data
transmission and exchange become faster, and the
overhead of the task migration between mobile devices
and edge cloud becomes smaller. In this paper, we adopt
the fine-grained task migration model. At the same
time, in order to further reduce the delay and energy
consumption of task execution, the concept of the task
cache is proposed, which involves caching the completed
tasks and related data on the edge cloud. Then, we
consider the limitations of the edge cloud cache
capacity to study the task caching strategy and
fine-grained task migration strategy on the edge cloud
using the genetic algorithm (GA). Thus, we obtained the
optimal mobile device task migration strategy,
satisfying minimum energy consumption and the optimal
cache on the edge cloud. The simulation results showed
that the task caching strategy based on fine-grained
migration can greatly reduce the energy consumption of
mobile devices in the MEC environment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Network Virtualization and Edge/Fog
Computing.",
}
@Article{Sheridan:2019:OBR,
author = "Paul Sheridan and Mikael Onsj{\"o} and Claudia Becerra
and Sergio Jimenez and George Due{\~n}as",
title = "An Ontology-Based Recommender System with an
Application to the {Star Trek} Television Franchise",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "182",
day = "22",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090182",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/9/182",
abstract = "Collaborative filtering based recommender systems have
proven to be extremely successful in settings where
user preference data on items is abundant. However,
collaborative filtering algorithms are hindered by
their weakness against the item cold-start problem and
general lack of interpretability. Ontology-based
recommender systems exploit hierarchical organizations
of users and items to enhance browsing, recommendation,
and profile construction. While ontology-based
approaches address the shortcomings of their
collaborative filtering counterparts, ontological
organizations of items can be difficult to obtain for
items that mostly belong to the same category (e.g.,
television series episodes). In this paper, we present
an ontology-based recommender system that integrates
the knowledge represented in a large ontology of
literary themes to produce fiction content
recommendations. The main novelty of this work is an
ontology-based method for computing similarities
between items and its integration with the classical
Item-KNN (K-nearest neighbors) algorithm. As a study
case, we evaluated the proposed method against other
approaches by performing the classical rating
prediction task on a collection of Star Trek television
series episodes in an item cold-start scenario. This
transverse evaluation provides insights into the
utility of different information resources and methods
for the initial stages of recommender system
development. We found our proposed method to be a
convenient alternative to collaborative filtering
approaches for collections of mostly similar items,
particularly when other content-based approaches are
not applicable or otherwise unavailable. Aside from the
new methods, this paper contributes a testbed for
future research and an online framework to
collaboratively extend the ontology of literary themes
to cover other narrative content.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue New Perspectives on Semantic Web
Technologies and Applications.",
}
@Article{Gunleifsen:2019:PCD,
author = "H{\aa}kon Gunleifsen and Thomas Kemmerich and
Vasileios Gkioulos",
title = "A Proof-of-Concept Demonstration of Isolated and
Encrypted Service Function Chains",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "183",
day = "24",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090183",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/9/183",
abstract = "Contemporary Service Function Chaining (SFC), and the
requirements arising from privacy concerns, call for
the increasing integration of security features such as
encryption and isolation across Network Function
Virtualisation (NFV) domains. Therefore, suitable
adaptations of automation and encryption concepts for
the development of interconnected data centre
infrastructures are essential. Nevertheless, packet
isolation constraints related to the current NFV
infrastructure and SFC protocols, render current NFV
standards insecure. Accordingly, the goal of our work
was an experimental demonstration of a new SFC packet
forwarding standard that enables contemporary data
centres to overcome these constraints. This article
presents a comprehensive view of the developed
architecture, focusing on the elements that constitute
a new forwarding standard of encrypted SFC packets.
Through a Proof-of-Concept demonstration, we present
our closing experimental results of how the
architecture fulfills the requirements defined in our
use case.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Network Virtualization and Edge/Fog
Computing.",
}
@Article{Zhang:2019:MEE,
author = "Wenming Zhang and Yiwen Zhang and Qilin Wu and Kai
Peng",
title = "Mobility-Enabled Edge Server Selection for Multi-User
Composite Services",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "184",
day = "25",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090184",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/9/184",
abstract = "In mobile edge computing, a set of edge servers is
geographically deployed near the mobile users such that
accessible computing capacities and services can be
provided to users with low latency. Due to user's
mobility, one fundamental and critical problem in
mobile edge computing is how to select edge servers for
many mobile users so that the total waiting time is
minimized. In this paper, we propose a multi-user
waiting time computation model about composite services
and show the resource contention of the edge server
among mobile users. Then, we introduce a novel and
optimal Multi-user Edge server Selection method based
on Particle swarm optimization (MESP) in mobile edge
computing, which selects edge servers for mobile uses
in advance within polynomial time. Extensive
simulations on a real-world data-trace show that the
MESP algorithm can effectively reduce the total waiting
time compared with traditional approaches.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Network Virtualization and Edge/Fog
Computing.",
}
@Article{Gao:2019:IMN,
author = "Ming Gao and Qifeng Xiao and Shaochun Wu and Kun
Deng",
title = "An Improved Method for Named Entity Recognition and
Its Application to {CEMR}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "185",
day = "26",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090185",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/9/185",
abstract = "Named Entity Recognition (NER) on Clinical Electronic
Medical Records (CEMR) is a fundamental step in
extracting disease knowledge by identifying specific
entity terms such as diseases, symptoms, etc. However,
the state-of-the-art NER methods based on Long
Short-Term Memory (LSTM) fail to exploit GPU
parallelism fully under the massive medical records.
Although a novel NER method based on Iterated Dilated
CNNs (ID-CNNs) can accelerate network computing, it
tends to ignore the word-order feature and semantic
information of the current word. In order to enhance
the performance of ID-CNNs-based models on NER tasks,
an attention-based ID-CNNs-CRF model, which combines
the word-order feature and local context, is proposed.
Firstly, position embedding is utilized to fuse
word-order information. Secondly, the ID-CNNs
architecture is used to extract global semantic
information rapidly. Simultaneously, the attention
mechanism is employed to pay attention to the local
context. Finally, we apply the CRF to obtain the
optimal tag sequence. Experiments conducted on two CEMR
datasets show that our model outperforms traditional
ones. The F1-scores of 94.55\% and 91.17\% are obtained
respectively on these two datasets, and both are better
than LSTM-based models.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Big Data and Augmented Intelligence.",
}
@Article{Orogun:2019:SCS,
author = "Adebola Orogun and Oluwaseun Fadeyi and Ondrej
Krejcar",
title = "Sustainable Communication Systems: a Graph-Labeling
Approach for Cellular Frequency Allocation in
Densely-Populated Areas",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "186",
day = "26",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090186",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/9/186",
abstract = "The need for smart and sustainable communication
systems has led to the development of mobile
communication networks. In turn, the vast
functionalities of the global system of mobile
communication (GSM) have resulted in a growing number
of subscribers. As the number of users increases, the
need for efficient and effective planning of the
``limited'' frequency spectrum of the GSM is
inevitable, particularly in densely-populated areas. As
such, there are ongoing discussions about frequency
(channel) allocation methods to resolve the challenges
of channel allocation, which is a complete NP
(Nondeterministic Polynomial time) problem. In this
paper, we propose an algorithm for channel allocation
which takes into account soft constraints (co-channel
interference and adjacent channel interference). By
using the Manhattan distance concept, this study shows
that the formulation of the algorithm is correct and in
line with results in the literature. Hence, the
Manhattan distance concept may be useful in other
scheduling and optimization problems. Furthermore, this
unique concept makes it possible to develop a more
sustainable telecommunication system with ease of
connectivity among users, even when several subscribers
are on a common frequency.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Smart Solutions in Development of Smart
Applications and Systems with Aspect of Usefullness and
Sustainability.",
}
@Article{Wu:2019:RSS,
author = "Zhijun Wu and Shengyan Zhou and Liang Liu and Jin
Lei",
title = "Research on {SWIM} Services Dynamic Migration Method",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "187",
day = "27",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090187",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/9/187",
abstract = "Air traffic management (ATM) plays an important role
in maintaining and promoting air traffic safety,
maintaining air traffic order and ensuring smooth air
traffic. As the core of air traffic management, it is
essential to ensure the safe and stable operation of
system-wide information management (SWIM). Facing the
complex and ever-changing network environment, a SWIM
services dynamic migration method is proposed in this
paper. This method combines SWIM core services to
select destination nodes and migrate services. The
experiment proves that the method can hide the service
node while ensuring service continuity and increase the
difficulty of malicious detection. By comparing with
others, this method is more suitable for SWIM in terms
of invulnerability. The throughput and delay
performance of the method can meet the needs of SWIM.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Information and
Communication Systems.",
}
@Article{Karyotakis:2019:SPS,
author = "Minos-Athanasios Karyotakis and Evangelos Lamprou and
Matina Kiourexidou and Nikos Antonopoulos",
title = "{SEO} Practices: a Study about the Way News {Websites}
Allow the Users to Comment on Their News Articles",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "188",
day = "30",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090188",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/9/188",
abstract = "In the current media world, there is a huge debate
about the importance of the visibility of a news
website in order to secure its existence. Thus, search
engine optimization (SEO) practices have emerged in the
news media systems around the world. This study aimed
to expand the current literature about the SEO
practices by focusing on examining, via the walkthrough
method, the ways that news companies allow the users to
comment on their online news articles. The comments on
the news websites are related to the notions of social
influence, information diffusion, and play an essential
role as a SEO practice, for instance, by providing
content and engagement. The examined sample was
collected by the most visited news websites' rankings
of alexa.com for a global scale and for the countries
Greece and Cyprus. The findings reveal that the news
websites throughout the globe use similar features and
ways to support the comments of the users. In the
meantime, though, a high number of the news websites
did not allow the users to use their social media
accounts in order to comment the provided news
articles, or provided multiple comment platforms. This
trend goes against the SEO practices. It is believed
that this finding is associated with the difficulty of
the news organizations to regulate and protect
themselves by the users' comments that promote, in some
case harmful rhetoric and polarization.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Search Engine Optimization.",
}
@Article{Parada:2019:RBE,
author = "Ra{\'u}l Parada and Alfonso Palaz{\'o}n and Carlos
Monzo and Joan Meli{\`a}-Segu{\'\i}",
title = "{RFID} Based Embedded System for Sustainable Food
Management in an {IoT} Network Paradigm",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "189",
day = "01",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090189",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/9/189",
abstract = "A third of the food produced in the world ends up in
the rubbish, enough to put an end to world hunger. On
the other hand, society is increasingly concerned to
bring healthy eating habits. A RFID (radio frequency
identification) food management system is designed to
palliate the previously described issues in an Internet
of Things (IoT) network paradigm. It consists of RFID
readers placed on a user's kitchen furniture, which
automatically reads food information. There is no need
for direct sight between reader and tag, as it occurs
through the barcode technology. As a complement, a
multi-platform web application is developed, allowing
its users to check the date of food expiration and
other detailed information. The application notifies
the user when a product is about to expire. It also
offers recipes that might be prepared with available
foods, thus preventing them from being wasted. The
recipes are accompanied by their nutritional
information, so that the user can exhaustively monitor
what he/she eats. This embedded system may provide
economic benefits to the manufacturer, since it allows
supermarkets to pay for displaying their products
advertised through the application. After system
deployment, design conclusions are shown, and future
improvement points are indicated.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue The Internet of Things for Smart
Environments.",
}
@Article{Jamal:2019:DLB,
author = "Nasir Jamal and Chen Xianqiao and Hamza Aldabbas",
title = "Deep Learning-Based Sentimental Analysis for
Large-Scale Imbalanced {Twitter} Data",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "190",
day = "02",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090190",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/9/190",
abstract = "Emotions detection in social media is very effective
to measure the mood of people about a specific topic,
news, or product. It has a wide range of applications,
including identifying psychological conditions such as
anxiety or depression in users. However, it is a
challenging task to distinguish useful emotions'
features from a large corpus of text because emotions
are subjective, with limited fuzzy boundaries that may
be expressed in different terminologies and
perceptions. To tackle this issue, this paper presents
a hybrid approach of deep learning based on TensorFlow
with Keras for emotions detection on a large scale of
imbalanced tweets' data. First, preprocessing steps are
used to get useful features from raw tweets without
noisy data. Second, the entropy weighting method is
used to compute the importance of each feature. Third,
class balancer is applied to balance each class.
Fourth, Principal Component Analysis (PCA) is applied
to transform high correlated features into normalized
forms. Finally, the TensorFlow based deep learning with
Keras algorithm is proposed to predict high-quality
features for emotions classification. The proposed
methodology is analyzed on a dataset of 1,600,000
tweets collected from the website \‘kaggle'.
Comparison is made of the proposed approach with other
state of the art techniques on different training
ratios. It is proved that the proposed approach
outperformed among other techniques.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Social Network and Artificial
Intelligence.",
}
@Article{Fantinelli:2019:SNS,
author = "Stefania Fantinelli and Michela Cortini",
title = "Social Network Services Management and Risk of
Doocing. {Comment} on {Kim, S.; Park, H.; Choi, M. J.
``Negative Impact of Social Network Services Based on
Stressor--Stress-Outcome: The Role of Experience of
Privacy Violations. Future Internet 2019, {\bf 11},
137''}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "191",
day = "04",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090191",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
note = "See \cite{Kim:2019:NIS}.",
URL = "https://www.mdpi.com/1999-5903/11/9/191",
abstract = "In light of the recent work by Kim and colleagues
about Social Network Service (SNS), examining the
individual and SNS characteristics as predictors of SNS
fatigue, we hypothesize to enlarge their model to the
job context. SNS is a relevant issue in occupational
life as employers use it to have a deeper knowledge of
their employees and as a tool of corporate
communication. Employees can use SNS as a social
platform and as a way to express discontent. In this
latter case, the organization can implement a
disciplinary procedure toward employees, known as
doocing. The perception of privacy violation is
strictly related to the fear and awareness of doocing,
which in turn can predict SNS fatigue as well. So, it
could be worthwhile to extend Kim and colleagues' model
to the workplace with particular attention to the
doocing phenomenon.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
keywords = "doocing: a disciplinary procedure toward employees",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Kapadais:2019:FDS,
author = "Konstantinos Kapadais and Iraklis Varlamis and
Christos Sardianos and Konstantinos Tserpes",
title = "A Framework for the Detection of Search and Rescue
Patterns Using Shapelet Classification",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "192",
day = "04",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090192",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/9/192",
abstract = "The problem of unmanned supervision of maritime areas
has attracted the interest of researchers for the last
few years, mainly thanks to the advances in vessel
monitoring that the Automatic Identification System
(AIS) has brought. Several frameworks and algorithms
have been proposed for the management of vessel
trajectory data, which focus on data compression, data
clustering, classification and visualization, offering
a wide variety of solutions from vessel monitoring to
automatic detection of complex events. This work builds
on our previous work in the topic of automatic
detection of Search and Rescue (SAR) missions, by
developing and evaluating a methodology for classifying
the trajectories of vessels that possibly participate
in such missions. The proposed solution takes advantage
of a synthetic trajectory generator and a classifier
that combines a genetic algorithm (GENDIS) for the
extraction of informative shapelets from training data
and a transformation to the shapelets' feature space.
Using the generator and several SAR patterns that are
formally described in naval operations bibliography, it
generates a synthetic dataset that is used to train the
classifier. Evaluation on both synthetic and real data
has very promising results and helped us to identify
vessel SAR maneuvers without putting any effort into
manual annotation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Emerging Techniques of AI for Mobility
Analysis and Mining.",
}
@Article{Volk:2019:SIA,
author = "Florian V{\"o}lk and Konstantinos Liolis and Marius
Corici and Joe Cahill and Thomas Schlichter {Robert
T.Schwarz } and Eric Troudt and Andreas Knopp",
title = "Satellite Integration into {5G}: Accent on First
Over-The-Air Tests of an Edge Node Concept with
Integrated Satellite Backhaul",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "193",
day = "05",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090193",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/9/193",
abstract = "The 5G vision embraces a broad range of applications
including the connectivity in underserved and remote
areas. In particular, for these applications,
satellites are going to play a role in future 5G
networks to provide capacity on trains, vessels,
aircraft, and for base stations around the globe. In
this paper, a 5G edge node concept, developed and
evaluated with over-the-air tests using satellites in
the geostationary orbit, is presented. The article
covers a testbed demonstration study in Europe with a
large-scale testbed including satellites and the latest
standardization for the network architecture. The main
goal of this testbed is to evaluate how satellite
networks can be best integrated within the convergent
5G environment. The over-the-air tests for 5G satellite
integration in this article are based on a 3GPP Release
15 core network architecture.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Satellite Communications in 5G
Networks.",
}
@Article{Zeadally:2019:YBT,
author = "Sherali Zeadally and Farhan Siddiqui and Zubair Baig",
title = "25 Years of {Bluetooth} Technology",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "194",
day = "09",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090194",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/9/194",
abstract = "Bluetooth technology started off as a wireless,
short-range cable replacement technology but it has
undergone significant developments over the last two
decades. Bluetooth radios are currently embedded in
almost all computing devices including personal
computers, smart phones, smart watches, and even
micro-controllers. For many of us, Bluetooth is an
essential technology that we use every day. We provide
an insight into the history of Bluetooth and its
significant design developments over the last 25 years.
We also discuss related issues (including security) and
Bluetooth as a driving technology for the Internet of
Things (IoT). Finally, we also present recent research
results obtained with Bluetooth technology in various
application areas.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 10th Anniversary Feature Papers.",
}
@Article{Mackita:2019:ERM,
author = "Masky Mackita and Soo-Young Shin and Tae-Young Choe",
title = "{ERMOCTAVE}: a Risk Management Framework for {IT}
Systems Which Adopt Cloud Computing",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "195",
day = "10",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090195",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/9/195",
abstract = "Many companies are adapting cloud computing technology
because moving to the cloud has an array of benefits.
During decision-making, having processed for adopting
cloud computing, the importance of risk management is
progressively recognized. However, traditional risk
management methods cannot be applied directly to cloud
computing when data are transmitted and processed by
external providers. When they are directly applied,
risk management processes can fail by ignoring the
distributed nature of cloud computing and leaving
numerous risks unidentified. In order to fix this
backdrop, this paper introduces a new risk management
method, Enterprise Risk Management for Operationally
Critical Threat, Asset, and Vulnerability Evaluation
(ERMOCTAVE), which combines Enterprise Risk Management
and Operationally Critical Threat, Asset, and
Vulnerability Evaluation for mitigating risks that can
arise with cloud computing. ERMOCTAVE is composed of
two risk management methods by combining each component
with another processes for comprehensive perception of
risks. In order to explain ERMOCTAVE in detail, a case
study scenario is presented where an Internet seller
migrates some modules to Microsoft Azure cloud. The
functionality comparison with ENISA and Microsoft cloud
risk assessment shows that ERMOCTAVE has additional
features, such as key objectives and strategies,
critical assets, and risk measurement criteria.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Network Virtualization and Edge/Fog
Computing.",
}
@Article{Cividino:2019:EDU,
author = "Sirio Cividino and Gianluca Egidi and Ilaria Zambon
and Andrea Colantoni",
title = "Evaluating the Degree of Uncertainty of Research
Activities in {Industry 4.0}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "196",
day = "11",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090196",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/9/196",
abstract = "Research and development (R\&D) are always oriented
towards new discoveries, based on original terms or
hypotheses, and their concluding outcomes are often
uncertain. The present work focused on the degree of
uncertainty for R\&D activities. In fact, uncertainty
makes it difficult to quantify the time and resources
needed to achieve a final outcome, create a work plan
and budget, and finalize the resulting ``innovative''
products or services that could be transferred or
exchanged in a specific market. The present work
attempts to indicate the degree of uncertainty of the
research activities developed by a set of firms. The
method used aimed to quantify the five criteria defined
by the Manual of Frascati. Through the creation of an
uncertainty cloud, a cone of uncertainty was defined
following an approach based on project management. The
evaluation grid was characterized by the decomposition
of the different variables divided into quartiles,
which allowed for the detection of the evolution of the
project and each of its component. The ancillary
objective aim was to also observe the development
degree of these industries towards a framework of
Industry 4.0.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yuan:2019:MRC,
author = "Baoxi Yuan and Yang Li and Fan Jiang and Xiaojie Xu
and Yingxia Guo and Jianhua Zhao and Deyue Zhang and
Jianxin Guo and Xiaoli Shen",
title = "{MU R-CNN}: a Two-Dimensional Code Instance
Segmentation Network Based on Deep Learning",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "197",
day = "13",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090197",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/9/197",
abstract = "In the context of Industry 4.0, the most popular way
to identify and track objects is to add tags, and
currently most companies still use cheap quick response
(QR) tags, which can be positioned by computer vision
(CV) technology. In CV, instance segmentation (IS) can
detect the position of tags while also segmenting each
instance. Currently, the mask region-based
convolutional neural network (Mask R-CNN) method is
used to realize IS, but the completeness of the
instance mask cannot be guaranteed. Furthermore, due to
the rich texture of QR tags, low-quality images can
lower intersection-over-union (IoU) significantly,
disabling it from accurately measuring the completeness
of the instance mask. In order to optimize the IoU of
the instance mask, a QR tag IS method named the mask
UNet region-based convolutional neural network (MU
R-CNN) is proposed. We utilize the UNet branch to
reduce the impact of low image quality on IoU through
texture segmentation. The UNet branch does not depend
on the features of the Mask R-CNN branch so its
training process can be carried out independently. The
pre-trained optimal UNet model can ensure that the loss
of MU R-CNN is accurate from the beginning of the
end-to-end training. Experimental results show that the
proposed MU R-CNN is applicable to both high- and
low-quality images, and thus more suitable for Industry
4.0.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Manufacturing Systems and Internet of
Thing.",
}
@Article{Xu:2019:DGR,
author = "Haiyan Xu and Yanhui Ding and Jing Sun and Kun Zhao
and Yuanjian Chen",
title = "Dynamic Group Recommendation Based on the Attention
Mechanism",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "198",
day = "17",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090198",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/9/198",
abstract = "Group recommendation has attracted significant
research efforts for its importance in benefiting group
members. The purpose of group recommendation is to
provide recommendations to group users, such as
recommending a movie to several friends. Group
recommendation requires that the recommendation should
be as satisfactory as possible to each member of the
group. Due to the lack of weighting of users in
different items, group decision-making cannot be made
dynamically. Therefore, in this paper, a dynamic
recommendation method based on the attention mechanism
is proposed. Firstly, an improved density peak
clustering (DPC) algorithm is used to discover the
potential group; and then the attention mechanism is
adopted to learn the influence weight of each user. The
normalized discounted cumulative gain (NDCG) and hit
ratio (HR) are adopted to evaluate the validity of the
recommendation results. Experimental results on the
CAMRa2011 dataset show that our method is effective.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Amadeo:2019:EVA,
author = "Marica Amadeo and Claudia Campolo and Antonella
Molinaro and Jerome Harri and Christian Esteve
Rothenberg and Alexey Vinel",
title = "Enhancing the {3GPP V2X} Architecture with
Information-Centric Networking",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "199",
day = "18",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090199",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/9/199",
abstract = "Vehicle-to-everything (V2X) communications allow a
vehicle to interact with other vehicles and with
communication parties in its vicinity (e.g., road-side
units, pedestrian users, etc.) with the primary goal of
making the driving and traveling experience safer,
smarter and more comfortable. A wide set of
V2X-tailored specifications have been identified by the
Third Generation Partnership Project (3GPP) with focus
on the design of architecture enhancements and a
flexible air interface to ensure ultra-low latency,
highly reliable and high-throughput connectivity as the
ultimate aim. This paper discusses the potential of
leveraging Information-Centric Networking (ICN)
principles in the 3GPP architecture for V2X
communications. We consider Named Data Networking (NDN)
as reference ICN architecture and elaborate on the
specific design aspects, required changes and
enhancements in the 3GPP V2X architecture to enable
NDN-based data exchange as an alternative/complementary
solution to traditional IP networking, which barely
matches the dynamics of vehicular environments. Results
are provided to showcase the performance improvements
of the NDN-based proposal in disseminating content
requests over the cellular network against a
traditional networking solution.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 5G-V2X Communications and Networking for
Connected and Autonomous Vehicles.",
}
@Article{Jia:2019:IBC,
author = "Yun-Fei Jia and Shan Li and Renbiao Wu",
title = "Incorporating Background Checks with Sentiment
Analysis to Identify Violence Risky {Chinese}
Microblogs",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "200",
day = "19",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090200",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/9/200",
abstract = "Based on Web 2.0 technology, more and more people tend
to express their attitude or opinions on the Internet.
Radical ideas, rumors, terrorism, or violent contents
are also propagated on the Internet, causing several
incidents of social panic every year in China. In fact,
most of this content comprises joking or emotional
catharsis. To detect this with conventional techniques
usually incurs a large false alarm rate. To address
this problem, this paper introduces a technique that
combines sentiment analysis with background checks.
State-of-the-art sentiment analysis usually depends on
training datasets in a specific topic area.
Unfortunately, for some domains, such as violence risk
speech detection, there is no definitive training data.
In particular, topic-independent sentiment analysis of
short Chinese text has been rarely reported in the
literature. In this paper, the violence risk of the
Chinese microblogs is calculated from multiple
perspectives. First, a lexicon-based method is used to
retrieve violence-related microblogs, and then a
similarity-based method is used to extract sentiment
words. Semantic rules and emoticons are employed to
obtain the sentiment polarity and sentiment strength of
short texts. Second, the activity risk is calculated
based on the characteristics of part of speech (PoS)
sequence and by semantic rules, and then a threshold is
set to capture the key users. Finally, the risk is
confirmed by historical speeches and the opinions of
the friend-circle of the key users. The experimental
results show that the proposed approach outperforms the
support vector machine (SVM) method on a
topic-independent corpus and can effectively reduce the
false alarm rate.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Web Technologies for Sentiment
Analysis.",
}
@Article{Sun:2019:RMO,
author = "Wei Sun and Shiwei Wei and Huaping Guo and Hongbing
Liu",
title = "Role-Mining Optimization with Separation-of-Duty
Constraints and Security Detections for
Authorizations",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "201",
day = "19",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090201",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/9/201",
abstract = "Role-based access control (RBAC), which has been
regarded as one of the most popular access-control
mechanisms, is featured by the separation-of-duty
constraints, mutually exclusive constraints, and the
least-privileges principle. Role mining, a bottom-up
role-engineering technology, is an effective method to
migrate from a non-RBAC system to an RBAC system.
However, conventional role-mining approaches not only
do not consider the separation of duty constraints, but
also cannot ensure the security of a constructed RBAC
system when the corresponding mined results violate the
separation of a duty constraint and/or the
least-privileges principle. To solve these problems,
this paper proposes a novel method called role-mining
optimization with separation-of-duty constraints and
security detections for authorizations (RMO\_SODSDA),
which mainly includes two aspects. First, we present a
role-mining-optimization approach for satisfying the
separation of duty constraints, and we constructed
different variants of mutually exclusive constraints to
correctly implement the given separation of duty
constraints based on unconstrained role mining. Second,
to ensure the security of the constructed system and
evaluate authorization performance, we reduced the
authorization-query problem to a maximal-satisfiability
problem. The experiments validate the effectiveness and
efficiency of the proposed method.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Cybersecurity.",
}
@Article{Rovira:2019:RRC,
author = "Crist{\`o}fol Rovira and Llu{\'\i}s Codina and
Frederic Guerrero-Sol{\'e} and Carlos Lopezosa",
title = "Ranking by Relevance and Citation Counts, a
Comparative Study: {Google Scholar}, {Microsoft
Academic}, {WoS} and {Scopus}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "202",
day = "19",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090202",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/9/202",
abstract = "Search engine optimization (SEO) constitutes the set
of methods designed to increase the visibility of, and
the number of visits to, a web page by means of its
ranking on the search engine results pages. Recently,
SEO has also been applied to academic databases and
search engines, in a trend that is in constant growth.
This new approach, known as academic SEO (ASEO), has
generated a field of study with considerable future
growth potential due to the impact of open science. The
study reported here forms part of this new field of
analysis. The ranking of results is a key aspect in any
information system since it determines the way in which
these results are presented to the user. The aim of
this study is to analyze and compare the relevance
ranking algorithms employed by various academic
platforms to identify the importance of citations
received in their algorithms. Specifically, we analyze
two search engines and two bibliographic databases:
Google Scholar and Microsoft Academic, on the one hand,
and Web of Science and Scopus, on the other. A reverse
engineering methodology is employed based on the
statistical analysis of Spearman's correlation
coefficients. The results indicate that the ranking
algorithms used by Google Scholar and Microsoft are the
two that are most heavily influenced by citations
received. Indeed, citation counts are clearly the main
SEO factor in these academic search engines. An
unexpected finding is that, at certain points in time,
Web of Science (WoS) used citations received as a key
ranking factor, despite the fact that WoS support
documents claim this factor does not intervene.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Search Engine Optimization.",
}
@Article{Uchida:2019:VDT,
author = "Noriki Uchida and Goshi Sato and Yoshitaka Shibata",
title = "Vehicular Delay-Tolerant Networks with Image
Recognition-Based Adaptive Array Antenna for Winter
Road Surveillance in Local Areas",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "9",
pages = "203",
day = "19",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11090203",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:07 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/9/203",
abstract = "The rapid growth of the ITS (intelligent transport
system) development requires us to realize new kinds of
applications, such as the winter road surveillance
system. However, it is still necessary to consider the
network difficulty areas for LTE (long-term evolution)
or 3G transmissions when one visits sightseeing spots
such as ski resorts or spas in mountain areas.
Therefore, this paper proposes a winter road
surveillance system in the local area based on
vehicular delay-tolerant networks. The adaptive array
antenna controlled by image recognition with the Kalman
filter algorithm is proposed as well to the system in
order to realize higher delivery rates. The
implementations of the prototype system are presented
in this paper as well, and the effectivity of the radio
transmission in the prototype system is realized by
vehicular image recognition methods and the
asynchronous voltage controls for antenna elements for
the rapid directional controls of the radio
transmission. The experimental results showed that the
radio directional controls by the prototype system for
the target vehicle can proceed within one second, and
that the simulation with the GIS (geographic
information system) map pointed out the delivery rates
of the proposed method --- which are better than those
of the epidemic DTN (delay-tolerant networking) routing
by the nondirectional antenna. The experiments of the
proposed methods indicate a higher efficiency of the
data transmissions --- even in the mountain area.
Furthermore, future research subjects are discussed in
this paper.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Advanced Techniques for Internet, P2P
and Cloud Computing-selected papers from 3PGCIC-2018.",
}
@Article{Dogan:2019:NRD,
author = "Safak Dogan and Nasser Haddad and Erhan Ekmekcioglu
and Ahmet M. Kondoz",
title = "No-Reference Depth Map Quality Evaluation Model Based
on Depth Map Edge Confidence Measurement in Immersive
Video Applications",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "10",
pages = "204",
day = "20",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11100204",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/10/204",
abstract = "When it comes to evaluating perceptual quality of
digital media for overall quality of experience
assessment in immersive video applications, typically
two main approaches stand out: Subjective and objective
quality evaluation. On one hand, subjective quality
evaluation offers the best representation of perceived
video quality assessed by the real viewers. On the
other hand, it consumes a significant amount of time
and effort, due to the involvement of real users with
lengthy and laborious assessment procedures. Thus, it
is essential that an objective quality evaluation model
is developed. The speed-up advantage offered by an
objective quality evaluation model, which can predict
the quality of rendered virtual views based on the
depth maps used in the rendering process, allows for
faster quality assessments for immersive video
applications. This is particularly important given the
lack of a suitable reference or ground truth for
comparing the available depth maps, especially when
live content services are offered in those
applications. This paper presents a no-reference depth
map quality evaluation model based on a proposed depth
map edge confidence measurement technique to assist
with accurately estimating the quality of rendered
(virtual) views in immersive multi-view video content.
The model is applied for depth image-based rendering in
multi-view video format, providing comparable
evaluation results to those existing in the literature,
and often exceeding their performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Multimedia Quality of Experience (QoE):
Current Status and Future Direction.",
}
@Article{Song:2019:TPA,
author = "Xin Song and Yue Ni and Xiuwei Han and Lei Qin and Li
Dong",
title = "Time and Power Allocation for Energy Efficiency
Maximization in Wireless-Powered Full-Duplex Relay
Systems",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "10",
pages = "205",
day = "20",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11100205",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/10/205",
abstract = "In this paper, we propose an optimal time and power
allocation scheme in a wireless power supply
full-duplex (FD) relay system, where we consider the
number of relay antennas in the energy harvesting
stage. At the same time, the energy efficiency
optimization problem of the system is structured, where
optimization issues related to time allocation factors
and power allocation are established. For the FD
dual-antenna and the FD single-antenna energy
harvesting system, energy efficiency function is proven
to be a concave function over the time-switch factor,
and the optimal time-switching factor is theoretically
obtained using the Lambert function. Then, according to
the given value range of the optimal time switching
factor, the optimal power distribution scheme is
obtained by analyzing the derivative function of the
system energy efficiency and using the properties of
the Lambert function. The time-switching factor and
transmission power are optimally selected at the
wireless power supply FD relay. Results reveal that the
performance of energy efficiency of the dual-antenna
energy harvesting at the FD relay outperforms that of
the single-antenna. Moreover, our results demonstrate
that FD relay systems always substantially boost the
energy efficiency compared with half-duplex (HD) relay
systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Network Virtualization and Edge/Fog
Computing.",
}
@Article{Abdo:2019:ACR,
author = "Ahmad Abdo and Sadok Aouini and Bilal Riaz and Naim
Ben-Hamida and Claude D'Amours",
title = "Adaptive Coherent Receiver Settings for Optimum
Channel Spacing in Gridless Optical Networks",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "10",
pages = "206",
day = "25",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11100206",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/10/206",
abstract = "In this paper, we propose a novel circuit and system
to optimize the spacing between optical channels in
gridless (also called flexible-grid or elastic)
networking. The method will exploit the
beginning-of-life link margin by enabling the channel
to operate in super-Nyquist dense wavelength division
multiplexing mode. We present the work in the context
of software-defined networking and high-speed optical
flexible-rate transponders. The clock recovery scheme
allows the mitigation of jitter by decoupling the
contribution of high-jitter noise sources from the
clock recovery loop. The method and associated
algorithm are experimentally verified where a spectrum
gain of up to 2 GHz in spacing between two channels in
the Media Channel (MC) is obtained compared to
conventional clocking strategies. We showed that the
improvement is equivalent to increasing throughput, in
a data-center interconnect scenario, by up to 300
giga-bits per second per route.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kavallieratos:2019:TAS,
author = "Georgios Kavallieratos and Nabin Chowdhury and
Sokratis Katsikas and Vasileios Gkioulos and Stephen
Wolthusen",
title = "Threat Analysis for Smart Homes",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "10",
pages = "207",
day = "25",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11100207",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/10/207",
abstract = "The development and deployment of highly dynamic,
cyber+connected operational environments, such as smart
homes, smart cities, and smart transportation systems,
is increasing. The security analysis of such dynamic
environments necessitates the use of dynamic risk
assessment methodologies and the modeling of
dynamically changing states. In this paper, we focus on
the smart home environment, where the deployment of IoT
devices increase the attack surface. We examine
existing dynamic risk assessment methodologies, and by
leveraging a smart home reference architecture we
identify the security risks of a smart home's physical
and communication viewpoints, taking into consideration
also dynamic operational aspects. Further, we develop a
smart home network topology generator and a graph-based
attack model to study dependencies among dynamically
changing states and the propagation of a malware
infection.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Reliability of
IoT---Selected Papers from SecRIoT 2019.",
}
@Article{Yang:2019:JOP,
author = "Jie Yang and Ziyu Pan and Hengfei Xu and Han Hu",
title = "Joint Optimization of Pico-Base-Station Density and
Transmit Power for an Energy-Efficient Heterogeneous
Cellular Network",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "10",
pages = "208",
day = "27",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11100208",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/10/208",
abstract = "Heterogeneous cellular networks (HCNs) have emerged as
the primary solution for explosive data traffic.
However, an increase in the number of base stations
(BSs) inevitably leads to an increase in energy
consumption. Energy efficiency (EE) has become a focal
point in HCNs. In this paper, we apply tools from
stochastic geometry to investigate and optimize the
energy efficiency (EE) for a two-tier HCN. The average
achievable transmission rate and the total power
consumption of all the BSs in a two-tier HCN is
derived, and then the EE is formulated. In order to
maximize EE, a one-dimensional optimization algorithm
is used to optimize picocell BS density and transmit
power. Based on this, an alternating optimization
method aimed at maximizing EE is proposed to jointly
optimize transmit power and density of picocell BSs.
Simulation results validate the accuracy of the
theoretical analysis and demonstrate that the proposed
joint optimization method can obviously improve EE.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Energy-Aware Networking and Green
Internet.",
}
@Article{deOliveira:2019:PCN,
author = "Fab{\'\i}ola Martins Campos de Oliveira and Edson
Borin",
title = "Partitioning Convolutional Neural Networks to Maximize
the Inference Rate on Constrained {IoT} Devices",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "10",
pages = "209",
day = "29",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11100209",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/10/209",
abstract = "Billions of devices will compose the IoT system in the
next few years, generating a huge amount of data. We
can use fog computing to process these data,
considering that there is the possibility of
overloading the network towards the cloud. In this
context, deep learning can treat these data, but the
memory requirements of deep neural networks may prevent
them from executing on a single resource-constrained
device. Furthermore, their computational requirements
may yield an unfeasible execution time. In this work,
we propose Deep Neural Networks Partitioning for
Constrained IoT Devices, a new algorithm to partition
neural networks for efficient distributed execution.
Our algorithm can optimize the neural network inference
rate or the number of communications among devices.
Additionally, our algorithm accounts appropriately for
the shared parameters and biases of Convolutional
Neural Networks. We investigate the inference rate
maximization for the LeNet model in constrained setups.
We show that the partitionings offered by popular
machine learning frameworks such as TensorFlow or by
the general-purpose framework METIS may produce invalid
partitionings for very constrained setups. The results
show that our algorithm can partition LeNet for all the
proposed setups, yielding up to 38\% more inferences
per second than METIS.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Innovative Topologies and Algorithms for
Neural Networks.",
}
@Article{Donati:2019:ALA,
author = "Camillo Donati and Andrea Guazzini and Giorgio Gronchi
and Andrea Smorti",
title = "About {Linda} Again: How Narratives and Group
Reasoning Can Influence Conjunction Fallacy",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "10",
pages = "210",
day = "08",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11100210",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/10/210",
abstract = "Conjunction fallacy (together with other systematic
reasoning errors) is usually explained in terms of the
dual process theory of reasoning: Biases should be
ascribed to fast and automatic processes, whereas slow
and deliberative processes are responsible of producing
answers that are correct with respect of normative
criterion. The dual process theory is related to
Bruner's distinction between narrative and paradigmatic
thought: Both modes of thought can be characterized by
the two different processes of reasoning. In this
paper, we explore the role of Bruner's mode of thought
manipulating also the difference between group vs
individual reasoning. We observed that the narrative
strategy of response induces more wrong answers.
However, narrative-based strategies have higher
effectiveness in the case of group reasoning. Our
results suggest that narrative reasoning and group
reasoning may induce violations of the conjunction rule
when acceptable by the verisimilitude of the story.
Five models are also presented in order to predict
answer correctness and strategy of reasoning using a
text analysis software.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Latvakoski:2019:TCH,
author = "Juhani Latvakoski and Jouni Heikkinen",
title = "A Trustworthy Communication Hub for Cyber-Physical
Systems",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "10",
pages = "211",
day = "08",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11100211",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/10/211",
abstract = "The motivation for this research arises from the
challenges in the trustworthy communications related
operation of cyber-physical systems (CPS), especially
in the energy and mobility domains. The increasing
amount of distributed energy resources (DERs) of
prosumers and electric vehicles requires new ways for
CPS communications to enable information exchanges for
smart operation in peak consumption hours and balancing
power levels in the energy grids in order to lower the
energy cost. The huge number of mobile appliances and
the related service providers do not serve properly the
privacy of the owners, owing to the vertical silo type
of operating model in industries. As the results of
this research, we provide a trustworthy communication
hub for CPS (CPS hub) for solving the challenges
related to trustworthy communications between physical
resources owned by different stakeholders. The CPS hub
realizes the communication spaces concept, and enables
combined trust and communications processes when
dynamic resources owned by different stakeholders are
exchanging information. The evaluations showed that the
provided CPS hub enable information exchanges between
distributed energy resources of different stakeholders,
so that they can join the aggregation process for more
flexible and efficient resource usage in energy
markets. The CPS hub enable interaction between
heterogeneous physical devices of multiple stakeholders
to exchange information so that, for example,
authorities can see the situation in the emergency area
and, simultaneously, the policies of the owners can be
taken into concern. Despite limited evaluation
scenarios, it is shown that consideration of the
ownership issues in the trustworthy communication for
information exchanges between heterogeneous physical
resources (devices) is possible and feasible. Several
future research items, such as, for example,
scalability; real-time and streams based operation; as
well as consideration of the security, privacy, trust,
and safety challenges, were detected. However, the
evaluations showed that the constructed CPS hub
contribute a set of very essential technical enablers
for future smart CPS systems and create strong a basis
for such future research towards a future smart
society.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bocharova:2019:LDI,
author = "Irina Bocharova and Boris Kudryashov and Nikita Lyamin
and Erik Frick and Maben Rabi and Alexey Vinel",
title = "Low Delay Inter-Packet Coding in Vehicular Networks",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "10",
pages = "212",
day = "11",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11100212",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/10/212",
abstract = "In Cooperative Intelligent Transportation Systems
(C-ITSs), vehicles need to wirelessly connect with
Roadside units (RSUs) over limited durations when such
point-to-point connections are possible. One example of
such communications is the downloading of maps to the
C-ITS vehicles. Another example occurs in the testing
of C-ITS vehicles, where the tested vehicles upload
trajectory records to the roadside units. Because of
real-time requirements, and limited bandwidths, data
are sent as User Datagram Protocol (UDP) packets. We
propose an inter-packet error control coding scheme
that improves the recovery of data when some of these
packets are lost; we argue that the coding scheme has
to be one of convolutional coding. We measure
performance through the session averaged probability of
successfully delivering groups of packets. We analyze
two classes of convolution codes and propose a
low-complexity decoding procedure suitable for network
applications. We conclude that Reed--Solomon
convolutional codes perform better than Wyner--Ash
codes at the cost of higher complexity. We show this by
simulation on the memoryless binary erasure channel
(BEC) and channels with memory, and through simulations
of the IEEE 802.11p DSRC/ITS-G5 network at the C-ITS
test track AstaZero.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 5G-V2X Communications and Networking for
Connected and Autonomous Vehicles.",
}
@Article{Voulgaris:2019:BTI,
author = "Spyros Voulgaris and Nikos Fotiou and Vasilios A.
Siris and George C. Polyzos and Mikael Jaatinen and
Yannis Oikonomidis",
title = "Blockchain Technology for Intelligent Environments",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "10",
pages = "213",
day = "11",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11100213",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/10/213",
abstract = "In the last few years, we have been witnessing the
convergence of the physical with the digital world. The
Internet of Things (IoT) is progressing at a fast pace,
and IoT devices are becoming pervasive in our physical
environments, bringing the vision of Intelligent
Environments closer to reality. At the same time, the
newly-introduced blockchain technology is offering for
the first time ever cryptographically proven trust
based on a set of mutually untrusted nodes. Blockchain
technology thus has the potential to become a key
component of many IoT systems, offering them an
unprecedented level of accountability, transparency,
and reliability. This paper first lays out the
principles on which blockchain systems are operating,
along with descriptions of the most noteworthy
blockchain implementations. It then presents a number
of systems through which blockchains may interact with
external systems and third-party data sources. Finally,
it provides a survey of the state-of-the-art
blockchain-based systems targeting IoT applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Featured Reviews of Future Internet
Research.",
}
@Article{Li:2019:BTM,
author = "Xiaoyu Li and Changyin Sun and Fan Jiang",
title = "Beam Training for Millimeter-Wave Communication Based
on Tabu Table Enhanced {Rosenbrock} Algorithm",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "10",
pages = "214",
day = "12",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11100214",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/10/214",
abstract = "The codebook-based beamforming for millimeter-wave (mm
Wave) communication systems is usually used to
compensate the severe attenuation of the mm Wave
region. The beam training process based on
pre-specified beam codebooks is considered a global
optimization problem in 2-D planes formed by the
potential beam index. The Rosenbrock algorithm (RA) is
adopted to implement optimum beam searching whereas the
simulated annealing (SA) algorithm is used to solve the
problem of falling into the local optimum, due to the
unavailable gradient information of the objective
function. However, the RA implements rounding to the
integer which leads to the problem of repeated search
and beam space discontinuity caused by beam index will
impair the powerful local search ability. Thus, in this
paper, an enhanced RA based on tabu search and combined
with SA algorithm is proposed as an alternative
solution for beam search success rate. The proposed
algorithm reduces the search times by forbidding the
repeat search with tabu table and design of neighbor
region. Moreover, to prevent the search failure, the
search candidate index is defined to keep the local
search ability of the original algorithm and wrap
around of beam index is applied to maintain continuity
of the search direction. Experimental simulations show
that the proposed technique can improve the search
efficiency in terms of reduced steps and increase
search success rate during the beam training procedure
compared to existing techniques.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advancements in Future Networking
Technologies.",
}
@Article{Behan:2019:SNF,
author = "Miroslav Behan and Ondrej Krejcar and Thabit Sabbah
and Ali Selamat",
title = "Sensorial Network Framework Embedded in Ubiquitous
Mobile Devices",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "10",
pages = "215",
day = "14",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11100215",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/10/215",
abstract = "Today's digital society is interconnected and
networked, with modern smart devices ubiquitously built
into and embedded within smart environments and other
environments, where people (their users) typically
live. It is very important to mention that sensorial
awareness of an environment depends on one's current
location and equipment, as well as the equipment's
real-time capabilities. Personal sensorial information
is considered to be the key factor for progress in the
improvement of the productivity of everyday life and
creation of a smart surrounding environment. This paper
describes the design, implementation, and testing
process of a new sensorial framework based on the
current possibilities created by ubiquitous smart
mobile devices with sensors, which involves computing
power and battery power issues. The two parts of the
proposed framework have been designed, implemented, and
tested. The client part is represented by a front-end
mobile application, and the back-end part is
represented by a server-side application. The analysis
of the data, captured during the testing phase,
involves the analysis of the processing time, battery
consumption, and transmitted data amount. This analysis
reveals that Transmission Control Protocol (TCP) and
user datagram protocol (UDP) protocols have a
comparable performance, although TCP is preferable for
use in local networks. In comparison to other solutions
such as MobiSense or Feel the World framework, the
final solution of the proposed and developed sensorial
framework has two main capabilities, which are the
security support and social networking possibilities.
The advantage of the MobiSense platform is the
existence of several real-world applications, whereas
the proposed sensorial framework needs to be verified
in the massive context of many users in real time.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet of Things for Smart City
Applications.",
}
@Article{Erturk:2019:SLA,
author = "Mehmet Ali Ert{\"u}rk and Muhammed Ali Aydin and
Muhammet Talha B{\"u}y{\"u}kakkaslar and Hayrettin
Evirgen",
title = "A Survey on {LoRaWAN} Architecture, Protocol and
Technologies",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "10",
pages = "216",
day = "17",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11100216",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/10/216",
abstract = "Internet of Things (IoT) expansion led the market to
find alternative communication technologies since
existing protocols are insufficient in terms of
coverage, energy consumption to fit IoT needs. Low
Power Wide Area Networks (LPWAN) emerged as an
alternative cost-effective communication technology for
the IoT market. LoRaWAN is an open LPWAN standard
developed by LoRa Alliance and has key features i.e.,
low energy consumption, long-range communication,
builtin security, GPS-free positioning. In this paper,
we will introduce LoRaWAN technology, the state of art
studies in the literature and provide open
opportunities.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Condoluci:2019:VSL,
author = "Massimo Condoluci and Laurent Gallo and Laurent Mussot
and Apostolos Kousaridas and Panagiotis Spapis and
Maliheh Mahlouji and Toktam Mahmoodi",
title = "{5G V2X} System-Level Architecture of {5GCAR}
Project",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "10",
pages = "217",
day = "19",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11100217",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/10/217",
abstract = "One of the goals of the 5G Communication Automotive
Research and innovation (5GCAR) project has been to
evaluate and propose system architecture enhancements
aiming at supporting the strict requirements of
vehicle-to-everything (V2X) use cases. In this paper,
we provide an overview of 3GPP 5G system architecture,
which is used as a baseline architecture in the
project, and we present the main architectural
enhancements introduced by 5GCAR. The work of the
project focused on the following categories: (i)
end-to-end security, also including aspects of privacy;
(ii) network orchestration and management; (iii)
network procedures; (iv) edge computing enhancements;
and (v) multi-connectivity cooperation. The
enhancements introduced by 5GCAR to above-listed
categories are discussed in this paper, while a more
detailed analysis of some selected features is
presented.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 5G-V2X Communications and Networking for
Connected and Autonomous Vehicles.",
}
@Article{Kolsch:2019:SBP,
author = "Johannes K{\"o}lsch and Christopher Heinz and Axel
Ratzke and Christoph Grimm",
title = "Simulation-Based Performance Validation of Homomorphic
Encryption Algorithms in the {Internet of Things}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "10",
pages = "218",
day = "22",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11100218",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/10/218",
abstract = "IoT systems consist of Hardware/Software systems
(e.g., sensors) that are embedded in a physical world,
networked and that interact with complex software
platforms. The validation of such systems is a
challenge and currently mostly done by prototypes. This
paper presents the virtual environment for simulation,
emulation and validation of an IoT platform and its
semantic model in real life scenarios. It is based on a
decentralized, bottom up approach that offers
interoperability of IoT devices and the value-added
services they want to use across different domains. The
framework is demonstrated by a comprehensive case
study. The example consists of the complete IoT ``Smart
Energy'' use case with focus on data privacy by
homomorphic encryption. The performance of the network
is compared while using partially homomorphic
encryption, fully homomorphic encryption and no
encryption at all.As a major result, we found that our
framework is capable of simulating big IoT networks and
the overhead introduced by homomorphic encryption is
feasible for VICINITY.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Reliability of
IoT---Selected Papers from SecRIoT 2019.",
}
@Article{Kiptoo:2019:ATE,
author = "Mark Kipngetich Kiptoo and Oludamilare Bode Adewuyi
and Mohammed Elsayed Lotfy and Theophilus Amara and
Keifa Vamba Konneh and Tomonobu Senjyu",
title = "Assessing the Techno-Economic Benefits of Flexible
Demand Resources Scheduling for Renewable Energy-Based
Smart Microgrid Planning",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "10",
pages = "219",
day = "22",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11100219",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/10/219",
abstract = "The need for innovative pathways for future
zero-emission and sustainable power development has
recently accelerated the uptake of variable renewable
energy resources (VREs). However, integration of VREs
such as photovoltaic and wind generators requires the
right approaches to design and operational planning
towards coping with the fluctuating outputs. This paper
investigates the technical and economic prospects of
scheduling flexible demand resources (FDRs) in optimal
configuration planning of VRE-based microgrids. The
proposed demand-side management (DSM) strategy
considers short-term power generation forecast to
efficiently schedule the FDRs ahead of time in order to
minimize the gap between generation and load demand.
The objective is to determine the optimal size of the
battery energy storage, photovoltaic and wind systems
at minimum total investment costs. Two simulation
scenarios, without and with the consideration of DSM,
were investigated. The random forest algorithm
implemented on scikit-learn python environment is
utilized for short-term power prediction, and mixed
integer linear programming (MILP) on MATLAB \® is
used for optimum configuration optimization. From the
simulation results obtained here, the application of
FDR scheduling resulted in a significant cost saving of
investment costs. Moreover, the proposed approach
demonstrated the effectiveness of the FDR in minimizing
the mismatch between the generation and load demand.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Global Trends and Advances Towards a
Smarter Grid and Smart Cities.",
}
@Article{Morrow:2019:BTI,
author = "Monique J. Morrow and Mehran Zarrebini",
title = "Blockchain and the Tokenization of the Individual:
Societal Implications",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "10",
pages = "220",
day = "22",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11100220",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/10/220",
abstract = "We are living in a world where the very systems upon
which trust is based are being challenged by new and
exciting paradigm shifts. Centralization whether in the
form of governments, financial institutions,
enterprises and organizations is simply being
challenged because of the lack of trust associated with
data governance often experienced in the form of data
breaches or simply a monetization of our data without
our permission and/or incentives to participate in this
emerging decentralization of structures. We see this
trust deficit challenging the very institutions we have
depended on including but not limited to financial
institutions, private enterprises or government bodies.
A new ``social contract'' is required as we
continuously evolve into more decentralized and
self-governing (or semi self-governing) entities. We
will see more development in digital sovereignty with
the caveat that a governance model will need to be
defined. This position paper will present evidence that
supports the premise that blockchain and individual
tokenization could provide a new social contract.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Blockchain: Current Challenges and
Future Prospects/Applications.",
}
@Article{Ding:2019:ILL,
author = "Zhengyang Ding and Weiwei Miao and Mingxuan Zhang and
Wei Li and Rui Liu and Jun Zou and Chen Xu",
title = "Integration of {LTE 230} and {LTE 1800} in Power
Wireless Private Networks",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "221",
day = "23",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110221",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/221",
abstract = "Power wireless private networks (PWPNs) have been
highly developed in China in recent years. They provide
a basis for the energy Internet of Things, which
enables the exchange of energy information between
devices. Although the power wireless private network is
an imitation of the public cellular network, a number
of special challenges remain in power private networks.
Due to the lack of general standards for PWPNs at the
beginning of deployment, there are now two independent
PWPN systems in China: long-term evolution (LTE) 230
and LTE 1800. Each has its own core and access networks
with independent hardware. In this paper, we propose a
high-level design of multinetwork integration to allow
LTE 230 and LTE 1800 to coexist. For core network
integration, we propose a protocol controller to select
the active protocol according to the user's mode
selection, since both LTE 230 and LTE 1800 evolved from
the standard LTE system. For access network
integration, we propose a multinetwork integration
controller to help the device access the optimal cell.
The simulation results show that the integrated system
can retain the advantages of these two independent
systems in terms of both capacity and coverage.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Information and
Communication Systems.",
}
@Article{Amadeo:2019:FCI,
author = "Marica Amadeo and Giuseppe Ruggeri and Claudia Campolo
and Antonella Molinaro and Valeria Loscr{\'\i} and
Carlos T. Calafate",
title = "Fog Computing in {IoT} Smart Environments via Named
Data Networking: a Study on Service Orchestration
Mechanisms",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "222",
day = "24",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110222",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/222",
abstract = "By offering low-latency and context-aware services,
fog computing will have a peculiar role in the
deployment of Internet of Things (IoT) applications for
smart environments. Unlike the conventional remote
cloud, for which consolidated architectures and
deployment options exist, many design and
implementation aspects remain open when considering the
latest fog computing paradigm. In this paper, we focus
on the problems of dynamically discovering the
processing and storage resources distributed among fog
nodes and, accordingly, orchestrating them for the
provisioning of IoT services for smart environments. In
particular, we show how these functionalities can be
effectively supported by the revolutionary Named Data
Networking (NDN) paradigm. Originally conceived to
support named content delivery, NDN can be extended to
request and provide named computation services, with
NDN nodes acting as both content routers and in-network
service executors. To substantiate our analysis, we
present an NDN fog computing framework with focus on a
smart campus scenario, where the execution of IoT
services is dynamically orchestrated and performed by
NDN nodes in a distributed fashion. A simulation
campaign in ndnSIM, the reference network simulator of
the NDN research community, is also presented to assess
the performance of our proposal against
state-of-the-art solutions. Results confirm the
superiority of the proposal in terms of service
provisioning time, paid at the expenses of a slightly
higher amount of traffic exchanged among fog nodes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue The Internet of Things for Smart
Environments.",
}
@Article{Takano:2019:OSO,
author = "Hirotaka Takano and Ryota Goto and Thin Zar Soe and
Nguyen Duc Tuyen and Hiroshi Asano",
title = "Operation Scheduling Optimization for Microgrids
Considering Coordination of Their Components",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "223",
day = "24",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110223",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/223",
abstract = "Operation scheduling is one of the most practical
optimization problems to efficiently manage the
electric power supply and demand in microgrids.
Although various microgrid-related techniques have been
developed, there has been no established solution to
the problem until now. This is because the formulated
problem becomes a complicated mixed-integer programming
problem having multiple optimization variables. The
authors present a framework for this problem and its
effective solution to obtain an operation schedule of
the microgrid components considering their
coordination. In the framework, trading electricity
with traditional main power grids is included in the
optimization target, and uncertainty originating from
variable renewable energy sources is considered. In the
solution, the formulated problem is reformulated to
reduce the dimensions of its solution space, and, as a
result, a combined algorithm of binary particle swarm
optimization and quadratic programming is applicable.
Through numerical simulations and discussions of their
results, the validity of the authors' proposal is
verified.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Global Trends and Advances Towards a
Smarter Grid and Smart Cities.",
}
@Article{Hao:2019:IVD,
author = "Ruohong Hao and Bingjia Shao and Rong Ma",
title = "Impacts of Video Display on Purchase Intention for
Digital and Home Appliance Products-Empirical Study
from {China}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "224",
day = "24",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110224",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/224",
abstract = "Rapid online trading expansion and the bloom of
internet technologies has raised the importance of
effective product video presentations for online
retailers. This article developed a model for the
impacts of video presentations on purchase intention
for digital and home appliance products. Four group
experiments were designed, and empirical tests were
performed. This research found that presenting videos
on how to use digital and home appliance products
increased purchase intention by raising the information
gained by customers. Meanwhile, video tutorial
information had insignificant effects related to the
knowledge and experience of customers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chen:2019:FBB,
author = "Yuling Chen and Jinyi Guo and Changlou Li and Wei
Ren",
title = "{FaDe}: a Blockchain-Based Fair Data Exchange Scheme
for Big Data Sharing",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "225",
day = "24",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110225",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/225",
abstract = "In the big data era, data are envisioned as critical
resources with various values, e.g., business
intelligence, management efficiency, and financial
evaluations. Data sharing is always mandatory for value
exchanges and profit promotion. Currently, certain big
data markets have been created for facilitating data
dissemination and coordinating data transaction, but we
have to assume that such centralized management of data
sharing must be trustworthy for data privacy and
sharing fairness, which very likely imposes limitations
such as joining admission, sharing efficiency, and
extra costly commissions. To avoid these weaknesses, in
this paper, we propose a blockchain-based fair data
exchange scheme, called FaDe. FaDe can enable
de-centralized data sharing in an autonomous manner,
especially guaranteeing trade fairness, sharing
efficiency, data privacy, and exchanging automation. A
fairness protocol based on bit commitment is proposed.
An algorithm based on blockchain script architecture
for a smart contract, e.g., by a bitcoin virtual
machine, is also proposed and implemented. Extensive
analysis justifies that the proposed scheme can
guarantee data exchanging without a trusted third party
fairly, efficiently, and automatically.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Blockchain: Current Challenges and
Future Prospects/Applications.",
}
@Article{Spathoulas:2019:CBB,
author = "Georgios Spathoulas and Nikolaos Giachoudis and
Georgios-Paraskevas Damiris and Georgios Theodoridis",
title = "Collaborative Blockchain-Based Detection of
Distributed Denial of Service Attacks Based on
{Internet of Things} Botnets",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "226",
day = "25",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110226",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/226",
abstract = "Internet of Things is one of the most significant
latest developments in computer science. It is common
for modern computing infrastructures to partially
consist of numerous low power devices that are
characterized by high diversity in both hardware and
software. Existing security models, approaches and
solutions are not able to sufficiently protect such
systems. In this paper we propose the use of
lightweight agents installed at multiple internet of
things (IoT) installations (e.g., smart-homes), in
order to collaboratively detect distributed denial of
service (DDoS) attacks conducted by the use of IoT
devices botnets. Specifically, agents exchange outbound
traffic information in order to identify possible
victims of DDoS attacks. This information exchange is
governed by a blockchain smart contract, that ensures
the integrity of both the procedure and the
information. A simulation of the operation of the
proposed methodology has been conducted in order to
evaluate both its detection efficiency and its
resilience against malicious agents that aim to falsify
results.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Reliability of
IoT---Selected Papers from SecRIoT 2019.",
}
@Article{Kamal:2019:IBS,
author = "Miraal Kamal and Manal Atif and Hafsa Mujahid and
Tamer Shanableh and A. R. Al-Ali and Ahmad {Al
Nabulsi}",
title = "{IoT} Based Smart City Bus Stops",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "227",
day = "26",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110227",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/227",
abstract = "The advent of smart sensors, single system-on-chip
computing devices, Internet of Things (IoT), and cloud
computing is facilitating the design and development of
smart devices and services. These include smart meters,
smart street lightings, smart gas stations, smart
parking lots, and smart bus stops. Countries in the
Gulf region have hot and humid weather around 6--7
months of the year, which might lead to uncomfortable
conditions for public commuters. Transportation
authorities have made some major enhancements to
existing bus stops by installing air-conditioning
units, but without any remote monitoring and control
features. This paper proposes a smart IoT-based
environmentally - friendly enhanced design for existing
bus stop services in the United Arab Emirates. The
objective of the proposed design was to optimize energy
consumption through estimating bus stop occupancy,
remotely monitor air conditioning and lights,
automatically report utility breakdowns, and measure
the air pollution around the area. In order to
accomplish this, bus stops will be equipped with a
WiFi-Based standalone microcontroller connected to
sensors and actuators. The microcontroller transmits
the sensor readings to a real-time database hosted in
the cloud and incorporates a mobile app that notifies
operators or maintenance personnel in the case of
abnormal readings or breakdowns. The mobile app
encompasses a map interface enabling operators to
remotely monitor the conditions of bus stops such as
the temperature, humidity, estimated occupancy, and air
pollution levels. In addition to presenting the
system's architecture and detailed design, a system
prototype is built to test and validate the proposed
solution.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Global Trends and Advances Towards a
Smarter Grid and Smart Cities.",
}
@Article{Pau:2019:SIN,
author = "Giovanni Pau and Alessandro Severino and Antonino
Canale",
title = "Special Issue {``New} Perspectives in Intelligent
Transportation Systems and Mobile Communications
towards a Smart Cities Context''",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "228",
day = "28",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110228",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/228",
abstract = "Intelligent transportation solutions and smart
information and communication technologies will be the
core of future smart cities. For this purpose, these
topics have captivated noteworthy interest in the
investigation and construction of cleverer
communication protocols or the application of
artificial intelligence in the connection of in-vehicle
devices by wireless networks, and in in-vehicle
services for autonomous driving using high-precision
positioning and sensing systems. This special issue has
focused on the collection of high-quality papers aimed
at solving open technical problems and challenges
typical of mobile communications for Intelligent
Transportation Systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue New Perspectives in Intelligent
Transportation Systems and Mobile Communications
towards a Smart Cities Context.",
}
@Article{Alharbi:2019:PRC,
author = "Adel R. Alharbi and Amer Aljaedi",
title = "Predicting Rogue Content and {Arabic} Spammers on
{Twitter}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "229",
day = "30",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110229",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/229",
abstract = "Twitter is one of the most popular online social
networks for spreading propaganda and words in the Arab
region. Spammers are now creating rogue accounts to
distribute adult content through Arabic tweets that
Arabic norms and cultures prohibit. Arab governments
are facing a huge challenge in the detection of these
accounts. Researchers have extensively studied English
spam on online social networks, while to date, social
network spam in other languages has been completely
ignored. In our previous study, we estimated that rogue
and spam content accounted for approximately three
quarters of all content with Arabic trending hashtags
in Saudi Arabia. This alarming rate, supported by
autonomous concurrent estimates, highlights the urgent
need to develop adaptive spam detection methods. In
this work, we collected a pure data set from spam
accounts producing Arabic tweets. We applied
lightweight feature engineering based on rogue content
and user profiles. The 47 generated features were
analyzed, and the best features were selected. Our
performance results show that the random forest
classification algorithm with 16 features performs
best, with accuracy rates greater than 90\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Cybersecurity.",
}
@Article{Sun:2019:HLS,
author = "Xiaolei Sun and Yu Zhang and Jing Chen",
title = "High-Level Smart Decision Making of a Robot Based on
Ontology in a Search and Rescue Scenario",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "230",
day = "31",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110230",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/230",
abstract = "The search and rescue (SAR) scenario is complex and
uncertain where a robot needs to understand the
scenario to make smart decisions. Aiming at the
knowledge representation (KR) in the field of SAR, this
paper builds an ontology model that enables a robot to
understand how to make smart decisions. The ontology is
divided into three parts, namely entity ontology,
environment ontology, and task ontology. Web Ontology
Language (OWL) is adopted to represent these three
types of ontology. Through ontology and Semantic Web
Rule Language (SWRL) rules, the robot infers the tasks
to be performed according to the environment state and
at the same time obtains the semantic information of
the victims. Then, the paper proposes an ontology-based
algorithm for task planning to get a sequence of atomic
actions so as to complete the high-level inferred task.
In addition, an indoor experiment was designed and
built for the SAR scenario using a real robot platform
--- TurtleBot3. The correctness and usability of the
ontology and the proposed methods are verified by
experiments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Active Learning and Reasoning in
Autonomous Intelligent Agents.",
}
@Article{Mavropoulos:2019:CAC,
author = "Thanassis Mavropoulos and Georgios Meditskos and
Spyridon Symeonidis and Eleni Kamateri and Maria Rousi
and Dimitris Tzimikas and Lefteris Papageorgiou and
Christos Eleftheriadis and George Adamopoulos and
Stefanos Vrochidis and Ioannis Kompatsiaris",
title = "A Context-Aware Conversational Agent in the
Rehabilitation Domain",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "231",
day = "01",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110231",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/231",
abstract = "Conversational agents are reshaping our communication
environment and have the potential to inform and
persuade in new and effective ways. In this paper, we
present the underlying technologies and the theoretical
background behind a health-care platform dedicated to
supporting medical stuff and individuals with movement
disabilities and to providing advanced monitoring
functionalities in hospital and home surroundings. The
framework implements an intelligent combination of two
research areas: (1) sensor- and camera-based monitoring
to collect, analyse, and interpret people behaviour and
(2) natural machine--human interaction through an
apprehensive virtual assistant benefiting ailing
patients. In addition, the framework serves as an
important assistant to caregivers and clinical experts
to obtain information about the patients in an
intuitive manner. The proposed approach capitalises on
latest breakthroughs in computer vision, sensor
management, speech recognition, natural language
processing, knowledge representation, dialogue
management, semantic reasoning, and speech synthesis,
combining medical expertise and patient history.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Intelligent Innovations in Multimedia
Data.",
}
@Article{Fotiou:2019:NBS,
author = "Nikos Fotiou and George C. Polyzos",
title = "Name-Based Security for Information-Centric Networking
Architectures",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "232",
day = "01",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110232",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/232",
abstract = "Information-Centric Networking (ICN) is an emerging
communication paradigm built around content names.
Securing ICN using named-based security is, therefore,
a natural choice. For this paper, we designed and
evaluated name-based security solutions that satisfy
security requirements that are particular to ICN
architectures. In order to achieve our goal, we
leverage identity-based encryption, identity-based
proxy re-encryption, and the emerging paradigm of
decentralized identifiers. Our solutions support
outsourcing content storage, content integrity
protection and content authentication, and provenance
verification, as well as access control. We show that
our solutions have tolerable storage and computation
overhead, thus proving their feasibility.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Information-Centric Networking (ICN).",
}
@Article{Zou:2019:RCC,
author = "Yongyan Zou and Yanzhi Zhang and Xin Yi",
title = "Research on Cooperative Communication Strategy and
Intelligent Agent Directional Source Grouping
Algorithms for {Internet of Things}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "233",
day = "01",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110233",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/233",
abstract = "In order to improve the network layer of the Internet
of things to improve transmission reliability, save
time delay and energy consumption, the Internet of
things cooperative communication and intelligent agent
technology were studied in this paper. In cooperative
communication, a new cooperative communication
algorithm KCN (k-cooperative node), and a reliability
prediction model are proposed. The k value is
determined by the end-to-end reliability. After k
cooperative nodes are selected, other nodes enter
dormancy. In aggregate traffic allocation, game theory
is used to model the traffic equilibrium and end-to-end
delay optimization scenarios. In practice, the optimal
duty cycle can be calculated, which makes some
cooperative nodes enter an idle state to save energy.
Under the premise of guaranteeing end-to-end delay, it
is shown that the reliability of the proposed KCN
algorithm is better than that of the other existing
routing protocols. In the aspect of intelligent agent,
a Directional source grouping based multi-Agent
Itinerary Planning (D-MIP) is proposed. This algorithm
studies the routing problem of multi-agent parallel
access to multiple source nodes. A directed source
packet multi-agent routing planning algorithm is
proposed. The iterative algorithm of each source node
is limited to a sector, and the optimal intelligent
agent route is obtained by selecting an appropriate
angle. Compared with other algorithms, it is shown
through a lot of simulated results that energy
consumption and time delay has been saved by the
proposed D-MIP algorithm.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue AI Technology on Dynamic Distributed
IoT, Wireless, and Next-Generation Networking.",
}
@Article{Vgena:2019:TAL,
author = "Katerina Vgena and Angeliki Kitsiou and Christos
Kalloniatis and Dimitris Kavroudakis and Stefanos
Gritzalis",
title = "Toward Addressing Location Privacy Issues: New
Affiliations with Social and Location Attributes",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "234",
day = "01",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110234",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/234",
abstract = "Nowadays, location-sharing applications (LSA) within
social media enable users to share their location
information at different levels of precision. Users on
their side are willing to disclose this kind of
information in order to represent themselves in a
socially acceptable online way. However, they express
privacy concerns regarding potential malware
location-sharing applications, since users' geolocation
information can provide affiliations with their social
identity attributes that enable the specification of
their behavioral normativity, leading to sensitive
information disclosure and privacy leaks. This paper,
after a systematic review on previous social and
privacy location research, explores the overlapping of
these fields in identifying users' social attributes
through examining location attributes while online, and
proposes a targeted set of location privacy attributes
related to users' socio-spatial characteristics within
social media.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Featured Reviews of Future Internet
Research.",
}
@Article{Ashouri:2019:ECS,
author = "Majid Ashouri and Fabian Lorig and Paul Davidsson and
Romina Spalazzese",
title = "Edge Computing Simulators for {IoT} System Design: An
Analysis of Qualities and Metrics",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "235",
day = "08",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110235",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/235",
abstract = "The deployment of Internet of Things (IoT)
applications is complex since many quality
characteristics should be taken into account, for
example, performance, reliability, and security. In
this study, we investigate to what extent the current
edge computing simulators support the analysis of
qualities that are relevant to IoT architects who are
designing an IoT system. We first identify the quality
characteristics and metrics that can be evaluated
through simulation. Then, we study the available
simulators in order to assess which of the identified
qualities they support. The results show that while
several simulation tools for edge computing have been
proposed, they focus on a few qualities, such as time
behavior and resource utilization. Most of the
identified qualities are not considered and we suggest
future directions for further investigation to provide
appropriate support for IoT architects.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Performance Evaluation in the Era of
Cloud and Edge Computing.",
}
@Article{Mtonga:2019:MLB,
author = "Kambombo Mtonga and Santhi Kumaran and Chomora Mikeka
and Kayalvizhi Jayavel and Jimmy Nsenga",
title = "Machine Learning-Based Patient Load Prediction and
{IoT} Integrated Intelligent Patient Transfer Systems",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "236",
day = "12",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110236",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/236",
abstract = "A mismatch between staffing ratios and service demand
leads to overcrowding of patients in waiting rooms of
health centers. Overcrowding consequently leads to
excessive patient waiting times, incomplete preventive
service delivery and disgruntled medical staff. Worse,
due to the limited patient load that a health center
can handle, patients may leave the clinic before the
medical examination is complete. It is true that as one
health center may be struggling with an excessive
patient load, another facility in the vicinity may have
a low patient turn out. A centralized hospital
management system, where hospitals are able to timely
exchange patient load information would allow excess
patient load from an overcrowded health center to be
re-assigned in a timely way to the nearest health
centers. In this paper, a machine learning-based
patient load prediction model for forecasting future
patient loads is proposed. Given current and historical
patient load data as inputs, the model outputs future
predicted patient loads. Furthermore, we propose
re-assigning excess patient loads to nearby facilities
that have minimal load as a way to control overcrowding
and reduce the number of patients that leave health
facilities without receiving medical care as a result
of overcrowding. The re-assigning of patients will
imply a need for transportation for the patient to move
from one facility to another. To avoid putting a
further strain on the already fragmented ambulatory
services, we assume the existence of a scheduled bus
system and propose an Internet of Things (IoT)
integrated smart bus system. The developed IoT system
can be tagged on buses and can be queried by patients
through representation state transfer application
program interfaces (APIs) to provide them with the
position of the buses through web app or SMS relative
to their origin and destination stop. The back end of
the proposed system is based on message queue telemetry
transport, which is lightweight, data efficient and
scalable, unlike the traditionally used hypertext
transfer protocol.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhang:2019:FFT,
author = "Jingren Zhang and Fang'ai Liu and Weizhi Xu and Hui
Yu",
title = "Feature Fusion Text Classification Model Combining
{CNN} and {BiGRU} with Multi-Attention Mechanism",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "237",
day = "12",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110237",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/237",
abstract = "Convolutional neural networks (CNN) and long
short-term memory (LSTM) have gained wide recognition
in the field of natural language processing. However,
due to the pre- and post-dependence of natural language
structure, relying solely on CNN to implement text
categorization will ignore the contextual meaning of
words and bidirectional long short-term memory
(BiLSTM). The feature fusion model is divided into a
multiple attention (MATT) CNN model and a
bi-directional gated recurrent unit (BiGRU) model. The
CNN model inputs the word vector (word vector
attention, part of speech attention, position
attention) that has been labeled by the attention
mechanism into our multi-attention mechanism CNN model.
Obtaining the influence intensity of the target keyword
on the sentiment polarity of the sentence, and forming
the first dimension of the sentiment classification,
the BiGRU model replaces the original BiLSTM and
extracts the global semantic features of the sentence
level to form the second dimension of sentiment
classification. Then, using PCA to reduce the dimension
of the two-dimensional fusion vector, we finally obtain
a classification result combining two dimensions of
keywords and sentences. The experimental results show
that the proposed MATT-CNN+BiGRU fusion model has
5.94\% and 11.01\% higher classification accuracy on
the MRD and SemEval2016 datasets, respectively, than
the mainstream CNN+BiLSTM method.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue New Perspectives on Semantic Web
Technologies and Applications.",
}
@Article{Alreshidi:2019:SAM,
author = "Abdulrahman Alreshidi and Aakash Ahmad and Ahmed B.
Altamimi and Khalid Sultan and Rashid Mehmood",
title = "Software Architecture for Mobile Cloud Computing
Systems",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "238",
day = "13",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110238",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/238",
abstract = "Mobile cloud computing (MCC) has recently emerged as a
state-of-the-art technology for mobile systems. MCC
enables portable and context-aware computation via
mobile devices by exploiting virtually unlimited
hardware and software resources offered by cloud
computing servers. Software architecture helps to
abstract the complexities of system design,
development, and evolution phases to implement MCC
systems effectively and efficiently. This paper aims to
identify, taxonomically classify, and systematically
map the state of the art on architecting MCC-based
software. We have used an evidence-based software
engineering (EBSE) approach to conduct a systematic
mapping study (SMS) based on 121 qualitatively selected
research studies published from 2006 to 2019. The
results of the SMS highlight that architectural
solutions for MCC systems are mainly focused on
supporting (i) software as a service for mobile
computing, (ii) off-loading mobile device data to
cloud-servers, (iii) internet of things, edge, and fog
computing along with various aspects like (iv) security
and privacy of mobile device data. The emerging
research focuses on the existing and futuristic
challenges that relate to MCC-based internet of things
(IoTs), mobile-cloud edge systems, along with green and
energy-efficient computing. The results of the SMS
facilitate knowledge transfer that could benefit
researchers and practitioners to understand the role of
software architecture to develop the next generation of
mobile-cloud systems to support internet-driven
computing.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hammood:2019:BBC,
author = "Dalal Abdulmohsin Hammood and Hasliza A. Rahim and
Ahmed Alkhayyat and R. Badlishah Ahmad",
title = "Body-to-Body Cooperation in {Internet} of Medical
Things: Toward Energy Efficiency Improvement",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "239",
day = "14",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110239",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/239",
abstract = "Internet of Medical Things (IoMT) technologies provide
suitability among physicians and patients because they
are useful in numerous medical fields. Wireless body
sensor networks (WBSNs) are one of the most crucial
technologies from within the IoMT evolution of the
healthcare system, whereby each patient is monitored by
low-powered and lightweight sensors. When the WBSNs are
integrated into IoMT networks, they are quite likely to
overlap each other; thus, cooperation between WBSN
sensors is possible. In this paper, we consider
communication between WBSNs and beyond their
communication range. Therefore, we propose inter-WBAN
cooperation for the IoMT system, which is also known as
inter-WBAN cooperation in an IoMT environment
(IWC-IoMT). In this paper, first, a proposed
architecture for the IoT health-based system is
investigated. Then, a mathematical model of the outage
probability for the IWC-IoMT is derived. Finally, the
energy efficiency of the IWC-IoT is analysed and
inspected. The simulation and numerical results show
that the IWC-IoMT (cooperative IoMT) system provides
superior performance compared to the non-cooperative
system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wu:2019:MIM,
author = "Cong Wu and Jianhui Yang",
title = "Multimedia Independent Multipath Routing Algorithms
for {Internet of Things} Based on a Node Hidden
Communication Model",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "240",
day = "15",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110240",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/240",
abstract = "In order to achieve a multi-path routing algorithm
with time delay and energy consumption balance to
alleviate the energy holes around a sink, a multimedia
independent multipath routing algorithm for internet of
things (IoT) based on node hidden communication model
is proposed in this paper. On the premise of satisfying
the application delay, a multi-source multi-path
routing algorithm is proposed by using the idea of
software definition and fitting multiple curves to form
independent multi-path routing. Through a sink node
centralized programming control source node routing,
according to the priority of the source node, the
dynamic angle of the source node can be allocated,
which effectively reduces the energy consumption of the
network. In addition, considering that the Internet of
Things has more perceptive nodes, limited computing and
storage capacity, frequent joining and exiting
operations and other factors, a hidden communication
model of nodes is designed for the IoT. It is helpful
to improve the level of privacy protection in the IoT,
and to effectively improve the ability of nodes to
resist attacks in the IoT. The experimental results
show that the proposed algorithm avoids the
interference between paths and various network attacks
to the greatest extent, and the energy consumption is
relatively low under the requirement of quality of
service (QoS) delay.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Multimedia Internet of Things (IoT) in
Smart Environment.",
}
@Article{Kapetanidou:2019:RBT,
author = "Ioanna Angeliki Kapetanidou and Christos-Alexandros
Sarros and Vassilis Tsaoussidis",
title = "Reputation-Based Trust Approaches in Named Data
Networking",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "241",
day = "18",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110241",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/241",
abstract = "Information-Centric Networking (ICN) has arisen as an
architectural solution that responds to the needs of
today's overloaded Internet, departing from the
traditional host-centric access paradigm. In this paper
we focus on Named Data Networking (NDN), the most
prominent ICN architecture. In the NDN framework,
disseminated content is at the core of the design and
providing trusted content is essential. In this paper,
we provide an overview of reputation-based trust
approaches, present their design trade-offs and argue
that these approaches can consolidate NDN trust and
security by working complementary to the existing
credential-based schemes. Finally, we discuss future
research directions and challenges.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Information-Centric Networking (ICN).",
}
@Article{Giannakoulopoulos:2019:AEW,
author = "Andreas Giannakoulopoulos and Nikos Konstantinou and
Dimitris Koutsompolis and Minas Pergantis and Iraklis
Varlamis",
title = "Academic Excellence, {Website} Quality, {SEO}
Performance: Is there a Correlation?",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "242",
day = "18",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110242",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/242",
abstract = "The academic excellence of universities around the
globe has always been a matter of extended study and so
has the quality of an institution's presence in the
World Wide Web. The purpose of this research is to
study the extent to which a university's academic
excellence is related to the quality of its web
presence. In order to achieve this, a method was
devised that quantified the website quality and search
engine optimization (SEO) performance of the university
websites of the top 100 universities in the Academic
Ranking of World Universities (ARWU) Shanghai list. A
variety of tools was employed to measure and test each
website and produced a Web quality ranking, an SEO
performance ranking, as well as a combined overall web
ranking for each one. Comparing these rankings with the
ARWU shows that academic excellence is moderately
correlated with website quality, but SEO performance is
not. Moreover, the overall web ranking also shows a
moderate correlation with ARWU which seems to be
positively influenced by website quality and negatively
by SEO performance. Conclusively, the results of the
research indicate that universities place particular
emphasis on issues concerning website quality, while
the utilization of SEO does not appear to be of equal
importance, indicating possible room for improvement in
this area.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Search Engine Optimization.",
}
@Article{Zhang:2019:RMP,
author = "Wenjie Zhang and Pin Wu and Yan Peng and Dongke Liu",
title = "Roll Motion Prediction of Unmanned Surface Vehicle
Based on Coupled {CNN} and {LSTM}",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "243",
day = "18",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110243",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/243",
abstract = "The prediction of roll motion in unmanned surface
vehicles (USVs) is vital for marine safety and the
efficiency of USV operations. However, the USV roll
motion at sea is a complex time-varying nonlinear and
non-stationary dynamic system, which varies with
time-varying environmental disturbances as well as
various sailing conditions. The conventional methods
have the disadvantages of low accuracy, poor
robustness, and insufficient practical application
ability. The rise of deep learning provides new
opportunities for USV motion modeling and prediction.
In this paper, a data-driven neural network model is
constructed by combining a convolution neural network
(CNN) with long short-term memory (LSTM) for USV roll
motion prediction. The CNN is used to extract spatially
relevant and local time series features of the USV
sensor data. The LSTM layer is exploited to reflect the
long-term movement process of the USV and predict roll
motion for the next moment. The fully connected layer
is utilized to decode the LSTM output and calculate the
final prediction results. The effectiveness of the
proposed model was proved using USV roll motion
prediction experiments based on two case studies from
``JingHai-VI'' and ``JingHai-III'' USVS of Shanghai
University. Experimental results on a real data set
indicated that our proposed model obviously
outperformed the state-of-the-art methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Big Data and Augmented Intelligence.",
}
@Article{Wang:2019:WSS,
author = "Huan Wang and Bin Wu and Yuancheng Yao and Mingwei
Qin",
title = "Wideband Spectrum Sensing Based on Reconfigurable
Filter Bank in Cognitive Radio",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "244",
day = "18",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110244",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/244",
abstract = "In order to ease the conflict between the bandwidth
demand of high-rate wireless communication and the
shortage of spectrum resources, a wideband spectrum
sensing method based on reconfigurable filter bank
(RFB) with adjustable resolution is presented. The
wideband signals are uniformly divided into
multi-narrowband signals by RFB, which is designed by
polyphase uniform Discrete Fourier Transform (DFT)
modulation, and each sub-band is sensed by energy
detection. According to the idle proportion of detected
sub-bands, the number of RFB sub-bands is reset in next
spectrum-sensing time. By simulating with collected
wideband dataset, the influence of filter bank
sub-bands number and idle state proportion on the
sensing results is analyzed, and then on the basis of
the trade-off between spectrum-sensing resolution and
computational complexity, the optimal sub-bands number
of filter bank is selected, so as to improve the
detection performance and save resources.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Song:2019:PAR,
author = "Xiangpeng Song and Hongbin Yang and Congcong Zhou",
title = "Pedestrian Attribute Recognition with Graph
Convolutional Network in Surveillance Scenarios",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "11",
pages = "245",
day = "19",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11110245",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:08 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/11/245",
abstract = "Pedestrian attribute recognition is to predict a set
of attribute labels of the pedestrian from surveillance
scenarios, which is a very challenging task for
computer vision due to poor image quality, continual
appearance variations, as well as diverse spatial
distribution of imbalanced attributes. It is desirable
to model the label dependencies between different
attributes to improve the recognition performance as
each pedestrian normally possesses many attributes. In
this paper, we treat pedestrian attribute recognition
as multi-label classification and propose a novel model
based on the graph convolutional network (GCN). The
model is mainly divided into two parts, we first use
convolutional neural network (CNN) to extract
pedestrian feature, which is a normal operation
processing image in deep learning, then we transfer
attribute labels to word embedding and construct a
correlation matrix between labels to help GCN propagate
information between nodes. This paper applies the
object classifiers learned by GCN to the image
representation extracted by CNN to enable the model to
have the ability to be end-to-end trainable.
Experiments on pedestrian attribute recognition dataset
show that the approach obviously outperforms other
existing state-of-the-art methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Innovative Topologies and Algorithms for
Neural Networks.",
}
@Article{Albahli:2019:DEL,
author = "Saleh Albahli",
title = "A Deep Ensemble Learning Method for Effort-Aware
Just-In-Time Defect Prediction",
journal = j-FUTURE-INTERNET,
volume = "11",
number = "12",
pages = "246",
day = "20",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi11120246",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Nov 21 16:51:09 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/11/12/246",
abstract = "Since the introduction of just-in-time effort aware
defect prediction, many researchers are focusing on
evaluating the different learning methods, which can
predict the defect inducing changes in a software
product. In order to predict these changes, it is
important for a learning model to consider the nature
of the dataset, its unbalancing properties and the
correlation between different attributes. In this
paper, we evaluated the importance of these properties
for a specific dataset and proposed a novel methodology
for learning the effort aware just-in-time prediction
of defect inducing changes. Moreover, we devised an
ensemble classifier, which fuses the output of three
individual classifiers (Random forest, XGBoost,
Multi-layer perceptron) to build an efficient
state-of-the-art prediction model. The experimental
analysis of the proposed methodology showed significant
performance with 77\% accuracy on the sample dataset
and 81\% accuracy on different datasets. Furthermore,
we proposed a highly competent reinforcement learning
technique to avoid false alarms in real time
predictions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{FIEO:2020:ARF,
author = "{Future Internet Editorial Office}",
title = "Acknowledgement to Reviewers of {{\booktitle{Future
Internet}}} in 2019",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "1",
pages = "18",
day = "20",
month = jan,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12010018",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:41 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/1/18",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wu:2020:SQI,
author = "Zhijun Wu and Rong Li and Panpan Yin and Changliang
Li",
title = "Steganalysis of Quantization Index Modulation
Steganography in {G.723.1} Codec",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "1",
pages = "17",
day = "19",
month = jan,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12010017",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:41 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/1/17",
abstract = "Steganalysis is used for preventing the illegal use of
steganography to ensure the security of network
communication through detecting whether or not secret
information is hidden in the carrier. This paper
presents an approach to detect the quantization index
modulation (QIM) of steganography in G.723.1 based on
the analysis of the probability of occurrence of index
values before and after steganography and studying the
influence of adjacent index values in voice over
internet protocol (VoIP). According to the change of
index value distribution characteristics, this approach
extracts the distribution probability matrix and the
transition probability matrix as feature vectors, and
uses principal component analysis (PCA) to reduce the
dimensionality. Through a large amount of sample
training, the support vector machine (SVM) is designed
as a classifier to detect the QIM steganography. The
speech samples with different embedding rates and
different durations were tested to verify their impact
on the accuracy of the steganalysis. The experimental
results show that the proposed approach improves the
accuracy and reliability of the steganalysis.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cyber Security of the Continuous Digital
Environment: Challenges, Solutions and Future
Directions.",
}
@Article{Matricciani:2020:GSS,
author = "Emilio Matricciani",
title = "Geocentric Spherical Surfaces Emulating the
Geostationary Orbit at Any Latitude with Zenith Links",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "1",
pages = "16",
day = "18",
month = jan,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12010016",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:41 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/1/16",
abstract = "According to altitude, the orbits of satellites
constellations can be divided into geostationary Earth
orbit (GEO), medium Earth orbit (MEO), and low Earth
orbit (LEO) constellations. We propose to use a Walker
star constellation with polar orbits, at any altitude,
to emulate the geostationary orbit with zenith paths at
any latitude. Any transmitter/receiver will be linked
to a satellite as if the site were at the equator and
the satellite at the local zenith. This constellation
design can have most of the advantages of the current
GEO, MEO, and LEO constellations, without having most
of their drawbacks. Doppler phenomena are largely
minimized because the connected satellite is always
seen almost at the local zenith. The extra free-space
loss, due to the fixed pointing of all antennas, is at
most 6 dBs when the satellite enters or leaves the
service area. The connections among satellites are easy
because the positions in the orbital plane and in
adjacent planes are constant, although with variable
distances. No steering antennas are required. The
tropospheric propagation fading and scintillations are
minimized. Our aim is to put forth the theoretical
ideas about this design, to which we refer to as the
geostationary surface (GeoSurf) constellation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Special Issue on Recent Advances in
Information and Communication Technologies.",
}
@Article{Wu:2020:MAR,
author = "Zhijun Wu and Yun Zhang and Enzhong Xu",
title = "Multi-Authority Revocable Access Control Method Based
on {CP-ABE} in {NDN}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "1",
pages = "15",
day = "16",
month = jan,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12010015",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:41 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/1/15",
abstract = "For the future of the Internet, because
information-centric network (ICN) have natural
advantages in terms of content distribution, mobility,
and security, it is regarded as a potential solution,
or even the key, to solve many current problems. Named
Data Network (NDN) is one of the research projects
initiated by the United States for network
architecture. NDN is a more popular project than ICN.
The information cache in the NDN separates content from
content publishers, but content security is threatened
because of the lack of security controls. Therefore, a
multi-authority revocable access control method based
on CP-ABE needs to be proposed. This method constructs
a proxy-assisted access control scheme, which can
implement effective data access control in NDN
networks, and the scheme has high security. Because of
the partial decryption on the NDN node, the decryption
burden of the consumer client in the solution is
reduced, and effective user and attribute revocation is
achieved, and forward security and backward security
are ensured, and collusion attacks are prevented.
Finally, through the other security and performance
analysis of the scheme of this paper, it proves that
the scheme is safe and efficient.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Named Data Networking Architecture.",
}
@Article{Utsu:2020:TBS,
author = "Keisuke Utsu and Mariko Abe and Shuji Nishikawa and
Osamu Uchida",
title = "{Twitter}-Based Safety Confirmation System for
Disaster Situations",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "1",
pages = "14",
day = "16",
month = jan,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12010014",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:41 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/1/14",
abstract = "In the aftermath of disastrous events in Japan, safety
information and rescue requests, as well as emergency
alerts and damage situations, have been shared on
Twitter. However, even victims who are familiar with
smartphones or similar devices and social media cannot
easily share detailed information, such as the
coordinates or address of their current location, which
are essential components of safety information and
rescue requests. Moreover, local governments and rescue
experts have difficulty in gathering such tweets from
Twitter. In this paper, we propose a novel system to
enable the victims to share their safety information,
make rescue requests, and enable quick information
gathering for decision making by local government staff
or rescue experts. The proposed system is a
Twitter-based safety confirmation system named [email
protected] Using the proposed application, the users
can easily submit their safety information and send
rescue requests on Twitter. The users who want to
confirm the safety information can check it quickly on
Twitter or via this system. Furthermore, the registered
safety information is displayed on an online map to
support rescue and assistance activities by local
governments and rescue experts.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Web-Based Communities and Social
Media.",
}
@Article{Foubert:2020:LRW,
author = "Brandon Foubert and Nathalie Mitton",
title = "Long-Range Wireless Radio Technologies: a Survey",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "1",
pages = "13",
day = "14",
month = jan,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12010013",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:41 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/1/13",
abstract = "Wireless networks are now a part of the everyday life
of many people and are used for many applications.
Recently, new technologies that enable low-power and
long-range communications have emerged. These
technologies, in opposition to more traditional
communication technologies rather defined as ``short
range'', allow kilometer-wide wireless communications.
Long-range technologies are used to form Low-Power
Wide-Area Networks (LPWAN). Many LPWAN technologies are
available, and they offer different performances,
business models etc., answering different applications'
needs. This makes it hard to find the right tool for a
specific use case. In this article, we present a survey
about the long-range technologies available presently
as well as the technical characteristics they offer.
Then we propose a discussion about the energy
consumption of each alternative and which one may be
most adapted depending on the use case requirements and
expectations, as well as guidelines to choose the best
suited technology.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Featured Reviews of Future Internet
Research.",
}
@Article{Guo:2020:MWA,
author = "You Guo and Hector Marco-Gisbert and Paul Keir",
title = "Mitigating Webshell Attacks through Machine Learning
Techniques",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "1",
pages = "12",
day = "14",
month = jan,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12010012",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:41 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/1/12",
abstract = "A webshell is a command execution environment in the
form of web pages. It is often used by attackers as a
backdoor tool for web server operations. Accurately
detecting webshells is of great significance to web
server protection. Most security products detect
webshells based on feature-matching methods ---
matching input scripts against pre-built malicious code
collections. The feature-matching method has a low
detection rate for obfuscated webshells. However, with
the help of machine learning algorithms, webshells can
be detected more efficiently and accurately. In this
paper, we propose a new PHP webshell detection model,
the NB-Opcode (na\ïve Bayes and opcode sequence)
model, which is a combination of na\ïve Bayes
classifiers and opcode sequences. Through experiments
and analysis on a large number of samples, the
experimental results show that the proposed method
could effectively detect a range of webshells. Compared
with the traditional webshell detection methods, this
method improves the efficiency and accuracy of webshell
detection.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Social Networks
and Solutions.",
}
@Article{Ausaf:2020:WAC,
author = "Asfund Ausaf and Mohammad Zubair Khan and Muhammad
Awais Javed and Ali Kashif Bashir",
title = "{WLAN} Aware Cognitive Medium Access Control Protocol
for {IoT} Applications",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "1",
pages = "11",
day = "11",
month = jan,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12010011",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:41 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/1/11",
abstract = "Internet of Things (IoT)-based devices consist of
wireless sensor nodes that are battery-powered; thus,
energy efficiency is a major issue. IEEE
802.15.4-compliant IoT devices operate in the
unlicensed Industrial, Scientific, and Medical (ISM)
band of 2.4 GHz and are subject to interference caused
by high-powered IEEE 802.11-compliant Wireless Local
Area Network (WLAN) users. This interference causes
frequent packet drop and energy loss for IoT users. In
this work, we propose a WLAN Aware Cognitive Medium
Access Control (WAC-MAC) protocol for IoT users that
uses techniques, such as energy detection based
sensing, adaptive wake-up scheduling, and adaptive
backoff, to reduce interference with the WSN and
improve network lifetime of the IoT users. Results show
that the proposed WAC-MAC achieves a higher packet
reception rate and reduces the energy consumption of
IoT nodes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue The Internet of Things for Smart
Environments.",
}
@Article{Paez:2020:ABE,
author = "Rafael P{\'a}ez and Manuel P{\'e}rez and Gustavo
Ram{\'\i}rez and Juan Montes and Lucas Bouvarel",
title = "An Architecture for Biometric Electronic
Identification Document System Based on Blockchain",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "1",
pages = "10",
day = "11",
month = jan,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12010010",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:41 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/1/10",
abstract = "This paper proposes an architecture for biometric
electronic identification document (e-ID) system based
on Blockchain for citizens identity verification in
transactions corresponding to the notary, registration,
tax declaration and payment, basic health services and
registration of economic activities, among others. To
validate the user authentication, a biometric e-ID
system is used to avoid spoofing and related attacks.
Also, to validate the document a digital certificate is
used with the corresponding public and private key for
each citizen by using a user's PIN. The proposed
transaction validation process was implemented on a
Blockchain system in order to record and verify the
transactions made by all citizens registered in the
electoral census, which guarantees security, integrity,
scalability, traceability, and no-ambiguity.
Additionally, a Blockchain network architecture is
presented in a distributed and decentralized way
including all the nodes of the network, database and
government entities such as national register and
notary offices. The results of the application of a new
consensus algorithm to our Blockchain network are also
presented showing mining time, memory and CPU usage
when the number of transactions scales up.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Smart Cities, Innovation, and
Multi-Dimensionality.",
}
@Article{Wang:2020:SBD,
author = "Jiajia Wang and Guangming Li",
title = "Study on Bridge Displacement Monitoring Algorithms
Based on Multi-Targets Tracking",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "1",
pages = "9",
day = "08",
month = jan,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12010009",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:41 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/1/9",
abstract = "Bridge displacement measurement is an important area
of bridge health monitoring, which can directly reflect
whether the deformation of bridge structure exceeds its
safety permission. Target tracking technology and
Digital Image Correlation (DIC) are two fast-developing
and well-known methods for non-contact bridge
displacement monitoring in Digital Image Processing
(DIP) methods. The former's cost of erecting detection
equipment is too large for bridges with a large span
that need to locate more multi-targets because of its
tracking only one target on a camera while the latter
is not suitable for remote detection because it
requires very high detection conditions. After
investigating the evolution of bridge displacement
monitoring, this paper proposes a bridge displacement
monitoring algorithm based on multi-target tracking.
The algorithm takes full account of practical
application and realizes accuracy, robustness,
real-time, low-cost, simplicity, and self-adaptability,
which sufficiently adapts the bridge displacement
monitoring in theory.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2020:NRA,
author = "Jingpu Wang and Xin Song and Yatao Ma",
title = "A Novel Resource Allocation Scheme in {NOMA}-Based
Cellular Network with {D2D} Communications",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "1",
pages = "8",
day = "06",
month = jan,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12010008",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:41 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/1/8",
abstract = "Non-orthogonal multiple access (NOMA) has become a
promising technology for 5G. With the support of
effective resource allocation algorithms, it can
improve the spectrum resource utilization and system
throughput. In this article, a new resource allocation
algorithm in the NOMA-enhanced cellular network with
device-to-device (D2D) communications is proposed, in
which we use two new searching methods and an optimal
link selection scheme to maximize the system throughput
and limit the interferences of the NOMA-based cellular
network. In the proposed joint user scheduling,
tree-based search power allocation and link selection
algorithm, we simplify the solving process of previous
methods and set up the optimization function, which
does not need to be derivable. With successive
interference cancellation (SIC) technology, we give
conditions for the D2D devices accessing into the
network. We also propose a suboptimal scheme to
schedule cellular users and D2D devices into multiple
subchannels, which reduces the complexity of the
exhaustive search method. Through consistent tree-based
searching for the power allocation coefficients, we can
get the maximum arithmetic average of the system sum
rate. Meanwhile, for the existence of the part of
interferences from larger power users which can be
canceled by the SIC in NOMA systems, the search options
are decreased for increasing the search rate of the
power allocation algorithm. Moreover, we propose a
distance-aware link selection scheme to guarantee the
quality of communications. In summary, the proposed
algorithm can improve the system throughput, has a low
complexity cost and potentially increases spectral
utilization. Numerical results demonstrate that the
proposed algorithm achieves a higher data transmission
rate than some of the traditional methods and we also
investigate the convergence and the computational
complexity cost of the joint algorithm.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Papavassiliou:2020:SDN,
author = "Symeon Papavassiliou",
title = "Software Defined Networking {(SDN)} and Network
Function Virtualization {(NFV)}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "1",
pages = "7",
day = "02",
month = jan,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12010007",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:41 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/12/1/7",
abstract = "The role of Software Defined Networking (SDN) and
Network Function Virtualization (NFV) have been
instrumental in realizing the transition and vision
``from black boxes to a white box towards facilitating
5G network architectures''. Though significant research
results and several deployments have occurred and
realized over the last few years focusing on the NFV
and SDN technologies, several issues --- both of
theoretical and practical importance --- remain still
open. Accordingly, the papers of this special issue are
significant contributions samples within the general
ecosystem highlighted above, ranging from SDN and NFV
architectures and implementations, to SDN-NFV
integration and orchestration approaches, while
considering issues associated with optimization,
network management and security aspects. In particular,
a total of nine excellent articles (one review and
eight original research articles) have been accepted,
following a rigorous review process, and addressing
many of the aforementioned challenges and beyond.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Software Defined Networking (SDN) and
Network Function Virtualization (NFV).",
}
@Article{Veglis:2020:SEO,
author = "Andreas Veglis and Dimitrios Giomelakis",
title = "Search Engine Optimization",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "1",
pages = "6",
day = "31",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12010006",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:41 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/12/1/6",
abstract = "The role of Software Defined Networking (SDN) and
Network Function Virtualization (NFV) have been
instrumental in realizing the transition and vision
``from black boxes to a white box towards facilitating
5G network architectures''. Though significant research
results and several deployments have occurred and
realized over the last few years focusing on the NFV
and SDN technologies, several issues --- both of
theoretical and practical importance --- remain still
open. Accordingly, the papers of this special issue are
significant contributions samples within the general
ecosystem highlighted above, ranging from SDN and NFV
architectures and implementations, to SDN-NFV
integration and orchestration approaches, while
considering issues associated with optimization,
network management and security aspects. In particular,
a total of nine excellent articles (one review and
eight original research articles) have been accepted,
following a rigorous review process, and addressing
many of the aforementioned challenges and beyond.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Search Engine Optimization.",
}
@Article{Kousaridas:2020:CBO,
author = "Apostolos Kousaridas and Andreas Schimpe and Sebastian
Euler and Xavier Vilajosana and Mikael Fallgren and
Giada Landi and Francesca Moscatelli and Sokratis
Barmpounakis and Francisco V{\'a}zquez-Gallego and
Roshan Sedar and Rodrigo Silva and Laurent Dizambourg
and Stefan Wendt and Maciej Muehleisen and Kurt Eckert
and J{\'e}r{\^o}me H{\"a}rri and Jesus Alonso-Zarate",
title = "{5G} Cross-Border Operation for Connected and
Automated Mobility: Challenges and Solutions",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "1",
pages = "5",
day = "24",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12010005",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:41 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/1/5",
abstract = "The vision of cooperative, connected and automated
mobility (CCAM) across Europe can only be realized when
harmonized solutions that support cross-border traffic
exist. The possibility of providing CCAM services along
different countries when vehicles drive across various
national borders has a huge innovative business
potential. However, the seamless provision of
connectivity and the uninterrupted delivery of services
along borders also poses interesting technical
challenges. The situation is particularly innovative
given the multi-country, multi-operator,
multi-telco-vendor, and multi-car-manufacturer scenario
of any cross-border layout. This paper introduces the
challenges associated to a cross-border deployment of
communication technologies through the analysis of
three use cases: tele-operated driving, high-definition
map generation and distribution for autonomous
vehicles, and anticipated cooperative collision
avoidance. Furthermore, a set of 5G solutions have been
identified to ensure that CCAM services can be
supported efficiently in cross-border scenarios. Faster
handover of a data connection from one operator to
another, generalized inter-mobile edge computing (MEC)
coordination, and quality of service (QoS) prediction
are some of the solutions that have been introduced to
reduce the uncertainties of a real 5G cross-border
deployment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 5G-V2X Communications and Networking for
Connected and Autonomous Vehicles.",
}
@Article{Yankson:2020:TET,
author = "Samuel Yankson and Mahdi Ghamkhari",
title = "Transactive Energy to Thwart Load Altering Attacks on
Power Distribution Systems",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "1",
pages = "4",
day = "24",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12010004",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:41 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/1/4",
abstract = "The automatic generation control mechanism in power
generators comes into operation whenever an over-supply
or under-supply of energy occurs in the power grid. It
has been shown that the automatic generation control
mechanism is highly vulnerable to load altering
attacks. In this type of attack, the power consumption
of multiple electric loads in power distribution
systems is remotely altered by cyber attackers in such
a way that the automatic generation control mechanism
is disrupted and is hindered from performing its
pivotal role. The existing literature on load altering
attacks has studied implementation, detection, and
location identification of these attacks. However, no
prior work has ever studied design of an
attack-thwarting system that can counter load altering
attacks, once they are detected in the power grid. This
paper addresses the above shortcoming by proposing an
attack-thwarting system for countering load altering
attacks. The proposed system is based on provoking
real-time adjustment in power consumption of the
flexible loads in response to the frequency
disturbances caused by the load altering attacks. To
make the adjustments in-proportion to the frequency
disturbances, the proposed attack-thwarting system uses
a transactive energy framework to establish a
coordination between the flexible loads and the power
grid operator.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Global Trends and Advances Towards a
Smarter Grid and Smart Cities.",
}
@Article{Lei:2020:DBC,
author = "Jianjun Lei and Ying Wang and Hong Yun",
title = "Decoupling-Based Channel Access Mechanism for
Improving Throughput and Fairness in Dense Multi-Rate
{WLANs}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "1",
pages = "3",
day = "23",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12010003",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:41 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/1/3",
abstract = "Legacy IEEE 802.11 Medium Access Control (MAC) adopts
the Distributed Coordination Function (DCF) mechanism,
which provides the same access opportunity for all
contenders. However, in dense multi-rate Wireless Local
Area Networks (WLANs), the pure distributed control
mechanism will cause high collision rate and
performance anomaly, which results in low network
utilization and wasting valuable channel resources. In
this paper, we present a decoupling MAC mechanism
(DMAC) based on the idea of contention/reservation to
reduce collision and realize collision free data
transmission. In proposed mechanism, the channel access
time is partitioned into channel contention process and
data transmission process. The proposed algorithm makes
full use of the distributed random channel access
mechanism and performs a centralized collision-free
data transmission. Wherein, we also design an adaptive
algorithm to adjust the length of the contention period
to improve the channel utilization. Furthermore, we
further propose two airtime fairness algorithms
Improve-DMAC1 (I-DMAC1) and Improve-DMAC2 (I-DMAC2) for
delay sensitive network and high throughput network
scenarios, respectively, to solve the performance
anomaly in multi-rate WLANs, based on DMAC. We verify
the effectiveness of these decoupling algorithms
through extensive simulations. Moreover, the simulation
results show that the proposed algorithms achieve
better performance than the 802.11 standard and other
protocols.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Internet of Things.",
}
@Article{An:2020:ADP,
author = "Wen An and Jun Jie Ma and Hong Yang Zhou and Hong Shan
Chen and Xu Jun and Xu Jian",
title = "An Adaptive Differential Protection and Fast
Auto-Closing System for {10 kV} Distribution Networks
Based on {4G LTE} Wireless Communication",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "1",
pages = "2",
day = "20",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12010002",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:41 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/1/2",
abstract = "With the development of wireless communication
technology and computer technology, more and more smart
technologies have been applied in electricity
distribution networks. This paper presents an adaptive
current differential protection and fast auto-closing
system for application in 10 kV distribution networks
in China Southern Power Grid. The current differential
protection can adaptively change its settings according
to the topology change of the primary distribution
networks, thus the system effectively reduces the
operation and maintenance cost of the power
distribution network. In order to restore the power
supply for the healthy part of the 10 kV networks
quickly after a power system fault is cleared, the
protection and control system provides wide area
control function for automatic fault isolation and
automatic switching. The traditional overcurrent
protection and control system have no fault location
function, it may take several minutes or even hours to
manually locate a fault and then restore the power
supply. Compared with the protection and control system
of the traditional 10 kV distribution networks, the
system developed can locate and isolate faults within
900 ms (assuming that the operating time of the load
switch is 700 ms), and can quickly restore power supply
in less than one second after a power system fault is
cleared.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Global Trends and Advances Towards a
Smarter Grid and Smart Cities.",
}
@Article{Yang:2020:CEE,
author = "Jie Yang and Ziyu Pan and Lihong Guo",
title = "Coverage and Energy Efficiency Analysis for Two-Tier
Heterogeneous Cellular Networks Based on {Mat{\'e}rn}
Hard-Core Process",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "1",
pages = "1",
day = "19",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:41 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/1/1",
abstract = "Due to the dense deployment of base stations (BSs) in
heterogeneous cellular networks (HCNs), the energy
efficiency (EE) of HCN has attracted the attention of
academia and industry. Considering its mathematical
tractability, the Poisson point process (PPP) has been
employed to model HCNs and analyze their performance
widely. The PPP falls short in modeling the effect of
interference management techniques, which typically
introduces some form of spatial mutual exclusion among
BSs. In PPP, all the nodes are independent from each
other. As such, PPP may not be suitable to model
networks with interference management techniques, where
there exists repulsion among the nodes. Considering
this, we adopt the Mat{\'e}rn hard-core process (MHCP)
instead of PPP, in which no two nodes can be closer
than a repulsion radius from one another. In this
paper, we study the coverage performance and EE of a
two-tier HCN modelled by Mat{\'e}rn hard-core process
(MHCP); we abbreviate this kind of two-tier HCN as
MHCP-MHCP. We first derive the approximate expression
of coverage probability of MHCP-MHCP by extending the
approximate signal to interference ratio analysis based
on the PPP (ASAPPP) method to multi-tier HCN. The
concrete SIR gain of the MHCP model relative to the PPP
model is derived through simulation and data fitting.
On the basis of coverage analysis, we derive and
formulate the EE of MHCP-MHCP network. Simulation
results verify the correctness of our theoretical
analysis and show the performance difference between
the MHCP-MHCP and PPP modelled network.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kapsoulis:2020:KYC,
author = "Nikolaos Kapsoulis and Alexandros Psychas and Georgios
Palaiokrassas and Achilleas Marinakis and Antonios
Litke and Theodora Varvarigou",
title = "Know Your Customer {(KYC)} Implementation with Smart
Contracts on a Privacy-Oriented Decentralized
Architecture",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "41",
day = "24",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020041",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/41",
abstract = "Enterprise blockchain solutions attempt to solve the
crucial matter of user privacy, albeit that blockchain
was initially directed towards full transparency. In
the context of Know Your Customer (KYC)
standardization, a decentralized schema that enables
user privacy protection on enterprise blockchains is
proposed with two types of developed smart contracts.
Through the public KYC smart contract, a user registers
and uploads their KYC information to the exploited IPFS
storage, actions interpreted in blockchain transactions
on the permissioned blockchain of Alastria Network.
Furthermore, through the public KYC smart contract, an
admin user approves or rejects the validity and
expiration date of the initial user's KYC documents.
Inside the private KYC smart contract, CRUD (Create,
read, update and delete) operations for the KYC file
repository occur. The presented system introduces
effectiveness and time efficiency of operations through
its schema simplicity and smart integration of the
different technology modules and components. This
developed scheme focuses on blockchain technology as
the most important and critical part of the
architecture and tends to accomplish an optimal schema
clarity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Social Web, New Media, Algorithms and
Power.",
}
@Article{Talamo:2020:BBP,
author = "Maurizio Talamo and Franco Arcieri and Andrea Dimitri
and Christian H. Schunck",
title = "A Blockchain based {PKI} Validation System based on
Rare Events Management",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "40",
day = "14",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020040",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/40",
abstract = "Public key infrastructures (PKIs) are the cornerstone
for the security of the communication layer of online
services relying on certificate-based authentication,
such as e-commerce, e-government, online banking, cloud
services, and many others. A PKI is an infrastructure
based on a hierarchical model, but the use of PKIs in
non-hierarchical contexts has exposed them to many
types of attacks. Here, we discuss weaknesses exploited
in past attacks and we propose a solution based on an
original consensus algorithm developed for use on
blockchain technology. In this implementation we retain
the full functionality around X.509 certificates, i.e.,
for the triad (server name, server address, X.509
server certificate), and demonstrate a mechanism for
obtaining fast consensus. The main properties of the
solution are that a consensus may be reached even when
not all members of the involved PKI participate in a
transaction, and that no advanced trust agreement among
PKIs is needed. The proposed solution is able to detect
PKI attacks and can distinguish errors from attacks,
allowing precise management of anomalies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Blockchain: Current Challenges and
Future Prospects/Applications.",
}
@Article{Su:2020:HGR,
author = "Zichun Su and Jialin Jiang",
title = "Hierarchical Gated Recurrent Unit with Semantic
Attention for Event Prediction",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "39",
day = "14",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020039",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/39",
abstract = "Event prediction plays an important role in financial
risk assessment and disaster warning, which can help
government decision-making and economic investment.
Previous works are mainly based on time series for
event prediction such as statistical language model and
recurrent neural network, while ignoring the impact of
prior knowledge on event prediction. This makes the
direction of event prediction often biased or wrong. In
this paper, we propose a hierarchical event prediction
model based on time series and prior knowledge. To
ensure the accuracy of the event prediction, the model
obtains the time-based event information and prior
knowledge of events by Gated Recurrent Unit and
Associated Link Network respectively. The semantic
selective attention mechanism is used to fuse the
time-based event information and prior knowledge, and
finally generate predicted events. Experimental results
on Chinese News datasets demonstrate that our model
significantly outperforms the state-of-the-art methods,
and increases the accuracy by 2.8\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Big Data and Augmented Intelligence.",
}
@Article{Restrepo:2020:CTT,
author = "Sandra Restrepo and Dubis Rinc{\'o}n and Edwin
Sepulveda",
title = "Cognitive Training for the Treatment of Addictions
Mediated by Information and Communication Technologies
{(ICT)}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "38",
day = "14",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020038",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/38",
abstract = "This work constitutes a narrative review of the state
of knowledge and advances in the intervention and
treatment of addictions through the use of information
and communication technologies, considering the growing
demand for virtuality-mediated strategies that
facilitate the approach of problems of public health
such as addictions, which increase considerably year
after year. To this end, the reader will be provided
with a current overview of the drug use trend;
subsequently, a conceptualization of the concept of
addiction and its understanding from a neurobiological
perspective and, finally, the progress in terms of
intervention processes and therapeutic approach will be
presented; which will imply an approach to the concept
of e-health and rehabilitation mediated by information
and communication technologies (ICT).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet of Healthcare Things (IoHT):
Methods, Advances, and Applications.",
}
@Article{Malik:2020:GTA,
author = "Om P. Malik",
title = "Global Trends and Advances Towards a Smarter Grid and
Smart Cities",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "37",
day = "14",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020037",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/37",
abstract = "Taking advantage of new developing technologies, power
systems are being developed into smarter grids with the
vision of becoming the next-generation electric grid
for smart cities. Some of the emerging issues and
challenges associated with the development of
technologies for smarter grids and smart cities are
highlighted in this special issue of the Future
Internet journal.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Global Trends and Advances Towards a
Smarter Grid and Smart Cities.",
}
@Article{Zhou:2020:LSM,
author = "Yi Zhou and Fenglei Yang",
title = "Latent Structure Matching for Knowledge Transfer in
Reinforcement Learning",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "36",
day = "13",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020036",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/36",
abstract = "Reinforcement learning algorithms usually require a
large number of empirical samples and give rise to a
slow convergence in practical applications. One
solution is to introduce transfer learning: Knowledge
from well-learned source tasks can be reused to reduce
sample request and accelerate the learning of target
tasks. However, if an unmatched source task is
selected, it will slow down or even disrupt the
learning procedure. Therefore, it is very important for
knowledge transfer to select appropriate source tasks
that have a high degree of matching with target tasks.
In this paper, a novel task matching algorithm is
proposed to derive the latent structures of value
functions of tasks, and align the structures for
similarity estimation. Through the latent structure
matching, the highly-matched source tasks are selected
effectively, from which knowledge is then transferred
to give action advice, and improve exploration
strategies of the target tasks. Experiments are
conducted on the simulated navigation environment and
the mountain car environment. The results illustrate
the significant performance gain of the improved
exploration strategy, compared with traditional $
\epsilon $-greedy exploration strategy. A theoretical
proof is also given to verify the improvement of the
exploration strategy based on latent structure
matching.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fotiou:2020:ICN,
author = "Nikos Fotiou",
title = "Information-Centric Networking {(ICN)}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "35",
day = "13",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020035",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/35",
abstract = "Information-Centric Networking (ICN) is novel paradigm
considered for the future Internet, as well as for
emerging architectures, such as the Internet of Things.
Despite the significant research efforts that take
place all around the world there are still many
challenges and open issues related to the applicability
of ICN. The papers of this special issue, six in total,
identify such challenges, and propose solutions, design
guidelines, and new research directions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Information-Centric Networking (ICN).",
}
@Article{Wang:2020:UME,
author = "Xiaofan Wang and Lingyu Xu",
title = "Unsteady Multi-Element Time Series Analysis and
Prediction Based on Spatial-Temporal Attention and
Error Forecast Fusion",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "34",
day = "13",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020034",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/34",
abstract = "Harmful algal blooms (HABs) often cause great harm to
fishery production and the safety of human lives.
Therefore, the detection and prediction of HABs has
become an important issue. Machine learning has been
increasingly used to predict HABs at home and abroad.
However, few of them can capture the sudden change of
Chl-a in advance and handle the long-term dependencies
appropriately. In order to address these challenges,
the Long Short-Term Memory (LSTM) based
spatial-temporal attentions model for Chlorophyll-a
(Chl-a) concentration prediction is proposed, a model
which can capture the correlation between various
factors and Chl-a adaptively and catch dynamic temporal
information from previous time intervals for making
predictions. The model can also capture the stage of
Chl-a when values soar as red tide breaks out in
advance. Due to the instability of the current Chl-a
concentration prediction model, the model is also
applied to make a prediction about the forecast
reliability, to have a basic understanding of the range
and fluctuation of model errors and provide a reference
to describe the range of marine disasters. The data
used in the experiment is retrieved from Fujian Marine
Forecasts Station from 2009 to 2011 and is combined
into 8-dimension data. Results show that the proposed
approach performs better than other Chl-a prediction
algorithms (such as Attention LSTM and Seq2seq and back
propagation). The result of error prediction also
reveals that the error forecast method possesses
established advantages for red tides prevention and
control.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Shuaieb:2020:RRF,
author = "Wafa Shuaieb and George Oguntala and Ali AlAbdullah
and Huthaifa Obeidat and Rameez Asif and Raed A.
Abd-Alhameed and Mohammed S. Bin-Melha and Chakib
Kara-Za{\"\i}tri",
title = "{RFID} {RSS} Fingerprinting System for Wearable Human
Activity Recognition",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "33",
day = "12",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020033",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/33",
abstract = "Alternative healthcare solutions have been identified
as a viable approach to ameliorate the increasing
demand for telehealth and prompt healthcare delivery.
Moreover, indoor localization using different
technologies and approaches have greatly contributed to
alternative healthcare solutions. In this paper, a
cost-effective, radio frequency identification
(RFID)-based indoor location system that employs
received signal strength (RSS) information of passive
RFID tags is presented. The proposed system uses RFID
tags placed at different positions on the target body.
The mapping of the analysed data against a set of
reference position datasets is used to accurately track
the vertical and horizontal positioning of a patient
within a confined space in real-time. The Euclidean
distance model achieves an accuracy of 98\% for all
sampled activities. However, the accuracy of the
activity recognition algorithm performs below the
threshold performance for walking and standing, which
is due to similarities in the target height, weight and
body density for both activities. The obtained results
from the proposed system indicate significant
potentials to provide reliable health measurement tool
for patients at risk.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jeon:2020:DEC,
author = "Soobin Jeon",
title = "Data Exchange in Cluster Structure for Longevity of
{IoT}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "32",
day = "12",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020032",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/32",
abstract = "In the Internet of Things (IoT), the scope of wireless
sensor nodes is extended to things deployed in a
pervasive world. For various IoT service applications,
things can gather and share their information with each
other through self-decision-making. Therefore, we
cannot apply the existing information aggregation
methods of wireless sensor networks to the IoT
environment, which aim to transmit the collected data
to only a sink node or a central server. Moreover,
since the existing methods involve all the sensor nodes
in the process of data exchange, they can cause an
increase in the network traffic, delay of data
transmission, and amount of energy consumed by things.
In this paper, we propose a clustering-property-based
data exchange method for efficient energy consumption
in IoT networks. First, the proposed method assigns
properties to each thing according to the
characteristics of the obtained data. Second, it
constructs a cluster network considering the location
of things and their energy consumption. Finally, the
things in a cluster communicate with other things in a
different cluster based on their properties. In the
experiment, the proposed method exhibits a better
performance than the existing method. Owing to the
energy-saving effect, we demonstrate that the proposed
method results in a more reliable network and improves
the longevity of IoT networks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Delay-Tolerant Networking.",
}
@Article{Tomaiuolo:2020:STD,
author = "Michele Tomaiuolo and Gianfranco Lombardo and Monica
Mordonini and Stefano Cagnoni and Agostino Poggi",
title = "A Survey on Troll Detection",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "31",
day = "10",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020031",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/31",
abstract = "A troll is usually defined as somebody who provokes
and offends people to make them angry, who wants to
dominate any discussion or who tries to manipulate
people's opinions. The problems caused by such persons
have increased with the diffusion of social media.
Therefore, on the one hand, press bodies and magazines
have begun to address the issue and to write articles
about the phenomenon and its related problems while, on
the other hand, universities and research centres have
begun to study the features characterizing trolls and
to look for solutions for their identification. This
survey aims at introducing the main researches
dedicated to the description of trolls and to the study
and experimentation of methods for their detection.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Featured Reviews of Future Internet
Research.",
}
@Article{Zhao:2020:ITC,
author = "Yafei Zhao and Paolo Vincenzo Genovese and Zhixing
Li",
title = "Intelligent Thermal Comfort Controlling System for
Buildings Based on {IoT} and {AI}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "30",
day = "10",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020030",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/python.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/30",
abstract = "With the improvement of technologies, people's demand
for intelligent devices of indoor and outdoor living
environments keeps increasing. However, the traditional
control system only adjusts living parameters
mechanically, which cannot better meet the requirements
of human comfort intelligently. This article proposes a
building intelligent thermal comfort control system
based on the Internet of Things and intelligent
artificial intelligence. Through the literature review,
various algorithms and prediction methods are analyzed
and compared. The system can automatically complete a
series of operations through IoT hardware devices which
are located at multiple locations in the building with
key modules. The code is developed and debugged by
Python to establish a model for energy consumption
prediction with environmental factors such as
temperature, humidity, radiant temperature, and air
velocity on thermal comfort indicators. By using the
simulation experiments, 1700 data sets are used for
training. Then, the output PMV predicted values are
compared with the real figure. The results show that
the performance of this system is superior to
traditional control on energy-saving and comfort.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet of Things and Ambient
Intelligence.",
}
@Article{Ghaddar:2020:EEA,
author = "Alia Ghaddar and Ahmad Merei",
title = "{EAOA}: Energy-Aware Grid-Based 3D-Obstacle Avoidance
in Coverage Path Planning for {UAVs}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "29",
day = "08",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020029",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/29",
abstract = "The presence of obstacles like a tree, buildings, or
birds along the path of a drone has the ability to
endanger and harm the UAV's flight mission. Avoiding
obstacles is one of the critical challenging keys to
successfully achieve a UAV's mission. The path planning
needs to be adapted to make intelligent and accurate
avoidance online and in time. In this paper, we propose
an energy-aware grid based solution for obstacle
avoidance (EAOA). Our work is based on two phases: in
the first one, a trajectory path is generated offline
using the area top-view. The second phase depends on
the path obtained in the first phase. A camera captures
a frontal view of the scene that contains the obstacle,
then the algorithm determines the new position where
the drone has to move to, in order to bypass the
obstacle. In this paper, the obstacles are static. The
results show a gain in energy and completion time using
3D scene information compared to 2D scene
information.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue The Internet of Things for Smart
Environments.",
}
@Article{DiMartino:2020:MBC,
author = "Beniamino {Di Martino} and Salvatore Venticinque and
Antonio Esposito and Salvatore D'Angelo",
title = "A Methodology Based on Computational Patterns for
Offloading of Big Data Applications on Cloud-Edge
Platforms",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "28",
day = "07",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020028",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/28",
abstract = "Internet of Things (IoT) is becoming a widespread
reality, as interconnected smart devices and sensors
have overtaken the IT market and invaded every aspect
of the human life. This kind of development, while
already foreseen by IT experts, implies additional
stress to already congested networks, and may require
further investments in computational power when
considering centralized and Cloud based solutions. That
is why a common trend is to rely on local resources,
provided by smart devices themselves or by aggregators,
to deal with part of the required computations: this is
the base concept behind Fog Computing, which is
becoming increasingly adopted as a distributed
calculation solution. In this paper a methodology,
initially developed within the TOREADOR European
project for the distribution of Big Data computations
over Cloud platforms, will be described and applied to
an algorithm for the prediction of energy consumption
on the basis of data coming from home sensors, already
employed within the CoSSMic European Project. The
objective is to demonstrate that, by applying such a
methodology, it is possible to improve the calculation
performances and reduce communication with centralized
resources.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Performance Evaluation in the Era of
Cloud and Edge Computing.",
}
@Article{Yu:2020:SSV,
author = "Miao Yu and Jianwei Zhuge and Ming Cao and Zhiwei Shi
and Lin Jiang",
title = "A Survey of Security Vulnerability Analysis,
Discovery, Detection, and Mitigation on {IoT} Devices",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "27",
day = "06",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020027",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/27",
abstract = "With the prosperity of the Internet of Things (IoT)
industry environment, the variety and quantity of IoT
devices have grown rapidly. IoT devices have been
widely used in smart homes, smart wear, smart
manufacturing, smart cars, smart medical care, and many
other life-related fields. With it, security
vulnerabilities of IoT devices are emerging endlessly.
The proliferation of security vulnerabilities will
bring severe risks to users' privacy and property. This
paper first describes the research background,
including IoT architecture, device components, and
attack surfaces. We review state-of-the-art research on
IoT device vulnerability discovery, detection,
mitigation, and other related works. Then, we point out
the current challenges and opportunities by evaluation.
Finally, we forecast and discuss the research
directions on vulnerability analysis techniques of IoT
devices.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Featured Reviews of Future Internet
Research.",
}
@Article{Wang:2020:NLC,
author = "Jiong Wang and Hua Zhang and Dongliang Lin and Huibin
Feng and Tao Wang and Hongyan Zhang and Xiaoding Wang",
title = "A Novel Low-Complexity Fault Diagnosis Algorithm for
Energy {Internet} in Smart Cities",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "26",
day = "06",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020026",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/26",
abstract = "The smart energy system, viewed as an ``Energy
Internet'', consists of the intelligent integration of
decentralized sustainable energy sources, efficient
distribution, and optimized power consumption. That
implies the fault diagnosis for a smart energy system
should be of low complexity. In this paper, we propose
a Strong Tracking Unscented Kalman Filter (STUKF) and
modified Bayes' classification-based Modified Three
Sigma test (MTS), abbreviated as SFBT, for smart energy
networks. The theoretical analysis and simulations
indicate that SFBT detects faults with a high accuracy
and a low complexity of $ O(n) $.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Energy Internet for Green Cities.",
}
@Article{Marchiori:2020:SSS,
author = "Massimo Marchiori and Lino Possamai",
title = "Strategies of Success for Social Networks: Mermaids
and Temporal Evolution",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "25",
day = "04",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020025",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/25",
abstract = "The main goal of this article is to investigate
techniques that can quickly lead to successful social
systems by boosting network connectivity. This is
especially useful when starting new online communities
where the aim is to increase the system utilization as
much as possible. This aspect is very important
nowadays, given the existence of many online social
networks available on the web, and the relatively high
level of competition. In other words, attracting users'
attention is becoming a major concern, and time is an
essential factor when investing money and resources
into online social systems. Our study describes an
effective technique that deals with this issue by
introducing the notion of mermaids, special attractors
that alter the normal evolutive behavior of a social
system. We analyze how mermaids can boost social
networks, and then provide estimations of fundamental
parameters that business strategists can take into
account in order to obtain successful systems within a
constrained budget.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Duradoni:2020:WBS,
author = "Mirko Duradoni and Federico Innocenti and Andrea
Guazzini",
title = "Well-Being and Social Media: a Systematic Review of
{Bergen} Addiction Scales",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "24",
day = "29",
month = jan,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020024",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/24",
abstract = "Does social media addiction impair the well-being of
non-clinical individuals? Despite the Internet being
able to be considered as a promoting factor for
individual empowerment, previous literature suggests
that the current massive availability of Information
and Communication Technologies (ICT) may be dangerous
for users' well-being. This article discusses the
relationship between the most used social media
addiction measures (i.e., the Bergen Facebook Addiction
Scale --- BFAS, the Bergen Social Media Addiction Scale
--- BSMAS) and well-being. A systematic review
considering all the publications indexed by PsycInfo,
PsycArticles, PubMed, Science Direct, Sociological
Abstracts, Academic Search Complete, and Google Scholar
databases was performed to collect the data. Ten of 635
studies were included in the qualitative synthesis.
Overall, most of the included works captured a negative
but small relationship between BFAS/BSMAS and
well-being, across multiple definitions and
measurement.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Featured Reviews of Future Internet
Research.",
}
@Article{Kungne:2020:RBL,
author = "Willy Kengne Kungne and Georges-Edouard Kouamou and
Claude Tangha",
title = "A Rule-Based Language and Verification Framework of
Dynamic Service Composition",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "23",
day = "26",
month = jan,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020023",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/23",
abstract = "The emergence of BPML (Business Process Modeling
Language) has favored the development of languages for
the composition of services. Process-oriented
approaches produce imperative languages, which are
rigid to change at run-time because they focus on how
the processes should be built. Despite the fact that
semantics is introduced in languages to increase their
flexibility, dynamism is limited to find services that
have disappeared or become defective. They do not offer
the possibility to adapt the composite service to
execution. Although rules-based languages were
introduced, they remain very much dependent on the BPML
which is the underlying technology. This article
proposes the specification of a rule-based declarative
language for the composition of services. It consists
of the syntactic categories which make up the concepts
of the language and a formal description of the
operational semantics that highlights the dynamism, the
flexibility and the adaptability of the language thus
defined. This paper also presents a verification
framework made of a formal aspect and a toolset. The
verification framework translates service
specifications into Promela for model checking. Then, a
validation framework is proposed that translates the
verified specifications to the operational system.
Finally, a case study is presented.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Oliveira:2020:MCI,
author = "Thays A. Oliveira and Yuri B. Gabrich and Helena
Ramalhinho and Miquel Oliver and Miri W. Cohen and Luiz
S. Ochi and Serigne Gueye and F{\'a}bio Protti and
Alysson A. Pinto and Di{\'o}genes V. M. Ferreira and
Igor M. Coelho and Vitor N. Coelho",
title = "Mobility, Citizens, Innovation and Technology in
Digital and Smart Cities",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "22",
day = "26",
month = jan,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020022",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/22",
abstract = "Cities are constantly transforming and, consequently,
attracting efforts from researchers and opportunities
to the industry. New transportation systems are being
built in order to meet sustainability and efficiency
criteria, as well as being adapted to the current
possibilities. Moreover, citizens are becoming aware
about the power and possibilities provided by the
current generation of autonomous devices. In this
sense, this paper presents and discusses
state-of-the-art transportation technologies and
systems, highlighting the advances that the concepts of
Internet of Things and Value are providing.
Decentralized technologies, such as blockchain, are
been extensively investigated by the industry, however,
its widespread adoption in cities is still desirable.
Aligned with operations research opportunities, this
paper identifies different points in which cities'
services could move to. This also study comments about
different combinatorial optimization problems that
might be useful and important for an efficient
evolution of our cities. By considering different
perspectives, didactic examples are presented with a
main focus on motivating decision makers to balance
citizens, investors and industry goals and wishes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Smart Cities, Innovation, and
Multi-Dimensionality.",
}
@Article{Abdo:2020:APP,
author = "Ahmad Abdo and Claude D'Amours",
title = "Adaptive Pre\slash Post-Compensation of Cascade
Filters in Coherent Optical Transponders",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "21",
day = "24",
month = jan,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020021",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/21",
abstract = "We propose an adaptive joint pre- and
post-compensation to correct the filtering effects
caused by cascading reconfigurable optical add drop
multiplexers (ROADMs). The improvement is achieved
without using additional hardware (HW) on the link or
within the signal processor in the transponders. Using
Monte Carlo simulations, the gradient-descent based
method shows an improvement of 0.6 dB and 1.1 dB in the
required optical signal-to-noise ratio (R-OSNR) at the
threshold pre-decoder bit error rate (BER) of 0.02
versus pre-compensation only in the linear and
nonlinear operating region of fiber respectively. We
experimentally verified the method with lab
measurements in the presence of heavy filtering and
optical impairments. We observed a gain up to $ \approx
0.4 $ dB compared to typically used pre-compensation
only. Additionally, other tangible system benefits of
our method are listed and discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Network Virtualization and Edge/Fog
Computing.",
}
@Article{Kakkavas:2020:RAA,
author = "Grigorios Kakkavas and Despoina Gkatzioura and
Vasileios Karyotis and Symeon Papavassiliou",
title = "A Review of Advanced Algebraic Approaches Enabling
Network Tomography for Future Network Infrastructures",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "20",
day = "22",
month = jan,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020020",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/20",
abstract = "Network tomography has emerged as one of the lean
approaches for efficient network monitoring, especially
aiming at addressing the ever-increasing requirements
for scaling and efficiency in modern network
architectures and infrastructures. In this paper, we
explore network coding and compressed sensing as
enabling technologies in the context of network
tomography. Both approaches capitalize on algebraic
tools for achieving accuracy while allowing scaling of
operation as the size of the monitored network
increases. Initially, a brief overview of the
tomographic problems and the related classification of
methods is provided to better comprehend the problems
encountered and solutions provided to date.
Subsequently, we present representative approaches that
employ either one of the aforementioned technologies
and we comparatively describe their fundamental
operation. Eventually, we provide a qualitative
comparison of features and approaches that can be used
for further research and technology development for
network monitoring in future Internet
infrastructures.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Featured Reviews of Future Internet
Research.",
}
@Article{Ghaddar:2020:MAC,
author = "Alia Ghaddar and Monah Bou Hatoum and Ghassan
Fadlallah and Hamid Mcheick",
title = "{MCCM}: An Approach for Connectivity and Coverage
Maximization",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "2",
pages = "19",
day = "21",
month = jan,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12020019",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/2/19",
abstract = "The internet of Things (IoT) has attracted significant
attention in many applications in both academic and
industrial areas. In IoT, each object can have the
capabilities of sensing, identifying, networking and
processing to communicate with ubiquitous objects and
services. Often this paradigm (IoT) using Wireless
Sensor Networks must cover large area of interest (AoI)
with huge number of devices. As these devices might be
battery powered and randomly deployed, their long-term
availability and connectivity for area coverage is very
important, in particular in harsh environments.
Moreover, a poor distribution of devices may lead to
coverage holes and degradation to the quality of
service. In this paper, we propose an approach for
self-organization and coverage maximization. We present
a distributed algorithm for ``Maintaining Connectivity
and Coverage Maximization'' called MCCM. The algorithm
operates on different movable devices in homogeneous
and heterogeneous distribution. It does not require
high computational complexity. The main goal is to keep
the movement of devices as minimal as possible to save
energy. Another goal is to reduce the overlapping areas
covered by different devices to increase the coverage
while maintaining connectivity. Simulation results show
that the proposed algorithm can achieve higher coverage
and lower nodes' movement over existing algorithms in
the state of the art.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue The Internet of Things for Smart
Environments.",
}
@Article{Ferrag:2020:RRD,
author = "Mohamed Amine Ferrag and Leandros Maglaras and Ahmed
Ahmim and Makhlouf Derdour and Helge Janicke",
title = "{RDTIDS}: Rules and Decision Tree-Based Intrusion
Detection System for {Internet-of-Things} Networks",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "3",
pages = "44",
day = "02",
month = mar,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12030044",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/3/44",
abstract = "This paper proposes a novel intrusion detection system
(IDS), named RDTIDS, for Internet-of-Things (IoT)
networks. The RDTIDS combines different classifier
approaches which are based on decision tree and
rules-based concepts, namely, REP Tree, JRip algorithm
and Forest PA. Specifically, the first and second
method take as inputs features of the data set, and
classify the network traffic as Attack/Benign. The
third classifier uses features of the initial data set
in addition to the outputs of the first and the second
classifier as inputs. The experimental results obtained
by analyzing the proposed IDS using the CICIDS2017
dataset and BoT-IoT dataset, attest their superiority
in terms of accuracy, detection rate, false alarm rate
and time overhead as compared to state of the art
existing schemes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Reliability of
IoT---Selected Papers from SecRIoT 2019.",
}
@Article{Wu:2020:BLS,
author = "Pin Wu and Xuting Chang and Yang Yang and Xiaoqiang
Li",
title = "{BASN}-Learning Steganography with a Binary Attention
Mechanism",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "3",
pages = "43",
day = "27",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12030043",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/3/43",
abstract = "Secret information sharing through image carriers has
aroused much research attention in recent years with
images' growing domination on the Internet and mobile
applications. The technique of embedding secret
information in images without being detected is called
image steganography. With the booming trend of
convolutional neural networks (CNN),
neural-network-automated tasks have been embedded more
deeply in our daily lives. However, a series of wrong
labeling or bad captioning on the embedded images has
left a trace of skepticism and finally leads to a
self-confession like exposure. To improve the security
of image steganography and minimize task result
distortion, models must maintain the feature maps
generated by task-specific networks being irrelative to
any hidden information embedded in the carrier. This
paper introduces a binary attention mechanism into
image steganography to help alleviate the security
issue, and, in the meantime, increase embedding payload
capacity. The experimental results show that our method
has the advantage of high payload capacity with little
feature map distortion and still resist detection by
state-of-the-art image steganalysis algorithms.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kan:2020:LCP,
author = "MingSung Kan and Atsushi Ito",
title = "Language Cognition and Pronunciation Training Using
Applications",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "3",
pages = "42",
day = "25",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12030042",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Mar 2 12:22:42 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/3/42",
abstract = "In language learning, adults seem to be superior in
their ability to memorize knowledge of new languages
and have better learning strategies, experiences, and
intelligence to be able to integrate new knowledge.
However, unless one learns pronunciation in childhood,
it is almost impossible to reach a native-level accent.
In this research, we take the difficulties of learning
tonal pronunciation in Mandarin as an example and
analyze the difficulties of tone learning and the
deficiencies of general learning methods using the
cognitive load theory. With the tasks designed
commensurate with the learner's perception ability
based on perception experiments and small-step
learning, the perception training app is more effective
for improving the tone pronunciation ability compared
to existing apps with voice analysis function.
Furthermore, the learning effect was greatly improved
by optimizing the app interface and operation
procedures. However, as a result of the combination of
pronunciation practice and perception training,
pronunciation practice with insufficient feedback could
lead to pronunciation errors. Therefore, we also
studied pronunciation practice using machine learning
and aimed to train the model for the pronunciation task
design instead of classification. We used voices
designed as training data and trained a model for
pronunciation training, and demonstrated that
supporting pronunciation practice with machine learning
is practicable.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cognitive Infocommunications-Theory and
Applications.",
}
@Article{Giannakoulopoulos:2020:EDE,
author = "Andreas Giannakoulopoulos and Minas Pergantis and
Nikos Konstantinou and Aristeidis Lamprogeorgos and
Laida Limniati and Iraklis Varlamis",
title = "Exploring the Dominance of the {English} Language on
the {Websites} of {EU} Countries",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "4",
pages = "76",
day = "22",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12040076",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/4/76",
abstract = "The English language is the most dominant language in
the Western world and its influence can be noticed in
every aspect of human communication. Its increasing
diffusion, especially since the turn of the century, is
hard to measure with conventional means. The present
research studies the use of language in websites of
European Union (EU) member states, in order to collect
data about the prevalence of the English language in
the different countries and regions of the European
Union. To achieve a realistic representation of today's
landscape of the European Web, this study uses a vast
population of websites and a representative sampling
size and methodology. By analyzing and processing the
findings from over 100,000 websites from every country
in the EU, a solid foundation is set that is used to
explore the dominance of the English language in the
European World Wide Web in general. This is the first
study that examines the presence of English content in
the websites of all EU member countries and provides
statistical evidence regarding the ratio of English
content availability for each country. Conclusively,
the results of the research demonstrate that the
English language is available on more than one quarter
of all websites of non-English speaking EU member
states. Moreover, it is available in the vast majority
of multilingual and bilingual websites, while at the
same time being the only language that is available in
a number of monolingual websites. In addition, it is
shown preference over the national language in a
significant number of cases. A moderate negative
correlation is found between a member state's
population and the availability of English in these
countries' websites and the same holds true for a
member state's Gross Domestic Product (GDP). Both these
correlations indicate that smaller countries tend to
provide more content in English in order to establish a
stronger presence in the international environment.
Taking into account the role of language in the
expression of national identity, this study provides
data and insights which may contribute to the
discussion about the changes underway in the national
identity of EU member states.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yang:2020:MBS,
author = "Wenzhong Yang and Tingting Yuan and Liejun Wang",
title = "Micro-Blog Sentiment Classification Method Based on
the Personality and Bagging Algorithm",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "4",
pages = "75",
day = "20",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12040075",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/4/75",
abstract = "Integrated learning can be used to combine weak
classifiers in order to improve the effect of emotional
classification. Existing methods of emotional
classification on micro-blogs seldom consider utilizing
integrated learning. Personality can significantly
influence user expressions but is seldom accounted for
in emotional classification. In this study, a
micro-blog emotion classification method is proposed
based on a personality and bagging algorithm (PBAL).
Introduce text personality analysis and use rule-based
personality classification methods to divide five
personality types. The micro-blog text is first
classified using five personality basic emotion
classifiers and a general emotion classifier. A long
short-term memory language model is then used to train
an emotion classifier for each set, which are then
integrated together. Experimental results show that
compared with traditional sentiment classifiers, PBAL
has higher accuracy and recall. The F value has
increased by 9\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rustamov:2020:DDA,
author = "Fayozbek Rustamov and Juhwan Kim and JooBeom Yun",
title = "{DeepDiver}: Diving into Abysmal Depth of the Binary
for Hunting Deeply Hidden Software Vulnerabilities",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "4",
pages = "74",
day = "18",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12040074",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/4/74",
abstract = "Fuzz testing is a simple automated software testing
approach that discovers software vulnerabilities at a
high level of performance by using randomly generated
seeds. However, it is restrained by coverage and thus,
there are chances of finding bugs entrenched in the
deep execution paths of the program. To eliminate these
limitations in mutational fuzzers, patching-based
fuzzers and hybrid fuzzers have been proposed as
groundbreaking advancements which combine two software
testing approaches. Despite those methods having
demonstrated high performance across different
benchmarks such as DARPA CGC programs, they still
present deficiencies in their ability to analyze deeper
code branches and in bypassing the roadblocks checks
(magic bytes, checksums) in real-world programs. In
this research, we design DeepDiver, a novel
transformational hybrid fuzzing tool that explores
deeply hidden software vulnerabilities. Our approach
tackles limitations exhibited by existing hybrid
fuzzing frameworks, by negating roadblock checks (RC)
in the program. By negating the RCs, the hybrid fuzzer
can explore new execution paths to trigger bugs that
are hidden in the abysmal depths of the binary. We
combine AFL++ and concolic execution engine and
leveraged the trace analyzer approach to construct the
tree for each input to detect RCs. To demonstrate the
efficiency of DeepDiver, we tested it with the LAVA-M
dataset and eight large real-world programs. Overall,
DeepDiver outperformed existing software testing tools,
including the patching-based fuzzer and
state-of-the-art hybrid fuzzing techniques. On average,
DeepDiver discovered vulnerabilities 32.2\% and 41.6\%
faster than QSYM and AFLFast respectively, and it
accomplished in-depth code coverage.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Social Networks
and Solutions.",
}
@Article{Vogel:2020:WOI,
author = "Bahtijar Vogel and Yuji Dong and Blerim Emruli and
Paul Davidsson and Romina Spalazzese",
title = "What Is an Open {IoT} Platform? {Insights} from a
Systematic Mapping Study",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "4",
pages = "73",
day = "18",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12040073",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/4/73",
abstract = "Today, the Internet of Things (IoT) is mainly
associated with vertically integrated systems that
often are closed and fragmented in their applicability.
To build a better IoT ecosystem, the open IoT platform
has become a popular term in the recent years. However,
this term is usually used in an intuitive way without
clarifying the openness aspects of the platforms. The
goal of this paper is to characterize the openness
types of IoT platforms and investigate what makes them
open. We conducted a systematic mapping study by
retrieving data from 718 papers. As a result of
applying the inclusion and exclusion criteria, 221
papers were selected for review. We discovered 46 IoT
platforms that have been characterized as open, whereas
25 platforms are referred as open by some studies
rather than the platforms themselves. We found that the
most widely accepted and used open IoT platforms are
NodeMCU and ThingSpeak that together hold a share of
more than 70\% of the declared open IoT platforms in
the selected papers. The openness of an IoT platform is
interpreted into different openness types. Our study
results show that the most common openness type
encountered in open IoT platforms is open-source, but
also open standards, open APIs, open data and open
layers are used in the literature. Finally, we propose
a new perspective on how to define openness in the
context of IoT platforms by providing several insights
from the different stakeholder viewpoints.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Internet of Things.",
}
@Article{Krol:2020:AIW,
author = "Karol Kr{\'o}l and Dariusz Zdonek",
title = "Aggregated Indices in {Website} Quality Assessment",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "4",
pages = "72",
day = "17",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12040072",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/4/72",
abstract = "Website users have increasingly high expectations
regarding website quality, starting from performance
and ending up with the content. This article provides a
list and characteristics of selected website quality
indices and testing applications that are available
free of charge. Aggregated website quality indices were
characterised based on a review of various source
materials, including the academic literature and
Internet materials. Aggregated website quality indices
are usually developed with a less specialised user
(customer) searching for descriptive information in
mind. Their presentation is focused on aesthetic
sensations. Most frequently, their values are expressed
in points or percent. Many of these indices appear to
be of little substantive value, as they present
approximate, estimated values. These indices, however,
are of great marketing value instead. Specific
(``single'') indices are of a specialised nature. They
are more difficult to interpret and address the subtle
aspects of website and web application functioning.
They offer great value to designers and software
developers. They indicate critical spots which affect
the website quality. Most of them are expressed
precisely, often up to two or three decimal places, in
specific units. Algorithmic tests for website quality,
whose results are presented using indices, enable a
reduction in the cost intensiveness of tests as well as
an increase in their number and frequency, as the tests
are repetitive and their number is not limited. What is
more, they allow the results to be compared.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Social Web, New Media, Algorithms and
Power.",
}
@Article{Awad:2020:PAS,
author = "Nancy Awad and Jean-Fran{\c{c}}ois Couchot and Bechara
{Al Bouna} and Laurent Philippe",
title = "Publishing Anonymized Set-Valued Data via
Disassociation towards Analysis",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "4",
pages = "71",
day = "17",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12040071",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/4/71",
abstract = "Data publishing is a challenging task for privacy
preservation constraints. To ensure privacy, many
anonymization techniques have been proposed. They
differ in terms of the mathematical properties they
verify and in terms of the functional objectives
expected. Disassociation is one of the techniques that
aim at anonymizing of set-valued datasets (e.g.,
discrete locations, search and shopping items) while
guaranteeing the confidentiality property known as k m
-anonymity. Disassociation separates the items of an
itemset in vertical chunks to create ambiguity in the
original associations. In a previous work, we defined a
new ant-based clustering algorithm for the
disassociation technique to preserve some items
associated together, called utility rules, throughout
the anonymization process, for accurate analysis. In
this paper, we examine the disassociated dataset in
terms of knowledge extraction. To make data analysis
easy on top of the anonymized dataset, we define
neighbor datasets or in other terms datasets that are
the result of a probabilistic re-association process.
To assess the neighborhood notion set-valued datasets
are formalized into trees and a tree edit distance
(TED) is directly applied between these neighbors.
Finally, we prove the faithfulness of the neighbors to
knowledge extraction for future analysis, in the
experiments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Social Networks
and Solutions.",
}
@Article{Song:2020:DPD,
author = "Ha Yoon Song and Hyochang Han",
title = "A Design of a Parcel Delivery System for Point to
Point Delivery with {IoT} Technology",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "4",
pages = "70",
day = "17",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12040070",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/4/70",
abstract = "Recently, IoT technology, low power networking
technology for IoT, and geopositioning systems are very
useful tools for future applications. One of the
applications is the logistics system, especially for
the point to point delivery. The current parcel
delivery system is delivered through the logistics hub
despite latent economic disadvantages in terms of
delivery time and delivery distance. The major
disadvantage of current hub and spoke delivery system
is that individual parcels must go to the logistics hub
first even if the origin and destination are nearby or
within a distance that can be delivered through the
hub. These sorts of delivery are inefficient and
increase total expense of delivery in terms of delivery
time and delivery costs. We designed a new delivery
system of point to point delivery using IoT technology
and end-to-end IoT platform based on ThingPlug and LoRa
technology for fast delivery and less cost of delivery.
We designed an IoT device that can be part of parcels
or attached to parcels, which have various
functionalities including the capability to understand
current delivery routes with the use of geopositioning
systems. In addition, we addressed the difficulties
with issues such as linking IoT device into IoT
platforms and designing IoT device functionalities. We
also showed methods to improve the efficiency of IoT
based parcel delivery systems. The proposed system may
improve economics of parcel delivery system by reducing
travel distance for delivery and dissipation of
delivery time.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Internet of Things.",
}
@Article{Zia:2020:IRA,
author = "Kashif Zia and Muhammad Shafi and Umar Farooq",
title = "Improving Recommendation Accuracy Using Social Network
of Owners in Social {Internet of Vehicles}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "4",
pages = "69",
day = "16",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12040069",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/4/69",
abstract = "The latest manifestation of ``all connected world'' is
the Internet of Things (IoT), and Internet of Vehicles
(IoV) is one of the key examples of IoT these days. In
Social IoV (SIoV), each vehicle is treated as a social
object where it establishes and manages its own Social
Network (SN). Incidentally, most of the SIoV research
in the literature is related to proximity-based
connectivity and interactions. In this paper, we bring
people in the loop by incorporating their SNs. While
emphasizing a recommendation scenario, in which
vehicles may require recommendations from SNs of their
owners (in addition to their own SIoV), we proposed an
agent-based model of information sharing (for
context-based recommendations) on a hypothetical
population of smart vehicles. Some important hypotheses
were tested using a realistic simulation setting. The
simulation results reveal that a recommendation using
weak ties is more valuable than a recommendation using
strong ties in pure SIoV. The simulation results also
demonstrate that recommendations using the
most-connected person in the social network are not
more valuable than recommendation using a random person
in the social network. The model presented in this
paper can be used to design a multi-scale
recommendation system, which uses SIoV and a typical SN
in combination.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Advances in Internet of Vehicles
(IoV).",
}
@Article{Elagin:2020:BBT,
author = "Vasiliy Elagin and Anastasia Spirkina and Andrei
Levakov and Ilya Belozertsev",
title = "Blockchain Behavioral Traffic Model as a Tool to
Influence Service {IT} Security",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "4",
pages = "68",
day = "15",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12040068",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/4/68",
abstract = "The present article describes the behavioral model of
blockchain services; their reliability is confirmed on
the basis of experimental data. The authors identify
the main technical characteristics and features
associated with data transmission through the network.
The authors determine the network scheme, working with
blockchain transactions and the dependence of network
characteristics on application parameters. They analyze
the application of this model for the detection of the
blockchain service and the possibility of the existing
security mechanisms of this technology being evaded.
Furthermore, the article offers recommendations for
hiding the blockchain traffic profile to significantly
complicate its identification in the data network.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cyber Security of the Continuous Digital
Environment: Challenges, Solutions and Future
Directions.",
}
@Article{Formica:2020:SSE,
author = "Anna Formica and Elaheh Pourabbas and Francesco
Taglino",
title = "Semantic Search Enhanced with Rating Scores",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "4",
pages = "67",
day = "15",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12040067",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/4/67",
abstract = "This paper presents SemSim e, a method based on
semantic similarity for searching over a set of digital
resources previously annotated by means of concepts
from a weighted reference ontology. SemSim e is an
enhancement of SemSim and, with respect to the latter,
it uses a frequency approach for weighting the
ontology, and refines both the user request and the
digital resources with the addition of rating scores.
Such scores are High, Medium, and Low, and in the user
request indicate the preferences assigned by the user
to each of the concepts representing the searching
criteria, whereas in the annotation of the digital
resources they represent the levels of quality
associated with each concept in describing the
resources. The SemSim e has been evaluated and the
results of the experiment show that it performs better
than SemSim and an evolution of it, referred to as S e
m S i m R V.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue New Perspectives on Semantic Web
Technologies and Applications.",
}
@Article{Kumar:2020:PPA,
author = "Ajit Kumar and Vinti Agarwal and Shishir Kumar
Shandilya and Andrii Shalaginov and Saket Upadhyay and
Bhawna Yadav",
title = "{PACER}: Platform for {Android} Malware
Classification, Performance Evaluation and Threat
Reporting",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "4",
pages = "66",
day = "12",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12040066",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/4/66",
abstract = "Android malware has become the topmost threat for the
ubiquitous and useful Android ecosystem. Multiple
solutions leveraging big data and machine-learning
capabilities to detect Android malware are being
constantly developed. Too often, these solutions are
either limited to research output or remain isolated
and incapable of reaching end users or malware
researchers. An earlier work named PACE (Platform for
Android Malware Classification and Performance
Evaluation), was introduced as a unified solution to
offer open and easy implementation access to several
machine-learning-based Android malware detection
techniques, that makes most of the research
reproducible in this domain. The benefits of PACE are
offered through three interfaces: Representational
State Transfer (REST) Application Programming Interface
(API), Web Interface, and Android Debug Bridge (ADB)
interface. These multiple interfaces enable users with
different expertise such as IT administrators, security
practitioners, malware researchers, etc. to use their
offered services. In this paper, we propose PACER
(Platform for Android Malware Classification,
Performance Evaluation, and Threat Reporting), which
extends PACE by adding threat intelligence and
reporting functionality for the end-user device through
the ADB interface. A prototype of the proposed platform
is introduced, and our vision is that it will help
malware analysts and end users to tackle challenges and
reduce the amount of manual work.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Advanced Big Data Analytics for Cyber
and Cyber-Physical Crime Investigations.",
}
@Article{Kavallieratos:2020:CSC,
author = "Georgios Kavallieratos and Sokratis Katsikas and
Vasileios Gkioulos",
title = "Cybersecurity and Safety Co-Engineering of
Cyberphysical Systems --- a Comprehensive Survey",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "4",
pages = "65",
day = "11",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12040065",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/4/65",
abstract = "Safeguarding both safety and cybersecurity is
paramount to the smooth and trustworthy operation of
contemporary cyber physical systems, many of which
support critical functions and services. As safety and
security have been known to be interdependent, they
need to be jointly considered in such systems. As a
result, various approaches have been proposed to
address safety and cybersecurity co-engineering in
cyber physical systems. This paper provides a
comprehensive survey of safety and cybersecurity
co-engineering methods, and discusses relevant open
issues and research challenges. Despite the extent of
the existing literature, several aspects of the subject
still remain to be fully addressed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future and Emerging topics in Security
for Cyber-Physical Systems.",
}
@Article{Ijaz:2020:RHP,
author = "Qaiser Ijaz and El-Bay Bourennane and Ali Kashif
Bashir and Hira Asghar",
title = "Revisiting the High-Performance Reconfigurable
Computing for Future Datacenters",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "4",
pages = "64",
day = "06",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12040064",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/super.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/12/4/64",
abstract = "Modern datacenters are reinforcing the computational
power and energy efficiency by assimilating field
programmable gate arrays (FPGAs). The sustainability of
this large-scale integration depends on enabling
multi-tenant FPGAs. This requisite amplifies the
importance of communication architecture and
virtualization method with the required features in
order to meet the high-end objective. Consequently, in
the last decade, academia and industry proposed several
virtualization techniques and hardware architectures
for addressing resource management, scheduling,
adoptability, segregation, scalability,
performance-overhead, availability, programmability,
time-to-market, security, and mainly, multitenancy.
This paper provides an extensive survey covering three
important aspects --- discussion on non-standard terms
used in existing literature, network-on-chip evaluation
choices as a mean to explore the communication
architecture, and virtualization methods under latest
classification. The purpose is to emphasize the
importance of choosing appropriate communication
architecture, virtualization technique and standard
language to evolve the multi-tenant FPGAs in
datacenters. None of the previous surveys encapsulated
these aspects in one writing. Open problems are
indicated for scientific community as well.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Featured Reviews of Future Internet
Research.",
}
@Article{Gupta:2020:ABS,
author = "Nishu Gupta and Ravikanti Manaswini and Bongaram
Saikrishna and Francisco Silva and Ariel Teles",
title = "Authentication-Based Secure Data Dissemination
Protocol and Framework for {5G}-Enabled {VANET}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "4",
pages = "63",
day = "01",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12040063",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/4/63",
abstract = "The amalgamation of Vehicular Ad hoc Network (VANET)
with the Internet of Things (IoT) leads to the concept
of the Internet of Vehicles (IoV). IoV forms a solid
backbone for Intelligent Transportation Systems (ITS),
which paves the way for technologies that better
explain about traffic efficiency and their management
applications. IoV architecture is seen as a big player
in different areas such as the automobile industry,
research organizations, smart cities and intelligent
transportation for various commercial and scientific
applications. However, as VANET is vulnerable to
various types of security attacks, the IoV structure
should ensure security and efficient performance for
vehicular communications. To address these issues, in
this article, an authentication-based protocol (A-MAC)
for smart vehicular communication is proposed along
with a novel framework towards an IoV architecture
model. The scheme requires hash operations and uses
cryptographic concepts to transfer messages between
vehicles to maintain the required security. Performance
evaluation helps analyzing its strength in withstanding
various types of security attacks. Simulation results
demonstrate that A-MAC outshines other protocols in
terms of communication cost, execution time, storage
cost, and overhead.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Advances in Internet of Vehicles
(IoV).",
}
@Article{Tagarev:2020:TDC,
author = "Todor Tagarev",
title = "Towards the Design of a Collaborative Cybersecurity
Networked Organisation: Identification and
Prioritisation of Governance Needs and Objectives",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "4",
pages = "62",
day = "28",
month = mar,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12040062",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/4/62",
abstract = "The effective response to the proliferation and
growing diversity and sophistication of cyber threats
requires a broad spectrum of competencies, human,
technological and financial resources that are in the
powers of very few countries. The European Union is
addressing this challenge through an initiative to
establish one or more cybersecurity competence
networks. A number of existing technologies can support
collaboration in networked organisations; however,
network governance remains a challenge. The study
presented in this article aimed to identify and
prioritise network governance issues. Towards that
purpose, qualitative and quantitative methods were
applied in the analysis of norms and regulations,
statutory documents of existing networks, academic
sources and interviews with representatives of funding
organisations and potential major customers. The
comprehensiveness and complementarity of these primary
sources allowed to identify 33 categories of governance
issues and group them in four tiers, indicative of the
respective priority level. The results of the study are
currently used to inform and orient the development of
alternative models for governance of a cybersecurity
network and a set of criteria for their evaluation.
They will support informed decision-making on the most
appropriate governance model of a future networked
organisation, evolving from a project consortium.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future and Emerging topics in Security
for Cyber-Physical Systems.",
}
@Article{Singh:2020:BFB,
author = "Parminder Singh and Anand Nayyar and Avinash Kaur and
Uttam Ghosh",
title = "Blockchain and Fog Based Architecture for {Internet of
Everything} in Smart Cities",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "4",
pages = "61",
day = "26",
month = mar,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12040061",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/4/61",
abstract = "Fog computing (FC) is used to reduce the energy
consumption and latency for the heterogeneous
communication approaches in the smart cities'
applications of the Internet of Everything (IoE). Fog
computing nodes are connected through wired or wireless
medium. The goal of smart city applications is to
develop the transaction relationship of real-time
response applications. There are various frameworks in
real-world to support the IoE in smart-cities but they
face the issues like security, platform Independence,
multi-application assistance, and resource management.
This article is motivated from the Blockchain and Fog
computing technologies and presents a secured
architecture Blockchain and Fog-based Architecture
Network (BFAN) for IoE applications in the smart
cities. The proposed architecture secures sensitive
data with encryption, authentication, and Blockchain.
It assists the System-developers and Architects to
deploy the applications in smart city paradigm. The
goal of the proposed architecture is to reduce the
latency and energy, and ensure improved security
features through Blockchain technology. The simulation
results demonstrate that the proposed architecture
performs better than the existing frameworks for
smart-cities.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Special Issue on Cyber Physical Systems:
Prospects, Challenges, and Role in Software Defined
Networking and Blockchain.",
}
@Article{Henriksen-Bulmer:2020:DCA,
author = "Jane Henriksen-Bulmer and Shamal Faily and Sheridan
Jeary",
title = "{DPIA} in Context: Applying {DPIA} to Assess Privacy
Risks of Cyber Physical Systems",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "5",
pages = "93",
day = "24",
month = may,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12050093",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/5/93",
abstract = "Cyber Physical Systems (CPS) seamlessly integrate
physical objects with technology, thereby blurring the
boundaries between the physical and virtual
environments. While this brings many opportunities for
progress, it also adds a new layer of complexity to the
risk assessment process when attempting to ascertain
what privacy risks this might impose on an
organisation. In addition, privacy regulations, such as
the General Data Protection Regulation (GDPR), mandate
assessment of privacy risks, including making Data
Protection Impact Assessments (DPIAs) compulsory. We
present the DPIA Data Wheel, a holistic privacy risk
assessment framework based on Contextual Integrity
(CI), that practitioners can use to inform decision
making around the privacy risks of CPS. This framework
facilitates comprehensive contextual inquiry into
privacy risk, that accounts for both the elicitation of
privacy risks, and the identification of appropriate
mitigation strategies. Further, by using this DPIA
framework we also provide organisations with a means of
assessing privacy from both the perspective of the
organisation and the individual, thereby facilitating
GDPR compliance. We empirically evaluate this framework
in three different real-world settings. In doing so, we
demonstrate how CI can be incorporated into the privacy
risk decision-making process in a usable, practical
manner that will aid decision makers in making informed
privacy decisions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future and Emerging topics in Security
for Cyber-Physical Systems.",
}
@Article{Fakis:2020:NDN,
author = "Alexandros Fakis and Georgios Karopoulos and Georgios
Kambourakis",
title = "Neither Denied nor Exposed: Fixing {WebRTC} Privacy
Leaks",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "5",
pages = "92",
day = "22",
month = may,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12050092",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/5/92",
abstract = "To establish peer-to-peer connections and achieve
real-time web-based communication, the Web Real-Time
Communication (WebRTC) framework requires address
information of the communicating peers. This means that
users behind, say, Network Address Translation (NAT) or
firewalls normally rely on the Interactive Connectivity
Establishment (ICE) framework for the sake of
negotiating information about the connection and media
transferring. This typically involves Session Traversal
Utilities for NAT (STUN)/Traversal using Relays around
NAT (TURN) servers, which assist the peers with
discovering each other's private and public IP:port,
and relay traffic if direct connection fails.
Nevertheless, these IP:port pieces of data can be
easily captured by anyone who controls the
corresponding STUN/TURN server, and even more become
readily available to the JavaScript application running
on the webpage. While this is acceptable for a user
that deliberately initiates a WebRTC connection, it
becomes a worrisome privacy issue for those being
unaware that such a connection is attempted.
Furthermore, the application acquires more information
about the local network architecture compared to what
is exposed in usual HTTP interactions, where only the
public IP is visible. Even though this problem is
well-known in the related literature, no practical
solution has been proposed so far. To this end, and for
the sake of detecting and preventing in real time the
execution of STUN/TURN clandestine, privacy-invading
requests, we introduce two different kinds of
solutions: (a) a browser extension, and (b) an HTTP
gateway, implemented in C++ as well as in Golang. Both
solutions detect any WebRTC API call before it happens
and inform accordingly the end-user about the webpage's
intentions. We meticulously evaluate the proposed
schemes in terms of performance and demonstrate that,
even in the worst case, the latency introduced is
tolerable.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Cybersecurity.",
}
@Article{Yu:2020:BOT,
author = "Jingyuan Yu and Juan Mu{\~n}oz-Justicia",
title = "A Bibliometric Overview of {Twitter}-Related Studies
Indexed in {Web of Science}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "5",
pages = "91",
day = "20",
month = may,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12050091",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/5/91",
abstract = "Twitter has been one of the most popular social
network sites for academic research; the main objective
of this study was to update the current knowledge
boundary surrounding Twitter-related investigations
and, further, identify the major research topics and
analyze their evolution across time. A bibliometric
analysis has been applied in this article: we retrieved
19,205 Twitter-related academic articles from Web of
Science after several steps of data cleaning and
preparation. The R package ``Bibliometrix'' was mainly
used in analyzing this content. Our study has two
sections, and performance analysis contains 5
categories (Annual Scientific Production, Most Relevant
Sources, Most Productive Authors, Most Cited
Publications, Most Relevant Keywords.). The science
mapping included country collaboration analysis and
thematic analysis. We highlight our thematic analysis
by splitting the whole bibliographic dataset into three
temporal periods, thus a thematic evolution across time
has been presented. This study is one of the most
comprehensive bibliometric overview in analyzing
Twitter-related studies by far. We proceed to explain
how the results will benefit the understanding of
current academic research interests on the social media
giant.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Social Web, New Media, Algorithms and
Power.",
}
@Article{Kim:2020:MBS,
author = "Mihui Kim and Youngmin Kim",
title = "Multi-Blockchain Structure for a Crowdsensing-Based
Smart Parking System",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "5",
pages = "90",
day = "16",
month = may,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12050090",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/5/90",
abstract = "As a representative example for the construction of a
smart city, a smart parking system has been developed
in past research and implemented through IoT and cloud
technologies. However, the initial installation cost of
IoT sensor devices is preventing the spread of this
technology, and thus as an alternative, a
crowdsensing-based system, operating through data from
publicly owned mobile devices, has been proposed. In
this paper, we propose a multi-blockchain structure
(i.e., constructed with public chain and private chain)
in a crowdsensing-based smart parking system. In this
structure, many sensing data contributors participate
through the opened public blockchain, to transparently
provide sensing information and to claim corresponding
rewards. The private blockchain provides an environment
for sharing the collected information among service
providers in real time and for providing parking
information to users. The bridge node performs an
information relay role between the two blockchains.
Performance analysis and security analysis on the
implemented proposed system show the feasibility of our
proposed system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet of Things (IoT) Applications
for Industry 4.0.",
}
@Article{Margariti:2020:MST,
author = "Spiridoula V. Margariti and Vassilios V. Dimakopoulos
and Georgios Tsoumanis",
title = "Modeling and Simulation Tools for Fog Computing --- a
Comprehensive Survey from a Cost Perspective",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "5",
pages = "89",
day = "16",
month = may,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12050089",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/5/89",
abstract = "Fog computing is an emerging and evolving technology,
which bridges the cloud with the network edges,
allowing computing to work in a decentralized manner.
As such, it introduces a number of complex issues to
the research community and the industry alike. Both of
them have to deal with many open challenges including
architecture standardization, resource management and
placement, service management, Quality of Service
(QoS), communication, participation, to name a few. In
this work, we provide a comprehensive literature review
along two axes --- modeling with an emphasis in the
proposed fog computing architectures and simulation
which investigates the simulation tools which can be
used to develop and evaluate novel fog-related ideas.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Network Cost Reduction in Cloud/Fog
Computing Environments.",
}
@Article{Hsu:2020:REE,
author = "Meng-Hsiang Hsu and Chun-Ming Chang and Shing-Ling
Wu",
title = "Re-examining the Effect of Online Social Support on
Subjective Well-Being: The Moderating Role of
Experience",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "5",
pages = "88",
day = "15",
month = may,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12050088",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/5/88",
abstract = "Building upon the perspectives of social capital
theory, social support, and experience, this study
developed a theoretical model to investigate the
determinants of subjective well-being on social media.
This study also examined the moderating role of
experience on the relationship between subjective
well-being and social support. Data collected from 267
social media users in Taiwan were used to test the
proposed model. Structural equation modeling analysis
was used to test the measurement model and the
structural model. The findings reveal that receiving
online support and providing online support are the key
predictors of subjective well-being. Furthermore,
social capital positively influences the reception and
provision of online support. Finally, providing online
support has a significant effect on the subjective
well-being of users with low levels of use experience,
while receiving online support exerts a stronger
influence on the subjective well-being of users with
high levels of use experience.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Social Web, New Media, Algorithms and
Power.",
}
@Article{Abonizio:2020:LIF,
author = "Hugo Queiroz Abonizio and Janaina Ignacio de Morais
and Gabriel Marques Tavares and Sylvio Barbon Junior",
title = "Language-Independent Fake News Detection: {English},
{Portuguese}, and {Spanish} Mutual Features",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "5",
pages = "87",
day = "11",
month = may,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12050087",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/5/87",
abstract = "Online Social Media (OSM) have been substantially
transforming the process of spreading news, improving
its speed, and reducing barriers toward reaching out to
a broad audience. However, OSM are very limited in
providing mechanisms to check the credibility of news
propagated through their structure. The majority of
studies on automatic fake news detection are restricted
to English documents, with few works evaluating other
languages, and none comparing language-independent
characteristics. Moreover, the spreading of deceptive
news tends to be a worldwide problem; therefore, this
work evaluates textual features that are not tied to a
specific language when describing textual data for
detecting news. Corpora of news written in American
English, Brazilian Portuguese, and Spanish were
explored to study complexity, stylometric, and
psychological text features. The extracted features
support the detection of fake, legitimate, and
satirical news. We compared four machine learning
algorithms ($k$-Nearest Neighbors ($k$-NN), Support
Vector Machine (SVM), Random Forest (RF), and Extreme
Gradient Boosting (XGB)) to induce the detection model.
Results show our proposed language-independent features
are successful in describing fake, satirical, and
legitimate news across three different languages, with
an average detection accuracy of 85.3\% with RF.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Social Web, New Media, Algorithms and
Power.",
}
@Article{Tsoumanis:2020:ITI,
author = "Georgios Tsoumanis and Asterios Papamichail and
Vasileios Dragonas and George Koufoudakis and
Constantinos T. Angelis and Konstantinos Oikonomou",
title = "Implementation of a {Topology Independent MAC (TiMAC)}
Policy on a Low-Cost {IoT} System",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "5",
pages = "86",
day = "11",
month = may,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12050086",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/5/86",
abstract = "The emerging new paradigm under the fifth generation
of wireless communications technologies (5G) and high
expectations for massively expanding today's Internet
of Things (IoT) under 5G, are expected to support a
large plurality of low-cost devices for an
all-increasing number of new IoT applications. Many
emerging IoT applications are going to take advantage
of techniques and technologies that have high demands
from low-cost devices in terms of processing large
amounts of data and communication. For example, in
systems based on fog computing technology, low-cost
devices have to assign some of their limited resources
for processing purposes. Considering the drawbacks
emerging from using low-cost devices and the fact that
many applications are in need for time-constrained
approaches, TDMA-based Medium Access Control (MAC)
policies need to be revisited and implemented in
low-cost devices of today. In this sense, a policy
independent of the underlying topology, TiMAC policy,
is considered here and is implemented in low-cost
devices using 433 MHz RF modules. Even though the
implementation is limited by synchronization issues and
a small number of nodes, the obtained experimental
results demonstrate the potential for employing
TDMA-based MAC policies on IoT systems consisting of
low-cost devices.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Network Cost Reduction in Cloud/Fog
Computing Environments.",
}
@Article{Diaz-Noci:2020:AIS,
author = "Javier D{\'\i}az-Noci",
title = "Artificial Intelligence Systems-Aided News and
Copyright: Assessing Legal Implications for Journalism
Practices",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "5",
pages = "85",
day = "08",
month = may,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12050085",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/5/85",
abstract = "Automated news, or artificial intelligence systems
(AIS)-aided production of news items, has been
developed from 2010 onwards. It comprises a variety of
practices in which the use of data, software and human
intervention is involved in diverse degrees. This can
affect the application of intellectual property and
copyright law in many ways. Using comparative legal
methods, we examine the implications of them for some
legal categories, such as authorship (and hence
required originality) and types of works, namely
collaborative, derivative and, most especially,
collective works. Sui generis and neighboring rights
are also considered for examination as being applicable
to AIS-aided news outputs. Our main conclusion is that
the economics intellectual property rights are
guaranteed in any case through collective works. We
propose a shorter term of duration before entering
public domain. Still, there is a place for more
authorial, personal rights. It shows, however, more
difficulty when coming to moral rights, especially in
Common Law countries.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Social Web, New Media, Algorithms and
Power.",
}
@Article{Lee:2020:TBS,
author = "Yu-Tse Lee and Jhan-Jia Lin and Jane Yung-Jen Hsu and
Ja-Ling Wu",
title = "A Time Bank System Design on the Basis of Hyperledger
Fabric Blockchain",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "5",
pages = "84",
day = "08",
month = may,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12050084",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/5/84",
abstract = "This paper presents a blockchain-based time bank
system on the basis of the Hyperledger Fabric
framework, which is one of the permissioned blockchain
networks. Most of the services provided by existing
Time Bank systems were recorded and conducted manually
in the past; furthermore, jobs for matching services
with receivers were managed by people. Running a time
bank in this way will cost lots of time and human
resources and, worse, it lacks security. This work
designs and realizes a time bank system enabling all
the service-related processes being executed and
recorded on a blockchain. The matching between
services' supply-and-demand tasks can directly be done
through autonomous smart contracts. Building a time
bank system on blockchain benefits the transaction of
time credit which plays the role of digital currency on
the system. In addition, the proposed time bank also
retains a grading system, allowing its members to give
each other a grade for reflecting their degrees of
satisfaction about the results provided by the system.
This grading system will incentivize the members to
provide a better quality of service and adopt a nicer
attitude for receiving a service, which may positively
endorse the development of a worldwide time bank
system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from the 3rd Annual
Decentralized Conference (DECENTRALIZED 2019).",
}
@Article{Aoyagi:2020:MAP,
author = "Saizo Aoyagi and Yiping Le and Tetsuo Shimizu and
Kazuki Takahashi",
title = "Mobile Application to Provide Traffic Congestion
Estimates and Tourism Spots to Promote Additional
Stopovers",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "5",
pages = "83",
day = "29",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12050083",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/5/83",
abstract = "In Japan, traffic congestions often occur on the
expressways connecting tourism areas with the Tokyo
metropolitan area. This congestion can be mitigated if
tourists delayed their departure of homeward trips to
avoid peak traffic hours. A potential method to promote
staggered departure times is providing the estimates of
near-future traffic congestion. This study hypothesized
and experimentally confirmed that some tourists would
delay their departure to avoid traffic based on
near-future traffic estimates. The experiment was
conducted in the Yatsugatake area using a mobile
application that provided this information to tourists.
The results suggest that approximately 40\% of
self-driving tourists will perform an additional
stopover if the returning route is congested and
near-future traffic congestion estimate is provided.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from ICITE 2019.",
}
@Article{Mescheryakov:2020:DCE,
author = "Serg Mescheryakov and Dmitry Shchemelinin and
Konstantin Izrailov and Victor Pokussov",
title = "Digital Cloud Environment: Present Challenges and
Future Forecast",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "5",
pages = "82",
day = "29",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12050082",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/5/82",
abstract = "This article addresses the challenges of a digital
cloud environment when it comes to global scalability
with a large number of remote servers and an unsecure
public cloud, such as Amazon. The goal of the study was
to work out an approach for evaluating the reasonable
system capacity under heavy workload. For that purpose,
Zabbix monitoring solution is used and business metrics
are applied in relation to existing system ones. A
prediction data model is proposed to compute the future
forecast of the user activity based on the collected
historical statistics and to verify whether capacity
adjustment is possible or not. The results of capacity
planning are implemented at Genesys International
Telecommunications Company. System analysis of the
production environment indicates the possibility to
downscale the capacity of certain virtual servers,
which allowed savings to the annual operational costs
of \$3500 (50\%) for each affected server.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cyber Security of the Continuous Digital
Environment: Challenges, Solutions and Future
Directions.",
}
@Article{Imbimbo:2020:ACI,
author = "Enrico Imbimbo and Federica Stefanelli and Andrea
Guazzini",
title = "Adolescent's Collective Intelligence: Empirical
Evidence in Real and Online Classmates Groups",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "5",
pages = "81",
day = "29",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12050081",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/5/81",
abstract = "Humans create teams to be more successful in a large
variety of tasks. Groups are characterized by an
emergent property called collective intelligence, which
leads them to be smarter than single individuals.
Previous studies proved that collective intelligence
characterizes both real and online environments,
focusing on adults' performances. In this work, we
explored which factors promote group success in an
offline and online logical task with adolescents. Five
hundred and fifty high school students participated in
the experiment and faced Raven's Advanced Progressive
Matrices, first by themselves using the computer, then
in a group. Groups interactions could have been
computer-mediated or face-to-face, and the participants
were randomly assigned to one of the two experimental
conditions. Results suggest that groups perform better
than singles, regardless of the experimental condition.
Among adolescents, online groups performance was
negatively affected by participants' average perception
of group cohesion, the difficulty of the problem, and
the number of communicative exchanges that occur in the
interaction. On the contrary, the factors that improve
their performances were the average intelligence of the
teammates, their levels of neuroticism, and the group
heterogeneity in terms of social abilities. This work
contributes to the literature with a comprehensive
model of collective intelligence among young people.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Markopoulos:2020:ISO,
author = "Evangelos Markopoulos and Mika Luimula",
title = "Immersive Safe Oceans Technology: Developing Virtual
Onboard Training Episodes for Maritime Safety",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "5",
pages = "80",
day = "28",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12050080",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/5/80",
abstract = "This paper introduces four safety training episodes
and virtual training technology called Immersive Safe
Oceans which can be used in further education of
professionals in immersive training scenarios. These
episodes were developed for maritime safety and are
under testing. Immersive Safe Oceans Technology is a
cost-effective, portable technology that can be used on
board just in time or in maritime training centers.
Four introduced episodes, namely, (1) command bridge,
(2) machine room, (3) crane, and (4) fire safety,
illustrate how Immersive Safe Oceans technology can be
used in various professional training scenarios. These
episodes also emphasize the growing need for virtual
reality training in the shipping industry. As a result,
next generation learning will happen onboard in
sophisticated virtual training centers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cognitive Infocommunications-Theory and
Applications.",
}
@Article{McKenna:2020:HSE,
author = "H. Patricia McKenna",
title = "Human-Smart Environment Interactions in Smart Cities:
Exploring Dimensionalities of Smartness",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "5",
pages = "79",
day = "27",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12050079",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/5/79",
abstract = "In the context of the challenges facing human computer
interaction (HCI) on the one hand and the future
Internet on the other, the purpose of this study is to
explore the multi-dimensionality of smart cities,
looking at relationships and interdependencies through
correlating selected dimensions of smartness. Key
dimensions of smartness are identified for exploration
in the context of smart cities in this work through a
review of the research literature. Methodologically,
this work combines an exploratory case study approach
consisting of multiple methods of data collection
including survey and in-depth interviews, with an
explanatory correlational design. In terms of results,
the main findings of this work shed light on the
relationships between selected dimensions of the
multi-dimensionality construct of smartness in
data-rich urban environments. This work is significant
in that it provides correlational information for smart
city dimensionalities while contributing to the
research literature in this domain; uses a hybrid case
study and correlational design in relation to the study
of multi-dimensionality; and, opens spaces for the
study of innovative urban initiatives, while taking the
ideas and experiences of people from many sectors into
consideration.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Smart Cities, Innovation, and
Multi-Dimensionality.",
}
@Article{Effendi:2020:SGD,
author = "Sedick Baker Effendi and Brink van der Merwe and
Wolf-Tilo Balke",
title = "Suitability of Graph Database Technology for the
Analysis of Spatio-Temporal Data",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "5",
pages = "78",
day = "26",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12050078",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/5/78",
abstract = "Every day large quantities of spatio-temporal data are
captured, whether by Web-based companies for social
data mining or by other industries for a variety of
applications ranging from disaster relief to marine
data analysis. Making sense of all this data
dramatically increases the need for intelligent backend
systems to provide realtime query response times while
scaling well (in terms of storage and performance) with
increasing quantities of structured or semi-structured,
multi-dimensional data. Currently, relational database
solutions with spatial extensions such as PostGIS, seem
to come to their limits. However, the use of graph
database technology has been rising in popularity and
has been found to handle graph-like spatio-temporal
data much more effectively. Motivated by the need to
effectively store multi-dimensional, interconnected
data, this paper investigates whether or not graph
database technology is better suited when compared to
the extended relational approach. Three database
technologies will be investigated using real world
datasets namely: PostgreSQL, JanusGraph, and
TigerGraph. The datasets used are the Yelp challenge
dataset and an ambulance response simulation dataset,
thus combining real world spatial data with realistic
simulations offering more control over the dataset. Our
extensive evaluation is based on how each database
performs under practical data analysis scenarios
similar to those found on enterprise level.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Sense Making in the Digital World.",
}
@Article{Psomakelis:2020:SSD,
author = "Evangelos Psomakelis and Anastasios Nikolakopoulos and
Achilleas Marinakis and Alexandros Psychas and Vrettos
Moulos and Theodora Varvarigou and Andreas Christou",
title = "A Scalable and Semantic Data as a Service Marketplace
for Enhancing Cloud-Based Applications",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "5",
pages = "77",
day = "25",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12050077",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu May 28 15:16:57 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/5/77",
abstract = "Data handling and provisioning play a dominant role in
the structure of modern cloud--fog-based architectures.
Without a strict, fast, and deterministic method of
exchanging data we cannot be sure about the performance
and efficiency of transactions and applications. In the
present work we propose an architecture for a Data as a
Service (DaaS) Marketplace, hosted exclusively in a
cloud environment. The architecture includes a storage
management engine that ensures the Quality of Service
(QoS) requirements, a monitoring component that enables
real time decisions about the resources used, and a
resolution engine that provides semantic data discovery
and ranking based on user queries. We show that the
proposed system outperforms the classic ElasticSearch
queries in data discovery use cases, providing more
accurate results. Furthermore, the semantic enhancement
of the process adds extra results which extend the user
query with a more abstract definition to each notion.
Finally, we show that the real-time scaling, provided
by the data storage manager component, limits QoS
requirements by decreasing the latency of the read and
write data requests.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Network Cost Reduction in Cloud/Fog
Computing Environments.",
}
@Article{deMeloeSilva:2020:MES,
author = "Alessandra {de Melo e Silva} and Jo{\~a}o Jos{\'e}
{Costa Gondim} and Robson {de Oliveira Albuquerque} and
Luis Javier {Garc{\'\i}a Villalba}",
title = "A Methodology to Evaluate Standards and Platforms
within Cyber Threat Intelligence",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "6",
pages = "108",
day = "23",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12060108",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jun 30 14:45:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/6/108",
abstract = "The cyber security landscape is fundamentally changing
over the past years. While technology is evolving and
new sophisticated applications are being developed, a
new threat scenario is emerging in alarming
proportions. Sophisticated threats with multi-vectored,
multi-staged and polymorphic characteristics are
performing complex attacks, making the processes of
detection and mitigation far more complicated. Thus,
organizations were encouraged to change their
traditional defense models and to use and to develop
new systems with a proactive approach. Such changes are
necessary because the old approaches are not effective
anymore to detect advanced attacks. Also, the
organizations are encouraged to develop the ability to
respond to incidents in real-time using complex threat
intelligence platforms. However, since the field is
growing rapidly, today Cyber Threat Intelligence
concept lacks a consistent definition and a
heterogeneous market has emerged, including diverse
systems and tools, with different capabilities and
goals. This work aims to provide a comprehensive
evaluation methodology of threat intelligence standards
and cyber threat intelligence platforms. The proposed
methodology is based on the selection of the most
relevant candidates to establish the evaluation
criteria. In addition, this work studies the Cyber
Threat Intelligence ecosystem and Threat Intelligence
standards and platforms existing in state-of-the-art.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Information Systems Security.",
}
@Article{AlSuwaidan:2020:VAH,
author = "Lulwah AlSuwaidan and Nuha Almegren",
title = "Validating the Adoption of Heterogeneous {Internet of
Things} with Blockchain",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "6",
pages = "107",
day = "21",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12060107",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jun 30 14:45:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/6/107",
abstract = "Emerging technologies such as Internet of Things (IoT)
and blockchain have affected the digital
transformation. Blockchain, on the one hand, was
initially developed for the purpose of financial
trading due to its robustness especially for fault
tolerance and cryptographic security in addition to its
decentralized architecture. IoT, on the other hand, is
an open interconnected network of smart devices able to
communicate simultaneously. This arises a challenge in
privacy and security, specifically for the data being
exchanged. To overcome this, studies have focused on
the blockchain to resolve the security and privacy
issues of IoT. Indeed, limited studies have proposed to
assess blockchain's viability for IoT and the
associated challenges. In this paper, a conceptual
model has proposed to identify the crucial factors
affecting the adoption of blockchain in IoT. The model
consists of four dimensions of factors that we assume
will affect the adoption of the two technologies. The
dimensions are: attitude-related factors, social
influence related factors, data-related factors, and
security-related factors. This model is validated
through a survey that was distributed between
professionals in blockchain and IoT. The findings show
a significant impact of data-related factors on the
adoption of blockchain in IoT and the intention to use
them. The model can play an important role in the
development of strategies, standards, and performance
assessment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Network Economics and Utility
Maximization.",
}
@Article{Olszowski:2020:CIP,
author = "Rafa{\l} Olszowski and Marcin Chmielowski",
title = "Collective Intelligence in {Polish--Ukrainian}
{Internet} Projects. {Debate} Models and Research
Methods",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "6",
pages = "106",
day = "20",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12060106",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jun 30 14:45:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/6/106",
abstract = "In this study, we focus on models of civic debate
suitable for use in Polish-Ukrainian internet projects,
as well as methods of researching collective
intelligence that can help to monitor particular
aspects of such debates and consequently create social
bridging capital between these groups. The dynamic
socio-political situation of recent years, both in
Ukraine and in Poland, has created new conditions.
Anti-government protests and social turmoil related to
the war in Crimea and Donbas, as well as a high level
of migration in the region in a short period led to the
creation of a multi-ethnic society. This brings
opportunities for the development of a new type of
social capital: A new participative model of social
life based on internet projects, with a relatively low
entry barrier, space for creativity, and the widespread
use of ICT technologies, can provide the new ways of
debating, civic engagement, and collective action. Our
research, based on a multidisciplinary literature
review, as well as a series of qualitative in-depth
interviews (IDIs), proved that the selected collective
intelligence (CI) research methods and debate models
can help to develop internet communities that will
contribute to building bridging capital between Poles
and Ukrainians.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from the INSCI2019:
Internet Science 2019.",
}
@Article{Bader:2020:SDD,
author = "Sebastian R. Bader and Maria Maleshkova",
title = "{SOLIOT} --- Decentralized Data Control and
Interactions for {IoT}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "6",
pages = "105",
day = "16",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12060105",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jun 30 14:45:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/6/105",
abstract = "The digital revolution affects every aspect of society
and economy. In particular, the manufacturing industry
faces a new age of production processes and connected
collaboration. The underlying ideas and concepts, often
also framed as a new ``Internet of Things'', transfer
IT technologies to the shop floor, entailing major
challenges regarding the heterogeneity of the domain.
On the other hand, web technologies have already proven
their value in distributed settings. SOLID (derived
from ``social linked data'') is a recent approach to
decentralize data control and standardize interactions
for social applications in the web. Extending this
approach towards industrial applications has the
potential to bridge the gap between the World Wide Web
and local manufacturing environments. This paper
proposes SOLIOT --- a combination of lightweight
industrial protocols with the integration and data
control provided by SOLID. An in-depth requirement
analysis examines the potential but also current
limitations of the approach. The conceptual
capabilities are outlined, compared and extended for
the IoT protocols CoAP and MQTT. The feasibility of the
approach is illustrated through an open-source
implementation, which is evaluated in a virtual test
bed and a detailed analysis of the proposed
components.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet of Things (IoT) Applications
for Industry 4.0.",
}
@Article{Lohr:2020:IXH,
author = "Christophe Lohr and J{\'e}r{\^o}me Kerdreux",
title = "Improvements of the {xAAL} Home Automation System",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "6",
pages = "104",
day = "12",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12060104",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jun 30 14:45:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/6/104",
abstract = "The xAAL home automation system has been designed on
the basis of distributed systems principles with
messages passing and home network communications over
IP. The proposal makes extensive use of standards and
provides a clear separation of roles along the
distributed system with no predominant actor. This
allows openness and interoperability. This objective
can be reached once all parts are convinced: consumers,
manufacturers, service providers, etc. To get a broad
adoption, the proposal comes with fine-tuned
communication, architecture, security, and simplicity.
Tests and experiments in the long term have led us to
optimize the protocol, adjust the architecture, and
rearrange device descriptions. This paper provides a
full description of the improved system, with all
details to make feasible compatible alternative
implementations. It also discusses alternatives and all
aspects that led us to make structuring choices: CBOR
messages on an IP multicast channel, intranet
communication, ciphering with Poly1305/Chacha20,
structured and extensible abstract device description,
and a distributed system architecture.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Atlam:2020:RBA,
author = "Hany F. Atlam and Muhammad Ajmal Azad and Madini O.
Alassafi and Abdulrahman A. Alshdadi and Ahmed
Alenezi",
title = "Risk-Based Access Control Model: a Systematic
Literature Review",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "6",
pages = "103",
day = "11",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12060103",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jun 30 14:45:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/6/103",
abstract = "Most current access control models are rigid, as they
are designed using static policies that always give the
same outcome in different circumstances. In addition,
they cannot adapt to environmental changes and
unpredicted situations. With dynamic systems such as
the Internet of Things (IoT) with billions of things
that are distributed everywhere, these access control
models are obsolete. Hence, dynamic access control
models are required. These models utilize not only
access policies but also contextual and real-time
information to determine the access decision. One of
these dynamic models is the risk-based access control
model. This model estimates the security risk value
related to the access request dynamically to determine
the access decision. Recently, the risk-based access
control model has attracted the attention of several
organizations and researchers to provide more
flexibility in accessing system resources. Therefore,
this paper provides a systematic review and examination
of the state-of-the-art of the risk-based access
control model to provide a detailed understanding of
the topic. Based on the selected search strategy, 44
articles (of 1044 articles) were chosen for a closer
examination. Out of these articles, the contributions
of the selected articles were summarized. In addition,
the risk factors used to build the risk-based access
control model were extracted and analyzed. Besides, the
risk estimation techniques used to evaluate the risks
of access control operations were identified.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Emerging Trends of Fog Computing in
Internet of Things Applications.",
}
@Article{Li:2020:CCM,
author = "KeDi Li and Ning Gui",
title = "{CMS}: A Continuous Machine-Learning and Serving
Platform for Industrial Big Data",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "6",
pages = "102",
day = "10",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12060102",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jun 30 14:45:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/6/102",
abstract = "The life-long monitoring and analysis for complex
industrial equipment demands a continuously evolvable
machine-learning platform. The machine-learning model
must be quickly regenerated and updated. This demands
the careful orchestration of trainers for model
generation and modelets for model serving without the
interruption of normal operations. This paper proposes
a container-based Continuous Machine-Learning and
Serving (CMS) platform. By designing out-of-the-box
common architecture for trainers and modelets, it
simplifies the model training and deployment process
with minimal human interference. An orchestrator is
proposed to manage the trainer's execution and enables
the model updating without interrupting the online
operation of model serving. CMS has been deployed in a
1000 MW thermal power plant for about five months. The
system running results show that the accuracy of eight
models remains at a good level even when they
experience major renovations. Moreover, CMS proved to
be a resource-efficient, effective resource isolation
and seamless model switching with little overhead.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Network Architectures and Protocols for
Industrial IoT.",
}
@Article{Olmedo:2020:PAN,
author = "Gonzalo Olmedo and Rom{\'a}n Lara-Cueva and Diego
Mart{\'\i}nez and Celso de Almeida",
title = "Performance Analysis of a Novel {TCP} Protocol
Algorithm Adapted to Wireless Networks",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "6",
pages = "101",
day = "09",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12060101",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jun 30 14:45:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/6/101",
abstract = "As telecommunication systems evolve towards
new-generation architectures, likewise, new protocols
are created in order to improve efficiency. One of
these protocols is Transmission Control Protocol (TCP),
which controls the transmission bit rate in function of
network congestion. Nevertheless, in wireless
communications, there appear problems such as noise and
interference, for which TCP was not designed. Based on
these problems, there exist some methods trying to
mitigate congestion, such as explicit loss
notifications and the use of end-to-end codification.
The aim of this work was to propose a wireless TCP
protocol improvement, considering a negative
acknowledgment (NACK), which allows to differentiate
between losses due to congestion and losses due to
wireless channel issues. NACK employs a small protocol
packet and produces improvement in the quality of
service metrics. The experiments were carried out in
in-door and out-door environments, over an online video
game scenario, and over a long-distance wireless link
between two islands. The average results show a
25-percent delay improvement and a 5-percent jitter
improvement when compared to the original TCP Reno
protocol, while for throughput a 90-percent improvement
was achieved for distances between 100 and 414 m.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2020:PMV,
author = "Jiao Wang and Jay Weitzen and Oguz Bayat and Volkan
Sevindik and Mingzhe Li",
title = "Performance Model for Video Service in {5G} Networks",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "6",
pages = "99",
day = "08",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12060099",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jun 30 14:45:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/6/99",
abstract = "Network slicing allows operators to sell customized
slices to various tenants at different prices. To
provide better-performing and cost-efficient services,
network slicing is looking to intelligent resource
management approaches to be aligned to users'
activities per slice. In this article, we propose a
radio access network (RAN) slicing design methodology
for quality of service (QoS) provisioning, for
differentiated services in a 5G network. A performance
model is constructed for each service using machine
learning (ML)-based approaches, optimized using
interference coordination approaches, and used to
facilitate service level agreement (SLA) mapping to the
radio resource. The optimal bandwidth allocation is
dynamically adjusted based on instantaneous network
load conditions. We investigate the application of
machine learning in solving the radio resource slicing
problem and demonstrate the advantage of machine
learning through extensive simulations. A case study is
presented to demonstrate the effectiveness of the
proposed radio resource slicing approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Networks: Latest Trends and
Developments.",
}
@Article{Hurst:2020:PPV,
author = "William Hurst and Aaron Boddy and Madjid Merabti and
Nathan Shone",
title = "Patient Privacy Violation Detection in Healthcare
Critical Infrastructures: an Investigation Using
Density-Based Benchmarking",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "6",
pages = "100",
day = "08",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12060100",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jun 30 14:45:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/6/100",
abstract = "Hospital critical infrastructures have a distinct
threat vector, due to (i) a dependence on legacy
software; (ii) the vast levels of interconnected
medical devices; (iii) the use of multiple bespoke
software and that (iv) electronic devices (e.g.,
laptops and PCs) are often shared by multiple users. In
the UK, hospitals are currently upgrading towards the
use of electronic patient record (EPR) systems. EPR
systems and their data are replacing traditional paper
records, providing access to patients' test results and
details of their overall care more efficiently. Paper
records are no-longer stored at patients' bedsides, but
instead are accessible via electronic devices for the
direct insertion of data. With over 83\% of hospitals
in the UK moving towards EPRs, access to this
healthcare data needs to be monitored proactively for
malicious activity. It is paramount that hospitals
maintain patient trust and ensure that the information
security principles of integrity, availability and
confidentiality are upheld when deploying EPR systems.
In this paper, an investigation methodology is
presented towards the identification of anomalous
behaviours within EPR datasets. Many security solutions
focus on a perimeter-based approach; however, this
approach alone is not enough to guarantee security, as
can be seen from the many examples of breaches. Our
proposed system can be complementary to existing
security perimeter solutions. The system outlined in
this research employs an internal-focused methodology
for anomaly detection by using the Local Outlier Factor
(LOF) and Density-Based Spatial Clustering of
Applications with Noise (DBSCAN) algorithms for
benchmarking behaviour, for assisting healthcare data
analysts. Out of 90,385 unique IDs, DBSCAN finds 102
anomalies, whereas 358 are detected using LOF.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet of Healthcare Things (IoHT):
Methods, Advances, and Applications.",
}
@Article{Kratzke:2020:VHC,
author = "Nane Kratzke",
title = "Volunteer Down: How {COVID-19} Created the Largest
Idling Supercomputer on {Earth}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "6",
pages = "98",
day = "06",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12060098",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jun 30 14:45:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/super.bib",
URL = "https://www.mdpi.com/1999-5903/12/6/98",
abstract = "From close to scratch, the COVID-19 pandemic created
the largest volunteer supercomputer on earth. Sadly,
processing resources assigned to the corresponding
[email protected] project cannot be shared with other
volunteer computing projects efficiently. Consequently,
the largest supercomputer had significant idle times.
This perspective paper investigates how the resource
sharing of future volunteer computing projects could be
improved. Notably, efficient resource sharing has been
optimized throughout the last ten years in cloud
computing. Therefore, this perspective paper reviews
the current state of volunteer and cloud computing to
analyze what both domains could learn from each other.
It turns out that the disclosed resource sharing
shortcomings of volunteer computing could be addressed
by technologies that have been invented, optimized, and
adapted for entirely different purposes by cloud-native
companies like Uber, Airbnb, Google, or Facebook.
Promising technologies might be containers, serverless
architectures, image registries, distributed service
registries, and all have one thing in common: They
already exist and are all tried and tested in large
web-scale deployments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cloud-Native Applications and
Services.",
}
@Article{Curreri:2020:ISM,
author = "Francesco Curreri and Giacomo Fiumara and Maria
Gabriella Xibilia",
title = "Input Selection Methods for Soft Sensor Design: a
Survey",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "6",
pages = "97",
day = "04",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12060097",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jun 30 14:45:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/6/97",
abstract = "Soft Sensors (SSs) are inferential models used in many
industrial fields. They allow for real-time estimation
of hard-to-measure variables as a function of available
data obtained from online sensors. SSs are generally
built using industries historical databases through
data-driven approaches. A critical issue in SS design
concerns the selection of input variables, among those
available in a candidate dataset. In the case of
industrial processes, candidate inputs can reach great
numbers, making the design computationally demanding
and leading to poorly performing models. An input
selection procedure is then necessary. Most used input
selection approaches for SS design are addressed in
this work and classified with their benefits and
drawbacks to guide the designer through this step.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Featured Reviews of Future Internet
Research.",
}
@Article{Pan:2020:MSN,
author = "Yirong Pan and Xiao Li and Yating Yang and Rui Dong",
title = "Multi-Source Neural Model for Machine Translation of
Agglutinative Language",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "6",
pages = "96",
day = "03",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12060096",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jun 30 14:45:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/6/96",
abstract = "Benefitting from the rapid development of artificial
intelligence (AI) and deep learning, the machine
translation task based on neural networks has achieved
impressive performance in many high-resource language
pairs. However, the neural machine translation (NMT)
models still struggle in the translation task on
agglutinative languages with complex morphology and
limited resources. Inspired by the finding that
utilizing the source-side linguistic knowledge can
further improve the NMT performance, we propose a
multi-source neural model that employs two separate
encoders to encode the source word sequence and the
linguistic feature sequences. Compared with the
standard NMT model, we utilize an additional encoder to
incorporate the linguistic features of lemma,
part-of-speech (POS) tag, and morphological tag by
extending the input embedding layer of the encoder.
Moreover, we use a serial combination method to
integrate the conditional information from the encoders
with the outputs of the decoder, which aims to enhance
the neural model to learn a high-quality context
representation of the source sentence. Experimental
results show that our approach is effective for the
agglutinative language translation, which achieves the
highest improvements of +2.4 BLEU points on
Turkish--English translation task and +0.6 BLEU points
on Uyghur--Chinese translation task.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Big Data and Augmented Intelligence.",
}
@Article{Bendechache:2020:SRM,
author = "Malika Bendechache and Sergej Svorobej and Patricia
Takako Endo and Theo Lynn",
title = "Simulating Resource Management across the
Cloud-to-Thing Continuum: a Survey and Future
Directions",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "6",
pages = "95",
day = "29",
month = may,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12060095",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jun 30 14:45:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/6/95",
abstract = "In recent years, there has been significant
advancement in resource management mechanisms for cloud
computing infrastructure performance in terms of cost,
quality of service (QoS) and energy consumption. The
emergence of the Internet of Things has led to the
development of infrastructure that extends beyond
centralised data centers from the cloud to the edge,
the so-called cloud-to-thing continuum (C2T). This
infrastructure is characterised by extreme
heterogeneity, geographic distribution, and complexity,
where the key performance indicators (KPIs) for the
traditional model of cloud computing may no longer
apply in the same way. Existing resource management
mechanisms may not be suitable for such complex
environments and therefore require thorough testing,
validation and evaluation before even being considered
for live system implementation. Similarly, previously
discounted resource management proposals may be more
relevant and worthy of revisiting. Simulation is a
widely used technique in the development and evaluation
of resource management mechanisms for cloud computing
but is a relatively nascent research area for new C2T
computing paradigms such as fog and edge computing. We
present a methodical literature analysis of C2T
resource management research using simulation software
tools to assist researchers in identifying suitable
methods, algorithms, and simulation approaches for
future research. We analyse 35 research articles from a
total collection of 317 journal articles published from
January 2009 to March 2019. We present our descriptive
and synthetic analysis from a variety of perspectives
including resource management, C2T layer, and
simulation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Network Cost Reduction in Cloud/Fog
Computing Environments.",
}
@Article{Ebner:2020:CEL,
author = "Martin Ebner and Sandra Sch{\"o}n and Clarissa Braun
and Markus Ebner and Ypatios Grigoriadis and Maria Haas
and Philipp Leitner and Behnam Taraghi",
title = "{COVID-19} Epidemic as E-Learning Boost?
{Chronological} Development and Effects at an
{Austrian} University against the Background of the
Concept of {``E-Learning} Readiness''",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "6",
pages = "94",
day = "26",
month = may,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12060094",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jun 30 14:45:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/6/94",
abstract = "The COVID-19 crisis influenced universities worldwide
in early 2020. In Austria, all universities were closed
in March 2020 as a preventive measure, and meetings
with over 100 people were banned and a curfew was
imposed. This development also had a massive impact on
teaching, which in Austria takes place largely
face-to-face. In this paper we would like to describe
the situation of an Austrian university regarding
e-learning before and during the first three weeks of
the changeover of the teaching system, using the
example of Graz University of Technology (TU Graz). The
authors provide insights into the internal procedures,
processes and decisions of their university and present
figures on the changed usage behaviour of their
students and teachers. As a theoretical reference, the
article uses the e-learning readiness assessment
according to Alshaher (2013), which provides a
framework for describing the status of the situation
regarding e-learning before the crisis. The paper
concludes with a description of enablers, barriers and
bottlenecks from the perspective of the members of the
Educational Technology department.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computational Thinking.",
}
@Article{Hewage:2020:MQE,
author = "Chaminda Hewage and Erhan Ekmekcioglu",
title = "Multimedia Quality of Experience {(QoE)}: Current
Status and Future Direction",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "7",
pages = "121",
day = "20",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12070121",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 24 13:38:26 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/7/121",
abstract = "Quality of Experience (QoE) is becoming an important
factor of User-Centred Design (UCD). The deployment of
pure technical measures such as Quality of Service
(QoS) parameters to assess the quality of multimedia
applications is phasing out due to the failure of those
methods to quantify true user satisfaction. Though
significant research results and several deployments
have occurred and been realized over the last few
years, focusing on QoE-based multimedia technologies,
several issues both of theoretical and practical
importance remain open. Accordingly, the papers of this
Special Issue are significant contribution samples
within the general ecosystem highlighted above, ranging
from QoE in the capture, processing and consumption of
next-generation multimedia applications. In particular,
a total of five excellent articles have been accepted,
following a rigorous review process, which address many
of the aforementioned challenges and beyond.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Multimedia Quality of Experience (QoE):
Current Status and Future Direction.",
}
@Article{Mallikarachchi:2020:DCR,
author = "Thanuja Mallikarachchi and Dumidu Talagala and
Hemantha Kodikara Arachchi and Chaminda Hewage and Anil
Fernando",
title = "A Decoding-Complexity and Rate-Controlled Video-Coding
Algorithm for {HEVC}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "7",
pages = "120",
day = "16",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12070120",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 24 13:38:26 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/7/120",
abstract = "Video playback on mobile consumer electronic (CE)
devices is plagued by fluctuations in the network
bandwidth and by limitations in processing and energy
availability at the individual devices. Seen as a
potential solution, the state-of-the-art adaptive
streaming mechanisms address the first aspect, yet the
efficient control of the decoding-complexity and the
energy use when decoding the video remain unaddressed.
The quality of experience (QoE) of the end-users'
experiences, however, depends on the capability to
adapt the bit streams to both these constraints (i.e.,
network bandwidth and device's energy availability). As
a solution, this paper proposes an encoding framework
that is capable of generating video bit streams with
arbitrary bit rates and decoding-complexity levels
using a decoding-complexity--rate--distortion model.
The proposed algorithm allocates rate and
decoding-complexity levels across frames and coding
tree units (CTUs) and adaptively derives the CTU-level
coding parameters to achieve their imposed targets with
minimal distortion. The experimental results reveal
that the proposed algorithm can achieve the target bit
rate and the decoding-complexity with 0.4\% and 1.78\%
average errors, respectively, for multiple bit rate and
decoding-complexity levels. The proposed algorithm also
demonstrates a stable frame-wise rate and
decoding-complexity control capability when achieving a
decoding-complexity reduction of 10.11 (\%/dB). The
resultant decoding-complexity reduction translates into
an overall energy-consumption reduction of up to 10.52
(\%/dB) for a 1 dB peak signal-to-noise ratio (PSNR)
quality loss compared to the HM 16.0 encoded bit
streams.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Multimedia Quality of Experience (QoE):
Current Status and Future Direction.",
}
@Article{Barletta:2020:IDV,
author = "Vita Santa Barletta and Danilo Caivano and Antonella
Nannavecchia and Michele Scalera",
title = "Intrusion Detection for in-Vehicle Communication
Networks: An Unsupervised {Kohonen} {SOM} Approach",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "7",
pages = "119",
day = "14",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12070119",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 24 13:38:26 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/7/119",
abstract = "The diffusion of embedded and portable communication
devices on modern vehicles entails new security risks
since in-vehicle communication protocols are still
insecure and vulnerable to attacks. Increasing interest
is being given to the implementation of automotive
cybersecurity systems. In this work we propose an
efficient and high-performing intrusion detection
system based on an unsupervised Kohonen Self-Organizing
Map (SOM) network, to identify attack messages sent on
a Controller Area Network (CAN) bus. The SOM network
found a wide range of applications in intrusion
detection because of its features of high detection
rate, short training time, and high versatility. We
propose to extend the SOM network to intrusion
detection on in-vehicle CAN buses. Many hybrid
approaches were proposed to combine the SOM network
with other clustering methods, such as the k-means
algorithm, in order to improve the accuracy of the
model. We introduced a novel distance-based procedure
to integrate the SOM network with the K-means algorithm
and compared it with the traditional procedure. The
models were tested on a car hacking dataset concerning
traffic data messages sent on a CAN bus, characterized
by a large volume of traffic with a low number of
features and highly imbalanced data distribution. The
experimentation showed that the proposed method greatly
improved detection accuracy over the traditional
approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Vehicular Networks and Mobility as
Service.",
}
@Article{Guazzini:2020:CFC,
author = "Andrea Guazzini and Elisa Guidi and Cristina Cecchini
and Eiko Yoneki",
title = "Collaborative Facilitation and Collaborative
Inhibition in Virtual Environments",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "7",
pages = "118",
day = "13",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12070118",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 24 13:38:26 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/7/118",
abstract = "Worldwide, organizations and small and medium-sized
enterprises have already disruptively changed in many
ways their physiological inner mechanisms, because of
information and communication technologies (ICT)
revolution. Nevertheless, the still ongoing COVID-19
worldwide emergency definitely promoted a wide adoption
of teleworking modalities for many people around the
world, making it more relevant than before to
understand the real impact of virtual environments
(VEs) on teamwork dynamics. From a psychological point
of view, a critical question about teleworking
modalities is how the social and cognitive dynamics of
collaborative facilitation and collaborative inhibition
would affect teamwork within VEs. This study analyzed
the impact of a virtual environment (VE) on the recall
of individuals and members of nominal and collaborative
groups. The research assessed costs and benefits for
collaborative retrieval by testing the effect of
experimental conditions, stimulus materials, group
size, experimental conditions order, anxiety state,
personality traits, gender group composition and social
interactions. A total of 144 participants were engaged
in a virtual Deese-Roediger-McDermott (DRM) classical
paradigm, which involved remembering word lists across
two successive sessions, in one of four protocols: I
-individual/nominal, I I -nominal/individual, I I I
-nominal/collaborative, I V -collaborative/nominal.
Results suggested, in general, a reduced collaborative
inhibition effect in the collaborative condition than
the nominal and individual condition. A combined effect
between experimental condition and difficulty of the
task appears to explain the presence of collaborative
inhibition or facilitation. Nominal groups appeared to
enhance the collaborative groups' performance when
virtual nominal groups come before collaborative
groups. Variables such as personality traits, gender
and social interactions may have a contribution to
collaborative retrieval. In conclusion, this study
indicated how VEs could maintain those peculiar social
dynamics characterizing the participants' engagement in
a task, both working together and individually, and
could affect their intrinsic motivation as well as
performances. These results could be exploited in order
to design brand new and evidenced-based practices, to
improve teleworking procedures and workers well-being,
as well as teleworking teamwork effectiveness.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from the INSCI2019:
Internet Science 2019.",
}
@Article{Graziani:2020:ITA,
author = "Salvatore Graziani and Maria Gabriella Xibilia",
title = "Innovative Topologies and Algorithms for Neural
Networks",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "7",
pages = "117",
day = "11",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12070117",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 24 13:38:26 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/7/117",
abstract = "The introduction of new topologies and training
procedures to deep neural networks has solicited a
renewed interest in the field of neural computation.
The use of deep structures has significantly improved
the state of the art in many applications, such as
computer vision, speech and text processing, medical
applications, and IoT (Internet of Things). The
probability of a successful outcome from a neural
network is linked to selection of an appropriate
network architecture and training algorithm.
Accordingly, much of the recent research on neural
networks is devoted to the study and proposal of novel
architectures, including solutions tailored to specific
problems. The papers of this Special Issue make
significant contributions to the above-mentioned fields
by merging theoretical aspects and relevant
applications. Twelve papers are collected in the issue,
addressing many relevant aspects of the topic.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Innovative Topologies and Algorithms for
Neural Networks.",
}
@Article{Molinaro:2020:VCN,
author = "Antonella Molinaro and Claudia Campolo and
J{\'e}r{\^o}me H{\"a}rri and Christian Esteve
Rothenberg and Alexey Vinel",
title = "{5G-V2X} Communications and Networking for Connected
and Autonomous Vehicles",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "7",
pages = "116",
day = "08",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12070116",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 24 13:38:26 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/7/116",
abstract = "The introduction of new topologies and training
procedures to deep neural networks has solicited a
renewed interest in the field of neural computation.
The use of deep structures has significantly improved
the state of the art in many applications, such as
computer vision, speech and text processing, medical
applications, and IoT (Internet of Things). The
probability of a successful outcome from a neural
network is linked to selection of an appropriate
network architecture and training algorithm.
Accordingly, much of the recent research on neural
networks is devoted to the study and proposal of novel
architectures, including solutions tailored to specific
problems. The papers of this Special Issue make
significant contributions to the above-mentioned fields
by merging theoretical aspects and relevant
applications. Twelve papers are collected in the issue,
addressing many relevant aspects of the topic.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 5G-V2X Communications and Networking for
Connected and Autonomous Vehicles.",
}
@Article{Pacini:2020:SCS,
author = "Giovanna Pacini and Cinzia Belmonte and Franco
Bagnoli",
title = "Science Caf{\'e}s, Science Shops and the Lockdown
Experience in {Florence} and {Rome}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "7",
pages = "115",
day = "08",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12070115",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 24 13:38:26 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/7/115",
abstract = "The lockdown was crucial to stop the COVID-19 pandemic
in Italy, but it affected many aspects of social life,
among which traditional live science caf{\'e}s.
Moreover, citizens and experts asked for a direct
contact, not relying on mass-media communication. In
this paper, we describe how the Florence and Rome
science caf{\'e}s, contacted by citizens and experts,
either directly or through the Florence science shop,
responded to these needs by organizing online versions
of traditional face-to-face events, experiencing high
levels of participation. The science caf{\'e}
methodology was also requested by a high school that
needed to conclude an engagement experience with
students and their families. We also report the results
of a survey about the satisfaction of this new
methodology with respect to the old one.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from the INSCI2019:
Internet Science 2019.",
}
@Article{Goncalves:2020:IBF,
author = "Rosiberto Gon{\c{c}}alves and Jesse J. M. Soares and
Ricardo M. F. Lima",
title = "An {IoT}-Based Framework for Smart Water Supply
Systems Management",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "7",
pages = "114",
day = "07",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12070114",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 24 13:38:26 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/7/114",
abstract = "The world's population growth and climate changes
increase the demand for high-quality water. This fact
forces humankind to create new water management
strategies. Smart cities have successfully applied the
Internet of Things (IoT) technology in many sectors.
Moreover, Complex Event Processing (CEP) can analyze
and process large data sets produced by IoT sensors in
real-time. Traditional business processes are too rigid
in expressing the dynamic behavior of water supply
systems. Every execution path must be explicitly
specified. On the other hand, declarative business
processes allow execution paths that are not prohibited
by the rules, providing more flexibility for water
supply managers. This paper joins together IoT, CEP,
and declarative processes to create a powerful,
efficient, and flexible architecture (REFlex Water) to
manage water supply systems. To the knowledge of the
authors, REFlex Water is the first solution to combine
these technologies in the context of water supply
systems. The paper describes the REFlex Water
architecture and demonstrates its application to a real
water system from a Brazilian municipality. Results are
promising, and the managers from the Brazilian water
company are expanding the use of REFlex Water to other
sectors of their water supply system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet of Things for Smart City
Applications.",
}
@Article{Capra:2020:USE,
author = "Maurizio Capra and Beatrice Bussolino and Alberto
Marchisio and Muhammad Shafique and Guido Masera and
Maurizio Martina",
title = "An Updated Survey of Efficient Hardware Architectures
for Accelerating Deep Convolutional Neural Networks",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "7",
pages = "113",
day = "07",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12070113",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 24 13:38:26 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/7/113",
abstract = "Deep Neural Networks (DNNs) are nowadays a common
practice in most of the Artificial Intelligence (AI)
applications. Their ability to go beyond human
precision has made these networks a milestone in the
history of AI. However, while on the one hand they
present cutting edge performance, on the other hand
they require enormous computing power. For this reason,
numerous optimization techniques at the hardware and
software level, and specialized architectures, have
been developed to process these models with high
performance and power/energy efficiency without
affecting their accuracy. In the past, multiple surveys
have been reported to provide an overview of different
architectures and optimization techniques for efficient
execution of Deep Learning (DL) algorithms. This work
aims at providing an up-to-date survey, especially
covering the prominent works from the last 3 years of
the hardware architectures research for DNNs. In this
paper, the reader will first understand what a hardware
accelerator is, and what are its main components,
followed by the latest techniques in the field of
dataflow, reconfigurability, variable bit-width, and
sparsity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Collection Featured Reviews of Future Internet
Research.",
}
@Article{Shen:2020:SDR,
author = "Bingqing Shen and Weiming Tan and Jingzhi Guo and
Hongming Cai and Bin Wang and Shuaihe Zhuo",
title = "A Study on Design Requirement Development and
Satisfaction for Future Virtual World Systems",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "7",
pages = "112",
day = "06",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12070112",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 24 13:38:26 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/7/112",
abstract = "Virtual worlds have become global platforms connecting
millions of people and containing various technologies.
For example, No Man's Sky (nomanssky.com), a
cross-platform virtual world, can dynamically and
automatically generate content with the progress of
user adventure. AltspaceVR (altvr.com) is a social
virtual reality platform supporting motion capture
through Microsoft's Kinect, eye tracking, and mixed
reality extension. The changes in industrial
investment, market revenue, user population, and
consumption drive the evolution of
virtual-world-related technologies (e.g., computing
infrastructure and interaction devices), which turns
into new design requirements and thus results in the
requirement satisfaction problem in virtual world
system architecture design. In this paper, we first
study the new or evolving features of virtual worlds
and emerging requirements of system development through
market/industry trend analysis, including
infrastructure mobility, content diversity, function
interconnectivity, immersive environment, and
intelligent agents. Based on the trend analysis, we
propose a new design requirement space. We, then,
discuss the requirement satisfaction of existing system
architectures and highlight their limitations through a
literature review. The feature-based requirement
satisfaction comparison of existing system
architectures sheds some light on the future virtual
world system development to match the changing trends
of the user market. At the end of this study, a new
architecture from an ongoing research, called Virtual
Net, is discussed, which can provide higher resource
sufficiency, computing reliability, content
persistency, and service credibility.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue VR, AR, and 3-D User Interfaces for
Measurement and Control.",
}
@Article{Kashevnik:2020:HPA,
author = "Alexey Kashevnik and Mikhail Kruglov and Igor Lashkov
and Nikolay Teslya and Polina Mikhailova and Evgeny
Ripachev and Vladislav Malutin and Nikita Saveliev and
Igor Ryabchikov",
title = "Human Psychophysiological Activity Estimation Based on
Smartphone Camera and Wearable Electronics",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "7",
pages = "111",
day = "01",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12070111",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 24 13:38:26 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/7/111",
abstract = "This paper presents a study related to human
psychophysiological activity estimation based on a
smartphone camera and sensors. In recent years,
awareness of the human body, as well as human mental
states, has become more and more popular. Yoga and
meditation practices have moved from the east to
Europe, the USA, Russia, and other countries, and there
are a lot of people who are interested in them.
However, recently, people have tried the practice but
would prefer an objective assessment. We propose to
apply the modern methods of computer vision, pattern
recognition, competence management, and dynamic
motivation to estimate the quality of the meditation
process and provide the users with objective
information about their practice. We propose an
approach that covers the possibility of recognizing
pictures of humans from a smartphone and utilizes
wearable electronics to measure the user's heart rate
and motions. We propose a model that allows building
meditation estimation scores based on these parameters.
Moreover, we propose a meditation expert network
through which users can find the coach that is most
appropriate for him/her. Finally, we propose the
dynamic motivation model, which encourages people to
perform the practice every day.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances of Machine Learning
Techniques on Smartphones.",
}
@Article{Sindermann:2020:IRB,
author = "Cornelia Sindermann and Ren{\'e} Riedl and Christian
Montag",
title = "Investigating the Relationship between Personality and
Technology Acceptance with a Focus on the Smartphone
from a Gender Perspective: Results of an Exploratory
Survey Study",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "7",
pages = "110",
day = "30",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12070110",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 24 13:38:26 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/7/110",
abstract = "Prior research found that user personality
significantly affects technology acceptance perceptions
and decisions. Yet, evidence on the moderating
influence of user gender on the relationship between
personality and technology acceptance is barely
existent despite theoretical consideration. Considering
this research gap, the present study reports the
results of a survey in which we examined the
relationships between personality and technology
acceptance from a gender perspective. This study draws
upon a sample of N = 686 participants ( n = 209 men, n
= 477 women) and applied the HEXACO Personality
Inventory---Revised along with established technology
acceptance measures. The major result of this study is
that we do not find significant influence of user
gender on the relationship between personality and
technology acceptance, except for one aspect of
personality, namely altruism. We found a negative
association between altruism and intention to use the
smartphone in men, but a positive association in women.
Consistent with this finding, we also found the same
association pattern for altruism and predicted usage: a
negative one in men and a positive one in women.
Implications for research and practice are discussed,
along with limitations of the present study and
possible avenues for future research.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from the INSCI2019:
Internet Science 2019.",
}
@Article{Maniou:2020:ECN,
author = "Theodora A. Maniou and Andreas Veglis",
title = "Employing a Chatbot for News Dissemination during
Crisis: Design, Implementation and Evaluation",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "7",
pages = "109",
day = "30",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12070109",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 24 13:38:26 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/7/109",
abstract = "The use of chatbots in news media platforms, although
relatively recent, offers many advantages to
journalists and media professionals and, at the same
time, facilitates users' interaction with useful and
timely information. This study shows the usability of a
news chatbot during a crisis situation, employing the
2020 COVID-19 pandemic as a case study. The basic
targets of the research are to design and implement a
chatbot in a news media platform with a two-fold aim in
regard to evaluation: first, the technical effort of
creating a functional and robust news chatbot in a
crisis situation both from the AI perspective and
interoperability with other platforms, which
constitutes the novelty of the approach; and second,
users' perception regarding the appropriation of this
news chatbot as an alternative means of accessing
existing information during a crisis situation. The
chatbot designed was evaluated in terms of effectively
fulfilling the social responsibility function of crisis
reporting, to deliver timely and accurate information
on the COVID-19 pandemic to a wide audience. In this
light, this study shows the advantages of implementing
chatbots in news platforms during a crisis situation,
when the audience's needs for timely and accurate
information rapidly increase.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Data Science and Knowledge Discovery.",
}
@Article{Giusfredi:2020:CAC,
author = "Michele Giusfredi and Franco Bagnoli",
title = "From Color-Avoiding to Color-Favored Percolation in
Diluted Lattices",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "8",
pages = "139",
day = "18",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12080139",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 28 12:33:08 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/8/139",
abstract = "We study the problem of color-avoiding and
color-favored percolation in a network, i.e., the
problem of finding a path that avoids a certain number
of colors, associated with vulnerabilities of nodes or
links, or is attracted by them. We investigate here
regular (mainly directed) lattices with a fractions of
links removed (hence the term ``diluted''). We show
that this problem can be formulated as a self-organized
critical problem, in which the asymptotic phase space
can be obtained in one simulation. The method is
particularly effective for certain ``convex''
formulations, but can be extended to arbitrary problems
using multi-bit coding. We obtain the phase diagram for
some problem related to color-avoiding percolation on
directed models. We also show that the interference
among colors induces a paradoxical effect in which
color-favored percolation is permitted where standard
percolation for a single color is impossible.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from the INSCI2019:
Internet Science 2019.",
}
@Article{Poulter:2020:ESU,
author = "Andrew John Poulter and Steven J. Ossont and Simon J.
Cox",
title = "Enabling the Secure Use of Dynamic Identity for the
{Internet of Things} --- Using the {Secure Remote
Update Protocol (SRUP)}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "8",
pages = "138",
day = "18",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12080138",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 28 12:33:08 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/8/138",
abstract = "This paper examines dynamic identity, as it pertains
to the Internet of Things (IoT), and explores the
practical implementation of a mitigation technique for
some of the key weaknesses of a conventional dynamic
identity model. This paper explores human-centric and
machine-based observer approaches for confirming device
identity, permitting automated identity confirmation
for deployed systems. It also assesses the advantages
of dynamic identity in the context of identity
revocation permitting secure change of ownership for
IoT devices. The paper explores use-cases for human and
machine-based observation for authentication of device
identity when devices join a Command and Control(C2)
network, and considers the relative merits for these
two approaches for different types of system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Feature Papers for Future
Internet-Internet of Things Section.",
}
@Article{Jiang:2020:PTI,
author = "Bo Jiang and Yanbai He and Rui Chen and Chuanyan Hao
and Sijiang Liu and Gangyao Zhang",
title = "Progressive Teaching Improvement For Small Scale
Learning: A Case Study in {China}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "8",
pages = "137",
day = "17",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12080137",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 28 12:33:08 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/8/137",
abstract = "Learning data feedback and analysis have been widely
investigated in all aspects of education, especially
for large scale remote learning scenario like Massive
Open Online Courses (MOOCs) data analysis. On-site
teaching and learning still remains the mainstream form
for most teachers and students, and learning data
analysis for such small scale scenario is rarely
studied. In this work, we first develop a novel user
interface to progressively collect students' feedback
after each class of a course with WeChat mini program
inspired by the evaluation mechanism of most popular
shopping website. Collected data are then visualized to
teachers and pre-processed. We also propose a novel
artificial neural network model to conduct a
progressive study performance prediction. These
prediction results are reported to teachers for
next-class and further teaching improvement.
Experimental results show that the proposed neural
network model outperforms other state-of-the-art
machine learning methods and reaches a precision value
of 74.05\% on a 3-class classifying task at the end of
the term.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computational Thinking.",
}
@Article{Begotti:2020:CSA,
author = "Tatiana Begotti and Martina Bollo and Daniela Acquadro
Maran",
title = "Coping Strategies and Anxiety and Depressive Symptoms
in Young Adult Victims of Cyberstalking: A
Questionnaire Survey in an {Italian} Sample",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "8",
pages = "136",
day = "12",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12080136",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 28 12:33:08 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/8/136",
abstract = "Aims: In the last decade, the use of smartphones,
computers and devices has progressively increased, and
prolonged use of technology and the internet has
generated new arenas (and tools) for victimization. The
first aim of this study was to analyze the use of
coping strategies in young adult self-declared victims
of cyberstalking. The coping strategies were
categorized as proactive behavior, avoidance tactics
and passivity. To better understand these strategies,
they were analyzed in light of the experience of
victimization in terms of incurred misconduct. The
second aim was to analyze the coping strategies and the
consequences (in terms of depression and anxiety) that
occurred in victims; a comparison was made between
males and females. Methods: A self-administered
questionnaire was distributed to over 433 young adults
living in Italy. The questionnaires were filled out by
398 (92\%) subjects, 41\% males and 59\% females. Their
ages ranged from 18 to 30 years (M = 23.5, SD = 2.76).
Respondents took part on a voluntary basis and did not
receive any compensation (or extra credit) for their
participation. Results: Findings from this
investigation confirmed that among victims, females
were more prone than males to experience cyberstalking
(respectively, 65\% and 35\%), with females
experiencing a higher percentage of more than one form
of cyberstalking behavior than males. Young adult male
victims used the internet principally for online
gaming, and for this activity, they experienced more
cyberstalking behavior than females. In most cases, the
perpetrator was a male, and the victim--cyberstalker
relationship was a friendship or an acquaintance. For
the coping strategies adopted, the findings indicated
that the victims were more prone to use avoidance
tactics than proactivity behavior and passivity
strategies. Young adults involved in this investigation
mainly used avoidance tactics to cope with the
stressful situation, which implies that they preferred
to decrease the use of the internet or stop online
contact than collect evidence and try to contact and
reason with the cyberstalker or increase the misuse of
alcohol of psychotropic substances. Moreover, females
were less prone to use proactive behavior than
expected. Our findings suggested that males were more
prone than females to adopt passivity strategies, while
females were more prone to adopt avoidance tactics.
Moreover, the data showed that proactivity behavior was
adopted more in the case of online contacts and online
identity fraud, while passivity strategies were adopted
in the case of online threats. Conclusion: Findings
from this investigation show the importance of
improving the knowledge about the coping strategies
that could be suggested to victims and the impact on
their psychological health.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Artificial Intelligence and Machine
Learning in Cybercrime Detection.",
}
@Article{Lynn:2020:UDF,
author = "Theo Lynn and Grace Fox and Anna Gourinovitch and
Pierangelo Rosati",
title = "Understanding the Determinants and Future Challenges
of Cloud Computing Adoption for High Performance
Computing",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "8",
pages = "135",
day = "11",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12080135",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 28 12:33:08 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/8/135",
abstract = "High performance computing (HPC) is widely recognized
as a key enabling technology for advancing scientific
progress, industrial competitiveness, national and
regional security, and the quality of human life.
Notwithstanding this contribution, the large upfront
investment and technical expertise required has limited
the adoption of HPC to large organizations, government
bodies, and third level institutions. Recent advances
in cloud computing and telecommunications have the
potential to overcome the historical issues associated
with HPC through increased flexibility and efficiency,
and reduced capital and operational expenditure. This
study seeks to advance the literature on technology
adoption and assimilation in the under-examined HPC
context through a mixed methods approach. Firstly, the
determinants of cloud computing adoption for HPC are
examined through a survey of 121 HPC decision makers
worldwide. Secondly, a modified Delphi method was
conducted with 13 experts to identify and prioritize
critical issues in the adoption of cloud computing for
HPC. Results from the quantitative phase suggest that
only organizational and human factors significantly
influence cloud computing adoption decisions for HPC.
While security was not identified as a significant
influencer in adoption decisions, qualitative research
findings suggest that data privacy and security issues
are an immediate and long-term concern.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cloud-Native Applications and
Services.",
}
@Article{Kapsoulis:2020:CBS,
author = "Nikolaos Kapsoulis and Alexandros Psychas and Georgios
Palaiokrassas and Achilleas Marinakis and Antonios
Litke and Theodora Varvarigou and Charalampos Bouchlis
and Amaryllis Raouzaiou and Gon{\c{c}}al Calvo and
Jordi Escudero Subirana",
title = "Consortium Blockchain Smart Contracts for Musical
Rights Governance in a Collective Management
Organizations {(CMOs)} Use Case",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "8",
pages = "134",
day = "11",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12080134",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 28 12:33:08 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/8/134",
abstract = "Private and permissioned blockchains are
conceptualized and mostly assembled for fulfilling
corporations' demands and needs in the context of their
own premises. This paper presents a complete and
sophisticated end-to-end permissioned blockchain
application for governance and management of musical
rights endorsed by smart contract development. In a
music industry use case, this disclosed solution
monitors and regulates conflicting musical rights of
diverse entities under a popular permissioned
distributed ledger technology network. The proposed
implementation couples various and distinct business
domains across the music industry organizations and
non-profit blockchain associations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Intelligent Innovations in Multimedia
Data.",
}
@Article{Florea:2020:MDL,
author = "George Albert Florea and Radu-Casian Mihailescu",
title = "Multimodal Deep Learning for Group Activity
Recognition in Smart Office Environments",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "8",
pages = "133",
day = "09",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12080133",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 28 12:33:08 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/8/133",
abstract = "Deep learning (DL) models have emerged in recent years
as the state-of-the-art technique across numerous
machine learning application domains. In particular,
image processing-related tasks have seen a significant
improvement in terms of performance due to increased
availability of large datasets and extensive growth of
computing power. In this paper we investigate the
problem of group activity recognition in office
environments using a multimodal deep learning approach,
by fusing audio and visual data from video. Group
activity recognition is a complex classification task,
given that it extends beyond identifying the activities
of individuals, by focusing on the combinations of
activities and the interactions between them. The
proposed fusion network was trained based on the
audio--visual stream from the AMI Corpus dataset. The
procedure consists of two steps. First, we extract a
joint audio--visual feature representation for activity
recognition, and second, we account for the temporal
dependencies in the video in order to complete the
classification task. We provide a comprehensive set of
experimental results showing that our proposed
multimodal deep network architecture outperforms
previous approaches, which have been designed for
unimodal analysis, on the aforementioned AMI dataset.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Internet of Things.",
}
@Article{Collodi:2020:HRS,
author = "Stefania Collodi and Maria Fiorenza and Andrea
Guazzini and Mirko Duradoni",
title = "How Reputation Systems Change the Psychological
Antecedents of Fairness in Virtual Environments",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "8",
pages = "132",
day = "09",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12080132",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 28 12:33:08 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/8/132",
abstract = "Reputational systems promote pro-social behaviors,
also in virtual environments, therefore their study
contributes to the knowledge of social interactions.
Literature findings emphasize the power of reputation
in fostering fairness in many circumstances, even when
its influence is not directly oriented towards specific
individuals. The present study contributes to the
investigation of the psychological antecedents of
fairness, introducing (or not) reputation in the social
dilemma framework. Although reputational systems
usually influence fairness dynamics, there are also
socio-psychological characteristics that can play a
role, affecting the adhesion to the norm online. To
investigate their effects, we employed a virtual
bargaining game that could include a reputational
system depending on the experimental condition. Results
show that the participant's fairness could be
significantly influenced by socio-psychological and
demographic characteristics, as well as personality
traits. Reputation seems to decrease fairness in those
individuals who report high levels of Neuroticism and
Openness. At the same time, high values of
Self-Efficacy appear to be more likely associated with
unfair behaviors when reputation is off the bargaining.
Finally, Age and Sense of Community emerge as fairness
promoters regardless of the experimental condition.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from the INSCI2019:
Internet Science 2019.",
}
@Article{Lo:2020:IEL,
author = "Chih-Fong Lo and Chin-Huang Lin",
title = "The Impact of {English} Learning Motivation and
Attitude on Well-Being: Cram School Students in
{Taiwan}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "8",
pages = "131",
day = "06",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12080131",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 28 12:33:08 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/8/131",
abstract = "As English is a global language, it is important for
students to learn it effectively and efficiently.
Learning English from English cram schools is very
popular in Taiwan. Most students have studied in
English cram schools for some period of time of their
English learning experience. The present study concerns
about how English cram school learners' English
learning attitudes related to their learning motivation
and learning well-being in Taiwan. By using the
quantitative research methodology, an empirical
research model has been proposed and 277 valid
questionnaires were collected. The research results
show that learning motivation has a significant impact
on learning attitude and learning well-being. Then, the
English learning attitude provides mediated effects
between learning motivation and well-being. Learning
attitude is the key to English learning well-being.
Furthermore, a participant's gender has a significant
moderating effect between learning intrinsic motivation
and attitude. According to research findings, some
suggestions such as using e-learning tools were
provided for teachers and educators of the cram schools
in Taiwan.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Network Virtualization and Edge/Fog
Computing.",
}
@Article{Ko:2020:PBN,
author = "Kyi Thar Ko and Htet Htet Hlaing and Masahiro Mambo",
title = "A {PEKS}-Based {NDN} Strategy for Name Privacy",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "8",
pages = "130",
day = "31",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12080130",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 28 12:33:08 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/8/130",
abstract = "Named Data Networking (NDN), where addressable content
name is used, is considered as a candidate of
next-generation Internet architectures. NDN routers use
In-Network cache to replicate and store passing packets
to make faster content delivery. Because NDN uses a
human-readable name, it is easy for an adversary to
guess what kind of content is requested. To solve this
issue, we develop a PEKS-based strategy for forwarding
packets, where PEKS stands for public key encryption
with keyword search. We implement the PEKS-based
strategy based on the best route strategy and multicast
strategy of NDN and show the performance of the
PEKS-based NDN strategy. We also discuss the issues of
the PEKS-based NDN strategy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Information and Future Internet
Security, Trust and Privacy.",
}
@Article{Coelho:2020:CPI,
author = "Igor M. Coelho and Vitor N. Coelho and Rodolfo P.
Araujo and Wang Yong Qiang and Brett D. Rhodes",
title = "Challenges of {PBFT}-Inspired Consensus for Blockchain
and Enhancements over Neo {dBFT}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "8",
pages = "129",
day = "30",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12080129",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 28 12:33:08 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/8/129",
abstract = "Consensus mechanisms are a core feature for handling
negotiation and agreements. Blockchain technology has
seen the introduction of different sorts of consensus
mechanism, ranging from tasks of heavy computation to
the subtle mathematical proofs of Byzantine agreements.
This paper presents the pioneer Delegated Byzantine
Fault Tolerance (dBFT) protocol of Neo Blockchain,
which was inspired by the Practical Byzantine Fault
Tolerance (PBFT). Besides introducing its history, this
study describes proofs and didactic examples, as well
as novel design and extensions for Neo dBFT with
multiple block proposals. Finally, we discuss
challenges when dealing with strong Byzantine
adversaries, and propose solutions inspired on PBFT for
current weak-synchrony problems and increasing system
robustness against attacks. Key Contribution: Presents
an overview of the history of PBFT-inspired consensus
for blockchain, highlighting its current importance on
the literature, challenges and assumptions. Contributes
to the field of Distributed Consensus, proposing novel
extensions for the Neo dBFT (dBFT 2.0+, dBFT 3.0 and
dBFT 3.0+), with new insights on innovative consensus
mechanisms.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Special Issue on Cyber Physical Systems:
Prospects, Challenges, and Role in Software Defined
Networking and Blockchain.",
}
@Article{Sandner:2020:RCI,
author = "Philipp Sandner and Anna Lange and Philipp Schulden",
title = "The Role of the {CFO} of an Industrial Company: An
Analysis of the Impact of Blockchain Technology",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "8",
pages = "128",
day = "30",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12080128",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 28 12:33:08 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/8/128",
abstract = "This qualitative multiple case study explores the
influence of blockchain technology on the chief
financial officer (CFO) of an industrial company. Due
to the advancing digitalization of business sectors and
increasing competitive pressures, industrial companies
are forced to promote their own digital transformation
to sustain on the market. Here, the literature regards
the CFO as a key corporate function to induce
digitization initiatives within organizations. The
blockchain technology, due to its features of
transparency, immutability and cryptography combined
with its ability to coordinate data flows of e.g., the
Internet of Things (IoT) or Artificial Intelligence
(AI), constitutes a suitable instrument for the CFO to
meet the requirements of Industry 4.0. This paper
provides a contribution to address existing research
gaps regarding the application side of blockchain
technology. Thus, the objective of this work is to
provide corporate financial functions, such as the CFO
of an industrial company, with an understanding of the
extent to which blockchain technology can be used for
the role-specific responsibilities. Therefore, the
underlying qualitative study explores the influence of
blockchain technology on the CFO-function of an
industrial company. Thus, intending to address a
research gap on the application side, it asks (1) What
is the impact of blockchain technology on the financial
as well strategic role of the CFO? (2) What is the
impact of blockchain technology in convergence with the
Machine Economy on the key performance indicators
(KPIs) of the CFO? (3) What is the impact of
blockchain-enabled integrated business ecosystems on
the role of the CFO? Based on a review of literature,
semi-structured expert interviews were conducted with
23 participants. Analysis of the responses demonstrated
a considerable impact of blockchain technology on the
CFO-function. The results indicate improvements of
business processes in regard to efficiency and
automation, a relocation of the CFO's strategic role,
improvements of CFO-relevant KPIs through integrating
machines into payment networks as well as the emergence
of integrated business ecosystems facilitating new
forms of inter-organizational collaboration. Necessary
prerequisites for adoption include digital competences
of the CFO, appropriate organizational structures,
digital currencies and identities on the blockchain, a
change of the competitive mindset as well as
standardized platforms with a neutral governance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from the 3rd Annual
Decentralized Conference (DECENTRALIZED 2019).",
}
@Article{Hassan:2020:AAA,
author = "Walaa Hassan and Tamer Farag",
title = "Adaptive Allocation Algorithm for Multi-Radio
Multi-Channel Wireless Mesh Networks",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "8",
pages = "127",
day = "29",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12080127",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 28 12:33:08 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/8/127",
abstract = "The wireless mesh network (WMN) has proven to be a
great choice for network communication technology. WMNs
are composed of access points (APs) that are installed
and communicate with each other through multi-hop
wireless networks. One or more of these APs acts as a
gateway (GW) to the internet. Hosts of WMNs are
stationary or mobile. According to the structure of
WMNs, some network features may be affected, such as
the overall performance, channel interference, and AP
connectivity. In this paper, we propose a new adaptive
channel allocation algorithm for a multi-radio
multi-channel wireless mesh network. The algorithm is
aimed to minimize the number of channel reassignments
while maximizing the performance under practical
constraints. The algorithm defines a decision function
for the channel reassignments. The decision function
aims to minimize the traffic around the GW. Whenever
the traffic changes in the wireless mesh network, the
decision function decides which channel radio
reassignment should be done. We demonstrated the
effectiveness of our algorithm through extensive
simulations using Network Simulator 2 (NS-2).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Smart System Infrastructure and
Applications.",
}
@Article{Derakhshannia:2020:DLG,
author = "Marzieh Derakhshannia and Carmen Gervet and Hicham
Hajj-Hassan and Anne Laurent and Arnaud Martin",
title = "Data Lake Governance: Towards a Systemic and Natural
Ecosystem Analogy",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "8",
pages = "126",
day = "27",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12080126",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 28 12:33:08 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/8/126",
abstract = "The realm of big data has brought new venues for
knowledge acquisition, but also major challenges
including data interoperability and effective
management. The great volume of miscellaneous data
renders the generation of new knowledge a complex data
analysis process. Presently, big data technologies
provide multiple solutions and tools towards the
semantic analysis of heterogeneous data, including
their accessibility and reusability. However, in
addition to learning from data, we are faced with the
issue of data storage and management in a
cost-effective and reliable manner. This is the core
topic of this paper. A data lake, inspired by the
natural lake, is a centralized data repository that
stores all kinds of data in any format and structure.
This allows any type of data to be ingested into the
data lake without any restriction or normalization.
This could lead to a critical problem known as data
swamp, which can contain invalid or incoherent data
that adds no values for further knowledge acquisition.
To deal with the potential avalanche of data, some
legislation is required to turn such heterogeneous
datasets into manageable data. In this article, we
address this problem and propose some solutions
concerning innovative methods, derived from a
multidisciplinary science perspective to manage data
lake. The proposed methods imitate the supply chain
management and natural lake principles with an emphasis
on the importance of the data life cycle, to implement
responsible data governance for the data lake.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from the INSCI2019:
Internet Science 2019.",
}
@Article{Hazari:2020:ITS,
author = "Shihab Shahriar Hazari and Qusay H. Mahmoud",
title = "Improving Transaction Speed and Scalability of
Blockchain Systems via Parallel Proof of Work",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "8",
pages = "125",
day = "27",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12080125",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 28 12:33:08 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/8/125",
abstract = "A blockchain is a distributed ledger forming a
distributed consensus on a history of transactions, and
is the underlying technology for the Bitcoin
cryptocurrency. Its applications are far beyond the
financial sector. The transaction verification process
for cryptocurrencies is much slower than traditional
digital transaction systems. One approach to
scalability or the speed at which transactions are
processed is to design a solution that offers faster
Proof of Work. In this paper, we propose a method for
accelerating the process of Proof of Work based on
parallel mining rather than solo mining. The goal is to
ensure that no more than two or more miners put the
same effort into solving a specific block. The proposed
method includes a process for selection of a manager,
distribution of work and a reward system. This method
has been implemented in a test environment that
contains all the characteristics needed to perform
Proof of Work for Bitcoin and has been tested, using a
variety of case scenarios, by varying the difficulty
level and number of validators. Experimental
evaluations were performed locally and in a cloud
environment, and experimental results demonstrate the
feasibility the proposed method.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Special Issue on Cyber Physical Systems:
Prospects, Challenges, and Role in Software Defined
Networking and Blockchain.",
}
@Article{Moreno-Guerrero:2020:SDE,
author = "Antonio-Jos{\'e} Moreno-Guerrero and Jes{\'u}s
L{\'o}pez-Belmonte and Jos{\'e}-Antonio
Mar{\'\i}n-Mar{\'\i}n and Rebeca Soler-Costa",
title = "Scientific Development of Educational Artificial
Intelligence in {Web of Science}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "8",
pages = "124",
day = "24",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12080124",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 28 12:33:08 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/8/124",
abstract = "The social and technological changes that society is
undergoing in this century are having a global
influence on important aspects such as the economy,
health and education. An example of this is the
inclusion of artificial intelligence in the
teaching--learning processes. The objective of this
study was to analyze the importance and the projection
that artificial intelligence has acquired in the
scientific literature in the Web of Science categories
related to the field of education. For this, scientific
mapping of the reported documents was carried out.
Different bibliometric indicators were analyzed and a
word analysis was carried out. We worked with an
analysis unit of 379 publications. The results show
that scientific production is irregular from its
beginnings in 1956 to the present. The language of
greatest development is English. The most significant
publication area is Education Educational Research,
with conference papers as document types. The
underlying organization is the Open University UK. It
can be concluded that there is an evolution in
artificial intelligence (AI) research in the
educational field, focusing in the last years on the
performance and influence of AI in the educational
processes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Distributed Systems and Artificial
Intelligence.",
}
@Article{Romero-Rodriguez:2020:CII,
author = "Jos{\'e}-Mar{\'\i}a Romero-Rodr{\'\i}guez and Santiago
Alonso-Garc{\'\i}a and Jos{\'e}-Antonio
Mar{\'\i}n-Mar{\'\i}n and Gerardo
G{\'o}mez-Garc{\'\i}a",
title = "Considerations on the Implications of the {Internet of
Things} in {Spanish} Universities: The Usefulness
Perceived by Professors",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "8",
pages = "123",
day = "24",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12080123",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 28 12:33:08 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/8/123",
abstract = "Internet of Things (IoT) is an emerging technology in
the field of education, which has not yet been
consolidated. Acceptance and adoption studies of IoT in
higher education are scarce. Accordingly, the purpose
of this study was to explore the acceptance of the IoT
by university professors for future adoption in higher
education. An online survey was implemented based on
the unified theory of acceptance and use of technology
(UTAUT), in a sample of 587 Spanish university
teachers, aged between 21 and 58. The results showed
that performance expectancy, facilitating conditions,
and attitude toward using technology were influential
in behavioral intention to use IoT. While the intention
for use was similar between men and women and with
respect to age. However, in the different constructs of
the UTAUT model, the highest average scores were
obtained in men and in teachers over 36 years of age.
Finally, the findings and implications of the paper are
discussed, showing empirical evidence on the adoption
and acceptance of IoT in higher education in the
context of Spain, highlighting the need for further
research on emerging technologies in a context that is
marked by COVID-19.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Internet of Things.",
}
@Article{Wang:2020:HCA,
author = "Baocheng Wang and Zetao Li and Haibin Li",
title = "Hybrid Consensus Algorithm Based on Modified
Proof-of-Probability and {DPoS}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "8",
pages = "122",
day = "24",
month = jul,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12080122",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 28 12:33:08 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/8/122",
abstract = "As the core of blockchain technology, the consensus
algorithm plays an important role in determining the
security, data consistency, and efficiency of
blockchain systems. The existing mainstream consensus
algorithm is experiencing difficulties satisfying the
needs of efficiency, security, and decentralization in
real-world scenarios. This paper proposes a hybrid
consensus algorithm based on modified
Proof-of-Probability and Delegated Proof-of-Stake. In
this method, the work of block generation and
validation is, respectively, completed by the nodes
using the modified Proof-of-Probability consensus
algorithm and Delegated Proof-of-Stake consensus
algorithm. When a transaction occurs, the system sends
several target hash values to the whole network. Each
modified Proof-of-Probability node has a different
sorting algorithm, so they have different mining
priorities. Every time a hash is decrypted by a
modified Proof-of-Probability node, the modulo
operation is done to the value of nonce, which is then
compared with the expected value given by the supernode
selected by the Delegated Proof-of-Stake nodes. If they
are not the same, the Proof-of-Probability node enters
the waiting time and the other Proof-of-Probability
nodes continue to mine. By adopting two consensus
algorithms, the malicious nodes must control more than
51\% of the nodes that adopt the two consensus
algorithms, at the same time, to effectively attack the
system, that is, they must have more than 51\% of the
computing power and more than 51\% of the tokens. This
not only increases the cost of malicious attacks, but
also reduces waste of computing power. In addition, the
efficiency of the DPoS algorithm makes up for the
deficiency of the PoP algorithm in system efficiency,
and the mining behavior based on probability in the PoP
algorithm also significantly weakens the ability of
supernodes in the DPoS algorithm to conduct monopoly
behavior or other malicious behaviors. In a word, the
combination of the two algorithms makes the system
perform better in terms of security, system efficiency,
and decentralization.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Special Issue on Cyber Physical Systems:
Prospects, Challenges, and Role in Software Defined
Networking and Blockchain.",
}
@Article{Pombo:2020:ELC,
author = "I{\~n}igo Pombo and Leire Godino and Jose Antonio
S{\'a}nchez and Rafael Lizarralde",
title = "Expectations and limitations of Cyber-Physical Systems
{(CPS)} for Advanced Manufacturing: A View from the
Grinding Industry",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "9",
pages = "159",
day = "22",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12090159",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 28 10:44:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/9/159",
abstract = "Grinding is a critical technology in the manufacturing
of high added-value precision parts, accounting for
approximately 20--25\% of all machining costs in the
industrialized world. It is a commonly used process in
the finishing of parts in numerous key industrial
sectors such as transport (including the aeronautical,
automotive and railway industries), and energy or
biomedical industries. As in the case of many other
manufacturing technologies, grinding relies heavily on
the experience and knowledge of the operatives. For
this reason, considerable efforts have been devoted to
generating a systematic and sustainable approach that
reduces and eventually eliminates costly
trial-and-error strategies. The main contribution of
this work is that, for the first time, a complete
digital twin (DT) for the grinding industry is
presented. The required flow of information between
numerical simulations, advanced mechanical testing and
industrial practice has been defined, thus producing a
virtual mirror of the real process. The structure of
the DT comprises four layers, which integrate: (1)
scientific knowledge of the process (advanced process
modeling and numerical simulation); (2)
characterization of materials through specialized
mechanical testing; (3) advanced sensing techniques, to
provide feedback for process models; and (4) knowledge
integration in a configurable open-source industrial
tool. To this end, intensive collaboration between all
the involved agents (from university to industry) is
essential. One of the most remarkable results is the
development of new and more realistic models for
predicting wheel wear, which currently can only be
known in industry through costly trial-and-error
strategies. Also, current work is focused on the
development of an intelligent grinding wheel, which
will provide on-line information about process
variables such as temperature and forces. This is a
critical issue in the advance towards a zero-defect
grinding process.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Collaborative Networks, Decision
Systems, Web Applications and Services for Supporting
Engineering and Production Management.",
}
@Article{Ventruto:2020:FED,
author = "Federica Ventruto and Marco Pulimeno and Massimo
Cafaro and Italo Epicoco",
title = "On Frequency Estimation and Detection of Heavy Hitters
in Data Streams",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "9",
pages = "158",
day = "18",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12090158",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 28 10:44:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/9/158",
abstract = "A stream can be thought of as a very large set of
data, sometimes even infinite, which arrives
sequentially and must be processed without the
possibility of being stored. In fact, the memory
available to the algorithm is limited and it is not
possible to store the whole stream of data which is
instead scanned upon arrival and summarized through a
succinct data structure in order to maintain only the
information of interest. Two of the main tasks related
to data stream processing are frequency estimation and
heavy hitter detection. The frequency estimation
problem requires estimating the frequency of each item,
that is the number of times or the weight with which
each appears in the stream, while heavy hitter
detection means the detection of all those items with a
frequency higher than a fixed threshold. In this work
we design and analyze ACMSS, an algorithm for frequency
estimation and heavy hitter detection, and compare it
against the state of the art AS ketch algorithm. We
show that, given the same budgeted amount of memory,
for the task of frequency estimation our algorithm
outperforms AS ketch with regard to accuracy.
Furthermore, we show that, under the assumptions stated
by its authors, AS ketch may not be able to report all
of the heavy hitters whilst ACMSS will provide with
high probability the full list of heavy hitters.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Big Data and Augmented Intelligence.",
}
@Article{Lee:2020:ITI,
author = "In Lee",
title = "{Internet of Things (IoT)} Cybersecurity: Literature
Review and {IoT} Cyber Risk Management",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "9",
pages = "157",
day = "18",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12090157",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 28 10:44:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/9/157",
abstract = "Along with the growing threat of cyberattacks,
cybersecurity has become one of the most important
areas of the Internet of Things (IoT). The purpose of
IoT cybersecurity is to reduce cybersecurity risk for
organizations and users through the protection of IoT
assets and privacy. New cybersecurity technologies and
tools provide potential for better IoT security
management. However, there is a lack of effective IoT
cyber risk management frameworks for managers. This
paper reviews IoT cybersecurity technologies and cyber
risk management frameworks. Then, this paper presents a
four-layer IoT cyber risk management framework. This
paper also applies a linear programming method for the
allocation of financial resources to multiple IoT
cybersecurity projects. An illustration is provided as
a proof of concept.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Frontiers in Cyber Security.",
}
@Article{Ghourabi:2020:HCL,
author = "Abdallah Ghourabi and Mahmood A. Mahmood and Qusay M.
Alzubi",
title = "A Hybrid {CNN-LSTM} Model for {SMS} Spam Detection in
{Arabic} and {English} Messages",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "9",
pages = "156",
day = "18",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12090156",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 28 10:44:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/9/156",
abstract = "Despite the rapid evolution of Internet protocol-based
messaging services, SMS still remains an indisputable
communication service in our lives until today. For
example, several businesses consider that text messages
are more effective than e-mails. This is because 82\%
of SMSs are read within 5 min., but consumers only open
one in four e-mails they receive. The importance of SMS
for mobile phone users has attracted the attention of
spammers. In fact, the volume of SMS spam has increased
considerably in recent years with the emergence of new
security threats, such as SMiShing. In this paper, we
propose a hybrid deep learning model for detecting SMS
spam messages. This detection model is based on the
combination of two deep learning methods CNN and LSTM.
It is intended to deal with mixed text messages that
are written in Arabic or English. For the comparative
evaluation, we also tested other well-known machine
learning algorithms. The experimental results that we
present in this paper show that our CNN-LSTM model
outperforms the other algorithms. It achieved a very
good accuracy of 98.37\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Cybersecurity.",
}
@Article{Pires:2020:IHA,
author = "Ivan Miguel Pires and Faisal Hussain and Nuno M.
Garcia and Eftim Zdravevski",
title = "Improving Human Activity Monitoring by Imputation of
Missing Sensory Data: Experimental Study",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "9",
pages = "155",
day = "17",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12090155",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 28 10:44:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/9/155",
abstract = "The automatic recognition of human activities with
sensors available in off-the-shelf mobile devices has
been the subject of different research studies in
recent years. It may be useful for the monitoring of
elderly people to present warning situations,
monitoring the activity of sports people, and other
possibilities. However, the acquisition of the data
from different sensors may fail for different reasons,
and the human activities are recognized with better
accuracy if the different datasets are fulfilled. This
paper focused on two stages of a system for the
recognition of human activities: data imputation and
data classification. Regarding the data imputation, a
methodology for extrapolating the missing samples of a
dataset to better recognize the human activities was
proposed. The K-Nearest Neighbors (KNN) imputation
technique was used to extrapolate the missing samples
in dataset captures. Regarding the data classification,
the accuracy of the previously implemented method,
i.e., Deep Neural Networks (DNN) with normalized and
non-normalized data, was improved in relation to the
previous results without data imputation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Deep Neural Networks on Reconfigurable
Embedded Systems.",
}
@Article{Roy:2020:ERF,
author = "Animesh Chandra Roy and Mohammad Shamsul Arefin and A.
S. M. Kayes and Mohammad Hammoudeh and Khandakar
Ahmed",
title = "An Empirical Recommendation Framework to Support
Location-Based Services",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "9",
pages = "154",
day = "17",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12090154",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 28 10:44:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/9/154",
abstract = "The rapid growth of Global Positioning System (GPS)
and availability of real-time Geo-located data allow
the mobile devices to provide information which leads
towards the Location Based Services (LBS). The need for
providing suggestions to personals about the activities
of their interests, the LBS contributing more
effectively to this purpose. Recommendation system (RS)
is one of the most effective and efficient features
that has been initiated by the LBS. Our proposed system
is intended to design a recommendation system that will
provide suggestions to the user and also find a
suitable place for a group of users and it is according
to their preferred type of places. In our work, we
propose the Density-Based Spatial Clustering of
Applications with Noise (DBSCAN) algorithm for
clustering the check-in spots of the user's and
user-based Collaborative Filtering (CF) to find similar
users as we are considering constructing an interest
profile for each user. We also introduced a grid-based
structure to present the Point of Interest (POI) into a
map. Finally, similarity calculation is done to make
the recommendations. We evaluated our system on real
world users and acquired the F-measure score on average
0.962 and 0.964 for a single user and for a group of
user respectively. We also observed that our system
provides effective recommendations for a single user as
well as for a group of users.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Sustainable Smart City.",
}
@Article{Ramakrishnan:2020:STC,
author = "Abinaya Megan Ramakrishnan and Aparna Nicole
Ramakrishnan and Sarah Lagan and John Torous",
title = "From Symptom Tracking to Contact Tracing: A Framework
to Explore and Assess {COVID-19} Apps",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "9",
pages = "153",
day = "08",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12090153",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 28 10:44:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/9/153",
abstract = "Smartphone applications related to coronavirus disease
2019 (COVID-19) continue to emerge and evolve, but
despite a wide variety of different app functions,
there has yet to be a comprehensive study of what the
most prevalent publicly available apps provide, and
there exists no standardized evaluation system for end
users to determine the safety and efficacy of an app
before they download it. Furthermore, limited oversight
means that the rapidly growing space creates challenges
for end users trying to find a relevant app. We adapted
the M-Health Index and Navigation Database (MIND) from
apps.digitalpsych.org that previously has been used to
evaluate mental health applications to guide the
assessment of COVID apps. Using this framework, we
conducted a thorough analysis of the top-100 returned
coronavirus apps on two separate dates a month apart to
understand the clinical utility and features of
COVID-19 apps and how these change in a short period of
time. We ultimately identified a significant turnover
rate, as well as privacy concerns around lack of
privacy policies and disclosure of personal
information. Our research offers insight into the
current status of COVID-19 apps and provides a
comprehensive and adaptable framework to help
individuals assess the growing number of such digital
tools in the wake of the pandemic.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances of Machine Learning
Techniques on Smartphones.",
}
@Article{Milicic:2020:GTA,
author = "Gregor Milicic and Sina Wetzel and Matthias Ludwig",
title = "Generic Tasks for Algorithms",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "9",
pages = "152",
day = "03",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12090152",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 28 10:44:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/9/152",
abstract = "Due to its links to computer science (CS), teaching
computational thinking (CT) often involves the handling
of algorithms in activities, such as their
implementation or analysis. Although there already
exists a wide variety of different tasks for various
learning environments in the area of computer science,
there is less material available for CT. In this
article, we propose so-called Generic Tasks for
algorithms inspired by common programming tasks from CS
education. Generic Tasks can be seen as a family of
tasks with a common underlying structure, format, and
aim, and can serve as best-practice examples. They thus
bring many advantages, such as facilitating the process
of creating new content and supporting asynchronous
teaching formats. The Generic Tasks that we propose
were evaluated by 14 experts in the field of Science,
Technology, Engineering, and Mathematics (STEM)
education. Apart from a general estimation in regard to
the meaningfulness of the proposed tasks, the experts
also rated which and how strongly six core CT skills
are addressed by the tasks. We conclude that, even
though the experts consider the tasks to be meaningful,
not all CT-related skills can be specifically
addressed. It is thus important to define additional
tasks for CT that are detached from algorithms and
programming.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computational Thinking.",
}
@Article{Baldi:2020:IGR,
author = "Alberto Baldi and Franco Bagnoli",
title = "Intransitiveness: From Games to Random Walks",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "9",
pages = "151",
day = "03",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12090151",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 28 10:44:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/9/151",
abstract = "Many games in which chance plays a role can be
simulated as a random walk over a graph of possible
configurations of board pieces, cards, dice or coins.
The end of the game generally consists of the
appearance of a predefined winning pattern; for random
walks, this corresponds to an absorbing trap. The
strategy of a player consist of betting on a given
sequence, i.e., in placing a trap on the graph. In
two-players games, the competition between strategies
corresponds to the capabilities of the corresponding
traps in capturing the random walks originated by the
aleatory components of the game. The concept of
dominance transitivity of strategies implies an
advantage for the first player, who can choose the
strategy that, at least statistically, wins. However,
in some games, the second player is statistically
advantaged, so these games are denoted
``intransitive''. In an intransitive game, the second
player can choose a location for his/her trap which
captures more random walks than that of the first one.
The transitivity concept can, therefore, be extended to
generic random walks and in general to Markov chains.
We analyze random walks on several kinds of networks
(rings, scale-free, hierarchical and city-inspired)
with many variations: traps can be partially absorbing,
the walkers can be biased and the initial distribution
can be arbitrary. We found that the transitivity
concept can be quite useful for characterizing the
combined properties of a graph and that of the
walkers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from the INSCI2019:
Internet Science 2019.",
}
@Article{AlMojamed:2020:IIM,
author = "Mohammad {Al Mojamed}",
title = "Integrating {IP} Mobility Management Protocols and
{MANET}: A Survey",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "9",
pages = "150",
day = "03",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12090150",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 28 10:44:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/9/150",
abstract = "The Mobile ad hoc Network (MANET) is a collection of
mobile devices that forms a self-created,
self-administered, and self-organized network. It is an
infrastructureless network that does not require an
existing infrastructure to operate. MANET suits
scenarios where a temporary network is needed, such as
emergency rescue, the military field, and disaster
areas. MANET is an isolated network, and communication
is restricted to the participating nodes' transmission
coverage. In order to increase its connectivity and its
application scope, however, MANET requires integration
with other networks, forming a hybrid MANET. The
integration of MANET and IP networks raises many
challenges and issues. Mobility management is one of
the main challenges. Traditional mobility management
protocols provide seamless mobility in a single hop
infrastructure network. Consequently, mobile nodes can
maintain their global connectivity without interrupting
the ongoing sessions. Mobility management becomes more
challenging in a network that relies on multi-hop
communication, such as MANET. This paper presents a
survey of the use of mobility management systems when
integrating MANET with the internet, with the objective
of serving as a handy reference in this field of
research. It presents, analyzes, and discusses existing
mobility management solutions for integrated MANET
networks. It also investigates their shortcomings and
provides a comparative study of the surveyed
proposals.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Smart System Infrastructure and
Applications.",
}
@Article{Lorenzo-Lledo:2020:DVQ,
author = "Alejandro Lorenzo-Lled{\'o}",
title = "Design and Validation of a Questionnaire to Measure
Future {Spanish} Teachers' Perceptions of Cinema in
Pre-School and Primary Education: Towards Active and
Technological Learning",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "9",
pages = "149",
day = "03",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12090149",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 28 10:44:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/9/149",
abstract = "State of the art: Cinema, because of the eclectic
nature of art, technology and mass media, can be
manifested as an educational tool in the classroom. In
this sense, the educational possibilities detected in
the cinema are numerous. The pre-service teacher
education in the figure of the teacher determines their
educational resources. Purpose: The general objective
of this study is to design and validate an instrument
to measure the perceptions of students of Pre-School
Teacher Degree and Primary Teacher Degree in Spanish
universities about cinema as a teaching resource in
Pre-School and Primary Education. Design/methodology:
For this purpose, a systematic and planned process was
developed for the design and validation of the
Percepciones sobre las potencialidades del cine como
recurso did{\'a}ctico en las aulas de Infantil y
Primaria ((PECID) (perceptions about the potentialities
of cinema as a didactic resource in pre-school and
primary classrooms)) questionnaire. Main findings: The
results obtained showed a good content validity of 25
items after an expert judgement. On the other hand, a
reliability of the internal consistency of the
instrument of 0.978 was obtained. Furthermore, a
three-factor structure was confirmed through factor
analysis. Conclusions: It is concluded that the PECID
questionnaire is a valid and reliable instrument to
measure the perceptions of future teachers in Spain
about using cinema as a resource for future teaching.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Ismailov:2020:VOS,
author = "Max Ismailov and Michail Tsikerdekis and Sherali
Zeadally",
title = "Vulnerabilities to Online Social Network Identity
Deception Detection Research and Recommendations for
Mitigation",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "9",
pages = "148",
day = "31",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12090148",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 28 10:44:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/9/148",
abstract = "Identity deception in online social networks is a
pervasive problem. Ongoing research is developing
methods for identity deception detection. However, the
real-world efficacy of these methods is currently
unknown because they have been evaluated largely
through laboratory experiments. We present a review of
representative state-of-the-art results on identity
deception detection. Based on this analysis, we
identify common methodological weaknesses for these
approaches, and we propose recommendations that can
increase their effectiveness for when they are applied
in real-world environments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Social Networks
and Solutions.",
}
@Article{Isyaku:2020:SDN,
author = "Babangida Isyaku and Mohd Soperi Mohd Zahid and Maznah
Bte Kamat and Kamalrulnizam Abu Bakar and Fuad A.
Ghaleb",
title = "Software Defined Networking Flow Table Management of
{OpenFlow} Switches Performance and Security
Challenges: A Survey",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "9",
pages = "147",
day = "31",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12090147",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 28 10:44:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/9/147",
abstract = "Software defined networking (SDN) is an emerging
network paradigm that decouples the control plane from
the data plane. The data plane is composed of
forwarding elements called switches and the control
plane is composed of controllers. SDN is gaining
popularity from industry and academics due to its
advantages such as centralized, flexible, and
programmable network management. The increasing number
of traffics due to the proliferation of the Internet of
Thing (IoT) devices may result in two problems: (1)
increased processing load of the controller, and (2)
insufficient space in the switches' flow table to
accommodate the flow entries. These problems may cause
undesired network behavior and unstable network
performance, especially in large-scale networks. Many
solutions have been proposed to improve the management
of the flow table, reducing controller processing load,
and mitigating security threats and vulnerabilities on
the controllers and switches. This paper provides
comprehensive surveys of existing schemes to ensure SDN
meets the quality of service (QoS) demands of various
applications and cloud services. Finally, potential
future research directions are identified and discussed
such as management of flow table using machine
learning.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Networks: Latest Trends and
Developments.",
}
@Article{Studen:2020:SMQ,
author = "Laura Studen and Victor Tiberius",
title = "Social Media, Quo Vadis? {Prospective} Development and
Implications",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "9",
pages = "146",
day = "28",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12090146",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 28 10:44:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/9/146",
abstract = "Over the past two decades, social media have become a
crucial and omnipresent cultural and economic
phenomenon, which has seen platforms come and go and
advance technologically. In this study, we explore the
further development of social media regarding
interactive technologies, platform development,
relationships to news media, the activities of
institutional and organizational users, and effects of
social media on the individual and the society over the
next five to ten years by conducting an international,
two-stage Delphi study. Our results show that enhanced
interaction on platforms, including virtual and
augmented reality, somatosensory sense, and touch- and
movement-based navigation are expected. AIs will
interact with other social media users. Inactive user
profiles will outnumber active ones. Platform providers
will diversify into the WWW, e-commerce, edu-tech,
fintechs, the automobile industry, and HR. They will
change to a freemium business model and put more effort
into combating cybercrime. Social media will become the
predominant news distributor, but fake news will still
be problematic. Firms will spend greater amounts of
their budgets on social media advertising, and schools,
politicians, and the medical sector will increase their
social media engagement. Social media use will
increasingly lead to individuals' psychic issues.
Society will benefit from economic growth and new jobs,
increased political interest, democratic progress, and
education due to social media. However, censorship and
the energy consumption of platform operators might
rise.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Wireless Internet, Multimedia, and
Artificial Intelligence: New Applications and
Infrastructures.",
}
@Article{Tchakounte:2020:CRF,
author = "Franklin Tchakount{\'e} and Athanase Esdras Yera Pagor
and Jean Claude Kamgang and Marcellin Atemkeng",
title = "{CIAA-RepDroid}: A Fine-Grained and Probabilistic
Reputation Scheme for {Android} Apps Based on Sentiment
Analysis of Reviews",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "9",
pages = "145",
day = "27",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12090145",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 28 10:44:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/9/145",
abstract = "To keep its business reliable, Google is concerned to
ensure the quality of apps on the store. One crucial
aspect concerning quality is security. Security is
achieved through Google Play protect and anti-malware
solutions. However, they are not totally efficient
since they rely on application features and application
execution threads. Google provides additional elements
to enable consumers to collectively evaluate
applications providing their experiences via reviews or
showing their satisfaction through rating. The latter
is more informal and hides details of rating whereas
the former is textually expressive but requires further
processing to understand opinions behind it. Literature
lacks approaches which mine reviews through sentiment
analysis to extract useful information to improve the
security aspects of provided applications. This work
goes in this direction and in a fine-grained way,
investigates in terms of confidentiality, integrity,
availability, and authentication (CIAA). While assuming
that reviews are reliable and not fake, the proposed
approach determines review polarities based on
CIAA-related keywords. We rely on the popular
classifier Naive Bayes to classify reviews into
positive, negative, and neutral sentiment. We then
provide an aggregation model to fusion different
polarities to obtain application global and CIAA
reputations. Quantitative experiments have been
conducted on 13 applications including e-banking, live
messaging and anti-malware apps with a total of 1050
security-related reviews and 7,835,322
functionality-related reviews. Results show that 23\%
of applications (03 apps) have a reputation greater
than 0.5 with an accent on integrity, authentication,
and availability, while the remaining 77\% has a
polarity under 0.5. Developers should make a lot of
effort in security while developing codes and that more
efforts should be made to improve confidentiality
reputation. Results also show that applications with
good functionality-related reputation generally offer a
bad security-related reputation. This situation means
that even if the number of security reviews is low, it
does not mean that the security aspect is not a
consumer preoccupation. Unlike, developers put much
more time to test whether applications work without
errors even if they include possible security
vulnerabilities. A quantitative comparison against
well-known rating systems reveals the effectiveness and
robustness of CIAA-RepDroid to repute apps in terms of
security. CIAA-RepDroid can be associated with existing
rating solutions to recommend developers exact CIAA
aspects to improve within source codes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Cybersecurity.",
}
@Article{Bodrunova:2020:TDB,
author = "Svetlana S. Bodrunova and Andrey V. Orekhov and Ivan
S. Blekanov and Nikolay S. Lyudkevich and Nikita A.
Tarasov",
title = "Topic Detection Based on Sentence Embeddings and
Agglomerative Clustering with {Markov} Moment",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "9",
pages = "144",
day = "26",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12090144",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 28 10:44:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/9/144",
abstract = "The paper is dedicated to solving the problem of
optimal text classification in the area of automated
detection of typology of texts. In conventional
approaches to topicality-based text classification
(including topic modeling), the number of clusters is
to be set up by the scholar, and the optimal number of
clusters, as well as the quality of the model that
designates proximity of texts to each other, remain
unresolved questions. We propose a novel approach to
the automated definition of the optimal number of
clusters that also incorporates an assessment of word
proximity of texts, combined with text encoding model
that is based on the system of sentence embeddings. Our
approach combines Universal Sentence Encoder (USE) data
pre-processing, agglomerative hierarchical clustering
by Ward's method, and the Markov stopping moment for
optimal clustering. The preferred number of clusters is
determined based on the ``e-2'' hypothesis. We set up
an experiment on two datasets of real-world labeled
data: News20 and BBC. The proposed model is tested
against more traditional text representation methods,
like bag-of-words and word2vec, to show that it
provides a much better-resulting quality than the
baseline DBSCAN and OPTICS models with different
encoding methods. We use three quality metrics to
demonstrate that clustering quality does not drop when
the number of clusters grows. Thus, we get close to the
convergence of text clustering and text
classification.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from the INSCI2019:
Internet Science 2019.",
}
@Article{Bylieva:2020:OGS,
author = "Daria Bylieva and Zafer Bekirogullari and Dmitry
Kuznetsov and Nadezhda Almazova and Victoria Lobatyuk
and Anna Rubtsova",
title = "Online Group Student Peer-Communication as an Element
of Open Education",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "9",
pages = "143",
day = "26",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12090143",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 28 10:44:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/9/143",
abstract = "Information and communication technologies transform
modern education into a more available learning matrix.
One of the unexplored aspects of open education is the
constant communicative interaction within the student
group by using social media. The aim of the study was
to determine principal functions of student-led
communication in the educational process, the method
for assessing its strong points and the disadvantages
disrupting traditional learning. For the primary study
of the phenomenon, we used methods that made it
possible to propose approaches to further analysis.
Netnography is the main research method defining the
essence and characteristics of the student-led
peer-communication. In our research, we applied data
visualization, analytical and quantitative methods and
developed a set of quantitative indicators that can be
used to assess various aspects of student communication
in chats. The elaborated visual model can serve as a
simple tool for diagnosing group communication
processes. We revealed that online group chats perform
a support function in learning. They provide constant
informational resource on educational and
organizational issues and create emotional comfort.
Identified features serve to define shortcomings (e.g.,
lack of students' readiness to freely exchange answers
to assignments) and significant factors (e.g.,
underutilized opportunities for self-organization) that
exist in the modern system of higher education.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue E-learning and Technology Enhanced
Learning.",
}
@Article{Wu:2020:HSD,
author = "Zhijun Wu and Bohua Cui",
title = "A Hybrid {SWIM} Data Naming Scheme Based on {TLC}
Structure",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "9",
pages = "142",
day = "25",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12090142",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 28 10:44:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/9/142",
abstract = "Aiming at the problem of low interconnection
efficiency caused by the wide variety of data in SWIM
(System-Wide Information Management) and the
inconsistent data naming methods, this paper proposes a
new TLC (Type-Length-Content) structure hybrid data
naming scheme combined with Bloom filters. This
solution can meet the uniqueness and durability
requirements of SWIM data names, solve the ``suffix
loopholes'' encountered in prefix-based route
aggregation in hierarchical naming, and realize
scalable and effective route state aggregation.
Simulation verification results show that the hybrid
naming scheme is better than prefix-based aggregation
in the probability of route identification errors. In
terms of search time, this scheme has increased by
17.8\% and 18.2\%, respectively, compared with the
commonly used hierarchical and flat naming methods.
Compared with the other two naming methods, scalability
has increased by 19.1\% and 18.4\%, respectively.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Big Data and Augmented Intelligence.",
}
@Article{Ziouzios:2020:DAS,
author = "Dimitris Ziouzios and Dimitris Tsiktsiris and Nikolaos
Baras and Minas Dasygenis",
title = "A Distributed Architecture for Smart Recycling Using
Machine Learning",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "9",
pages = "141",
day = "24",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12090141",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 28 10:44:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/9/141",
abstract = "Recycling is vital for a sustainable and clean
environment. Developed and developing countries are
both facing the problem of solid management waste and
recycling issues. Waste classification is a good
solution to separate the waste from the recycle
materials. In this work, we propose a cloud based
classification algorithm for automated machines in
recycling factories using machine learning. We trained
an efficient MobileNet model, able to classify five
different types of waste. The inference can be
performed in real-time on a cloud server. Various
techniques are described and used in order to improve
the classification accuracy, such as data augmentation
and hyper-parameter tuning. Multiple industrial
stations are supported and interconnected via custom
data transmission protocols, along with security
features. Experimental results indicated that our
solution can achieve excellent performance with 96.57\%
accuracy utilizing a cloud server.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Smart System Infrastructure and
Applications.",
}
@Article{Masinde:2020:SEL,
author = "Newton Masinde and Liat Khitman and Iakov Dlikman and
Kalman Graffi",
title = "Systematic Evaluation of {LibreSocial} --- a
Peer-to-Peer Framework for Online Social Networks",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "9",
pages = "140",
day = "20",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12090140",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 28 10:44:27 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/9/140",
abstract = "Peer-to-peer (P2P) networks have been under
investigation for several years now, with many novel
mechanisms proposed as is shown by available articles.
Much of the research focused on showing how the
proposed mechanism improves system performance. In
addition, several applications were proposed to harness
the benefits of the P2P networks. Of these
applications, online social networks (OSNs) raised much
interest particularly because of the scalability and
privacy concerns with centralized OSNs, hence several
proposals are in existence. However, accompanying
studies on the overall performance of the P2P network
under the weight of the OSN applications outside
simulations are very few, if any. In this paper, the
aim is to undertake a systematic evaluation of the
performance of a P2P framework for online social
networks called LibreSocial. Benchmark tests are
designed, taking into account the random behavior of
users, effects of churn on system stability and effect
of replication factor. We manage to run benchmark tests
for up to 2000 nodes and show the performance against
costs of the system in general. From the results it is
evident that LibreSocial's performance is capable of
meeting the needs of users.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Social Networks
and Solutions.",
}
@Article{Carta:2020:LFE,
author = "Salvatore Carta and Alessandro Sebastian Podda and
Diego Reforgiato Recupero and Roberto Saia",
title = "A Local Feature Engineering Strategy to Improve
Network Anomaly Detection",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "10",
pages = "177",
day = "21",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12100177",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/10/177",
abstract = "The dramatic increase in devices and services that has
characterized modern societies in recent decades,
boosted by the exponential growth of ever faster
network connections and the predominant use of wireless
connection technologies, has materialized a very
crucial challenge in terms of security. The
anomaly-based intrusion detection systems, which for a
long time have represented some of the most efficient
solutions to detect intrusion attempts on a network,
have to face this new and more complicated scenario.
Well-known problems, such as the difficulty of
distinguishing legitimate activities from illegitimate
ones due to their similar characteristics and their
high degree of heterogeneity, today have become even
more complex, considering the increase in the network
activity. After providing an extensive overview of the
scenario under consideration, this work proposes a
Local Feature Engineering (LFE) strategy aimed to face
such problems through the adoption of a data
preprocessing strategy that reduces the number of
possible network event patterns, increasing at the same
time their characterization. Unlike the canonical
feature engineering approaches, which take into account
the entire dataset, it operates locally in the feature
space of each single event. The experiments conducted
on real-world data showed that this strategy, which is
based on the introduction of new features and the
discretization of their values, improves the
performance of the canonical state-of-the-art
solutions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Wireless Internet, Multimedia, and
Artificial Intelligence: New Applications and
Infrastructures.",
}
@Article{Scheel:2020:VIA,
author = "Christian Scheel and Francesca Fallucchi and Ernesto
William {De Luca}",
title = "Visualization, Interaction and Analysis of
Heterogeneous Textbook Resources",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "10",
pages = "176",
day = "21",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12100176",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/10/176",
abstract = "Historically grown research projects, run by
researchers with limited understanding of data
sustainability, data reusability and standards, often
lead to data silos. While the data are very valuable it
can not be used by any service except the tool it was
prepared for. Over the years, the number of such data
graveyards will increase because new projects will
always be designed from scratch. In this work we
propose a Component Metadata Infrastructure
(CMDI)-based approach for data rescue and data reuse,
where data are retroactively joined into one repository
minimizing the implementation effort of future research
projects.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Data Science and Knowledge Discovery.",
}
@Article{Song:2020:SCU,
author = "Xin Song and Lin Xia and Siyang Xu and Yue Wang",
title = "Secure Communication for Uplink Cellular Networks
Assisted with Full-Duplex Device-to-Device User",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "10",
pages = "175",
day = "18",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12100175",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/10/175",
abstract = "In this paper, the secure communication based on the
full-duplex (FD) device-to-device (D2D) in cellular
networks is proposed. For the proposed scheme, the
novel model is established, in which a D2D user is
played as a relay operating in FD mode to assist in the
secure transmission of uplink information. Considering
that the D2D user as a relay is untrusted, D2D link
rate maximization is formulated with the constraint of
secrecy rate, which ensures the security of uplink
cellular networks. To cope with the optimization
problem, the optimal power allocation factors of the
cellular user (CU) and the D2D user are jointly
optimized. Firstly, by using the monotonicity of the
objective function, the optimal solution of the power
allocation factor at the D2D user can be obtained.
Subsequently, the closed-form expression of the optimal
power allocation factor at the CU is derived and
verified that the solution is the global minimum point.
Simulation results verify that the proposed scheme has
better output performance than the conventional
scheme.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Cybersecurity.",
}
@Article{Rahayu:2020:RTU,
author = "Flourensia Sapty Rahayu and Lukito Edi Nugroho and
Ridi Ferdiana and Djoko Budiyanto Setyohadi",
title = "Research Trend on the Use of {IT} in Digital
Addiction: an Investigation Using a Systematic
Literature Review",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "10",
pages = "174",
day = "18",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12100174",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/10/174",
abstract = "Despite the negative role of IT in digital addiction
development, IT may have a positive role in dealing
with digital addiction. The present study undertakes a
systematic literature review to explore the state of
play and the trend regarding the use of IT in digital
addiction research. Using predefined keywords, the
Scopus database was searched for relevant literature
published from 2017 to 2020. The initial search found
1655 papers. Six stages of study selection were
completed using a set of inclusion and exclusion
criteria. The study selection and quality assessment
process were applied, then 15 papers were selected for
further review. The results show that addiction
detection using IT is the most researched topic in
digital addiction research. The most commonly used IT
in the selected studies are AI methods and biosignal
recording systems. Various approaches in detection,
prevention, and intervention are suggested in the
selected studies. The advantages and limitations of
each approach are discussed. Based on these results,
some future research directions are suggested.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue The Future Internet of Medical Things.",
}
@Article{Vilella:2020:IDT,
author = "Salvatore Vilella and Mirko Lai and Daniela Paolotti
and Giancarlo Ruffo",
title = "Immigration as a Divisive Topic: Clusters and Content
Diffusion in the {Italian} {Twitter} Debate",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "10",
pages = "173",
day = "15",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12100173",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/10/173",
abstract = "In this work, we apply network science to analyse
almost 6 M tweets about the debate around immigration
in Italy, collected between 2018 and 2019, when many
related events captured media outlets' attention. Our
aim was to better understand the dynamics underlying
the interactions on social media on such a delicate and
divisive topic, which are the actors that are leading
the discussion, and whose messages have the highest
chance to reach out the majority of the accounts that
are following the debate. The debate on Twitter is
represented with networks; we provide a
characterisation of the main clusters by looking at the
highest in-degree nodes in each one and by analysing
the text of the tweets of all the users. We find a
strongly segregated network which shows an explicit
interplay with the Italian political and social
landscape, that however seems to be disconnected from
the actual geographical distribution and relocation of
migrants. In addition, quite surprisingly, the
influencers and political leaders that apparently lead
the debate, do not necessarily belong to the clusters
that include the majority of nodes: we find evidence of
the existence of a `silent majority' that is more
connected to accounts who expose a more positive stance
toward migrants, while leaders whose stance is negative
attract apparently more attention. Finally, we see that
the community structure clearly affects the diffusion
of content (URLs) by identifying the presence of both
local and global trends of diffusion, and that
communities tend to display segregation regardless of
their political and cultural background. In particular,
we observe that messages that spread widely in the two
largest clusters, whose most popular members are also
notoriously at the opposite sides of the political
spectrum, have a very low chance to get visibility into
other clusters.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Network analysis and computational
social science: theory, methods, applications, future
perspectives.",
}
@Article{Shi:2020:ERS,
author = "Yanjun Shi and Yijia Guo and Lingling Lv and Keshuai
Zhang",
title = "An Efficient Resource Scheduling Strategy for {V2X}
Microservice Deployment in Edge Servers",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "10",
pages = "172",
day = "15",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12100172",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/10/172",
abstract = "The fast development of connected vehicles with
support for various V2X (vehicle-to-everything)
applications carries high demand for quality of edge
services, which concerns microservice deployment and
edge computing. We herein propose an efficient resource
scheduling strategy to containerize microservice
deployment for better performance. Firstly, we quantify
three crucial factors (resource utilization, resource
utilization balancing, and microservice dependencies)
in resource scheduling. Then, we propose a
multi-objective model to achieve equilibrium in these
factors and a multiple fitness genetic algorithm (MFGA)
for the balance between resource utilization, resource
utilization balancing, and calling distance, where a
container dynamic migration strategy in the crossover
and mutation process of the algorithm is provided. The
simulated results from Container-CloudSim showed the
effectiveness of our MFGA.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Selected Papers from the International
Conference on Communications, Signal Processing and
Their Applications (ICCSPA '20).",
}
@Article{Tipantuna:2020:NEE,
author = "Christian Tipantu{\~n}a and Xavier Hesselbach",
title = "{NFV}-Enabled Efficient Renewable and Non-Renewable
Energy Management: Requirements and Algorithms",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "10",
pages = "171",
day = "14",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12100171",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/10/171",
abstract = "The increasing worldwide energy demand, the CO$_2$
emissions generated due to the production and use of
energy, climate change, and the depletion of natural
resources are important concerns that require new
solutions for energy generation and management. In
order to ensure energy sustainability, measures,
including the use of renewable energy sources, the
deployment of adaptive energy consumption schemes, and
consumer participation, are currently envisioned as
feasible alternatives. Accordingly, this paper presents
the requirements and algorithmic solutions for
efficient management of energy consumption, which aims
to optimize the use of available energy, whether or not
it is 100\% renewable, by minimizing the waste of
energy. The proposal works within a Demand-Response
environment, uses Network Functions Virtualization as
an enabling technology, and leverages the massive
connectivity of the Internet of Things provided by
modern communications technologies. The energy
consumption optimization problem is formulated as an
Integer Linear Program. It is optimally solved while
using a brute-force search strategy, defined as O pt T
s, to detect all concerns that are related to the
problem. Given the NP-hard nature of the problem and
the non-polynomial complexity of O pt T s, some
heuristic solutions are analyzed. Subsequently, a
heuristic strategy, described as F ast T s based on a
pre-partitioning method, is implemented. The simulation
results validate our proposed energy management
solution. Exact and heuristic strategies, when deployed
in the Network Functions Virtualization domain,
demonstrate improvements in the way that energy is
consumed, thereby offering an increase in service
processing. The evaluation results also show that F ast
T s produces high-quality solutions that are close to
those of O pt T s while executing 230 $ \times $ --5000
$ \times $ faster.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Feature Papers for Future
Internet-Internet of Things Section.",
}
@Article{Huang:2020:ANS,
author = "Hailong Huang and Andrey V. Savkin",
title = "Autonomous Navigation of a Solar-Powered {UAV} for
Secure Communication in Urban Environments with
Eavesdropping Avoidance",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "10",
pages = "170",
day = "10",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12100170",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/10/170",
abstract = "This paper considers the navigation of a solar-powered
unmanned aerial vehicle (UAV) for securing the
communication with an intended ground node in the
presence of eavesdroppers in urban environments. To
complete this task, the UAV needs to not only fly
safely in the complex urban environment, but also take
into account the communication performance with the
intended node and eavesdroppers. To this end, we
formulate a multi-objective optimization problem to
plan the UAV path. This problem jointly considers the
maximization of the residual energy of the
solar-powered UAV at the end of the mission, the
maximization of the time period in which the UAV can
securely communicate with the intended node and the
minimization of the time to reach the destination. We
pay attention to the impact of the buildings in the
urban environments, which may block the transmitted
signals and also create some shadow region where the
UAV cannot harvest energy. A Rapidly-exploring Random
Tree (RRT) based path planning scheme is presented.
This scheme captures the nonlinear UAV motion model,
and is computationally efficient considering the
randomness nature. From the generated tree, a set of
possible paths can be found. We evaluate the security
of the wireless communication, compute the overall
energy consumption as well as the harvested amount for
each path and calculate the time to complete the
flight. Compared to a general RRT scheme, the proposed
method enables a large time window for the UAV to
securely transmit data.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Wireless Internet, Multimedia, and
Artificial Intelligence: New Applications and
Infrastructures.",
}
@Article{Petrov:2020:ACC,
author = "Mikhail Petrov",
title = "An Approach to Changing Competence Assessment for
Human Resources in Expert Networks",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "10",
pages = "169",
day = "03",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12100169",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/10/169",
abstract = "An expert network is a community of professionals in a
specific field, united by an information system, in
which different tasks are solved. One of the main tasks
in expert networks is the selection of specialists with
specified competencies for joint problem solving. The
main characteristic of an expert network member is a
set of competencies, which includes both functional
aspects and personal qualities. For this reason, the
procedure for selecting specialists and ranking them is
critical. Such a procedure uses specialists' competence
assessments from the expert network. If these
assessments are out of date, the project results can be
unsuccessful. This article proposes an approach aimed
at automating the assessment of the specialists'
competencies based on the projects results. This
approach consists of a reference model and an algorithm
of competence assessment change for human resources.
The paper also includes an algorithm evaluation on
generated data.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Alabdan:2020:PAS,
author = "Rana Alabdan",
title = "Phishing Attacks Survey: Types, Vectors, and Technical
Approaches",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "10",
pages = "168",
day = "30",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12100168",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/10/168",
abstract = "Phishing attacks, which have existed for several
decades and continue to be a major problem today,
constitute a severe threat in the cyber world.
Attackers are adopting multiple new and creative
methods through which to conduct phishing attacks,
which are growing rapidly. Therefore, there is a need
to conduct a comprehensive review of past and current
phishing approaches. In this paper, a review of the
approaches used during phishing attacks is presented.
This paper comprises a literature review, followed by a
comprehensive examination of the characteristics of the
existing classic, modern, and cutting-edge phishing
attack techniques. The aims of this paper are to build
awareness of phishing techniques, educate individuals
about these attacks, and encourage the use of phishing
prevention techniques, in addition to encouraging
discourse among the professional community about this
topic.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Social Networks
and Solutions.",
}
@Article{Thapa:2020:CML,
author = "Niraj Thapa and Zhipeng Liu and Dukka B. KC and
Balakrishna Gokaraju and Kaushik Roy",
title = "Comparison of Machine Learning and Deep Learning
Models for Network Intrusion Detection Systems",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "10",
pages = "167",
day = "30",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12100167",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/10/167",
abstract = "The development of robust anomaly-based network
detection systems, which are preferred over static
signal-based network intrusion, is vital for
cybersecurity. The development of a flexible and
dynamic security system is required to tackle the new
attacks. Current intrusion detection systems (IDSs)
suffer to attain both the high detection rate and low
false alarm rate. To address this issue, in this paper,
we propose an IDS using different machine learning (ML)
and deep learning (DL) models. This paper presents a
comparative analysis of different ML models and DL
models on Coburg intrusion detection datasets (CIDDSs).
First, we compare different ML- and DL-based models on
the CIDDS dataset. Second, we propose an ensemble model
that combines the best ML and DL models to achieve
high-performance metrics. Finally, we benchmarked our
best models with the CIC-IDS2017 dataset and compared
them with state-of-the-art models. While the popular
IDS datasets like KDD99 and NSL-KDD fail to represent
the recent attacks and suffer from network biases,
CIDDS, used in this research, encompasses labeled
flow-based data in a simulated office environment with
both updated attacks and normal usage. Furthermore,
both accuracy and interpretability must be considered
while implementing AI models. Both ML and DL models
achieved an accuracy of 99\% on the CIDDS dataset with
a high detection rate, low false alarm rate, and
relatively low training costs. Feature importance was
also studied using the Classification and regression
tree (CART) model. Our models performed well in 10-fold
cross-validation and independent testing. CART and
convolutional neural network (CNN) with embedding
achieved slightly better performance on the CIC-IDS2017
dataset compared to previous models. Together, these
results suggest that both ML and DL methods are robust
and complementary techniques as an effective network
intrusion detection system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computer Vision, Deep Learning and
Machine Learning with Applications.",
}
@Article{Papa:2020:SDM,
author = "Louis Edward Papa and Thaier Hayajneh",
title = "A Survey of Defensive Measures for Digital Persecution
in the Global South",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "10",
pages = "166",
day = "29",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12100166",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/10/166",
abstract = "This paper examines the phenomenon of digital
persecution in the Global South and evaluates tools
that defend against it. First, the paper explains the
nature of persecution and its digital incarnation. It
then provides a contextual overview of real-world
instances of digital persecution in seven Global South
countries. The possible defensive technologies against
censorship and surveillance are discussed. The article
goes on to discuss barriers to technology adoption in
the Global South, explains the security implication of
these difficulties, and examines the role that human
computer interaction (HCI) metrics could play in
overcoming these challenges. Finally, the paper surveys
the viability of sixteen security tools in a Global
South context. The survey results were mixed, with
37.5\% of the reviewed tools being deemed to be
inviable for use in the Global South to defend against
persecution. Prescriptive recommendations are provided
for creating security tools that are universal, simple,
and effective.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Digital Society Challenges in Developing
Countries.",
}
@Article{Mikhailov:2020:TBA,
author = "Sergei Mikhailov and Alexey Kashevnik",
title = "Tourist Behaviour Analysis Based on Digital Pattern of
Life --- an Approach and Case Study",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "10",
pages = "165",
day = "28",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12100165",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/10/165",
abstract = "The tourism industry has been rapidly growing over the
last years and IT technologies have had a great affect
on tourists as well. Tourist behaviour analysis has
been the subject of different research studies in
recent years. This paper presents the digital pattern
of life concept which simplifies the tourist behaviour
models' construction and usage. The digital pattern of
life defines the general concepts of tourist behaviour,
connects the tourist and the digital world and allows
us to track behaviour changes over time. A literature
review of the current state of the research in selected
fields is performed for identifying the existing
problems. The case studies of behaviour analysis based
on classification, clustering and time series events
behaviour models are shown. An ontological approach and
artificial neural networks are used during behaviour
model construction, training and evaluation. The
gathered results can be used by smart tourism service
developers and business stakeholders.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Sun:2020:PEO,
author = "Wei Sun and Hui Su and Huacheng Xie",
title = "Policy-Engineering Optimization with Visual
Representation and Separation-of-Duty Constraints in
Attribute-Based Access Control",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "10",
pages = "164",
day = "27",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12100164",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/10/164",
abstract = "Recently, attribute-based access control (ABAC) has
received increasingly more attention and has emerged as
the desired access control mechanism for many
organizations because of its flexibility and
scalability for authorization management, as well as
its security policies, such as separation-of-duty
constraints and mutually exclusive constraints.
Policy-engineering technology is an effective approach
for the construction of ABAC systems. However, most
conventional methods lack interpretability, and their
constructing processes are complex. Furthermore, they
do not consider the separation-of-duty constraints. To
address these issues in ABAC, this paper proposes a
novel method called policy engineering optimization
with visual representation and separation of duty
constraints (PEO\_VR\&SOD). First, to enhance
interpretability while mining a minimal set of rules,
we use the visual technique with Hamming distance to
reduce the policy mining scale and present a policy
mining algorithm. Second, to verify whether the
separation of duty constraints can be satisfied in a
constructed policy engineering system, we use the
method of SAT-based model counting to reduce the
constraints and construct mutually exclusive
constraints to implicitly enforce the given separation
of duty constraints. The experiments demonstrate the
efficiency and effectiveness of the proposed method and
show encouraging results.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Cybersecurity.",
}
@Article{Al-Ali:2020:DTC,
author = "A. R. Al-Ali and Ragini Gupta and Tasneem Zaman Batool
and Taha Landolsi and Fadi Aloul and Ahmad {Al
Nabulsi}",
title = "Digital Twin Conceptual Model within the Context of
{Internet of Things}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "10",
pages = "163",
day = "26",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12100163",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/10/163",
abstract = "As the Internet of Things (IoT) is gaining ground and
becoming increasingly popular in smart city
applications such as smart energy, smart buildings,
smart factories, smart transportation, smart farming,
and smart healthcare, the digital twin concept is
evolving as complementary to its counter physical part.
While an object is on the move, its operational and
surrounding environmental parameters are collected by
an edge computing device for local decision. A virtual
replica of such object (digital twin) is based in the
cloud computing platform and hosts the real-time
physical object data, 2D and 3D models, historical
data, and bill of materials (BOM) for further
processing, analytics, and visualization. This paper
proposes an end-to-end digital twin conceptual model
that represents its complementary physical object from
the ground to the cloud. The paper presents the
proposed digital twin model's multi-layers, namely,
physical, communication, virtual space, data analytic
and visualization, and application as well as the
overlapping security layer. The hardware and software
technologies that are used in building such a model
will be explained in detail. A use case will be
presented to show how the layers collect, exchange, and
process the physical object data from the ground to the
cloud.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Feature Papers for Future
Internet-Internet of Things Section.",
}
@Article{Villegas-Ch:2020:ITM,
author = "William Villegas-Ch and Xavier Palacios-Pacheco and
Milton Rom{\'a}n-Ca{\~n}izares",
title = "An {Internet of Things} Model for Improving Process
Management on University Campus",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "10",
pages = "162",
day = "25",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12100162",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/10/162",
abstract = "Currently, there are several emerging technologies
that seek to improve quality of life. To achieve this,
it is important to establish the various technologies'
fields of action and to determine which technology
meets the conditions established by the environment in
which it is designed to operate in order to satisfy the
needs of society. One type of environment is the
university campus. This particular environment is
conducive to the development and testing of
technological innovations that might later be
replicated in larger environments such as smart cities.
The technology that has experienced the greatest
development and introduction of applications is the
Internet of Things. The wide variety of available
devices and the wide reach of the Internet have become
ideal parameters for the application of the Internet of
Things in areas that previously required the work of
people. The Internet of Things is seen as an assistant
to, or a substitute for, processes that are generally
routine and which require the effort of one or more
people. This work focuses specifically on processes to
improve administrative management in a university
through the use of the Internet of Things.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Feature Papers for Future
Internet-Internet of Things Section.",
}
@Article{Jahedi:2020:VSH,
author = "Zahra Jahedi and Thomas Kunz",
title = "The Value of Simple Heuristics for Virtualized Network
Function Placement",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "10",
pages = "161",
day = "25",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12100161",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/10/161",
abstract = "Network Function Virtualization (NFV) can lower the
CAPEX and/or OPEX for service providers and allow for
quick deployment of services. Along with the advantages
come some challenges. The main challenge in the use of
Virtualized Network Functions (VNF) is the VNFs'
placement in the network. There is a wide range of
mathematical models proposed to place the Network
Functions (NF) optimally. However, the critical problem
of mathematical models is that they are NP-hard, and
consequently not applicable to larger networks. In
wireless networks, we are considering the scarcity of
Bandwidth (BW) as another constraint that is due to the
presence of interference. While there exist many
efforts in designing a heuristic model that can provide
solutions in a timely manner, the primary focus with
such heuristics was almost always whether they provide
results almost as good as optimal solution.
Consequently, the heuristics themselves become quite
non-trivial, and solving the placement problem for
larger networks still takes a significant amount of
time. In this paper, in contrast, we focus on designing
a simple and scalable heuristic. We propose four
heuristics, which are gradually becoming more complex.
We compare their performance with each other, a related
heuristic proposed in the literature, and a
mathematical optimization model. Our results
demonstrate that while more complex placement
heuristics do not improve the performance of the
algorithm in terms of the number of accepted placement
requests, they take longer to solve and therefore are
not applicable to larger networks.In contrast, a very
simple heuristic can find near-optimal solutions much
faster than the other more complicated heuristics while
keeping the number of accepted requests close to the
results achieved with an NP-hard optimization model.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Machine Learning Advances Applied to
Wireless Multi-hop IoT Networks.",
}
@Article{Ali:2020:TFA,
author = "Guma Ali and Mussa Ally Dida and Anael Elikana Sam",
title = "Two-Factor Authentication Scheme for Mobile Money: a
Review of Threat Models and Countermeasures",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "10",
pages = "160",
day = "24",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12100160",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/10/160",
abstract = "The proliferation of digital financial innovations
like mobile money has led to the rise in mobile
subscriptions and transactions. It has also increased
the security challenges associated with the current
two-factor authentication (2FA) scheme for mobile money
due to the high demand. This review paper aims to
determine the threat models in the 2FA scheme for
mobile money. It also intends to identify the
countermeasures to overcome the threat models. A
comprehensive literature search was conducted from the
Google Scholar and other leading scientific databases
such as IEEE Xplore, MDPI, Emerald Insight, Hindawi,
ACM, Elsevier, Springer, and Specific and International
Journals, where 97 papers were reviewed that focused on
the topic. Descriptive research papers and studies
related to the theme were selected. Three reviewers
extracted information independently on authentication,
mobile money system architecture, mobile money access,
the authentication scheme for mobile money, various
attacks on the mobile money system (MMS), threat models
in the 2FA scheme for mobile money, and
countermeasures. Through literature analysis, it was
found that the threat models in the 2FA scheme for
mobile money were categorised into five, namely,
attacks against privacy, attacks against
authentication, attacks against confidentiality,
attacks against integrity, and attacks against
availability. The countermeasures include use of
cryptographic functions (e.g., asymmetric encryption
function, symmetric encryption function, and hash
function) and personal identification (e.g.,
number-based and biometric-based countermeasures). This
review study reveals that the current 2FA scheme for
mobile money has security gaps that need to be
addressed since it only uses a personal identification
number (PIN) and a subscriber identity module (SIM) to
authenticate users, which are susceptible to attacks.
This work, therefore, will help mobile money service
providers (MMSPs), decision-makers, and governments
that wish to improve their current 2FA scheme for
mobile money.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gameiro:2020:NFI,
author = "Lu{\'\i}s Gameiro and Carlos Senna and Miguel
Lu{\'\i}s",
title = "{ndnIoT-FC}: {IoT} Devices as First-Class Traffic in
Name Data Networks",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "207",
day = "21",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110207",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/207",
abstract = "In recent years we have been assisting a radical
change in the way devices are connected to the
Internet. In this new scope, the traditional TCP/IP
host-centric network fails in large-scale mobile
wireless distributed environments, such as IoT
scenarios, due to node mobility, dynamic topologies and
intermittent connectivity, and the Information-Centric
Networking (ICN) paradigm has been considered the most
promising candidate to overcome the drawbacks of
host-centric architectures. Despite bringing efficient
solutions for content distribution, the basic ICN
operating principle, where content must always be
associated with an interest, has serious restrictions
in IoT environments in relation to scale, performance,
and naming, among others. To address such drawbacks, we
are presenting ndnIoT-FC, an NDN-based architecture
that respects the ICN rules but offers special
treatment for IoT traffic. It combines efficient hybrid
naming with strategies to minimize the number of
interests and uses caching strategies that virtually
eliminates copies of IoT data from intermediate nodes.
The ndnIoT-FC makes available new NDN-based
application-to-application protocol to implement a
signature model operation and tools to manage its life
cycle, following a publisher-subscriber scheme. To
demonstrate the versatility of the proposed
architecture, we show the results of the efficient
gathering of environmental information in a simulation
environment considering different and distinct use
cases.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Feature Papers for Future
Internet-Internet of Things Section.",
}
@Article{Lousado:2020:MSE,
author = "Jos{\'e} Paulo Lousado and Sandra Antunes",
title = "Monitoring and Support for Elderly People Using {LoRa}
Communication Technologies: {IoT} Concepts and
Applications",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "206",
day = "20",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110206",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/206",
abstract = "The pandemic declared by the World Health Organization
due to the SARS-CoV-2 virus (COVID-19) awakened us to a
reality that most of us were previously unaware
of---isolation, confinement and the massive use of
information and communication technologies, as well as
increased knowledge of the difficulties and limitations
of their use. This article focuses on the rapid
implementation of low-cost technologies, which allow us
to answer a fundamental question: how can near
real-time monitoring and follow-up of the elderly and
their health conditions, as well as their homes,
especially for those living in isolated and remote
areas, be provided within their care and protect them
from risky events? The system proposed here as a proof
of concept uses low-cost devices for communication and
data processing, supported by Long-Range (LoRa)
technology and connection to The Things Network,
incorporating various sensors, both personal and in the
residence, allowing family members, neighbors and
authorized entities, including security forces, to have
access to the health condition of system users and the
habitability of their homes, as well as their urgent
needs, thus evidencing that it is possible, using
low-cost systems, to implement sensor networks for
monitoring the elderly using the LoRa gateway and other
support infrastructures.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Data Science and Knowledge Discovery.",
}
@Article{Oliveira:2020:FME,
author = "Jo{\~a}o Oliveira and Gon{\c{c}}alo Carvalho and Bruno
Cabral and Jorge Bernardino",
title = "Failure Mode and Effect Analysis for Cyber-Physical
Systems",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "205",
day = "20",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110205",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/205",
abstract = "Cyber-Physical Systems (CPS) are a prominent component
of the modern digital transformation, which combines
the dynamics of the physical processes with those of
software and networks. Critical infrastructures have
built-in CPS, and assessing its risk is crucial to
avoid significant losses, both economic and social. As
CPS are increasingly attached to the world's main
industries, these systems' criticality depends not only
on software efficiency and availability but also on
cyber-security awareness. Given this, and because
Failure Mode and Effect Analysis (FMEA) is one of the
most effective methods to assess critical
infrastructures' risk, in this paper, we show how this
method performs in the analysis of CPS threats, also
exposing the main drawbacks concerning CPS risk
assessment. We first propose a risk prevention analysis
to the Communications-Based Train Control (CBTC)
system, which involves exploiting cyber
vulnerabilities, and we introduce a novel approach to
the failure modes' Risk Priority Number (RPN)
estimation. We also propose how to adapt the FMEA
method to the requirement of CPS risk evaluation. We
applied the proposed procedure to the CBTC system use
case since it is a CPS with a substantial cyber
component and network data transfer.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Feature Papers for Future
Internet---Cybersecurity Section.",
}
@Article{Grande-de-Prado:2020:DCG,
author = "Mario Grande-de-Prado and Ruth Ca{\~n}{\'o}n and
Sheila Garc{\'\i}a-Mart{\'\i}n and Isabel Cant{\'o}n",
title = "Digital Competence and Gender: Teachers in Training.
{A} Case Study",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "204",
day = "20",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110204",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/204",
abstract = "The ICTs are simultaneously an important tool and
subject in teacher training. It, therefore, follows
that digital competence is fundamental and constitutes
a significant educational challenge, particularly the
digital divide or gap by gender. The aim is to identify
and analyze self-perceptions of digital skills, and the
possible relationship of these to gender, in first-year
university students taking a degree in primary
education teacher training at a Spanish faculty of
education. This is a descriptive study using
ex-post-facto method and collecting data from a
questionnaire administered for four consecutive years
to the above-mentioned subjects. The results revealed
gender differences in the students' reported
perceptions. Men were more likely to perceive
themselves as competent in the use of ICTs, reporting
better information management and online collaboration
skills using digital media. Besides, they made more use
of computers as their sole device for browsing,
downloading, and streaming and felt more confident
about solving problems with devices. In contrast, women
reported making more use of mobile phones and were more
familiar with social media and aspects related to image
and text processing and graphic design.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Education Responses to Technological
Challenges and Their Impact on Classrooms.",
}
@Article{Casadei:2020:PCP,
author = "Roberto Casadei and Danilo Pianini and Andrea Placuzzi
and Mirko Viroli and Danny Weyns",
title = "Pulverization in Cyber-Physical Systems: Engineering
the Self-Organizing Logic Separated from Deployment",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "203",
day = "19",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110203",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/203",
abstract = "Emerging cyber-physical systems, such as robot swarms,
crowds of augmented people, and smart cities, require
well-crafted self-organizing behavior to properly deal
with dynamic environments and pervasive disturbances.
However, the infrastructures providing networking and
computing services to support these systems are
becoming increasingly complex, layered and
heterogeneous---consider the case of the
edge--fog--cloud interplay. This typically hinders the
application of self-organizing mechanisms and patterns,
which are often designed to work on flat networks. To
promote reuse of behavior and flexibility in
infrastructure exploitation, we argue that
self-organizing logic should be largely independent of
the specific application deployment. We show that this
separation of concerns can be achieved through a
proposed `` pulverization approach '': the global
system behavior of application services gets broken
into smaller computational pieces that are continuously
executed across the available hosts. This model can
then be instantiated in the aggregate computing
framework, whereby self-organizing behavior is
specified compositionally. We showcase how the proposed
approach enables expressing the application logic of a
self-organizing cyber-physical system in a
deployment-independent fashion, and simulate its
deployment on multiple heterogeneous infrastructures
that include cloud, edge, and LoRaWAN network
elements.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Special Issue on Cyber Physical Systems:
Prospects, Challenges, and Role in Software Defined
Networking and Blockchain.",
}
@Article{Pan:2020:PLB,
author = "Wei Pan and Jide Li and Xiaoqiang Li",
title = "Portfolio Learning Based on Deep Learning",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "202",
day = "18",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110202",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/202",
abstract = "Traditional portfolio theory divides stocks into
different categories using indicators such as industry,
market value, and liquidity, and then selects
representative stocks according to them. In this paper,
we propose a novel portfolio learning approach based on
deep learning and apply it to China's stock market.
Specifically, this method is based on the similarity of
deep features extracted from candlestick charts. First,
we obtained whole stock information from Tushare, a
professional financial data interface. These raw time
series data are then plotted into candlestick charts to
make an image dataset for studying the stock market.
Next, the method extracts high-dimensional features
from candlestick charts through an autoencoder. After
that, K-means is used to cluster these high-dimensional
features. Finally, we choose one stock from each
category according to the Sharpe ratio and a low-risk,
high-return portfolio is obtained. Extensive
experiments are conducted on stocks in the Chinese
stock market for evaluation. The results demonstrate
that the proposed portfolio outperforms the market's
leading funds and the Shanghai Stock Exchange Composite
Index (SSE Index) in a number of metrics.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computer Vision, Deep Learning and
Machine Learning with Applications.",
}
@Article{Karpinski:2020:GAT,
author = "Mikolaj Karpinski and Svitlana Kuznichenko and Nadiia
Kazakova and Oleksii Fraze-Frazenko and Daniel
Jancarczyk",
title = "Geospatial Assessment of the Territorial Road Network
by Fractal Method",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "201",
day = "17",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110201",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/201",
abstract = "This paper proposes an approach to the geospatial
assessment of a territorial road network based on the
fractals theory. This approach allows us to obtain
quantitative values of spatial complexity for any
transport network and, in contrast to the classical
indicators of the transport provisions of a territory
(Botcher, Henkel, Engel, Goltz, Uspensky, etc.),
consider only the complexity level of the network
itself, regardless of the area of the territory. The
degree of complexity is measured by a fractal
dimension. A method for calculating the fractal
dimension based on a combination of box counting and
GIS analysis is proposed. We created a geoprocessing
script tool for the GIS software system ESRI ArcGIS
10.7, and a study of the spatial pattern of the
transport network of the Ukraine territory, and other
countries of the world, was made. The results of the
study will help to better understand the different
aspects of the development of transport networks, their
changes over time and the impact on the socioeconomic
indicators of urban development.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Data Science and Knowledge Discovery.",
}
@Article{Li:2020:TAT,
author = "Haiyan Li and Hongtao Lu",
title = "{AT-Text}: Assembling Text Components for Efficient
Dense Scene Text Detection",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "200",
day = "17",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110200",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/200",
abstract = "Text detection is a prerequisite for text recognition
in scene images. Previous segmentation-based methods
for detecting scene text have already achieved a
promising performance. However, these kinds of
approaches may produce spurious text instances, as they
usually confuse the boundary of dense text instances,
and then infer word/text line instances relying heavily
on meticulous heuristic rules. We propose a novel
Assembling Text Components (AT-text) that accurately
detects dense text in scene images. The AT-text
localizes word/text line instances in a bottom-up
mechanism by assembling a parsimonious component set.
We employ a segmentation model that encodes multi-scale
text features, considerably improving the
classification accuracy of text/non-text pixels. The
text candidate components are finely classified and
selected via discriminate segmentation results. This
allows the AT-text to efficiently filter out
false-positive candidate components, and then to
assemble the remaining text components into different
text instances. The AT-text works well on
multi-oriented and multi-language text without complex
post-processing and character-level annotation.
Compared with the existing works, it achieves
satisfactory results and a considerable balance between
precision and recall without a large margin in
ICDAR2013 and MSRA-TD 500 public benchmark datasets.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Saripalle:2020:IUT,
author = "Rishi Saripalle and Mehdi Sookhak and Mahboobeh
Haghparast",
title = "An Interoperable {UMLS} Terminology Service Using
{FHIR}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "199",
day = "16",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110199",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/199",
abstract = "The Unified Medical Language System (UMLS) is an
internationally recognized medical vocabulary that
enables semantic interoperability across various
biomedical terminologies. To use its knowledge, the
users must understand its complex knowledge structure,
a structure that is not interoperable or is not
compliant with any known biomedical and healthcare
standard. Further, the users also need to have good
technical skills to understand its inner working and
interact with UMLS in general. These barriers might
cause UMLS usage concerns among inter-disciplinary
users in biomedical and healthcare informatics.
Currently, there exists no terminology service that
normalizes UMLS's complex knowledge structure to a
widely accepted interoperable healthcare standard and
allows easy access to its knowledge, thus hiding its
workings. The objective of this research is to design
and implement a light-weight terminology service that
allows easy access to UMLS knowledge structured using
the fast health interoperability resources (FHIR)
standard, a widely accepted interoperability healthcare
standard. The developed terminology service, named UMLS
FHIR, leverages FHIR resources and features, and can
easily be integrated into any application to consume
UMLS knowledge in the FHIR format without the need to
understand UMLS's native knowledge structure and its
internal working.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances of Machine Learning
Techniques on Smartphones.",
}
@Article{Hao:2020:MAS,
author = "Jingjing Hao and Guangsheng Han",
title = "On the Modeling of Automotive Security: a Survey of
Methods and Perspectives",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "198",
day = "16",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110198",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/198",
abstract = "As the intelligent car-networking represents the new
direction of the future vehicular development,
automotive security plays an increasingly important
role in the whole car industry chain. On condition that
the accompanying problems of security are proofed,
vehicles will provide more convenience while ensuring
safety. Security models can be utilized as tools to
rationalize the security of the automotive system and
represent it in a structured manner. It is essential to
improve the knowledge about security models by
comparing them besides proposing new methods. This
paper aims to give a comprehensive introduction to the
topic of security models for the Intelligent Transport
System (ITS). A survey of the current methodologies for
security modeling is conducted and a classification
scheme is subsequently proposed. Furthermore, the
existing framework and methods to build automotive
security models are broadly examined according to the
features of automotive electronic system. A number of
fundamental aspects are defined to compare the
presented methods in order to comprehend the automotive
security modeling in depth.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Cybersecurity.",
}
@Article{Pierro:2020:ORE,
author = "Giuseppe Antonio Pierro and Roberto Tonelli and
Michele Marchesi",
title = "An Organized Repository of {Ethereum} Smart Contracts'
Source Codes and Metrics",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "197",
day = "15",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110197",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/197",
abstract = "Many empirical software engineering studies show that
there is a need for repositories where source codes are
acquired, filtered and classified. During the last few
years, Ethereum block explorer services have emerged as
a popular project to explore and search for Ethereum
blockchain data such as transactions, addresses,
tokens, smart contracts' source codes, prices and other
activities taking place on the Ethereum blockchain.
Despite the availability of this kind of service,
retrieving specific information useful to empirical
software engineering studies, such as the study of
smart contracts' software metrics, might require many
subtasks, such as searching for specific transactions
in a block, parsing files in HTML format, and filtering
the smart contracts to remove duplicated code or unused
smart contracts. In this paper, we afford this problem
by creating Smart Corpus, a corpus of smart contracts
in an organized, reasoned and up-to-date repository
where Solidity source code and other metadata about
Ethereum smart contracts can easily and systematically
be retrieved. We present Smart Corpus's design and its
initial implementation, and we show how the data set of
smart contracts' source codes in a variety of
programming languages can be queried and processed to
get useful information on smart contracts and their
software metrics. Smart Corpus aims to create a
smart-contract repository where smart-contract data
(source code, application binary interface (ABI) and
byte code) are freely and immediately available and are
classified based on the main software metrics
identified in the scientific literature. Smart
contracts' source codes have been validated by
EtherScan, and each contract comes with its own
associated software metrics as computed by the freely
available software PASO. Moreover, Smart Corpus can be
easily extended as the number of new smart contracts
increases day by day.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Eramo:2020:PIA,
author = "Vincenzo Eramo and Francesco Giacinto Lavacca and
Tiziana Catena and Paul Jaime Perez Salazar",
title = "Proposal and Investigation of an Artificial
Intelligence ({AI})-Based Cloud Resource Allocation
Algorithm in Network Function Virtualization
Architectures",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "196",
day = "13",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110196",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/196",
abstract = "The high time needed to reconfigure cloud resources in
Network Function Virtualization network environments
has led to the proposal of solutions in which a
prediction based-resource allocation is performed. All
of them are based on traffic or needed resource
prediction with the minimization of symmetric loss
functions like Mean Squared Error. When inevitable
prediction errors are made, the prediction
methodologies are not able to differently weigh
positive and negative prediction errors that could
impact the total network cost. In fact if the predicted
traffic is higher than the real one then an over
allocation cost, referred to as over-provisioning cost,
will be paid by the network operator; conversely, in
the opposite case, Quality of Service degradation cost,
referred to as under-provisioning cost, will be due to
compensate the users because of the resource under
allocation. In this paper we propose and investigate a
resource allocation strategy based on a Long Short Term
Memory algorithm in which the training operation is
based on the minimization of an asymmetric cost
function that differently weighs the positive and
negative prediction errors and the corresponding
over-provisioning and under-provisioning costs. In a
typical traffic and network scenario, the proposed
solution allows for a cost saving by 30\% with respect
to the case of solution with symmetric cost function.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cognitive Software Defined Networking
and Network Function Virtualization and Applications.",
}
@Article{Martins:2020:MTR,
author = "Nuno Martins and Daniel Brand{\~a}o and Heitor Alvelos
and Sara Silva",
title = "E-Marketplace as a Tool for the Revitalization of
{Portuguese} Craft Industry: The Design Process in the
Development of an Online Platform",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "195",
day = "12",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110195",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/195",
abstract = "The craft trade in Portugal faces challenges that
compromise its productive and economic sustainability
and may result in the disappearance of millenary
techniques, traditions, and industrial practices of
high symbolic and historical value. The growing
incompatibility of these traditional activities with
digital technologies, the lack of resources, and a
growing age gap are among the main problems identified.
This situation made worse by various restrictions
pertaining to the COVID-19 pandemic points towards the
possibility of extinction of this type of manual arts.
The goal of this research is to demonstrate how the
design process of an e-marketplace platform, throughout
its different phases, may contribute to the
revitalization of traditional industries. The
methodologies adopted in the framework consisted in the
study of UX and UI best design practices, including
wireframe design, user flows, definition of personas,
development of prototypes, and style guides. The
results of the conducted usability tests to the
prototype allowed a gradual improvement of the
solution, culminating in the confirmation of its
effectiveness. The study concluded that digital
technology, namely a designed e-marketplace solution,
could potentially bring buyers and sellers closer
together, thus being a tool with high potential for the
dissemination and sustainability of the craft
industry.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Pires:2020:HDN,
author = "Ivan Miguel Pires and Faisal Hussain and Nuno M.
Garcia and Petre Lameski and Eftim Zdravevski",
title = "Homogeneous Data Normalization and Deep Learning: a
Case Study in Human Activity Classification",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "194",
day = "10",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110194",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/194",
abstract = "One class of applications for human activity
recognition methods is found in mobile devices for
monitoring older adults and people with special needs.
Recently, many studies were performed to create
intelligent methods for the recognition of human
activities. However, the different mobile devices in
the market acquire the data from sensors at different
frequencies. This paper focuses on implementing four
data normalization techniques, i.e., MaxAbsScaler,
MinMaxScaler, RobustScaler, and Z-Score. Subsequently,
we evaluate the impact of the normalization algorithms
with deep neural networks (DNN) for the classification
of the human activities. The impact of the data
normalization was counterintuitive, resulting in a
degradation of performance. Namely, when using the
accelerometer data, the accuracy dropped from about
79\% to only 53\% for the best normalization approach.
Similarly, for the gyroscope data, the accuracy without
normalization was about 81.5\%, whereas with the best
normalization, it was only 60\%. It can be concluded
that data normalization techniques are not helpful in
classification problems with homogeneous data.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Intelligent Systems and Networks
2020-2021.",
}
@Article{Jiang:2020:HTD,
author = "Fenyu Jiang and Chris Phillips",
title = "High Throughput Data Relay in {UAV} Wireless
Networks",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "193",
day = "09",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110193",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/193",
abstract = "As a result of their high mobility and reduced cost,
Unmanned Aerial Vehicles (UAVs) have been found to be a
promising tool in wireless networks. A UAV can perform
the role of a base station as well as a mobile relay,
connecting distant ground terminals. In this paper, we
dispatch a UAV to a disaster area to help relay
information for victims. We involve a bandwidth
efficient technique called the Dual-Sampling (DS)
method when planning the UAV flight trajectory, trying
to maximize the data transmission throughput. We
propose an iterative algorithm for solving this
problem. The victim bandwidth scheduling and the UAV
trajectory are alternately optimized in each iteration,
meanwhile a power balance mechanism is implemented in
the algorithm to ensure the proper functioning of the
DS method. We compare the results of the DS-enabled
scheme with two non-DS schemes, namely a fair bandwidth
allocation scheme and a bandwidth contention scheme.
The DS scheme outperforms the other two non-DS schemes
regarding max-min average data rate among all the
ground victims. Furthermore, we derive the theoretical
optimal performance of the DS scheme for a given
scenario, and find that the proposed approach can be
regarded as a general method to solve this optimization
problem. We also observe that the optimal UAV
trajectory for the DS scheme is quite different from
that of the non-DS bandwidth contention scheme.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Internet of Things.",
}
@Article{Azzoug:2020:PVR,
author = "Youcef Azzoug and Abdelmadjid Boukra and Vasco N. G.
J. Soares",
title = "A Probabilistic {VDTN} Routing Scheme Based on Hybrid
Swarm-Based Approach",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "192",
day = "07",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110192",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/192",
abstract = "The probabilistic Delay Tolerant Network (DTN) routing
has been adjusted for vehicular network (VANET) routing
through numerous works exploiting the historic routing
profile of nodes to forward bundles through better
Store-Carry-and-Forward (SCF) relay nodes. In this
paper, we propose a new hybrid swarm-inspired
probabilistic Vehicular DTN (VDTN) router to optimize
the next-SCF vehicle selection using the combination of
two bio-metaheuristic techniques called the Firefly
Algorithm (FA) and the Glowworm Swarm Optimization
(GSO). The FA-based strategy exploits the stochastic
intelligence of fireflies in moving toward better
individuals, while the GSO-based strategy mimics the
movement of glowworm towards better area for displacing
and food foraging. Both FA and GSO are executed
simultaneously on each node to track better SCF
vehicles towards each bundle's destination. A
geography-based recovery method is performed in case no
better SCF vehicles are found using the hybrid FA--GSO
approach. The proposed FA--GSO VDTN scheme is compared
to ProPHET and GeoSpray routers. The simulation results
indicated optimized bundles flooding levels and higher
profitability of combined delivery delay and delivery
probability.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Delay-Tolerant Networking.",
}
@Article{Tsourela:2020:ITI,
author = "Maria Tsourela and Dafni-Maria Nerantzaki",
title = "An {Internet of Things (IoT)} Acceptance Model.
{Assessing} Consumer's Behavior toward {IoT} Products
and Applications",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "191",
day = "03",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110191",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/191",
abstract = "A common managerial and theoretical concern is to know
how individuals perceive Internet of Things (IoT)
products and applications and how to accelerate
adoption of them. The purpose of the current study is
to answer, ``What are the factors that define
behavioral intention to adopt IoT products and
applications among individuals?'' An IoT adoption model
was developed and tested, incorporating pull factors
from two different information impact sources:
technical and psychological. This study employs
statistical structural equation modeling (SEM) in order
to examine the conceptual IoT acceptance model. It is
demonstrated that facilitated appropriation, perceived
usefulness and perceived ease of use, as mediators,
significantly influence consumers' attitude and
behavioral intention towards IoT products and
applications. User character, cyber resilience,
cognitive instrumentals, social influence and trust,
all with different significance rates, exhibited an
indirect effect, through the three mediators. The IoT
acceptance model (IoTAM) upgrades current knowledge on
consumers' behavioral intention and equips
practitioners with the knowledge needed to create
successful integrated marketing tactics and
communication strategies. It provides a solid base for
examining multirooted models for the acceptance of
newly formed technologies, as it bridges the
discontinuity in migrating from information and
communication technologies (ICTs) to IoT adoption
studies, causing distortions to societies' abilities to
make informed decisions about IoT adoption and use.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Feature Papers for Future
Internet-Internet of Things Section.",
}
@Article{Badidi:2020:FCS,
author = "Elarbi Badidi and Zineb Mahrez and Essaid Sabir",
title = "Fog Computing for Smart Cities' Big Data Management
and Analytics: a Review",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "190",
day = "31",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110190",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/190",
abstract = "Demographic growth in urban areas means that modern
cities face challenges in ensuring a steady supply of
water and electricity, smart transport, livable space,
better health services, and citizens' safety. Advances
in sensing, communication, and digital technologies
promise to mitigate these challenges. Hence, many smart
cities have taken a new step in moving away from
internal information technology (IT) infrastructure to
utility-supplied IT delivered over the Internet. The
benefit of this move is to manage the vast amounts of
data generated by the various city systems, including
water and electricity systems, the waste management
system, transportation system, public space management
systems, health and education systems, and many more.
Furthermore, many smart city applications are
time-sensitive and need to quickly analyze data to
react promptly to the various events occurring in a
city. The new and emerging paradigms of edge and fog
computing promise to address big data storage and
analysis in the field of smart cities. Here, we review
existing service delivery models in smart cities and
present our perspective on adopting these two emerging
paradigms. We specifically describe the design of a
fog-based data pipeline to address the issues of
latency and network bandwidth required by
time-sensitive smart city applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Emerging Trends of Fog Computing in
Internet of Things Applications.",
}
@Article{Alodhyani:2020:PMA,
author = "Fahad Alodhyani and George Theodorakopoulos and
Philipp Reinecke",
title = "Password Managers --- It's All about Trust and
Transparency",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "189",
day = "30",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110189",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/189",
abstract = "A password is considered to be the first line of
defence in protecting online accounts, but there are
problems when people handle their own passwords, for
example, password reuse and difficult to memorize.
Password managers appear to be a promising solution to
help people handle their passwords. However, there is
low adoption of password managers, even though they are
widely available, and there are fewer studies on users
of password managers. Therefore, the issues that cause
people not to use password managers must be
investigated and, more generally, what users think
about them and the user interfaces of password
managers. In this paper, we report three studies that
we conducted: on user interfaces and the functions of
three password managers; a usability test and an
interview study; and an online questionnaire study
about users and non-users of password managers, which
also compares experts and non-experts regarding their
use (or non-use) of password managers. Our findings
show that usability is not a major problem, rather lack
of trust and transparency are the main reasons for the
low adoption of password managers. Users of password
managers have trust and security concerns, while there
are a few issues with the user interfaces and functions
of password managers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Social Networks
and Solutions.",
}
@Article{Zhang:2020:IDB,
author = "Yue Zhang and Fangai Liu",
title = "An Improved Deep Belief Network Prediction Model Based
on Knowledge Transfer",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "188",
day = "29",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110188",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/188",
abstract = "A deep belief network (DBN) is a powerful generative
model based on unlabeled data. However, it is difficult
to quickly determine the best network structure and
gradient dispersion in traditional DBN. This paper
proposes an improved deep belief network (IDBN): first,
the basic DBN structure is pre-trained and the learned
weight parameters are fixed; secondly, the learned
weight parameters are transferred to the new neuron and
hidden layer through the method of knowledge transfer,
thereby constructing the optimal network width and
depth of DBN; finally, the top-down layer-by-layer
partial least squares regression method is used to
fine-tune the weight parameters obtained by the
pre-training, which avoids the traditional fine-tuning
problem based on the back-propagation algorithm. In
order to verify the prediction performance of the
model, this paper conducts benchmark experiments on the
Movielens-20M (ML-20M) and Last.fm-1k (LFM-1k) public
data sets. Compared with other traditional algorithms,
IDBN is better than other fixed models in terms of
prediction performance and training time. The proposed
IDBN model has higher prediction accuracy and
convergence speed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Future Networks: Latest Trends and
Developments.",
}
@Article{Muneer:2020:CAM,
author = "Amgad Muneer and Suliman Mohamed Fati",
title = "A Comparative Analysis of Machine Learning Techniques
for Cyberbullying Detection on {Twitter}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "187",
day = "29",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110187",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/187",
abstract = "The advent of social media, particularly Twitter,
raises many issues due to a misunderstanding regarding
the concept of freedom of speech. One of these issues
is cyberbullying, which is a critical global issue that
affects both individual victims and societies. Many
attempts have been introduced in the literature to
intervene in, prevent, or mitigate cyberbullying;
however, because these attempts rely on the victims'
interactions, they are not practical. Therefore,
detection of cyberbullying without the involvement of
the victims is necessary. In this study, we attempted
to explore this issue by compiling a global dataset of
37,373 unique tweets from Twitter. Moreover, seven
machine learning classifiers were used, namely,
Logistic Regression (LR), Light Gradient Boosting
Machine (LGBM), Stochastic Gradient Descent (SGD),
Random Forest (RF), AdaBoost (ADB), Naive Bayes (NB),
and Support Vector Machine (SVM). Each of these
algorithms was evaluated using accuracy, precision,
recall, and F1 score as the performance metrics to
determine the classifiers' recognition rates applied to
the global dataset. The experimental results show the
superiority of LR, which achieved a median accuracy of
around 90.57\%. Among the classifiers, logistic
regression achieved the best F1 score (0.928), SGD
achieved the best precision (0.968), and SVM achieved
the best recall (1.00).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Artificial Intelligence and Machine
Learning in Cybercrime Detection.",
}
@Article{Ponce:2020:ASO,
author = "Alan Ponce and Raul Alberto Ponce Rodriguez",
title = "An Analysis of the Supply of Open Government Data",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "186",
day = "29",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110186",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/186",
abstract = "An index of the release of open government data,
published in 2016 by the Open Knowledge Foundation,
shows that there is significant variability in the
country's supply of this public good. What explains
these cross-country differences? Adopting an
interdisciplinary approach based on data science and
economic theory, we developed the following research
workflow. First, we gather, clean, and merge different
datasets released by institutions such as the Open
Knowledge Foundation, World Bank, United Nations, World
Economic Forum, Transparency International, Economist
Intelligence Unit, and International Telecommunication
Union. Then, we conduct feature extraction and variable
selection founded on economic domain knowledge. Next,
we perform several linear regression models, testing
whether cross-country differences in the supply of open
government data can be explained by differences in the
country's economic, social, and institutional
structures. Our analysis provides evidence that the
country's civil liberties, government transparency,
quality of democracy, efficiency of government
intervention, economies of scale in the provision of
public goods, and the size of the economy are
statistically significant to explain the cross-country
differences in the supply of open government data. Our
analysis also suggests that political participation,
sociodemographic characteristics, and demographic and
global income distribution dummies do not help to
explain the country's supply of open government data.
In summary, we show that cross-country differences in
governance, social institutions, and the size of the
economy can explain the global distribution of open
government data.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Data Science and Knowledge Discovery.",
}
@Article{Coelho:2020:MMB,
author = "Vitor Naz{\'a}rio Coelho and Rodolfo Pereira
Ara{\'u}jo and Haroldo Gambini Santos and Wang Yong
Qiang and Igor Machado Coelho",
title = "A {MILP} Model for a {Byzantine} Fault Tolerant
Blockchain Consensus",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "185",
day = "29",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110185",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/185",
abstract = "Mixed-integer mathematical programming has been widely
used to model and solve challenging optimization
problems. One interesting feature of this technique is
the ability to prove the optimality of the achieved
solution, for many practical scenarios where a linear
programming model can be devised. This paper explores
its use to model very strong Byzantine adversaries, in
the context of distributed consensus systems. In
particular, we apply the proposed technique to find
challenging adversarial conditions on a
state-of-the-art blockchain consensus: the Neo dBFT.
Neo Blockchain has been using the dBFT algorithm since
its foundation, but, due to the complexity of the
algorithm, it is challenging to devise definitive
algebraic proofs that guarantee safety/liveness of the
system (and adjust for every change proposed by the
community). Core developers have to manually devise and
explore possible adversarial attacks scenarios as an
exhaustive task. The proposed multi-objective model is
intended to assist the search of possible faulty
scenario, which includes three objective functions that
can be combined as a maximization problem for testing
one-block finality or a minimization problem for
ensuring liveness. Automated graphics help developers
to visually observe attack conditions and to quickly
find a solution. This paper proposes an exact
adversarial model that explores current limits for
practical blockchain consensus applications such as
dBFT, with ideas that can also be extended to other
decentralized ledger technologies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Special Issue on Cyber Physical Systems:
Prospects, Challenges, and Role in Software Defined
Networking and Blockchain.",
}
@Article{Paligu:2020:BFI,
author = "Furkan Paligu and Cihan Varol",
title = "Browser Forensic Investigations of {WhatsApp} {Web}
Utilizing {IndexedDB} Persistent Storage",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "184",
day = "28",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110184",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/184",
abstract = "Digital Evidence is becoming an indispensable factor
in most legal cases. However, technological
advancements that lead to artifact complexity, are
forcing investigators to create sophisticated
connections between the findings and the suspects for
admissibility of evidence in court. This paper
scrutinizes whether IndexedDB, an emerging browser
technology, can be a source of digital evidence to
provide additional and correlating support for
traditional investigation methods. It particularly
focuses on the artifacts of the worldwide popular
application, WhatsApp. A single case pretest--posttest
quasi experiment is applied with WhatsApp Messenger and
Web Application to populate and investigate artifacts
in IndexedDB storage of Google Chrome. The findings are
characterized and presented with their potential to be
utilized in forensic investigation verifications. The
storage locations of the artifacts are laid out and
operations of extraction, conversion and presentation
are systematized. Additionally, a proof of concept tool
is developed for demonstration. The results show that
WhatsApp Web IndexedDB storage can be employed for time
frame analysis, demonstrating its value in evidence
verification.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Information and Future Internet
Security, Trust and Privacy.",
}
@Article{Rinaldi:2020:KDM,
author = "Antonio Maria Rinaldi and Cristiano Russo and Cristian
Tommasino",
title = "A Knowledge-Driven Multimedia Retrieval System Based
on Semantics and Deep Features",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "183",
day = "28",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110183",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/183",
abstract = "In recent years the information user needs have been
changed due to the heterogeneity of web contents which
increasingly involve in multimedia contents. Although
modern search engines provide visual queries, it is not
easy to find systems that allow searching from a
particular domain of interest and that perform such
search by combining text and visual queries. Different
approaches have been proposed during years and in the
semantic research field many authors proposed
techniques based on ontologies. On the other hand, in
the context of image retrieval systems techniques based
on deep learning have obtained excellent results. In
this paper we presented novel approaches for image
semantic retrieval and a possible combination for
multimedia document analysis. Several results have been
presented to show the performance of our approach
compared with literature baselines.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Data Science and Knowledge Discovery.",
}
@Article{Agafonova:2020:PTR,
author = "Yana Agafonova and Alexey Tikhonov and Ivan P.
Yamshchikov",
title = "Paranoid Transformer: Reading Narrative of Madness as
Computational Approach to Creativity",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "182",
day = "27",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110182",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/182",
abstract = "This paper revisits the receptive theory in the
context of computational creativity. It presents a case
study of a Paranoid Transformer---a fully autonomous
text generation engine with raw output that could be
read as the narrative of a mad digital persona without
any additional human post-filtering. We describe
technical details of the generative system, provide
examples of output, and discuss the impact of receptive
theory, chance discovery, and simulation of fringe
mental state on the understanding of computational
creativity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Nature Language Engineering: Methods,
Tasks and Applications.",
}
@Article{Cavazza:2020:DIA,
author = "Francesco Cavazza and Francesco Galioto and Meri Raggi
and Davide Viaggi",
title = "Digital Irrigated Agriculture: Towards a Framework for
Comprehensive Analysis of Decision Processes under
Uncertainty",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "181",
day = "26",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110181",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/181",
abstract = "Several studies address the topic of Information and
Communication Technologies (ICT) adoption in irrigated
agriculture. Many of these studies testify on the
growing importance of ICT in influencing the evolution
of the sector, especially by bringing down information
barriers. While the potentialities of such technologies
are widely investigated and confirmed, there is still a
gap in understanding and modeling decisions on ICT
information implementation. This gap concerns, in
particular, accounting for all the aspects of
uncertainty which are mainly due to a lack of knowledge
on the reliability of ICT and on the errors of
ICT-information. Overall, such uncertainties might
affect Decision Makers' (DM's) behavior and hamper ICT
uptake. To support policy makers in the designing of
uncertainty-management policies for the achievement of
the benefits of a digital irrigated agriculture, we
further investigated the topic of uncertainty modelling
in ICT uptake decisions. To do so, we reviewed the
economic literature on ambiguity, in the context of the
wider literature on decision making under uncertainty
in order to explore its potential for better modeling
ICT uptake decisions. Findings from the discussed
literature confirm the capabilities of this approach to
yield a deeper understanding of decision processes when
the reliability of ICT is unknown and provides better
insights on how behavioral barriers to the achievement
of potential ICT-benefits can be overcome. Policy
implications to accompany the sector in the
digitalization process include mainly: (a) defining new
approaches for ICT-developers to tailor platforms to
answer heterogeneous DMs' needs; (b) establish
uncertainty-management policies complementary to DM
tools adoption.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Artificial Intelligence (AI) in
Agriculture.",
}
@Article{Mahfouz:2020:ECN,
author = "Ahmed Mahfouz and Abdullah Abuhussein and Deepak
Venugopal and Sajjan Shiva",
title = "Ensemble Classifiers for Network Intrusion Detection
Using a Novel Network Attack Dataset",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "180",
day = "26",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110180",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/180",
abstract = "Due to the extensive use of computer networks, new
risks have arisen, and improving the speed and accuracy
of security mechanisms has become a critical need.
Although new security tools have been developed, the
fast growth of malicious activities continues to be a
pressing issue that creates severe threats to network
security. Classical security tools such as firewalls
are used as a first-line defense against security
problems. However, firewalls do not entirely or
perfectly eliminate intrusions. Thus, network
administrators rely heavily on intrusion detection
systems (IDSs) to detect such network intrusion
activities. Machine learning (ML) is a practical
approach to intrusion detection that, based on data,
learns how to differentiate between abnormal and
regular traffic. This paper provides a comprehensive
analysis of some existing ML classifiers for
identifying intrusions in network traffic. It also
produces a new reliable dataset called GTCS (Game
Theory and Cyber Security) that matches real-world
criteria and can be used to assess the performance of
the ML classifiers in a detailed experimental
evaluation. Finally, the paper proposes an ensemble and
adaptive classifier model composed of multiple
classifiers with different learning paradigms to
address the issue of the accuracy and false alarm rate
in IDSs. Our classifiers show high precision and recall
rates and use a comprehensive set of features compared
to previous work.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Artificial Intelligence and Machine
Learning in Cybercrime Detection.",
}
@Article{Garlinska:2020:MFS,
author = "Magdalena Garlinska and Agnieszka Pregowska and Karol
Masztalerz and Magdalena Osial",
title = "From Mirrors to Free-Space Optical
Communication-Historical Aspects in Data Transmission",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "179",
day = "22",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110179",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/179",
abstract = "Fast communication is of high importance. Recently,
increased data demand and crowded radio frequency
spectrum have become crucial issues. Free-Space Optical
Communication (FSOC) has diametrically changed the way
people exchange information. As an alternative to wire
communication systems, it allows efficient voice,
video, and data transmission using a medium like air.
Due to its large bandwidth, FSOC can be used in various
applications and has therefore become an important part
of our everyday life. The main advantages of FSOC are a
high speed, cost savings, compact structures, low
power, energy efficiency, a maximal transfer capacity,
and applicability. The rapid development of the
high-speed connection technology allows one to reduce
the repair downtime and gives the ability to quickly
establish a backup network in an emergency.
Unfortunately, FSOC is susceptible to disruption due to
atmospheric conditions or direct sunlight. Here, we
briefly discuss Free-Space Optical Communication from
mirrors and optical telegraphs to modern wireless
systems and outline the future development directions
of optical communication.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Wireless Internet, Multimedia, and
Artificial Intelligence: New Applications and
Infrastructures.",
}
@Article{Cao:2020:LHG,
author = "Kerang Cao and Jingyu Gao and Kwang-nam Choi and Lini
Duan",
title = "Learning a Hierarchical Global Attention for Image
Classification",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "11",
pages = "178",
day = "22",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12110178",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:25:59 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/11/178",
abstract = "To classify the image material on the internet, the
deep learning methodology, especially deep neural
network, is the most optimal and costliest method of
all computer vision methods. Convolutional neural
networks (CNNs) learn a comprehensive feature
representation by exploiting local information with a
fixed receptive field, demonstrating distinguished
capacities on image classification. Recent works
concentrate on efficient feature exploration, which
neglect the global information for holistic
consideration. There is large effort to reduce the
computational costs of deep neural networks. Here, we
provide a hierarchical global attention mechanism that
improve the network representation with restricted
increase of computation complexity. Different from
nonlocal-based methods, the hierarchical global
attention mechanism requires no matrix multiplication
and can be flexibly applied in various modern network
designs. Experimental results demonstrate that proposed
hierarchical global attention mechanism can
conspicuously improve the image classification
precision---a reduction of 7.94\% and 16.63\% percent
in Top 1 and Top 5 errors separately---with little
increase of computation complexity (6.23\%) in
comparison to competing approaches.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Big Data and Augmented Intelligence.",
}
@Article{Tariq:2020:VAU,
author = "Muhammad Atiq Ur Rehman Tariq and Cheuk Yin Wai and
Nitin Muttil",
title = "Vulnerability Assessment of Ubiquitous Cities Using
the Analytic Hierarchy Process",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "235",
day = "21",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120235",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/235",
abstract = "Urbanization is a challenge faced by most countries
worldwide and leads to several problems. Due to rapid
communication capabilities, conforming the megacities
into Ubiquitous cities (U-cities) seems to be a
potential solution to mitigate the problems caused by
urbanization. Extensive reliance and dependencies of
U-cities on information and communication technologies
(ICTs) bring forth a new set of risks and
vulnerabilities to these megacities. This research
investigates the vulnerabilities of ICTs against
man-made and natural hazards in a systematic way using
the Analytic Hierarchy Process. The study identifies
the vulnerabilities of different ICTs in U-cities and
helps in improving the system's resistivity against
various hazards. The task is performed by evaluating
the level of disruption on the different technologies
and areas under the identified man-made and natural
hazards. The research provides an insight into the
working mechanisms of involved ICTs. It also helps to
manage U-cities with more secure and sustainable
services. The research identified that the new
ICTs-based hazards have emerged and have become among
the most influential hazards. The research has
concluded that the vulnerabilities of U-cities are
significantly different from that of conventional
cities and need further studies to develop further
understandings. The research recommends similar
vulnerability studies for regional areas as well.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Sustainable Smart City.",
}
@Article{Chaves:2020:EEC,
author = "Ricardo Chaves and Carlos Senna and Miguel Lu{\'\i}s
and Susana Sargento and Andr{\'e} Moreira and Diogo
Recharte and Ricardo Matos",
title = "{EmuCD}: an Emulator for Content Dissemination
Protocols in Vehicular Networks",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "234",
day = "21",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120234",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/234",
abstract = "The development of protocols for mobile networks,
especially for vehicular ad-hoc networks (VANETs),
presents great challenges in terms of testing in real
conditions. Using a production network for testing
communication protocols may not be feasible, and the
use of small networks does not meet the requirements
for mobility and scale found in real networks. The
alternative is to use simulators and emulators, but
vehicular network simulators do not meet all the
requirements for effective testing. Aspects closely
linked to the behaviour of the network nodes (mobility,
radio communication capabilities, etc.) are
particularly important in mobile networks, where a
delay tolerance capability is desired. This paper
proposes a distributed emulator, EmuCD, where each
network node is built in a container that consumes a
data trace that defines the node's mobility and
connectivity in a real network (but also allowing the
use of data from simulated networks). The emulated
nodes interact directly with the container's operating
system, updating the network conditions at each step of
the emulation. In this way, our emulator allows the
development and testing of protocols, without any
relation to the emulator, whose code is directly
portable to any hardware without requiring changes or
customizations. Using the facilities of our emulator,
we tested InterPlanetary File System (IPFS), Sprinkler
and BitTorrent content dissemination protocols with
real mobility and connectivity data from a real
vehicular network. The tests with a real VANET and with
the emulator have shown that, under similar conditions,
EmuCD performs closely to the real VANET, only lacking
in the finer details that are extremely hard to
emulate, such as varying loads in the hardware.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Delay-Tolerant Networking.",
}
@Article{Li:2020:JOR,
author = "Long Li and Gaochao Xu and Peng Liu and Yang Li and
Jiaqi Ge",
title = "Jointly Optimize the Residual Energy of Multiple
Mobile Devices in the {MEC-WPT} System",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "233",
day = "20",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120233",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/233",
abstract = "With the rapid popularity of mobile devices (MDs),
mobile edge computing (MEC) networks and wireless power
transmission (WPT) will receive more attention.
Naturally, by integrating these two technologies, the
inherent energy consumption during task execution can
be effectively reduced, and the collected energy can be
provided to charge the MD. In this article, our
research focuses on extending the battery time of MDs
by maximizing the harvested energy and minimizing the
consumed energy in the MEC--WPT system, which is
formulated as a residual energy maximization problem
and also a non-convex optimization problem. On the
basis of study on maximizing the residual energy under
multi-users and multi-time blocks, we propose an
effective jointly optimization method (i.e., jointly
optimize the energy harvesting time, task-offloading
time, task-offloading size and the MDs' CPU frequency),
which combines the convex optimization method and the
augmented Lagrangian to solve the residual energy
maximum problem. We leverage Time Division Multiple
Access (TMDA) mode to coordinate computation
offloading. Simulation results show that our scheme has
better performance than the benchmark schemes on
maximizing residual energy. In particular, our proposed
scheme is outstanding in the failure rate of multiple
MDs and can adapt to the task size to minimize the
failure rate.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Fog and Mobile Edge Computing.",
}
@Article{Torres-Madronero:2020:CPI,
author = "Esperanza Milena Torres-Madro{\~n}ero and Maria C.
Torres-Madro{\~n}ero and Luz Dary Ruiz Botero",
title = "Challenges and Possibilities of {ICT}-Mediated
Assessment in Virtual Teaching and Learning Processes",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "232",
day = "18",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120232",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/232",
abstract = "The transformations in educational environments due to
the immersion of information and communication
technologies (ICT) make it necessary to analyze the
limits and possibilities of the assessment of the
virtual training process. This paper presents an
analysis of the meanings of ICT-mediated assessment,
establishing what kinds of knowledge are suitable for
this type of evaluation, and the challenges and
possibilities of virtual tools. For this, we present a
systematic review of ICT-mediated evaluation and
assessment according to the educational paradigms and
their implementation. We highlight that contemporary
pedagogical models and their implementation in ICT
mediation tools show a trend towards quantitative and
summative valuation. The commonly used learning
management systems (LMS) include several types of
questions oriented to quantitative evaluation, with
multiple-choice being the most common. However, new
technological approaches like gamification, virtual
reality and mobile learning open new assessment
possibilities. The ICT educational platforms and new
technologies demand new skills for all educational
actors, such as digital literacy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue E-Learning and Technology Enhanced
Learning.",
}
@Article{Miranda:2020:PSM,
author = "Juli{\'a}n Miranda and Ang{\'e}lica Fl{\'o}rez and
Gustavo Ospina and Ciro Gamboa and Carlos Fl{\'o}rez
and Miguel Altuve",
title = "Proposal for a System Model for Offline Seismic Event
Detection in {Colombia}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "231",
day = "18",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120231",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/231",
abstract = "This paper presents an integrated model for seismic
events detection in Colombia using machine learning
techniques. Machine learning is used to identify P-wave
windows in historic records and hence detect seismic
events. The proposed model has five modules that group
the basic detection system procedures: the seeking,
gathering, and storage seismic data module, the reading
of seismic records module, the analysis of
seismological stations module, the sample selection
module, and the classification process module. An
explanation of each module is given in conjunction with
practical recommendations for its implementation. The
resulting model allows understanding the integration of
the phases required for the design and development of
an offline seismic event detection system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Collaborative Networks, Decision
Systems, Web Applications and Services for Supporting
Engineering and Production Management.",
}
@Article{Zhang:2020:INP,
author = "Ping Zhang and Rongqin Wang and Nianfeng Shi",
title = "{IgA} Nephropathy Prediction in Children with Machine
Learning Algorithms",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "230",
day = "17",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120230",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/230",
abstract = "Immunoglobulin A nephropathy (IgAN) is the most common
primary glomerular disease all over the world and it is
a major cause of renal failure. IgAN prediction in
children with machine learning algorithms has been
rarely studied. We retrospectively analyzed the
electronic medical records from the Nanjing Eastern War
Zone Hospital, chose eXtreme Gradient Boosting
(XGBoost), random forest (RF), CatBoost, support vector
machines (SVM), k-nearest neighbor (KNN), and extreme
learning machine (ELM) models in order to predict the
probability that the patient would not reach or reach
end-stage renal disease (ESRD) within five years, used
the chi-square test to select the most relevant 16
features as the input of the model, and designed a
decision-making system (DMS) of IgAN prediction in
children that is based on XGBoost and Django framework.
The receiver operating characteristic (ROC) curve was
used in order to evaluate the performance of the models
and XGBoost had the best performance by comparison. The
AUC value, accuracy, precision, recall, and f1-score of
XGBoost were 85.11\%, 78.60\%, 75.96\%, 76.70\%, and
76.33\%, respectively. The XGBoost model is useful for
physicians and pediatric patients in providing
predictions regarding IgAN. As an advantage, a DMS can
be designed based on the XGBoost model to assist a
physician to effectively treat IgAN in children for
preventing deterioration.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Curative Power of Medical Data 2020.",
}
@Article{Marotta:2020:BAQ,
author = "Lorena Marotta and Andrea Pesce and Andrea Guazzini",
title = "Before and after the Quarantine: an Approximate Study
on the Psychological Impact of {COVID-19} on the
{Italian} Population during the Lockdown Period",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "229",
day = "15",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120229",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/229",
abstract = "COVID-19 (Corona-Virus Disease 2019) in Italy and the
measures that were adopted to contain its diffusion had
a strong impact on people's quality of life and mental
health. The objective of the study was to quantify the
psychological impact of the lockdown period on the
general Italian population during the two weeks when
the COVID-19 emergency in Italy was at its peak. The
study (1556 adults) was conducted from April 6th to
April 12th, 2020. A survey was developed through Google
Forms in order to assess different psychological
measures (Self Efficacy, Locus of Control, Social
Connectedness, Sense of Virtual Community, Flourishing,
Positive and Negative Affect, Life Satisfaction, and
Risk Propensity). The results were then compared to
reference data. Thelockdown period increased arousal
mainly for negative emotions, but also for positive
emotions, and quality of life seemed to be reduced.
From a psychosocial point of view, while social
connectedness has decreased during lockdown, probably
because of isolation and social distancing, the virtual
social community seemed to increase in the same period.
Interestingly, we revealed how self efficacy increased
during the lockdown period, and, at the same time, the
Locus of control appeared as externalized, and the risk
propensity as reduced. The results are discussed
considering previous literature, and a coherent
theoretical framework is proposed in order to refine
the forecasting model for the psychological impact of
the lockdown.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue 2020 Selected Papers from Future
Internet Editorial Board Members and Guest Editors.",
}
@Article{Ce:2020:AMI,
author = "Peng Ce and Bao Tie",
title = "An Analysis Method for Interpretability of {CNN} Text
Classification Model",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "228",
day = "13",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120228",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/228",
abstract = "With continuous development of artificial
intelligence, text classification has gradually changed
from a knowledge-based method to a method based on
statistics and machine learning. Among them, it is a
very important and efficient way to classify text based
on the convolutional neural network (CNN) model. Text
data are a kind of sequence data, while time
sequentiality of the general text data is relatively
weak, so text classification is usually less relevant
to the sequential structure of the full text.
Therefore, CNN-based text classification has gradually
become a research hotspot when dealing with issues of
text classification. For machine learning, especially
deep learning, model interpretability has increasingly
become the focus of academic research and industrial
applications, and also become a key issue for further
development and application of deep learning
technology. Therefore, we recommend using the
backtracking analysis method to conduct in-depth
research on deep learning models. This paper proposes
an analysis method for interpretability of a CNN text
classification model. The method proposed by us can
perform multi-angle analysis on the discriminant
results of multi-classified text and multi-label
classification tasks through backtracking analysis on
model prediction results. Finally, the analysis results
of the model can be displayed using visualization
technology from multiple dimensions based on
interpretability. The representative data set IMDB
(Internet Movie Database) in text classification is
verified by examples, and the results show that the
model can be effectively analyzed when using our
method.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Smart System Infrastructure and
Applications.",
}
@Article{Yovita:2020:PAC,
author = "Leanna Vidya Yovita and Nana Rachmana Syambas and Ian
Joseph Matheus Edward and Noriaki Kamiyama",
title = "Performance Analysis of Cache Based on Popularity and
Class in Named Data Network",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "227",
day = "09",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120227",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/227",
abstract = "The communication network is growing with some unique
characteristics, such as consumers repeatedly request
the same content to the server, similarity in local
demand trend, and dynamic changes to requests within a
specific period. Therefore, a different network
paradigm is needed to replace the IP network, namely
Named Data Network (NDN). The content store, which acts
as a crucial component in the NDN nodes is a limited
resource. In addition, a cache mechanism is needed to
optimize the router's content store by exploiting the
different content services characters in the network.
This paper proposes a new caching algorithm called
Cache Based on Popularity and Class (CAPIC) with
dynamic mechanism, and the detail explanation about the
static method also presented. The goal of Static-CAPIC
was to enhance the total cache hit ratio on the network
by pre-determining the cache proportion for each
content class. However, this technique is not
appropriate to control the cache hit ratio for priority
class. Therefore, the Dynamic-CAPIC is used to provide
flexibility to change the cache proportion based on the
frequency of requests in real-time. The formula
involves considering the consumers' request all the
time. It gives a higher cache hit ratio for the
priority content class. This method outperforms
Static-CAPIC, and the LCD+sharing scheme in the total
network cache hit ratio parameter and channels it to
the priority class.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Internet of Things.",
}
@Article{Khrais:2020:RAI,
author = "Laith T. Khrais",
title = "Role of Artificial Intelligence in Shaping Consumer
Demand in E-Commerce",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "226",
day = "08",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120226",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/226",
abstract = "The advent and incorporation of technology in
businesses have reformed operations across industries.
Notably, major technical shifts in e-commerce aim to
influence customer behavior in favor of some products
and brands. Artificial intelligence (AI) comes on board
as an essential innovative tool for personalization and
customizing products to meet specific demands. This
research finds that, despite the contribution of AI
systems in e-commerce, its ethical soundness is a
contentious issue, especially regarding the concept of
explainability. The study adopted the use of word cloud
analysis, voyance analysis, and concordance analysis to
gain a detailed understanding of the idea of
explainability as has been utilized by researchers in
the context of AI. Motivated by a corpus analysis, this
research lays the groundwork for a uniform front, thus
contributing to a scientific breakthrough that seeks to
formulate Explainable Artificial Intelligence (XAI)
models. XAI is a machine learning field that inspects
and tries to understand the models and steps involved
in how the black box decisions of AI systems are made;
it provides insights into the decision points,
variables, and data used to make a recommendation. This
study suggested that, to deploy explainable XAI
systems, ML models should be improved, making them
interpretable and comprehensible.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Data Science and Knowledge Discovery.",
}
@Article{Velusamy:2020:SSD,
author = "Gandhimathi Velusamy and Ricardo Lent",
title = "Smart Site Diversity for a High Throughput Satellite
System with Software-Defined Networking and a Virtual
Network Function",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "225",
day = "07",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120225",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/225",
abstract = "High Throughput Satellite (HTS) systems aim to push
data rates to the order of Terabit/s, making use of
Extremely High Frequencies (EHF) or free-space optical
(FSO) in the feeder links. However, one challenge that
needs to be addressed is that the use of such high
frequencies makes the feeder links vulnerable to
atmospheric conditions, which can effectively disable
channels at times or temporarily increases the bit
error rates. One way to cope with the problem is to
introduce site diversity and to forward the data
through the gateways not affected, or at least less
constrained, by adverse conditions. In this paper, a
virtual network function (VNF) introduced through
reinforcement learning defines a smart routing service
for an HTS system. Experiments were conducted on an
emulated ground-satellite system in CloudLab, testing a
VNF implementation of the approach with
software-defined networking virtual switches, which
indicate the expected performance of the proposed
method.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cognitive Software Defined Networking
and Network Function Virtualization and Applications.",
}
@Article{Niyonambaza:2020:PMP,
author = "Irene Niyonambaza and Marco Zennaro and Alfred
Uwitonze",
title = "Predictive Maintenance {(PdM)} Structure Using
{Internet of Things} {(IoT)} for Mechanical Equipment
Used into Hospitals in Rwanda",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "224",
day = "07",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120224",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/224",
abstract = "The success of all industries relates to attaining the
satisfaction to clients with a high level of services
and productivity. The success main factor depends on
the extent of maintaining their equipment. To date, the
Rwandan hospitals that always have a long queue of
patients that are waiting for service perform a repair
after failure as common maintenance practice that may
involve unplanned resources, cost, time, and completely
or partially interrupt the remaining hospital
activities. Aiming to reduce unplanned equipment
downtime and increase their reliability, this paper
proposes the Predictive Maintenance (PdM) structure
while using Internet of Things (IoT) in order to
predict early failure before it happens for mechanical
equipment that is used in Rwandan hospitals. Because
prediction relies on data, the structure design
consists of a simplest developed real time data
collector prototype with the purpose of collecting real
time data for predictive model construction and
equipment health status classification. The real time
data in the form of time series have been collected
from selected equipment components in King Faisal
Hospital and then later used to build a proposed
predictive time series model to be employed in proposed
structure. The Long Short Term Memory (LSTM) Neural
Network model is used to learn data and perform with an
accuracy of 90\% and 96\% to different two selected
components.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Internet of Things (IoT) for Industry
4.0.",
}
@Article{Sarasa-Cabezuelo:2020:MCI,
author = "Antonio Sarasa-Cabezuelo",
title = "A Model for Creating Interactive {eBooks} for
{eLearning}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "223",
day = "07",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120223",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/223",
abstract = "In recent decades, electronic books have
revolutionized the publishing world. In this sense, an
area of application is education, where electronic
books can be used as educational resources to implement
learning strategies about content and in eLearning
environments. For this, it is necessary to introduce
interactive elements in the electronic books that turn
the reader into an active actor in the reading process.
However, ebooks have a limitation regarding their
creation process. In this sense, the tools can be
user-oriented or programmer-oriented. The former are
intuitive to use and have user-friendly interfaces, but
they offer a reduced number of functionalities to add
to books. The second are aimed at programmers, allowing
for the implementation of any functionality, but
limiting the number of content creators who can use
them. The main motivation of this work is to propose an
intermediate solution that offers a wide number of
functionalities while not requiring deep programming
knowledge to use them. In this sense, the solution of
this article is novel since it proposes the use of
extensible markup language (XML) documents to specify
the structure of the electronic book in such a way that
its processing will lead to the electronic book.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue E-Learning and Technology Enhanced
Learning.",
}
@Article{Konig:2020:CBS,
author = "Lukas K{\"o}nig and Yuliia Korobeinikova and Simon
Tjoa and Peter Kieseberg",
title = "Comparing Blockchain Standards and Recommendations",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "222",
day = "07",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120222",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/222",
abstract = "Since the introduction of Bitcoin, the term
``blockchain'' has attracted many start-ups and
companies over the years, especially in the financial
sector. However, technology is evolving faster than
standardization frameworks. This left the industry in
the position of having to use this emerging technology,
without being backed by any international standards
organization regarding for neither the technology
itself, nor for a blockchain specific information
security framework. In times of the General Data
Protection Regulation and growing international trade
conflicts, protecting information is more relevant than
ever. Standardization of blockchains is an appeal to
raise the development of information technologies to
the next level. Therefore, this paper shall provide an
overview of standardization organization's publications
about blockchains/distributed ledger technologies, a
set of comparison criteria for future work and a
comparison of the existing standards work itself. With
that information, aligning to existing standardization
efforts becomes easier, and might even present the
possibility to create frameworks where there are none
at the moment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Information and Future Internet
Security, Trust and Privacy.",
}
@Article{Song:2020:BAB,
author = "Yang Song and Yawen Wang and Dahai Jin",
title = "A {Bayesian} Approach Based on {Bayes} Minimum Risk
Decision for Reliability Assessment of {Web} Service
Composition",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "221",
day = "04",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120221",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/221",
abstract = "Web service composition is the process of combining
and reusing existing web services to create new
business processes to satisfy specific user
requirements. Reliability plays an important role in
ensuring the quality of web service composition.
However, owing to the flexibility and complexity of
such architecture, sufficient estimation of reliability
is difficult. In this paper, the authors propose a
method to estimate the reliability of web service
compositions based on Bayes reliability assessment by
considering it to be a decision-making problem. This
improves the testing efficiency and accuracy of such
methods. To this end, the authors focus on fully
utilizing prior information of web services to increase
the accuracy of prior distributions, and construct a
Markov model in terms of the reliabilities of the web
composition and each web service to integrate the
limited test data. The authors further propose a method
of minimum risk (MMR) to calculate the initial values
of hyperparameters satisfying the constraint of minimal
risk of the wrong decision. Experiments demonstrate
that the proposed method is capable of efficiently
utilizing prior module-level failure information,
comparing with the Bayesian Monte Carlo method (BMCM)
and expert scoring method (ESM), when the number of
failures increased from 0 to 5, reducing the required
number of test cases from 19.8\% to 28.9\% and 6.1\% to
14.1\% separately, improving the reliability assessment
of web service compositions, and reducing the expenses
incurred by system-level reliability testing and
demonstration.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Big Data and Augmented Intelligence.",
}
@Article{Harborth:2020:EIE,
author = "David Harborth and Sebastian Pape",
title = "Empirically Investigating Extraneous Influences on the
{``APCO''} Model --- Childhood Brand Nostalgia and the
Positivity Bias",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "220",
day = "02",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120220",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/220",
abstract = "Pok{\'e}mon Go is one of the most successful mobile
games of all time. Millions played and still play this
mobile augmented reality (AR) application, although
severe privacy issues are pervasive in the app due to
its use of several sensors such as location data and
camera. In general, individuals regularly use online
services and mobile apps although they might know that
the use is associated with high privacy risks. This
seemingly contradictory behavior of users is analyzed
from a variety of different perspectives in the
information systems domain. One of these perspectives
evaluates privacy-related decision making processes
based on concepts from behavioral economics. We follow
this line of work by empirically testing one exemplary
extraneous factor within the ``enhanced APCO model''
(antecedents-privacy concerns-outcome). Specific
empirical tests on such biases are rare in the
literature which is why we propose and empirically
analyze the extraneous influence of a positivity bias.
In our case, we hypothesize that the bias is induced by
childhood brand nostalgia towards the Pok{\'e}mon
franchise. We analyze our proposition in the context of
an online survey with 418 active players of the game.
Our results indicate that childhood brand nostalgia
influences the privacy calculus by exerting a large
effect on the benefits within the trade-off and,
therefore, causing a higher use frequency. Our work
shows two important implications. First, the behavioral
economics perspective on privacy provides additional
insights relative to previous research. However, the
effects of several other biases and heuristics have to
be tested in future work. Second, relying on nostalgia
represents an important, but also double-edged,
instrument for practitioners to market new services and
applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yang:2020:MCB,
author = "Pin Yang and Huiyu Zhou and Yue Zhu and Liang Liu and
Lei Zhang",
title = "Malware Classification Based on Shallow Neural
Network",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "219",
day = "02",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120219",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/219",
abstract = "The emergence of a large number of new malicious code
poses a serious threat to network security, and most of
them are derivative versions of existing malicious
code. The classification of malicious code is helpful
to analyze the evolutionary trend of malicious code
families and trace the source of cybercrime. The
existing methods of malware classification emphasize
the depth of the neural network, which has the problems
of a long training time and large computational cost.
In this work, we propose the shallow neural
network-based malware classifier (SNNMAC), a malware
classification model based on shallow neural networks
and static analysis. Our approach bridges the gap
between precise but slow methods and fast but less
precise methods in existing works. For each sample, we
first generate n-grams from their opcode sequences of
the binary file with a decompiler. An improved n-gram
algorithm based on control transfer instructions is
designed to reduce the n-gram dataset. Then, the SNNMAC
exploits a shallow neural network, replacing the full
connection layer and softmax with the average pooling
layer and hierarchical softmax, to learn from the
dataset and perform classification. We perform
experiments on the Microsoft malware dataset. The
evaluation result shows that the SNNMAC outperforms
most of the related works with 99.21\% classification
precision and reduces the training time by more than
half when compared with the methods using DNN (Deep
Neural Networks).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Cybersecurity.",
}
@Article{Onorati:2020:PLD,
author = "Dario Onorati and Pierfrancesco Tommasino and Leonardo
Ranaldi and Francesca Fallucchi and Fabio Massimo
Zanzotto",
title = "Pat-in-the-Loop: Declarative Knowledge for Controlling
Neural Networks",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "218",
day = "02",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120218",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/218",
abstract = "The dazzling success of neural networks over natural
language processing systems is imposing an urgent need
to control their behavior with simpler, more direct
declarative rules. In this paper, we propose
Pat-in-the-Loop as a model to control a specific class
of syntax-oriented neural networks by adding
declarative rules. In Pat-in-the-Loop, distributed tree
encoders allow to exploit parse trees in neural
networks, heat parse trees visualize activation of
parse trees, and parse subtrees are used as declarative
rules in the neural network. Hence, Pat-in-the-Loop is
a model to include human control in specific natural
language processing (NLP)-neural network (NN) systems
that exploit syntactic information, which we will
generically call Pat. A pilot study on question
classification showed that declarative rules
representing human knowledge, injected by Pat, can be
effectively used in these neural networks to ensure
correctness, relevance, and cost-effective.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Nature Language Engineering: Methods,
Tasks and Applications.",
}
@Article{Martinez:2020:IBV,
author = "Juan Miguel Mart{\'\i}nez Mart{\'\i}nez and Antonio
Tudela Sancho",
title = "Interactions between Virtual Spaces and Schools: a
Collective Case Study",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "217",
day = "02",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120217",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/217",
abstract = "Information and Communication Technologies (ICT) play
an important role in the current educational panorama.
Their presence in educational centers has increased in
the last decade due to the constant development of
educational policies focused on their inclusion in the
classroom. However, the integration of ICT in
educational spaces and practices has still not reach
the levels desired by international organizations such
as the OECD and UNESCO. The aim of this study is to
understand the nature of the interaction between
virtual spaces and school spaces, and how this
interaction affects the development of students'
learning processes. To this end, we follow an
interpretive research methodology using a collective
case study with four students from Spain. The results
highlight the scarce integration of ICT into
educational centers and teaching practices. However,
virtual spaces play an important role in the
development of other learning processes, such as
informed learning, informal learning, and learning
outside of the school context. In this work, we also
provide a brief overview of changes in the current
educational situation due to the COVID-19 pandemic.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Education Responses to Technological
Challenges and Their Impact on Classrooms.",
}
@Article{Han:2020:ECF,
author = "Junyan Han and Jinglei Zhang and Xiaoyuan Wang and
Yaqi Liu and Quanzheng Wang and Fusheng Zhong",
title = "An Extended Car-Following Model Considering
Generalized Preceding Vehicles in {V2X} Environment",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "216",
day = "28",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120216",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/216",
abstract = "Vehicle-to-everything (V2X) technology will
significantly enhance the information perception
ability of drivers and assist them in optimizing
car-following behavior. Utilizing V2X technology,
drivers could obtain motion state information of the
front vehicle, non-neighboring front vehicle, and front
vehicles in the adjacent lanes (these vehicles are
collectively referred to as generalized preceding
vehicles in this research). However, understanding of
the impact exerted by the above information on
car-following behavior and traffic flow is limited. In
this paper, a car-following model considering the
average velocity of generalized preceding vehicles
(GPV) is proposed to explore the impact and then
calibrated with the next generation simulation (NGSIM)
data utilizing the genetic algorithm. The neutral
stability condition of the model is derived via linear
stability analysis. Numerical simulation on the
starting, braking and disturbance propagation process
is implemented to further study features of the
established model and traffic flow stability. Research
results suggest that the fitting accuracy of the GPV
model is 40.497\% higher than the full velocity
difference (FVD) model. Good agreement between the
theoretical analysis and the numerical simulation
reveals that motion state information of GPV can
stabilize traffic flow of following vehicles and thus
alleviate traffic congestion.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhang:2020:KMC,
author = "Wenbo Zhang and Xiao Li and Yating Yang and Rui Dong
and Gongxu Luo",
title = "Keeping Models Consistent between Pretraining and
Translation for Low-Resource Neural Machine
Translation",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "215",
day = "27",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120215",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/215",
abstract = "Recently, the pretraining of models has been
successfully applied to unsupervised and
semi-supervised neural machine translation. A
cross-lingual language model uses a pretrained masked
language model to initialize the encoder and decoder of
the translation model, which greatly improves the
translation quality. However, because of a mismatch in
the number of layers, the pretrained model can only
initialize part of the decoder's parameters. In this
paper, we use a layer-wise coordination transformer and
a consistent pretraining translation transformer
instead of a vanilla transformer as the translation
model. The former has only an encoder, and the latter
has an encoder and a decoder, but the encoder and
decoder have exactly the same parameters. Both models
can guarantee that all parameters in the translation
model can be initialized by the pretrained model.
Experiments on the Chinese--English and English--German
datasets show that compared with the vanilla
transformer baseline, our models achieve better
performance with fewer parameters when the parallel
corpus is small.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Semantic Aspects in Natural Language
Processing.",
}
@Article{Chua:2020:PAD,
author = "Sook-Ling Chua and Lee Kien Foo and Hans W. Guesgen",
title = "Predicting Activities of Daily Living with
Spatio-Temporal Information",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "214",
day = "27",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120214",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/214",
abstract = "The smart home has begun playing an important role in
supporting independent living by monitoring the
activities of daily living, typically for the elderly
who live alone. Activity recognition in smart homes has
been studied by many researchers with much effort spent
on modeling user activities to predict behaviors. Most
people, when performing their daily activities,
interact with multiple objects both in space and
through time. The interactions between user and objects
in the home can provide rich contextual information in
interpreting human activity. This paper shows the
importance of spatial and temporal information for
reasoning in smart homes and demonstrates how such
information is represented for activity recognition.
Evaluation was conducted on three publicly available
smart-home datasets. Our method achieved an average
recognition accuracy of more than 81\% when predicting
user activities given the spatial and temporal
information.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Data Science and Knowledge Discovery.",
}
@Article{Minati:2020:CCS,
author = "Gianfranco Minati",
title = "Complex Cognitive Systems and Their Unconscious.
Related Inspired Conjectures for Artificial
Intelligence",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "213",
day = "27",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120213",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/213",
abstract = "The aim of the article is to propose a conceptual
framework, constructs, and conjectures to act as a
guide for future, related research finalized to design
and implement versions of Artificial Intelligence
encompassing an artificially simulated unconscious
suitable for human-like artificial cognitive
processing. This article considers the concept of the
unconscious in psychoanalysis. The interdisciplinary
understanding of this concept is considered to be the
unavoidable property of sufficiently complex, cognitive
processing. We elaborate on the possibility of an
artificial unconscious, able to both self-acquired
properties through usage, and self-profile through a
supposed implicit, parasitic usage of explicit
cognitive processing. Memory activities are considered
to be integrated into cognitive processing, with memory
no longer only being storage and reminding no longer
only being finding. We elaborate on the artificial
unconscious as an implicit, usage-dependent,
self-profiling, and emergent process. Conceptual
characteristics of the research project are the
implementation of weighted networked, fuzzified
memorizations; self-generated networks of links of
inter-relationships as nodes, self-variation of the
intensity of the links according to the use, and
activation of internal self-processes such as the
introduction of fictitious links intended as variations
and combinations of the current ones. Application
examples suitable for experimental implementation are
also discussed with reference to chatbot technology
that has been extended with features of an artificial
unconscious. Thus, we introduce the concept of the
AU-chatbot. The main purpose is to allow the artificial
cognitive processing to acquire suitable human-like
attitudes in representing, interfacing, and learning,
potentially important in supporting and complementing
human-centered activities. Examples of expected
features are the ability to combine current and
unconscious links to perform cognitive processing such
as representing, deciding, memorizing, and solving
equivalencies, and also learning meta-profiles, such as
in supporting doctor--patient interactions and
educational activities. We also discuss possible
technologies suitable for implementing experiments for
the artificial unconscious.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Smart System Infrastructure and
Applications.",
}
@Article{Artiemjew:2020:ARB,
author = "Piotr Artiemjew and Lada Rudikova and Oleg Myslivets",
title = "About Rule-Based Systems: Single Database Queries for
Decision Making",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "212",
day = "27",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120212",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/212",
abstract = "One of the developmental directions of Future Internet
technologies is the implementation of artificial
intelligence systems for manipulating data and the
surrounding world in a more complex way. Rule-based
systems, very accessible for people's decision-making,
play an important role in the family of computational
intelligence methods. The use of decision-making rules
along with decision trees are one of the simplest forms
of presenting complex decision-making processes.
Decision support systems, according to the
cross-industry standard process for data mining
(CRISP-DM) framework, require final embedding of the
learned model in a given computer infrastructure,
integrated circuits, etc. In this work, we deal with
the topic concerning placing the learned rule-based
model of decision support in the database
environment-exactly in the SQL database tables. Our
main goal is to place the previously trained model in
the database and apply it by means of single queries.
In our work we assume that the decision-making rules
applied are mutually consistent and additionally the
Minimal Description Length (MDL) rule is introduced. We
propose a universal solution for any IF THEN rule
induction algorithm.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Data Science and Knowledge Discovery.",
}
@Article{Nyblom:2020:RPS,
author = "Philip Nyblom and Gaute Wangen and Vasileios
Gkioulos",
title = "Risk Perceptions on Social Media Use in {Norway}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "211",
day = "26",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120211",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/211",
abstract = "Social media are getting more and more ingrained into
everybody's lives. With people's more substantial
presence on social media, threat actors exploit the
platforms and the information that people share there
to deploy and execute various types of attacks. This
paper focuses on the Norwegian population, exploring
how people perceive risks arising from the use of
social media, focusing on the analysis of specific
indicators such as age, sexes and differences among the
users of distinct social media platforms. For data
collection, a questionnaire was structured and deployed
towards the users of multiple social media platforms
(total n = 329). The analysis compares risk perceptions
of using the social media platforms Facebook (n = 288),
Twitter (n = 134), Reddit (n = 189) and Snapchat (n =
267). Furthermore, the paper analyses the differences
between the sexes and between the digital natives and
non-natives. Our sample also includes sufferers of ID
theft (n = 50). We analyse how account compromise
occurs and how suffering ID theft changes behaviour and
perception. The results show significant discrepancies
in the risk perception among the social media platform
users across the examined indicators, but also explicit
variations on how this affects the associated usage
patterns. Based on the results, we propose a generic
risk ranking of social media platforms, activities,
sharing and a threat model for SoMe users. The results
show the lack of a unified perception of risk on social
media, indicating the need for targeted security
awareness enhancement mechanisms focusing on this
topic.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Security and Privacy in Social Networks
and Solutions.",
}
@Article{Mazumdar:2020:CST,
author = "Suvodeep Mazumdar and Dhavalkumar Thakker",
title = "Citizen Science on {Twitter}: Using Data Analytics to
Understand Conversations and Networks",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "210",
day = "26",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120210",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/210",
abstract = "This paper presents a long-term study on how the
public engage with discussions around citizen science
and crowdsourcing topics. With progress in sensor
technologies and IoT, our cities and neighbourhoods are
increasingly sensed, measured and observed. While such
data are often used to inform citizen science projects,
it is still difficult to understand how citizens and
communities discuss citizen science activities and
engage with citizen science projects. Understanding
these engagements in greater depth will provide citizen
scientists, project owners, practitioners and the
generic public with insights around how social media
can be used to share citizen science related topics,
particularly to help increase visibility, influence
change and in general and raise awareness on topics. To
the knowledge of the authors, this is the first
large-scale study on understanding how such information
is discussed on Twitter, particularly outside the scope
of individual projects. The paper reports on the wide
variety of topics (e.g., politics, news, ecological
observations) being discussed on social media and a
wide variety of network types and the varied roles
played by users in sharing information in Twitter.
Based on these findings, the paper highlights
recommendations for stakeholders for engaging with
citizen science topics.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue AI and IoT technologies in Smart
Cities.",
}
@Article{Zhao:2020:UAI,
author = "Jie Zhao and Can Yan",
title = "User Acceptance of Information Feed Advertising: a
Hybrid Method Based on {SEM} and {QCA}",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "209",
day = "26",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120209",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/spss.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/209",
abstract = "It is of great significance for enterprises'
development to effectively use mobile Internet to carry
out information feed advertising. This paper aims to
study the influence factors and effect of the users'
acceptance intention of information feed advertising
through empirical analysis to provide references for
further optimizing information feed advertising
strategy. Traditional quantitative analysis methods,
such as the Structural Equation Model (SEM), can only
measure a single factor's influence from an individual
perspective. Therefore, we introduce the Qualitative
Comparative Analysis (QCA) and present a two-stage
hybrid method based on SEM and QCA. In the first stage,
we analyze the influence of a single variable on the
acceptance intention of information feed advertising by
SEM. Then, in the second stage, we analyze the impact
of different variable combinations by QCA. Based on the
actual questionnaire data, we define six independent
variables and use AMOS, SPSS, and fsQCA to carry out
SEM analysis and the fuzzy-set-based QCA analysis,
respectively. The SEM analysis results show that the
four factors (including consistency, informativeness,
sociability, and advertising reward) have a significant
positive impact on user acceptance of information feed
advertising. On the contrary, perceived advertising
clustering has a significant negative impact. In
addition, accuracy has no considerable effect. The QCA
analysis reveals that seven constructs of six variables
can all significantly enhance information feed ads'
acceptance intention.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Network Economics and Utility
Maximization.",
}
@Article{Bigini:2020:RBI,
author = "Gioele Bigini and Valerio Freschi and Emanuele
Lattanzi",
title = "A Review on Blockchain for the {Internet of Medical
Things}: Definitions, Challenges, Applications, and
Vision",
journal = j-FUTURE-INTERNET,
volume = "12",
number = "12",
pages = "208",
day = "25",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi12120208",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/12/12/208",
abstract = "Nowadays, there are a lot of new mobile devices that
have the potential to assist healthcare professionals
when working and help to increase the well-being of the
people. These devices comprise the Internet of Medical
Things, but it is generally difficult for healthcare
institutions to meet compliance of their systems with
new medical solutions efficiently. A technology that
promises the sharing of data in a trust-less scenario
is the Distributed Ledger Technology through its
properties of decentralization, immutability, and
transparency. The Blockchain and the Internet of
Medical Things can be considered as at an early stage,
and the implementations successfully applying the
technology are not so many. Some aspects covered by
these implementations are data sharing,
interoperability of systems, security of devices, the
opportunity of data monetization and data ownership
that will be the focus of this review. This work aims
at giving an overview of the current state-of-the-art
of the Blockchain-based systems for the Internet of
Medical Things, specifically addressing the challenges
of reaching user-centricity for these combined systems,
and thus highlighting the potential future directions
to follow for full ownership of data by users.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue The Future Internet of Medical Things.",
}
@Article{Bakaev:2021:WMU,
author = "Maxim Bakaev and Olga Razumnikova",
title = "What Makes a {UI} Simple? {Difficulty} and Complexity
in Tasks Engaging Visual--Spatial Working Memory",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "1",
pages = "21",
day = "19",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13010021",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/1/21",
abstract = "Tasks that imply engagement of visual-spatial working
memory (VSWM) are common in interaction with
two-dimensional graphical user interfaces. In our
paper, we consider two groups of factors as predictors
of user performance in such tasks: (1) the metrics
based on compression algorithms (RLE and Deflate) plus
the Hick's law, which are known to be characteristic of
visual complexity, and (2) metrics based on Gestalt
groping principle of proximity, operationalized as von
Neumann and Moore range 1 neighborhoods from the
cellular automata theory. We involved 88 subjects who
performed about 5000 VSWM-engaging tasks and 78
participants who assessed the complexity of the tasks'
configurations. We found that the Gestalt-based
predictors had a notable advantage over the visual
complexity-based ones, as the memorized chunks best
corresponded to von Neumann neighborhood groping. The
latter was further used in the formulation of index of
difficulty and throughput for VSWM-engaging tasks,
which we proposed by analogy with the infamous Fitts'
law. In our experimental study, throughput amounted to
3.75 bit/s, and we believe that it can be utilized for
comparing and assessing UI designs.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue VR, AR, and 3-D User Interfaces for
Measurement and Control.",
}
@Article{Alghamdi:2021:PIS,
author = "Abdulelah A. Alghamdi and Margaret Plunkett",
title = "The Perceived Impact of Social Networking Sites and
Apps on the Social Capital of {Saudi} Postgraduate
Students: a Case Study",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "1",
pages = "20",
day = "16",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13010020",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/1/20",
abstract = "With the increased use of Social Networking Sites and
Apps (SNSAs) in Saudi Arabia, it is important to
consider the impact of this on the social lives of
tertiary students, who are heavy users of such
technology. A mixed methods study exploring the effect
of SNSAs use on the social capital of Saudi
postgraduate students was conducted using a
multidimensional construct of social capital, which
included the components of life satisfaction, social
trust, civic participation, and political engagement.
Data were collected through surveys and interviews
involving 313 male and 293 female postgraduate students
from Umm Al-Qura University (UQU) in Makkah. Findings
show that male and female participants perceived SNSAs
use impacting all components of social capital at a
moderate and mainly positive level. Correlational
analysis demonstrated medium to large positive
correlations among components of social capital. Gender
differences were not evident in the life satisfaction
and social trust components; however, females reported
more involvement with SNSAs for the purposes of
political engagement while males reported more use for
civic participation, which is an interesting finding,
in light of the norms and traditional culture of Saudi
society.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Karajeh:2021:CDI,
author = "Ola Karajeh and Dirar Darweesh and Omar Darwish and
Noor Abu-El-Rub and Belal Alsinglawi and Nasser
Alsaedi",
title = "A Classifier to Detect Informational vs.
Non-Informational Heart Attack Tweets",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "1",
pages = "19",
day = "16",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13010019",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/1/19",
abstract = "Social media sites are considered one of the most
important sources of data in many fields, such as
health, education, and politics. While surveys provide
explicit answers to specific questions, posts in social
media have the same answers implicitly occurring in the
text. This research aims to develop a method for
extracting implicit answers from large tweet
collections, and to demonstrate this method for an
important concern: the problem of heart attacks. The
approach is to collect tweets containing ``heart
attack'' and then select from those the ones with
useful information. Informational tweets are those
which express real heart attack issues, e.g.,
``Yesterday morning, my grandfather had a heart attack
while he was walking around the garden.'' On the other
hand, there are non-informational tweets such as
``Dropped my iPhone for the first time and almost had a
heart attack.'' The starting point was to manually
classify around 7000 tweets as either informational
(11\%) or non-informational (89\%), thus yielding a
labeled dataset to use in devising a machine learning
classifier that can be applied to our large collection
of over 20 million tweets. Tweets were cleaned and
converted to a vector representation, suitable to be
fed into different machine-learning algorithms: Deep
neural networks, support vector machine (SVM), J48
decision tree and na{\"\i}ve Bayes. Our experimentation
aimed to find the best algorithm to use to build a
high-quality classifier. This involved splitting the
labeled dataset, with 2/3 used to train the classifier
and 1/3 used for evaluation besides cross-validation
methods. The deep neural network (DNN) classifier
obtained the highest accuracy (95.2\%). In addition, it
obtained the highest F1-scores with (73.6\%) and
(97.4\%) for informational and non-informational
classes, respectively.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Wireless Internet, Multimedia, and
Artificial Intelligence: New Applications and
Infrastructures.",
}
@Article{Peker:2021:ECE,
author = "Serhat Peker and Gonca Gokce Menekse Dalveren and
Yavuz Inal",
title = "The Effects of the Content Elements of Online Banner
Ads on Visual Attention: Evidence from An-Eye-Tracking
Study",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "1",
pages = "18",
day = "15",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13010018",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/1/18",
abstract = "The aim of this paper is to examine the influence of
the content elements of online banner ads on customers'
visual attention, and to evaluate the impacts of
gender, discount rate and brand familiarity on this
issue. An eye-tracking study with 34 participants (18
male and 16 female) was conducted, in which the
participants were presented with eight types of online
banner ads comprising three content elements---namely
brand, discount rate and image---while their eye
movements were recorded. The results showed that the
image was the most attractive area among the three main
content elements. Furthermore, the middle areas of the
banners were noticed first, and areas located on the
left side were mostly noticed earlier than those on the
right side. The results also indicated that the
discount areas of banners with higher discount rates
were more attractive and eye-catching compared to those
of banners with lower discount rates. In addition to
these, the participants who were familiar with the
brand mostly concentrated on the discount area, while
those who were unfamiliar with the brand mostly paid
attention to the image area. The findings from this
study will assist marketers in creating more effective
and efficient online banner ads that appeal to
customers, ultimately fostering positive attitudes
towards the advertisement.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Human-Computer Interaction Theory and
Applications.",
}
@Article{Sun:2021:MNP,
author = "Jiachen Sun and Peter Gloor",
title = "E-Mail Network Patterns and Body Language Predict
Risk-Taking Attitude",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "1",
pages = "17",
day = "14",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13010017",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/1/17",
abstract = "As the Enron scandal and Bernie Madoff's pyramid
scheme have shown, individuals' attitude towards
ethical risks can have a huge impact on society at
large. In this paper, we compare risk-taking attitudes
assessed with the Domain-Specific Risk-Taking (DOSPERT)
survey with individual e-mail networking patterns and
body language measured with smartwatches. We find that
e-mail communication signals such as network structure
and dynamics, and content features as well as
real-world behavioral signals measured through a
smartwatch such as heart rate, acceleration, and mood
state demonstrate a strong correlation with the
individuals' risk-preference in the different domains
of the DOSPERT survey. For instance, we found that
people with higher degree centrality in the e-mail
network show higher likelihood to take social risks,
while using language expressing a ``you live only
once'' attitude indicates lower willingness to take
risks in some domains. Our results show that analyzing
the human interaction in organizational networks
provides valuable information for decision makers and
managers to support an increase in ethical behavior of
the organization's members.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Information Processing and Management
for Large and Complex Networks.",
}
@Article{Li:2021:PSB,
author = "Wei Li and Peng Sun and Rui Han",
title = "Path Segmentation-Based Hybrid Caching in
Information-Centric Networks",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "1",
pages = "16",
day = "12",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13010016",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/1/16",
abstract = "Information-centric networks (ICNs) have received wide
interest from researchers, and in-network caching is an
important characteristic of ICN. The management and
placement of contents are essential due to cache nodes'
limited cache space and the huge Internet traffic. This
paper focuses on coordinating two cache metrics, namely
user access latency and network resource utilization,
and proposes a hybrid caching scheme called the path
segmentation-based hybrid caching scheme (PSBC). We
temporarily divide each data transmit path into a
user-edge area and non-edge area. The user-edge area
adopts a heuristic caching scheme to reduce user access
latency. In contrast, the non-edge area implements
caching network content migration and optimization to
improve network resource utilization. The simulation
results show that the proposed method positively
affects both the cache hit ratio and access latency.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Emerging Architectures and Technologies
for Evolving Mobile Internet and 6G.",
}
@Article{Ortiz-Marcos:2021:CAI,
author = "Jos{\'e} Manuel Ortiz-Marcos and Mar{\'\i}a
Tom{\'e}-Fern{\'a}ndez and Christian
Fern{\'a}ndez-Leyva",
title = "Cyberbullying Analysis in Intercultural Educational
Environments Using Binary Logistic Regressions",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "1",
pages = "15",
day = "09",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13010015",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/spss.bib",
URL = "https://www.mdpi.com/1999-5903/13/1/15",
abstract = "The goal of this study is to analyze how religion,
ethnic group, and race influence the likelihood of
becoming either a cybervictim or cyberbully in
intercultural educational environments. In the
research, 755 students in secondary education were
analyzed in the south of Spain through the
Cyberbullying Scale for students with Cultural and
Religious Diversity (CSCRD). The analyses were carried
out using the Statistical Package SPSS and the STATA
software. The results obtained from the Kruskal--Wallis
H test showed significant differences according to
these aspects, for both the cybervictim and cyberbully
parameters. The results stemming from binary logistic
regressions confirmed such differences and regarded
those students who belong to the Muslim religion, the
gypsy ethnic group and the Asian race as being more
likely to become cybervictims. Furthermore, these
analyses showed that Gypsy and Asian students were also
more likely to be cyberbullies than other groups. The
main conclusions state that minority groups are more
likely to suffer cyberbullying in intercultural
educational environments, and that students from these
groups are also more likely to become cyberbullies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Education Responses to Technological
Challenges and Their Impact on Classrooms.",
}
@Article{Zhang:2021:DRP,
author = "Xiaolin Zhang and Chao Che",
title = "Drug Repurposing for {Parkinson}'s Disease by
Integrating Knowledge Graph Completion Model and
Knowledge Fusion of Medical Literature",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "1",
pages = "14",
day = "08",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13010014",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/1/14",
abstract = "The prevalence of Parkinson's disease increases a
tremendous medical and economic burden to society.
Therefore, the effective drugs are urgently required.
However, the traditional development of effective drugs
is costly and risky. Drug repurposing, which identifies
new applications for existing drugs, is a feasible
strategy for discovering new drugs for Parkinson's
disease. Drug repurposing is based on sufficient
medical knowledge. The local medical knowledge base
with manually labeled data contains a large number of
accurate, but not novel, medical knowledge, while the
medical literature containing the latest knowledge is
difficult to utilize, because of unstructured data.
This paper proposes a framework, named D rug R
epurposing for Parkinson's disease by integrating
Knowledge Graph Completion method and Knowledge Fusion
of medical literature data (DRKF) in order to make full
use of a local medical knowledge base containing
accurate knowledge and medical literature with novel
knowledge. DRKF first extracts the relations that are
related to Parkinson's disease from medical literature
and builds a medical literature knowledge graph. After
that, the literature knowledge graph is fused with a
local medical knowledge base that integrates several
specific medical knowledge sources in order to
construct a fused medical knowledge graph.
Subsequently, knowledge graph completion methods are
leveraged to predict the drug candidates for
Parkinson's disease by using the fused knowledge graph.
Finally, we employ classic machine learning methods to
repurpose the drug for Parkinson's disease and compare
the results with the method only using the
literature-based knowledge graph in order to confirm
the effectiveness of knowledge fusion. The experiment
results demonstrate that our framework can achieve
competitive performance, which confirms the
effectiveness of our proposed DRKF for drug repurposing
against Parkinson's disease. It could be a supplement
to traditional drug discovery methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Curative Power of Medical Data 2020.",
}
@Article{Che:2021:KGB,
author = "Mingxuan Che and Kui Yao and Chao Che and Zhangwei Cao
and Fanchen Kong",
title = "Knowledge-Graph-Based Drug Repositioning against
{COVID-19} by Graph Convolutional Network with
Attention Mechanism",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "1",
pages = "13",
day = "07",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13010013",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/1/13",
abstract = "The current global crisis caused by COVID-19 almost
halted normal life in most parts of the world. Due to
the long development cycle for new drugs, drug
repositioning becomes an effective method of screening
drugs for COVID-19. To find suitable drugs for
COVID-19, we add COVID-19-related information into our
medical knowledge graph and utilize a
knowledge-graph-based drug repositioning method to
screen potential therapeutic drugs for COVID-19.
Specific steps are as follows. Firstly, the information
about COVID-19 is collected from the latest published
literature, and gene targets of COVID-19 are added to
the knowledge graph. Then, the information of COVID-19
of the knowledge graph is extracted and a drug--disease
interaction prediction model based on Graph
Convolutional Network with Attention (Att-GCN) is
established. Att-GCN is used to extract features from
the knowledge graph and the prediction matrix
reconstructed through matrix operation. We evaluate the
model by predicting drugs for both ordinary diseases
and COVID-19. The model can achieve area under curve
(AUC) of 0.954 and area under the precise recall area
curve (AUPR) of 0.851 for ordinary diseases. On the
drug repositioning experiment for COVID-19, five drugs
predicted by the models have proved effective in
clinical treatment. The experimental results confirm
that the model can predict drug--disease interaction
effectively for both normal diseases and COVID-19.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Curative Power of Medical Data 2020.",
}
@Article{Wang:2021:DIV,
author = "Juan Wang and Yang Yu and Yi Li and Chengyang Fan and
Shirong Hao",
title = "Design and Implementation of Virtual Security Function
Based on Multiple Enclaves",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "1",
pages = "12",
day = "06",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13010012",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/1/12",
abstract = "Network function virtualization (NFV) provides
flexible and scalable network function for the emerging
platform, such as the cloud computing, edge computing,
and IoT platforms, while it faces more security
challenges, such as tampering with network policies and
leaking sensitive processing states, due to running in
a shared open environment and lacking the protection of
proprietary hardware. Currently, Intel {\reg} Software
Guard Extensions (SGX) provides a promising way to
build a secure and trusted VNF (virtual network
function) by isolating VNF or sensitive data into an
enclave. However, directly placing multiple VNFs in a
single enclave will lose the scalability advantage of
NFV. This paper combines SGX and click technology to
design the virtual security function architecture based
on multiple enclaves. In our design, the sensitive
modules of a VNF are put into different enclaves and
communicate by local attestation. The system can freely
combine these modules according to user requirements,
and increase the scalability of the system while
protecting its running state security. In addition, we
design a new hot-swapping scheme to enable the system
to dynamically modify the configuration function at
runtime, so that the original VNFs do not need to stop
when the function of VNFs is modified. We implement an
IDS (intrusion detection system) based on our
architecture to verify the feasibility of our system
and evaluate its performance. The results show that the
overhead introduced by the system architecture is
within an acceptable range.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Feature Papers for Future
Internet-Internet of Things Section.",
}
@Article{Tomczyk:2021:EDP,
author = "Lukasz Tomczyk",
title = "Evaluation of Digital Piracy by Youths",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "1",
pages = "11",
day = "04",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13010011",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/1/11",
abstract = "This paper sets out to explain how adolescents
interpret piracy. Digital piracy is one of the most
important risk behaviours mediated by new media to be
found among adolescents. It is global, and changes
dynamically due to the continued development of the
information society. To explore the phenomena related
to piracy among adolescent Internet users we need to
apply qualitative research methods. The sample
contained 1320 Polish respondents. The research used
the technique of qualitative research. Data was
collected using a form containing an open question.
Adolescents will answer in the form how they interpret
digital piracy. The categories characterize how piracy
is perceived, and includes downloading various
files---whether video or music files or even software
(also games)---from unauthorized sources
(P2P---Peer-to-peer `warez' servers---websites which
serve as repositories of illegal files). The
qualitative data analysis allowed the identification of
the following constructs in the perception of digital
piracy by adolescents: ethical (giving value to the
phenomenon), economical (showing profits and losses),
legal (connected with punitive consequences and
criminal liability), praxeological (facilitating daily
life), technical (referring to the hardware necessary),
social (the scale of the phenomenon and interpersonal
relations), and personal benefits. The results fit into
the discussion on the standard and hidden factors
connected with piracy. The presented seven categories
of the perception of piracy help us better understand
the phenomenon of the infringement of intellectual
property law and will help to develop appropriate
preventive measures. Qualitative research makes it
possible to understand the phenomenon of piracy from a
deeper perspective, which can be translated into the
design of effective educational measures. Preventive
guidance on minimising risky behaviour is part of the
development of one of the key competences, namely
digital knowledge and skills. The research allowed us
to enrich the theoretical knowledge on risky behaviours
in cyberspace among adolescents (theoretical aim), to
understand how to interpret risky behaviours in
cyberspace (understanding of micro-worlds---cognitive
aim), and to gather new knowledge that will be useful
for prevention (practical aim).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Education Responses to Technological
Challenges and Their Impact on Classrooms.",
}
@Article{Javed:2021:PPA,
author = "Yousra Javed and Elham {Al Qahtani} and Mohamed
Shehab",
title = "Privacy Policy Analysis of Banks and Mobile Money
Services in the {Middle East}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "1",
pages = "10",
day = "03",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13010010",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/1/10",
abstract = "Privacy compliance of the Middle East's financial
sector has been relatively unexplored. This paper
evaluates the privacy compliance and readability of
privacy statements for top banks and mobile money
services in the Middle East. Our analysis shows that,
overall, Middle Eastern banks have better privacy
policy availability and language distribution, and are
more privacy compliant compared to mobile money
services. However, both the banks and mobile money
services need to improve (1) compliance with the
principles of children/adolescent's data protection,
accountability and enforcement, and data
minimization/retention, and (2) privacy statement texts
to be comprehensible for a reader with $ \approx 8 $
years of education or less.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Cybersecurity.",
}
@Article{Matosevic:2021:UML,
author = "Goran Matosevi{\'c} and Jasminka Dobsa and Dunja
Mladeni{\'c}",
title = "Using Machine Learning for {Web} Page Classification
in Search Engine Optimization",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "1",
pages = "9",
day = "02",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13010009",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/1/9",
abstract = "This paper presents a novel approach of using machine
learning algorithms based on experts' knowledge to
classify web pages into three predefined classes
according to the degree of content adjustment to the
search engine optimization (SEO) recommendations. In
this study, classifiers were built and trained to
classify an unknown sample (web page) into one of the
three predefined classes and to identify important
factors that affect the degree of page adjustment. The
data in the training set are manually labeled by domain
experts. The experimental results show that machine
learning can be used for predicting the degree of
adjustment of web pages to the SEO
recommendations---classifier accuracy ranges from
54.59\% to 69.67\%, which is higher than the baseline
accuracy of classification of samples in the majority
class (48.83\%). Practical significance of the proposed
approach is in providing the core for building software
agents and expert systems to automatically detect web
pages, or parts of web pages, that need improvement to
comply with the SEO guidelines and, therefore,
potentially gain higher rankings by search engines.
Also, the results of this study contribute to the field
of detecting optimal values of ranking factors that
search engines use to rank web pages. Experiments in
this paper suggest that important factors to be taken
into consideration when preparing a web page are page
title, meta description, H1 tag (heading), and body
text---which is aligned with the findings of previous
research. Another result of this research is a new data
set of manually labeled web pages that can be used in
further research.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Digital Marketing and App-based
Marketing.",
}
@Article{Venu:2021:EDC,
author = "Sagar Kora Venu and Sridhar Ravula",
title = "Evaluation of Deep Convolutional Generative
Adversarial Networks for Data Augmentation of Chest
{X}-ray Images",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "1",
pages = "8",
day = "31",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13010008",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/1/8",
abstract = "Medical image datasets are usually imbalanced due to
the high costs of obtaining the data and time-consuming
annotations. Training a deep neural network model on
such datasets to accurately classify the medical
condition does not yield the desired results as they
often over-fit the majority class samples' data. Data
augmentation is often performed on the training data to
address the issue by position augmentation techniques
such as scaling, cropping, flipping, padding, rotation,
translation, affine transformation, and color
augmentation techniques such as brightness, contrast,
saturation, and hue to increase the dataset sizes.
Radiologists generally use chest X-rays for the
diagnosis of pneumonia. Due to patient privacy
concerns, access to such data is often protected. In
this study, we performed data augmentation on the Chest
X-ray dataset to generate artificial chest X-ray images
of the under-represented class through generative
modeling techniques such as the Deep Convolutional
Generative Adversarial Network (DCGAN). With just 1341
chest X-ray images labeled as Normal, artificial
samples were created by retaining similar
characteristics to the original data with this
technique. Evaluating the model resulted in a
Fr{\'e}chet Distance of Inception (FID) score of 1.289.
We further show the superior performance of a CNN
classifier trained on the DCGAN augmented dataset.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computer Vision, Deep Learning and
Machine Learning with Applications.",
}
@Article{Jimenez:2021:CUE,
author = "Ivonne Angelica Castiblanco Jimenez and Laura Cristina
Cepeda Garc{\'\i}a and Maria Grazia Violante and
Federica Marcolin and Enrico Vezzetti",
title = "Commonly Used External {TAM} Variables in e-Learning,
Agriculture and Virtual Reality Applications",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "1",
pages = "7",
day = "31",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13010007",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/1/7",
abstract = "In recent years information and communication
technologies (ICT) have played a significant role in
all aspects of modern society and have impacted
socioeconomic development in sectors such as education,
administration, business, medical care and agriculture.
The benefits of such technologies in agriculture can be
appreciated only if farmers use them. In order to
predict and evaluate the adoption of these new
technological tools, the technology acceptance model
(TAM) can be a valid aid. This paper identifies the
most commonly used external variables in e-learning,
agriculture and virtual reality applications for
further validation in an e-learning tool designed for
EU farmers and agricultural entrepreneurs. Starting
from a literature review of the technology acceptance
model, the analysis based on Quality Function
Deployment (QFD) shows that computer self-efficacy,
individual innovativeness, computer anxiety, perceived
enjoyment, social norm, content and system quality,
experience and facilitating conditions are the most
common determinants addressing technology acceptance.
Furthermore, findings evidenced that the external
variables have a different impact on the two main
beliefs of the TAM Model, Perceived Usefulness (PU) and
Perceived Ease of Use (PEOU). This study is expected to
bring theoretical support for academics when
determining the variables to be included in TAM
extensions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue VR, AR, and 3-D User Interfaces for
Measurement and Control.",
}
@Article{Hu:2021:UBM,
author = "Rui Hu and Bruno Michel and Dario Russo and
Niccol{\`o} Mora and Guido Matrella and Paolo
Ciampolini and Francesca Cocchi and Enrico Montanari
and Stefano Nunziata and Thomas Brunschwiler",
title = "An Unsupervised Behavioral Modeling and Alerting
System Based on Passive Sensing for Elderly Care",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "1",
pages = "6",
day = "30",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13010006",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/1/6",
abstract = "Artificial Intelligence in combination with the
Internet of Medical Things enables remote healthcare
services through networks of environmental and/or
personal sensors. We present a remote healthcare
service system which collects real-life data through an
environmental sensor package, including binary motion,
contact, pressure, and proximity sensors, installed at
households of elderly people. Its aim is to keep the
caregivers informed of subjects' health-status
progressive trajectory, and alert them of
health-related anomalies to enable objective on-demand
healthcare service delivery at scale. The system was
deployed in 19 households inhabited by an elderly
person with post-stroke condition in the
Emilia--Romagna region in Italy, with maximal and
median observation durations of 98 and 55 weeks. Among
these households, 17 were multi-occupancy residences,
while the other 2 housed elderly patients living alone.
Subjects' daily behavioral diaries were extracted and
registered from raw sensor signals, using rule-based
data pre-processing and unsupervised algorithms.
Personal behavioral habits were identified and compared
to typical patterns reported in behavioral science, as
a quality-of-life indicator. We consider the activity
patterns extracted across all users as a dictionary,
and represent each patient's behavior as a `Bag of
Words', based on which patients can be categorized into
sub-groups for precision cohort treatment. Longitudinal
trends of the behavioral progressive trajectory and
sudden abnormalities of a patient were detected and
reported to care providers. Due to the sparse sensor
setting and the multi-occupancy living condition, the
sleep profile was used as the main indicator in our
system. Experimental results demonstrate the ability to
report on subjects' daily activity pattern in terms of
sleep, outing, visiting, and health-status
trajectories, as well as predicting/detecting 75\%
hospitalization sessions up to 11 days in advance. 65\%
of the alerts were confirmed to be semantically
meaningful by the users. Furthermore, reduced social
interaction (outing and visiting), and lower sleep
quality could be observed during the COVID-19 lockdown
period across the cohort.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue The Future Internet of Medical Things.",
}
@Article{Paakkonen:2021:AEE,
author = "Pekka P{\"a}{\"a}kk{\"o}nen and Daniel Pakkala and
Jussi Kiljander and Roope Sarala",
title = "Architecture for Enabling Edge Inference via Model
Transfer from Cloud Domain in a {Kubernetes}
Environment",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "1",
pages = "5",
day = "29",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13010005",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/1/5",
abstract = "The current approaches for energy consumption
optimisation in buildings are mainly reactive or focus
on scheduling of daily/weekly operation modes in
heating. Machine Learning (ML)-based advanced control
methods have been demonstrated to improve energy
efficiency when compared to these traditional methods.
However, placing of ML-based models close to the
buildings is not straightforward. Firstly, edge-devices
typically have lower capabilities in terms of
processing power, memory, and storage, which may limit
execution of ML-based inference at the edge. Secondly,
associated building information should be kept private.
Thirdly, network access may be limited for serving a
large number of edge devices. The contribution of this
paper is an architecture, which enables training of
ML-based models for energy consumption prediction in
private cloud domain, and transfer of the models to
edge nodes for prediction in Kubernetes environment.
Additionally, predictors at the edge nodes can be
automatically updated without interrupting operation.
Performance results with sensor-based devices
(Raspberry Pi 4 and Jetson Nano) indicated that a
satisfactory prediction latency ($ \approx 7$--$9$ s)
can be achieved within the research context. However,
model switching led to an increase in prediction
latency ($ \approx 9$--$ 13$ s). Partial evaluation of
a Reference Architecture for edge computing systems,
which was used as a starting point for architecture
design, may be considered as an additional contribution
of the paper.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Network Virtualization and Edge/Fog
Computing.",
}
@Article{Zannou:2021:SNS,
author = "Abderrahim Zannou and Abdelhak Boulaalam and El Habib
Nfaoui",
title = "{SIoT}: a New Strategy to Improve the Network Lifetime
with an Efficient Search Process",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "1",
pages = "4",
day = "29",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13010004",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/1/4",
abstract = "The Social Internet of Things (SIoT) means that every
node can use a set of nodes that are considered as
friends to search for a specific service. However, this
is a slow process because each node is required to
manage a high number of friends. Thus, the SIoT issue
consists of how to select the right friends that
improve the network navigability. The enhancement of
the network navigability boosts the search for a
service to be rapid but not guaranteed. Furthermore,
sending requests from the shortest paths involves the
rapid search, but the network lifetime can be reduced
due to the number of requests that can be transmitted
and processed by the nodes that have low power energy.
This paper proposes a new approach that improves the
network navigability, speeds up the search process, and
increases the network lifetime. This approach aims at
creating groups dynamically by nodes where each group
has a master node, second, using a consensus algorithm
between master nodes to agree with a specific
capability, finally adopting a friendship selection
method to create a social network. Thus, the friends
will be sorted periodically for the objective of
creating simultaneously a balance between the energy
consumption and the rapid search process. Simulation
results on the Brightkite location-based online social
network dataset demonstrate that our proposal
outperforms baseline methods in terms of some
parameters of network navigability, path length to
reach the providers, and network lifetime.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Internet of Things.",
}
@Article{Romanov:2021:AIR,
author = "Aleksandr Romanov and Anna Kurtukova and Alexander
Shelupanov and Anastasia Fedotova and Valery
Goncharov",
title = "Authorship Identification of a {Russian}-Language Text
Using Support Vector Machine and Deep Neural Networks",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "1",
pages = "3",
day = "25",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13010003",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/1/3",
abstract = "The article explores approaches to determining the
author of a natural language text and the advantages
and disadvantages of these approaches. The importance
of the considered problem is due to the active
digitalization of society and reassignment of most
parts of the life activities online. Text authorship
methods are particularly useful for information
security and forensics. For example, such methods can
be used to identify authors of suicide notes, and other
texts are subjected to forensic examinations. Another
area of application is plagiarism detection. Plagiarism
detection is a relevant issue both for the field of
intellectual property protection in the digital space
and for the educational process. The article describes
identifying the author of the Russian-language text
using support vector machine (SVM) and deep neural
network architectures (long short-term memory (LSTM),
convolutional neural networks (CNN) with attention,
Transformer). The results show that all the considered
algorithms are suitable for solving the authorship
identification problem, but SVM shows the best
accuracy. The average accuracy of SVM reaches 96\%.
This is due to thoroughly chosen parameters and feature
space, which includes statistical and semantic features
(including those extracted as a result of an aspect
analysis). Deep neural networks are inferior to SVM in
accuracy and reach only 93\%. The study also includes
an evaluation of the impact of attacks on the method on
models' accuracy. Experiments show that the SVM-based
methods are unstable to deliberate text anonymization.
In comparison, the loss in accuracy of deep neural
networks does not exceed 20\%. Transformer architecture
is the most effective for anonymized texts and allows
81\% accuracy to be achieved.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Data Science and Knowledge Discovery.",
}
@Article{Santamaria-Granados:2021:TRS,
author = "Luz Santamaria-Granados and Juan Francisco
Mendoza-Moreno and Gustavo Ramirez-Gonzalez",
title = "Tourist Recommender Systems Based on Emotion
Recognition --- a Scientometric Review",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "1",
pages = "2",
day = "24",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13010002",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/1/2",
abstract = "Recommendation systems have overcome the overload of
irrelevant information by considering users'
preferences and emotional states in the fields of
tourism, health, e-commerce, and entertainment. This
article reviews the principal recommendation approach
documents found in scientific databases (Elsevier's
Scopus and Clarivate Web of Science) through a
scientometric analysis in ScientoPy. Research
publications related to the recommenders of
emotion-based tourism cover the last two decades. The
review highlights the collection, processing, and
feature extraction of data from sensors and wearables
to detect emotions. The study proposes the thematic
categories of recommendation systems, emotion
recognition, wearable technology, and machine learning.
This paper also presents the evolution, trend analysis,
theoretical background, and algorithmic approaches used
to implement recommenders. Finally, the discussion
section provides guidelines for designing
emotion-sensitive tourist recommenders.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Recent Advances of Machine Learning
Techniques on Smartphones.",
}
@Article{Wang:2021:DAA,
author = "Jing Wang and ZhongCheng Wu and Fang Li and Jun
Zhang",
title = "A Data Augmentation Approach to Distracted Driving
Detection",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "1",
pages = "1",
day = "22",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jan 22 11:26:00 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/1/1",
abstract = "Distracted driving behavior has become a leading cause
of vehicle crashes. This paper proposes a data
augmentation method for distracted driving detection
based on the driving operation area. First, the class
activation mapping method is used to show the key
feature areas of driving behavior analysis, and then
the driving operation areas are detected by the faster
R-CNN detection model for data augmentation. Finally,
the convolutional neural network classification mode is
implemented and evaluated to detect the original
dataset and the driving operation area dataset. The
classification result achieves a 96.97\% accuracy using
the distracted driving dataset. The results show the
necessity of driving operation area extraction in the
preprocessing stage, which can effectively remove the
redundant information in the images to get a higher
classification accuracy rate. The method of this
research can be used to detect drivers in actual
application scenarios to identify dangerous driving
behaviors, which helps to give early warning of unsafe
driving behaviors and avoid accidents.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Data Science and Knowledge Discovery.",
}
@Article{Lei:2021:VCB,
author = "Zhou Lei and Yiyong Huang",
title = "Video Captioning Based on Channel Soft Attention and
Semantic Reconstructor",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "55",
day = "23",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020055",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/55",
abstract = "Video captioning is a popular task which automatically
generates a natural-language sentence to describe video
content. Previous video captioning works mainly use the
encoder-decoder framework and exploit special
techniques such as attention mechanisms to improve the
quality of generated sentences. In addition, most
attention mechanisms focus on global features and
spatial features. However, global features are usually
fully connected features. Recurrent convolution
networks (RCNs) receive 3-dimensional features as input
at each time step, but the temporal structure of each
channel at each time step has been ignored, which
provide temporal relation information of each channel.
In this paper, a video captioning model based on
channel soft attention and semantic reconstructor is
proposed, which considers the global information for
each channel. In a video feature map sequence, the same
channel of every time step is generated by the same
convolutional kernel. We selectively collect the
features generated by each convolutional kernel and
then input the weighted sum of each channel to RCN at
each time step to encode video representation.
Furthermore, a semantic reconstructor is proposed to
rebuild semantic vectors to ensure the integrity of
semantic information in the training process, which
takes advantage of both forward (semantic to sentence)
and backward (sentence to semantic) flows. Experimental
results on popular datasets MSVD and MSR-VTT
demonstrate the effectiveness and feasibility of our
model.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{Liu:2021:LBO,
author = "Yazhi Liu and Jiye Zhang and Wei Li and Qianqian Wu
and Pengmiao Li",
title = "Load Balancing Oriented Predictive Routing Algorithm
for Data Center Networks",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "54",
day = "22",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020054",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/54",
abstract = "A data center undertakes increasing background
services of various applications, and the data flows
transmitted between the nodes in data center networks
(DCNs) are consequently increased. At the same time,
the traffic of each link in a DCN changes dynamically
over time. Flow scheduling algorithms can improve the
distribution of data flows among the network links so
as to improve the balance of link loads in a DCN.
However, most current load balancing works achieve flow
scheduling decisions to the current links on the basis
of past link flow conditions. This situation impedes
the existing link scheduling methods from implementing
optimal decisions for scheduling data flows among the
network links in a DCN. This paper proposes a
predictive link load balance routing algorithm for a
DCN based on residual networks (ResNet), i.e., the link
load balance route (LLBR) algorithm. The LLBR algorithm
predicts the occupancy of the network links in the next
duty cycle, according to the ResNet architecture, and
then the optimal traffic route is selected according to
the predictive network environment. The LLBR algorithm,
round-robin scheduling (RRS), and weighted round-robin
scheduling (WRRS) are used in the same experimental
environment. Experimental results show that compared
with the WRRS and RRS, the LLBR algorithm can reduce
the transmission time by approximately 50\%, reduce the
packet loss rate from 0.05\% to 0.02\%, and improve the
bandwidth utilization by 30\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Big Data and Augmented Intelligence.",
}
@Article{Goudosis:2021:AOR,
author = "Athanasios Goudosis and Sokratis Katsikas",
title = "{ARIBC}: Online Reporting Based on Identity-Based
Cryptography",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "53",
day = "21",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020053",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/53",
abstract = "The reporting of incidents of misconduct, violence,
sexual assault, harassment, and other types of crime
that constitute a major concern in modern society is of
significant value when investigating such incidents.
Unfortunately, people involved in such incidents,
either as witnesses or victims, are often reluctant to
report them when such reporting demands revealing the
reporter's true identity. In this paper, we propose an
online reporting system that leverages Identity-Based
Cryptography (IBC) and offers data authentication, data
integrity, and data confidentiality services to both
eponymous and anonymous users. The system, called
ARIBC, is founded on a certificate-less, public-key,
IBC infrastructure, implemented by employing the
Sakai-Kasahara approach and by following the IEEE
1363.3-2013 standard. We develop a proof-of-concept
implementation of the proposed scheme, and demonstrate
its applicability in environments with constrained
human, organizational and/or computational resources.
The computational overheads imposed by the scheme are
found to be well within the capabilities of modern
fixed or mobile devices.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Feature Papers for Future
Internet---Cybersecurity Section.",
}
@Article{Rodriguez-Abitia:2021:ADT,
author = "Guillermo Rodr{\'\i}guez-Abitia and Graciela
Bribiesca-Correa",
title = "Assessing Digital Transformation in Universities",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "52",
day = "20",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020052",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/52",
abstract = "Industry 4.0 and Society 5.0 are reshaping the way
organizations function and interact with the
communities they serve. The massive penetration of
computer and network applications forces organizations
to digitalize their processes and provide innovative
products, services, and business models. The education
market is suffering changes as well, but universities
seem slow to react. This paper proposes the application
of an integrated digital transformation model to assess
the maturity level that educational institutions have
in their digital transformation processes and compares
them to other industries. Particular considerations to
address when using the model for higher-education
institutions are discussed. Our results show that
universities fall behind other sectors, probably due to
a lack of effective leadership and changes in culture.
This is complemented negatively by an insufficient
degree of innovation and financial support.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Education 4.0 in the Transformation of
Universities: Educational and Research Applications.",
}
@Article{Sun:2021:IVG,
author = "Lili Sun and Xueyan Liu and Min Zhao and Bo Yang",
title = "Interpretable Variational Graph Autoencoder with
Noninformative Prior",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "51",
day = "18",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020051",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/51",
abstract = "Variational graph autoencoder, which can encode
structural information and attribute information in the
graph into low-dimensional representations, has become
a powerful method for studying graph-structured data.
However, most existing methods based on variational
(graph) autoencoder assume that the prior of latent
variables obeys the standard normal distribution which
encourages all nodes to gather around 0. That leads to
the inability to fully utilize the latent space.
Therefore, it becomes a challenge on how to choose a
suitable prior without incorporating additional expert
knowledge. Given this, we propose a novel
noninformative prior-based interpretable variational
graph autoencoder (NPIVGAE). Specifically, we exploit
the noninformative prior as the prior distribution of
latent variables. This prior enables the posterior
distribution parameters to be almost learned from the
sample data. Furthermore, we regard each dimension of a
latent variable as the probability that the node
belongs to each block, thereby improving the
interpretability of the model. The correlation within
and between blocks is described by a block-block
correlation matrix. We compare our model with
state-of-the-art methods on three real datasets,
verifying its effectiveness and superiority.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Big Data and Augmented Intelligence.",
}
@Article{Jahromi:2021:STC,
author = "Hamed Z. Jahromi and Declan Delaney and Andrew Hines",
title = "A Sign of Things to Come: Predicting the Perception of
Above-the-Fold Time in {Web} Browsing",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "50",
day = "17",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020050",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/50",
abstract = "Content is a key influencing factor in Web Quality of
Experience (QoE) estimation. A web user's satisfaction
can be influenced by how long it takes to render and
visualize the visible parts of the web page in the
browser. This is referred to as the Above-the-fold
(ATF) time. SpeedIndex (SI) has been widely used to
estimate perceived web page loading speed of ATF
content and a proxy metric for Web QoE estimation. Web
application developers have been actively introducing
innovative interactive features, such as animated and
multimedia content, aiming to capture the users'
attention and improve the functionality and utility of
the web applications. However, the literature shows
that, for the websites with animated content, the
estimated ATF time using the state-of-the-art metrics
may not accurately match completed ATF time as
perceived by users. This study introduces a new metric,
Plausibly Complete Time (PCT), that estimates ATF time
for a user's perception of websites with and without
animations. PCT can be integrated with SI and web QoE
models. The accuracy of the proposed metric is
evaluated based on two publicly available datasets. The
proposed metric holds a high positive Spearman's
correlation ( rs=0.89 ) with the Perceived ATF reported
by the users for websites with and without animated
content. This study demonstrates that using PCT as a
KPI in QoE estimation models can improve the robustness
of QoE estimation in comparison to using the
state-of-the-art ATF time metric. Furthermore,
experimental result showed that the estimation of SI
using PCT improves the robustness of SI for websites
with animated content. The PCT estimation allows web
application designers to identify where poor design has
significantly increased ATF time and refactor their
implementation before it impacts end-user experience.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Quality of Experience (QoE) Management
in Softwarized Network Environments.",
}
@Article{Cui:2021:STP,
author = "Guowei Cui and Wei Shuai and Xiaoping Chen",
title = "Semantic Task Planning for Service Robots in Open
Worlds",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "49",
day = "17",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020049",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/49",
abstract = "This paper presents a planning system based on
semantic reasoning for a general-purpose service robot,
which is aimed at behaving more intelligently in
domains that contain incomplete information,
under-specified goals, and dynamic changes. First, Two
kinds of data are generated by Natural Language
Processing module from the speech: (i) action frames
and their relationships; (ii) the modifier used to
indicate some property or characteristic of a variable
in the action frame. Next, the task's goals are
generated from these action frames and modifiers. These
goals are represented as AI symbols, combining world
state and domain knowledge, which are used to generate
plans by an Answer Set Programming solver. Finally, the
plan's actions are executed one by one, and continuous
sensing grounds useful information, which makes the
robot use contingent knowledge to adapt to dynamic
changes and faults. For each action in the plan, the
planner gets its preconditions and effects from domain
knowledge, so during the execution of the task, the
environmental changes, especially those conflict with
the actions, not only the action being performed but
also the subsequent actions, can be detected and
handled as early as possible. A series of case studies
are used to evaluate the system and verify its ability
to acquire knowledge through dialogue with users, solve
problems with the acquired causal knowledge, and plan
for complex tasks autonomously in the open world.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Service-Oriented Systems and
Applications.",
}
@Article{Du:2021:BEE,
author = "Yao Du and Zehua Wang and Victor C. M. Leung",
title = "Blockchain-Enabled Edge Intelligence for {IoT}:
Background, Emerging Trends and Open Issues",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "48",
day = "17",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020048",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/48",
abstract = "Blockchain, a distributed ledger technology (DLT),
refers to a list of records with consecutive time
stamps. This decentralization technology has become a
powerful model to establish trust among trustless
entities, in a verifiable manner. Motivated by the
recent advancement of multi-access edge computing (MEC)
and artificial intelligence (AI), blockchain-enabled
edge intelligence has become an emerging technology for
the Internet of Things (IoT). We review how
blockchain-enabled edge intelligence works in the IoT
domain, identify the emerging trends, and suggest open
issues for further research. To be specific: (1) we
first offer some basic knowledge of DLT, MEC, and AI;
(2) a comprehensive review of current peer-reviewed
literature is given to identify emerging trends in this
research area; and (3) we discuss some open issues and
research gaps for future investigations. We expect that
blockchain-enabled edge intelligence will become an
important enabler of future IoT, providing trust and
intelligence to satisfy the sophisticated needs of
industries and society.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Feature Papers for Future
Internet-Internet of Things Section.",
}
@Article{Yang:2021:AAB,
author = "Zhi-Peng Yang and Lu Hua and Ning-Jie Gao and Ru Huo
and Jiang Liu and Tao Huang",
title = "An Accelerating Approach for Blockchain Information
Transmission Based on {NDN}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "47",
day = "14",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020047",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/47",
abstract = "Blockchain is becoming more and more popular in
various fields. Since the information transmission mode
of the blockchain is data broadcasting, the traditional
TCP/IP network cannot support the blockchain system
well, but the Named-Data Networking (NDN) could be a
good choice because of its multi-path forwarding and
intra-network caching functions. In this article, we
propose a new blockchain information transmission
acceleration strategy (AITS) combining with graph
theory and probability theory based on the NDN
architecture. We select some more important nodes in
the network as ``secondary nodes'', and give them more
bandwidth and cache space to assist the NDN network in
data transmission. In order to select the correct node
as the secondary node, we present a method to calculate
the number of secondary nodes, and give the function to
calculate the importance of each node. The simulation
results show that in complex networks, the proposed
method has superior performance in accelerating
information transmission and reducing data overhead.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue The Next Blockchain Wave Current
Challenges and Future Prospects.",
}
@Article{Phengsuwan:2021:USM,
author = "Jedsada Phengsuwan and Tejal Shah and Nipun Balan
Thekkummal and Zhenyu Wen and Rui Sun and Divya
Pullarkatt and Hemalatha Thirugnanam and Maneesha
Vinodini Ramesh and Graham Morgan and Philip James and
Rajiv Ranjan",
title = "Use of Social Media Data in Disaster Management: a
Survey",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "46",
day = "12",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020046",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/46",
abstract = "Social media has played a significant role in disaster
management, as it enables the general public to
contribute to the monitoring of disasters by reporting
incidents related to disaster events. However, the vast
volume and wide variety of generated social media data
create an obstacle in disaster management by limiting
the availability of actionable information from social
media. Several approaches have therefore been proposed
in the literature to cope with the challenges of social
media data for disaster management. To the best of our
knowledge, there is no published literature on social
media data management and analysis that identifies the
research problems and provides a research taxonomy for
the classification of the common research issues. In
this paper, we provide a survey of how social media
data contribute to disaster management and the
methodologies for social media data management and
analysis in disaster management. This survey includes
the methodologies for social media data classification
and event detection as well as spatial and temporal
information extraction. Furthermore, a taxonomy of the
research dimensions of social media data management and
analysis for disaster management is also proposed,
which is then applied to a survey of existing
literature and to discuss the core advantages and
disadvantages of the various methodologies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue AI and IoT technologies in Smart
Cities.",
}
@Article{daCosta:2021:DCM,
author = "Nuno Marques da Costa and Nelson Mileu and Andr{\'e}
Alves",
title = "Dashboard {COMPRIME\_COMPRI\_MOv}: Multiscalar
Spatio-Temporal Monitoring of the {COVID-19} Pandemic
in {Portugal}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "45",
day = "12",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020045",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/45",
abstract = "Due to its novelty, the recent pandemic of the
coronavirus disease (COVID-19), which is associated
with the spread of the new severe acute respiratory
syndrome coronavirus (SARS-CoV-2), triggered the
public's interest in accessing information,
demonstrating the importance of obtaining and analyzing
credible and updated information from an
epidemiological surveillance context. For this purpose,
health authorities, international organizations, and
university institutions have published online various
graphic and cartographic representations of the
evolution of the pandemic with daily updates that allow
the almost real-time monitoring of the evolutionary
behavior of the spread, lethality, and territorial
distribution of the disease. The purpose of this
article is to describe the technical solution and the
main results associated with the publication of the
COMPRIME\_COMPRI\_MOv dashboard for the dissemination
of information and multi-scale knowledge of COVID-19.
Under two rapidly implementing research projects for
innovative solutions to respond to the COVID-19
pandemic, promoted in Portugal by the FCT (Foundation
for Science and Technology), a website was created.
That website brings together a diverse set of variables
and indicators in a dynamic and interactive way that
reflects the evolutionary behavior of the pandemic from
a multi-scale perspective, in Portugal, constituting
itself as a system for monitoring the evolution of the
pandemic. In the current situation, this type of
exploratory solutions proves to be crucial to guarantee
everyone's access to information while simultaneously
emerging as an epidemiological surveillance tool that
is capable of assisting decision-making by public
authorities with competence in defining control
policies and fight the spread of the new coronavirus.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Data Science and Knowledge Discovery.",
}
@Article{Pokrovskaia:2021:DRI,
author = "Nadezhda N. Pokrovskaia and Olga N. Korableva and
Lucio Cappelli and Denis A. Fedorov",
title = "Digital Regulation of Intellectual Capital for Open
Innovation: Industries' Expert Assessments of Tacit
Knowledge for Controlling and Networking Outcome",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "44",
day = "10",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020044",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/44",
abstract = "Digital regulation implies the quantified measuring
and the network infrastructure allowing managers to
control the processes of value creation. Digital
regulation needs to take into account tacit elements of
the value creation process, including unconscious
competency, creativity, and intuitive anticipation, to
assure the resulting network's innovation growth.
Digital society in developing countries is built on the
ground of fact change of the economy and social
relations, of transition towards an emerging market
within the global offline network of interactions and
online activities through Internet; the innovative
growth imposes the evolution of managerial behavior and
attitudes. The main objective of the paper is to obtain
indications on the perception of intellectual capital
by corporate managers. The exploratory study was
carried out in Russian companies operating in different
sectors, with the use of the open-ended approach,
including focused interviews and group discussion among
experts, middle and senior managers from marketing or
corporate governance background. The data were
complemented by documentary analysis of descriptions of
internal processes of the implementation of digital
tools of accounting, which includes the human resources
control applied for the remote work during the
pandemic. Networking helps to coordinate functions
between team members at remote work and between teams
and administrators. The interviews demonstrated the
administrative tendency to under-estimate the
non-formalized factors of innovation activity, such as
awareness of corporate strategy, creativity,
motivation, and affective and behavioral components of
communication of the persons involved in the enrichment
of intellectual capital. The results show fuzzy
boundaries between the intellectual capital components
that are difficult to control. This difficulty provokes
the preference for the use of ``traditional''
quantitative indicators that had been implemented at
the stage of the financial digitalization, instead of
developing new parameters or measuring approaches. The
networking emerges synergetic effect if the
administrators refuse their monopoly on the uncertainty
zones and are oriented to construct the trustful
atmosphere of personal responsibility within the
network.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Digital Society Challenges in Developing
Countries.",
}
@Article{Pokrovskaia:2021:DCT,
author = "Nadezhda N. Pokrovskaia and Veronika L. Leontyeva and
Marianna Yu. Ababkova and Lucio Cappelli and Fabrizio
D'Ascenzo",
title = "Digital Communication Tools and Knowledge Creation
Processes for Enriched Intellectual Outcome-Experience
of Short-Term E-Learning Courses during Pandemic",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "43",
day = "05",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020043",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/43",
abstract = "Social isolation during the pandemic contributed to
the transition of educational processes to e-learning.
A short-term e-marketing education program for a
variety of students was introduced in May 2020 and is
taught entirely online. A survey was conducted
regularly in the last week of training using Google
Forms, and three cohorts were surveyed in July,
September, and December 2020. A high level of
satisfaction indicates an interest in the content and a
positive assessment of the level of comfort of an
organization adapted to the needs of students; this
positive result contrasted with the negative opinion of
the remote learning in Russia since March 2020, and
this surprising satisfaction of students has motivated
the study to try to explain its reasons. This result
was compared with the short-term course taught through
the educational pedagogical platform of a university.
The students of traditional short- and long-term
university programs were asked to assess their
satisfaction with different digital communication tools
used for e-learning. They showed low satisfaction with
the pedagogical platform and a positive reaction to the
e-communication tools (messengers, social media, short
surveys, video conferences, etc.). The qualitative
responses helped to better understand the real problems
of the cognitive process and the triple structure of
intellectual production during e-learning, including
interest in the intellectual outcome, the need for
emotional and motivational elements of cooperation and
competition between students, and smooth behavioral
enrichment, which requires special efforts from
students and their leading from teachers. The main
conclusion concerns a practical decision to continue
the implementation of the educational program in the
form of an online course with the use of the mixed
digital communication tools of social media,
messengers, and video conferences, which most likely
meets the expectations and capabilities of students.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue E-Learning and Technology Enhanced
Learning.",
}
@Article{Duan:2021:IAM,
author = "Qiang Duan",
title = "Intelligent and Autonomous Management in Cloud-Native
Future Networks --- a Survey on Related Standards from
an Architectural Perspective",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "42",
day = "05",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020042",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/42",
abstract = "Cloud-native network design, which leverages network
virtualization and softwarization together with the
service-oriented architectural principle, is
transforming communication networks to a versatile
platform for converged network-cloud/edge service
provisioning. Intelligent and autonomous management is
one of the most challenging issues in cloud-native
future networks, and a wide range of machine learning
(ML)-based technologies have been proposed for
addressing different aspects of the management
challenge. It becomes critical that the various
management technologies are applied on the foundation
of a consistent architectural framework with a holistic
vision. This calls for standardization of new
management architecture that supports seamless the
integration of diverse ML-based technologies in
cloud-native future networks. The goal of this paper is
to provide a big picture of the recent developments of
architectural frameworks for intelligent and autonomous
management for future networks. The paper surveys the
latest progress in the standardization of network
management architectures including works by 3GPP, ETSI,
and ITU-Tand analyzes how cloud-native network design
may facilitate the architecture development for
addressing management challenges. Open issues related
to intelligent and autonomous management in
cloud-native future networks are also discussed in this
paper to identify some possible directions for future
research and development.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Cloud-Native Applications and
Services.",
}
@Article{Delgado:2021:RPS,
author = "Gabriela Torres Delgado and Neil Hern{\'a}ndez-Gress",
title = "Research Professors' Self-Assessment of Competencies",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "41",
day = "04",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020041",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/41",
abstract = "Research professors develop scientific products that
impact and benefit society, but their competencies in
doing so are rarely evaluated. Therefore, by employing
a mixed two-stage sequential design, this study
developed a self-assessment model of research
professors' competencies with four domains, seven
competencies, and 30 competency elements. Next, we
conducted descriptive statistical analysis of those
elements. In the first year, 320 respondents rated
themselves on four levels: initial, basic, autonomous,
and consolidated. In the assessment model's second
year, we compared 30 respondents' results with those of
their initial self-assessment. The main developmental
challenge was Originality and Innovation, which
remained at the initial level. Both Training of
Researchers and Transformation of Society were at the
basic level, and Digital Competency was at the
autonomous level. Both Teaching Competence and Ethics
and Citizenship attained the consolidated level. This
information helps establish priorities for accelerating
researchers' training and the quality of their
research.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Education 4.0 in the Transformation of
Universities: Educational and Research Applications.",
}
@Article{Sun:2021:AGA,
author = "Tianfang Sun and Pin Yang and Mengming Li and Shan
Liao",
title = "An Automatic Generation Approach of the Cyber Threat
Intelligence Records Based on Multi-Source Information
Fusion",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "40",
day = "02",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020040",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/40",
abstract = "With the progressive deterioration of cyber threats,
collecting cyber threat intelligence (CTI) from
open-source threat intelligence publishing platforms
(OSTIPs) can help information security personnel grasp
public opinions with specific pertinence, handle
emergency events, and even confront the advanced
persistent threats. However, due to the explosive
growth of information shared on multi-type OSTIPs,
manually collecting the CTI has had low efficiency.
Articles published on the OSTIPs are unstructured,
leading to an imperative challenge to automatically
gather CTI records only through natural language
processing (NLP) methods. To remedy these limitations,
this paper proposes an automatic approach to generate
the CTI records based on multi-type OSTIPs (GCO),
combing the NLP method, machine learning method, and
cybersecurity threat intelligence knowledge. The
experiment results demonstrate that the proposed GCO
outperformed some state-of-the-art approaches on
article classification and cybersecurity intelligence
details (CSIs) extraction, with accuracy, precision,
and recall all over 93\%; finally, the generated
records in the Neo4j-based CTI database can help reveal
malicious threat groups.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Feature Papers for Future
Internet---Cybersecurity Section.",
}
@Article{Ulven:2021:SRC,
author = "Joachim Bj{\o}rge Ulven and Gaute Wangen",
title = "A Systematic Review of Cybersecurity Risks in Higher
Education",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "39",
day = "02",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020039",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/39",
abstract = "The demands for information security in higher
education will continue to increase. Serious data
breaches have occurred already and are likely to happen
again without proper risk management. This paper
applies the Comprehensive Literature Review (CLR) Model
to synthesize research within cybersecurity risk by
reviewing existing literature of known assets, threat
events, threat actors, and vulnerabilities in higher
education. The review included published studies from
the last twelve years and aims to expand our
understanding of cybersecurity's critical risk areas.
The primary finding was that empirical research on
cybersecurity risks in higher education is scarce, and
there are large gaps in the literature. Despite this
issue, our analysis found a high level of agreement
regarding cybersecurity issues among the reviewed
sources. This paper synthesizes an overview of
mission-critical assets, everyday threat events,
proposes a generic threat model, and summarizes common
cybersecurity vulnerabilities. This report concludes
nine strategic cyber risks with descriptions of
frequencies from the compiled dataset and consequence
descriptions. The results will serve as input for
security practitioners in higher education, and the
research contains multiple paths for future work. It
will serve as a starting point for security researchers
in the sector.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Feature Papers for Future
Internet---Cybersecurity Section.",
}
@Article{Xu:2021:AWM,
author = "Yao Xu and Qin Yu",
title = "Adaptive Weighted Multi-Level Fusion of Multi-Scale
Features: a New Approach to Pedestrian Detection",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "38",
day = "02",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020038",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/38",
abstract = "Great achievements have been made in pedestrian
detection through deep learning. For detectors based on
deep learning, making better use of features has become
the key to their detection effect. While current
pedestrian detectors have made efforts in feature
utilization to improve their detection performance, the
feature utilization is still inadequate. To solve the
problem of inadequate feature utilization, we proposed
the Multi-Level Feature Fusion Module (MFFM) and its
Multi-Scale Feature Fusion Unit (MFFU) sub-module,
which connect feature maps of the same scale and
different scales by using horizontal and vertical
connections and shortcut structures. All of these
connections are accompanied by weights that can be
learned; thus, they can be used as adaptive multi-level
and multi-scale feature fusion modules to fuse the best
features. Then, we built a complete pedestrian
detector, the Adaptive Feature Fusion Detector
(AFFDet), which is an anchor-free one-stage pedestrian
detector that can make full use of features for
detection. As a result, compared with other methods,
our method has better performance on the challenging
Caltech Pedestrian Detection Benchmark (Caltech) and
has quite competitive speed. It is the current
state-of-the-art one-stage pedestrian detection
method.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computer Vision, Deep Learning and
Machine Learning with Applications.",
}
@Article{Yang:2021:CFB,
author = "FengLei Yang and Fei Liu and ShanShan Liu",
title = "Collaborative Filtering Based on a Variational
{Gaussian} Mixture Model",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "37",
day = "01",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020037",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/37",
abstract = "Collaborative filtering (CF) is a widely used method
in recommendation systems. Linear models are still the
mainstream of collaborative filtering research methods,
but non-linear probabilistic models are beyond the
limit of linear model capacity. For example,
variational autoencoders (VAEs) have been extensively
used in CF, and have achieved excellent results. Aiming
at the problem of the prior distribution for the latent
codes of VAEs in traditional CF is too simple, which
makes the implicit variable representations of users
and items too poor. This paper proposes a variational
autoencoder that uses a Gaussian mixture model for
latent factors distribution for CF, GVAE-CF. On this
basis, an optimization function suitable for GVAE-CF is
proposed. In our experimental evaluation, we show that
the recommendation performance of GVAE-CF outperforms
the previously proposed VAE-based models on several
popular benchmark datasets in terms of recall and
normalized discounted cumulative gain (NDCG), thus
proving the effectiveness of the algorithm.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Computer Vision, Deep Learning and
Machine Learning with Applications.",
}
@Article{Zhou:2021:HPG,
author = "Chao Zhou and Tao Zhang",
title = "High Performance Graph Data Imputation on Multiple
{GPUs}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "36",
day = "31",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020036",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/36",
abstract = "In real applications, massive data with graph
structures are often incomplete due to various
restrictions. Therefore, graph data imputation
algorithms have been widely used in the fields of
social networks, sensor networks, and MRI to solve the
graph data completion problem. To keep the data
relevant, a data structure is represented by a
graph-tensor, in which each matrix is the vertex value
of a weighted graph. The convolutional imputation
algorithm has been proposed to solve the low-rank
graph-tensor completion problem that some data matrices
are entirely unobserved. However, this data imputation
algorithm has limited application scope because it is
compute-intensive and low-performance on CPU. In this
paper, we propose a scheme to perform the convolutional
imputation algorithm with higher time performance on
GPUs (Graphics Processing Units) by exploiting
multi-core GPUs of CUDA architecture. We propose
optimization strategies to achieve coalesced memory
access for graph Fourier transform (GFT) computation
and improve the utilization of GPU SM resources for
singular value decomposition (SVD) computation.
Furthermore, we design a scheme to extend the
GPU-optimized implementation to multiple GPUs for
large-scale computing. Experimental results show that
the GPU implementation is both fast and accurate. On
synthetic data of varying sizes, the GPU-optimized
implementation running on a single Quadro RTX6000 GPU
achieves up to 60.50$ \times $ speedups over the
GPU-baseline implementation. The multi-GPU
implementation achieves up to 1.81$ \times $ speedups
on two GPUs versus the GPU-optimized implementation on
a single GPU. On the ego-Facebook dataset, the
GPU-optimized implementation achieves up to 77.88$
\times $ speedups over the GPU-baseline implementation.
Meanwhile, the GPU implementation and the CPU
implementation achieve similar, low recovery errors.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Smart System Infrastructure and
Applications.",
}
@Article{Delgado:2021:TPC,
author = "Francisco Delgado",
title = "Teaching Physics for Computer Science Students in
Higher Education During the {COVID-19} Pandemic: a
Fully {Internet}-Supported Course",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "35",
day = "29",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020035",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/35",
abstract = "The COVID-19 pandemic has modified and diversified the
ways that students receive education. During
confinements, complex courses integrating previous
knowledge must be carefully designed and implemented to
effectively replace the elements present in
face-to-face learning to improve the students'
experience. This work assesses the implementation of a
digital-learning physics course for computer science
students in a skill-based education program in higher
education. The assessment was useful for the
institution to evaluate if the digital strategy
implemented in the course fulfilled the original
premises and objectives. The analyses performed provide
useful knowledge of theoretical and operational actions
applied in this methodology that could be adapted to
similar courses for the younger generations in this
university. COVID-19 confinement will continue in
Mexico in 2021. This assessment resulted in a positive
evaluation of the digital strategy being followed,
which can be continued while the contingency lasts.
Three teachers came together to design math, physics,
and computational sciences content for various sections
of a physics course. The analysis was developed and
implemented according to an institutional digital
delivery model for the COVID-19 pandemic. Elements
related to attendance, digital access, performance
distribution by gender, activity types, and the course
learning sections were considered. The analysis was
performed with some techniques found in the literature
for small groups, complemented when necessary by
standard statistical tests to discern meaningful
trends. A primary goal was to assess skill-based
learning in the course delivered digitally due to the
COVID-19 confinement. Furthermore, additional issues
concerning the learning dynamics were searched,
reported, and analyzed. Finally, the outcomes of an
institutional exit survey collecting students' opinions
supported certain observed behaviors. The analysis
produced meaningful evidence that the course's
skill-based development was well supported by the
digital delivery during the confinement. Furthermore,
differences in the students' performances in the
various course content sections proved statistically
significant and are discussed in this work.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Education Responses to Technological
Challenges and Their Impact on Classrooms.",
}
@Article{Rodriguez-Breijo:2021:CPO,
author = "Vanessa Rodr{\'\i}guez-Breijo and N{\'u}ria Simelio
and Pedro Molina-Rodr{\'\i}guez-Navas",
title = "{Council Press Offices} as Sources of Political
Information: Between Journalism for Accountability and
Propaganda",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "34",
day = "29",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020034",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/34",
abstract = "This study uses a qualitative approach to examine what
political and technical leaders of municipalities
understand transparency and public information to mean,
and what role they believe the different subjects
involved (government, opposition, and the public)
should have. The websites of 605 Spanish councils with
more than 100,000 inhabitants were analysed and three
focus groups were held with political and technical
leaders from a selection of sample councils. The
results show that the technical and political leaders
of the councils do not have a clear awareness of their
function of management accountability or of the need to
apply journalistic criteria to the information they
publish, defending with nuances the use of propaganda
criteria to focus on the actions of the local
government, its information, the lack of space
dedicated to public debate and the opposition's
actions. In relation to accountability and citizen
participation, they have a negative view of citizens,
who they describe as being disengaged. However, they
emphasize that internally it is essential to continue
improving in terms of the culture of transparency and
the public information they provide citizens.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Guo:2021:CSD,
author = "Dongwei Guo and Mengmeng Fu and Hai Li",
title = "Cooperation in Social Dilemmas: a Group Game Model
with Double-Layer Networks",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "33",
day = "27",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020033",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/33",
abstract = "The combination of complex networks and game theory is
one of the most suitable ways to describe the
evolutionary laws of various complex systems. In order
to explore the evolution of group cooperation in
multiple social dilemmas, a model of a group game with
a double-layer network is proposed here. Firstly, to
simulate a multiplayer game under multiple identities,
we combine a double-layer network and public goods
game. Secondly, in order to make an individual's
strategy selection process more in line with a
practical context, a new strategy learning method that
incorporates individual attributes is designed here,
referred to as a ``public goods game with selection
preferences'' (PGG-SP), which makes strategic choices
that are more humane and diversified. Finally, a
co-evolution mechanism for strategies and topologies is
introduced based on the double-layer network, which
effectively explains the dynamic game process in real
life. To verify the role of multiple double-layer
networks with a PGG-SP, four types of double-layer
networks are applied in this paper. In addition, the
corresponding game results are compared between
single-layer, double-layer, static, and dynamic
networks. Accordingly, the results show that
double-layer networks can facilitate cooperation in
group games.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Recupero:2021:TEL,
author = "Diego Reforgiato Recupero",
title = "Technology Enhanced Learning Using Humanoid Robots",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "32",
day = "27",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020032",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/32",
abstract = "In this paper we present a mixture of technologies
tailored for e-learning related to the Deep Learning,
Sentiment Analysis, and Semantic Web domains, which we
have employed to show four different use cases that we
have validated in the field of Human-Robot Interaction.
The approach has been designed using Zora, a humanoid
robot that can be easily extended with new software
behaviors. The goal is to make the robot able to engage
users through natural language for different tasks.
Using our software the robot can (i) talk to the user
and understand their sentiments through a dedicated
Semantic Sentiment Analysis engine; (ii) answer to
open-dialog natural language utterances by means of a
Generative Conversational Agent; (iii) perform action
commands leveraging a defined Robot Action ontology and
open-dialog natural language utterances; and (iv)
detect which objects the user is handing by using
convolutional neural networks trained on a huge
collection of annotated objects. Each module can be
extended with more data and information and the overall
architectural design is general, flexible, and scalable
and can be expanded with other components, thus
enriching the interaction with the human. Different
applications within the e-learning domains are
foreseen: The robot can either be a trainer and
autonomously perform physical actions (e.g., in
rehabilitation centers) or it can interact with the
users (performing simple tests or even identifying
emotions) according to the program developed by the
teachers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue E-Learning and Technology Enhanced
Learning.",
}
@Article{Rovira:2021:LBG,
author = "Crist{\`o}fol Rovira and Llu{\'\i}s Codina and Carlos
Lopezosa",
title = "Language Bias in the {Google Scholar} Ranking
Algorithm",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "31",
day = "27",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020031",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/31",
abstract = "The visibility of academic articles or conference
papers depends on their being easily found in academic
search engines, above all in Google Scholar. To enhance
this visibility, search engine optimization (SEO) has
been applied in recent years to academic search engines
in order to optimize documents and, thereby, ensure
they are better ranked in search pages (i.e., academic
search engine optimization or ASEO). To achieve this
degree of optimization, we first need to further our
understanding of Google Scholar's relevance ranking
algorithm, so that, based on this knowledge, we can
highlight or improve those characteristics that
academic documents already present and which are taken
into account by the algorithm. This study seeks to
advance our knowledge in this line of research by
determining whether the language in which a document is
published is a positioning factor in the Google Scholar
relevance ranking algorithm. Here, we employ a reverse
engineering research methodology based on a statistical
analysis that uses Spearman's correlation coefficient.
The results obtained point to a bias in multilingual
searches conducted in Google Scholar with documents
published in languages other than in English being
systematically relegated to positions that make them
virtually invisible. This finding has important
repercussions, both for conducting searches and for
optimizing positioning in Google Scholar, being
especially critical for articles on subjects that are
expressed in the same way in English and other
languages, the case, for example, of trademarks,
chemical compounds, industrial products, acronyms,
drugs, diseases, etc.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue The Current State of Search Engines and
Search Engine Optimization.",
}
@Article{Papamartzivanos:2021:PMC,
author = "Dimitrios Papamartzivanos and Sofia Anna Menesidou and
Panagiotis Gouvas and Thanassis Giannetsos",
title = "A Perfect Match: Converging and Automating Privacy and
Security Impact Assessment On-the-Fly",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "30",
day = "27",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020030",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/30",
abstract = "As the upsurge of information and communication
technologies has become the foundation of all modern
application domains, fueled by the unprecedented amount
of data being processed and exchanged, besides security
concerns, there are also pressing privacy
considerations that come into play. Compounding this
issue, there is currently a documented gap between the
cybersecurity and privacy risk assessment (RA) avenues,
which are treated as distinct management processes and
capitalise on rather rigid and make-like approaches. In
this paper, we aim to combine the best of both worlds
by proposing the APSIA (Automated Privacy and Security
Impact Assessment) methodology, which stands for
Automated Privacy and Security Impact Assessment. APSIA
is powered by the use of interdependency graph models
and data processing flows used to create a digital
reflection of the cyber-physical environment of an
organisation. Along with this model, we present a novel
and extensible privacy risk scoring system for
quantifying the privacy impact triggered by the
identified vulnerabilities of the ICT infrastructure of
an organisation. We provide a prototype implementation
and demonstrate its applicability and efficacy through
a specific case study in the context of a heavily
regulated sector (i.e., assistive healthcare domain)
where strict security and privacy considerations are
not only expected but mandated so as to better showcase
the beneficial characteristics of APSIA. Our approach
can complement any existing security-based RA tool and
provide the means to conduct an enhanced, dynamic and
generic assessment as an integral part of an iterative
and unified risk assessment process on-the-fly. Based
on our findings, we posit open issues and challenges,
and discuss possible ways to address them, so that such
holistic security and privacy mechanisms can reach
their full potential towards solving this conundrum.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Special Issue Information and Future Internet
Security, Trust and Privacy.",
}
@Article{Basile:2021:HDE,
author = "Valerio Basile and Francesco Cauteruccio and Giorgio
Terracina",
title = "How Dramatic Events Can Affect Emotionality in Social
Posting: The Impact of {COVID-19} on {Reddit}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "29",
day = "27",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020029",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/29",
abstract = "The COVID-19 outbreak impacted almost all the aspects
of ordinary life. In this context, social networks
quickly started playing the role of a sounding board
for the content produced by people. Studying how
dramatic events affect the way people interact with
each other and react to poorly known situations is
recognized as a relevant research task. Since
automatically identifying country-based COVID-19 social
posts on generalized social networks, like Twitter and
Facebook, is a difficult task, in this work we
concentrate on Reddit megathreads, which provide a
unique opportunity to study focused reactions of people
by both topic and country. We analyze specific
reactions and we compare them with a ``normal'' period,
not affected by the pandemic; in particular, we
consider structural variations in social posting
behavior, emotional reactions under the Plutchik model
of basic emotions, and emotional reactions under
unconventional emotions, such as skepticism,
particularly relevant in the COVID-19 context.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Techno-Social Smart Systems.",
}
@Article{FIEO:2021:ARF,
author = "{Future Internet Editorial Office}",
title = "Acknowledgment to Reviewers of {{\booktitle{Future
Internet}}} in 2020",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "28",
day = "24",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020028",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/28",
abstract = "The COVID-19 outbreak impacted almost all the aspects
of ordinary life. In this context, social networks
quickly started playing the role of a sounding board
for the content produced by people. Studying how
dramatic events affect the way people interact with
each other and react to poorly known situations is
recognized as a relevant research task. Since
automatically identifying country-based COVID-19 social
posts on generalized social networks, like Twitter and
Facebook, is a difficult task, in this work we
concentrate on Reddit megathreads, which provide a
unique opportunity to study focused reactions of people
by both topic and country. We analyze specific
reactions and we compare them with a ``normal'' period,
not affected by the pandemic; in particular, we
consider structural variations in social posting
behavior, emotional reactions under the Plutchik model
of basic emotions, and emotional reactions under
unconventional emotions, such as skepticism,
particularly relevant in the COVID-19 context.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hao:2021:EIS,
author = "Chuanyan Hao and Anqi Zheng and Yuqi Wang and Bo
Jiang",
title = "Experiment Information System Based on an Online
Virtual Laboratory",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "27",
day = "24",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020027",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/27",
abstract = "In the information age, MOOCs (Massive Open Online
Courses), micro-classes, flipping classroom, and other
blended teaching scenes have improved students learning
outcomes. However, incorporating technologies into
experimental courses, especially electronic and
electrical experiments, has its own characteristics and
difficulties. The focus of this paper is to introduce
virtual technology into an electronic circuit
experiment course and to explore its teaching strategy,
thereby realizing the informatization of experiment
teaching. First, this paper explores the design
concepts and implementation details of the digital
circuit virtual laboratory, which is then developed
based on previous literature and a prequestionnaire to
users. Second, the informatization process of the
experiment learning model based on traditional custom
lab benches is shown through a blended learning scheme
that integrates the online virtual laboratory. Finally,
the experiment information system is verified and
analyzed with a control group experiment and
questionnaires. The blended program turned out to be an
effective teaching model to complement the deficiencies
in existing physical laboratories. The research
conclusions show that the virtual experiment system
provides students with a rich, efficient, and expansive
experimental experience, in particular, the
flexibility, repeatability, and visual appeal of a
virtual platform could promote the development of
students' abilities in active learning, reflective
thinking, and creativity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
remark = "Section Smart System Infrastructure and
Applications.",
}
@Article{Riana:2021:IFH,
author = "Dwiza Riana and Achmad Nizar Hidayanto and Sri
Hadianti and Darmawan Napitupulu",
title = "Integrative Factors of E-Health Laboratory Adoption: a
Case of {Indonesia}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "2",
pages = "26",
day = "24",
month = jan,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13020026",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 26 10:54:58 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/2/26",
abstract = "Around the world, the adoption of digital health
applications is growing very fast. The use of e-health
laboratory systems is increasing while research on the
factors that impact users to use e-health laboratory
systems in Indonesia has not been done much. The
objective of this study is to analyze the behavioral
factors of e-health laboratory users. This study
includes a survey conducted on Indonesian users, and
data analysis was carried out thoroughly. Based on the
Technology Acceptance Model, this research framework
explores a combination of variables consisting of
task-driven, technology-driven, human-driven, and
adoption variables to form the model proposed in this
study. This model was verified using the Structural
Equation Modeling (SEM) method for factor analysis,
path analysis, and regression. A total of 163
respondents were collected to evaluate this research
model empirically and the level of this study were
individuals. These three problems are all essential in
affecting usage intentions in adopting an e-health
laboratory system. Specifically, task technology fit,
information quality, and accessibility show a direct
effect on both perceived usefulness and perceived ease
of use factors perceived by the user, and have an
indirect influence on the adoption of an e-health
laboratory system through these two factors. The design
of an online laboratory system affects perceived ease
of use and personal innovativeness factors affect the
perceived usefulness that users feel when adopting a
laboratory system, while task technology fit and
personal innovativeness factors do not affect the
perceived ease of use. However, overall technology
characteristic and perceived usefulness followed by
design are the main predictors of adopting an e-health
laboratory system on e-health systems in Indonesia.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chetty:2021:VNF,
author = "Swarna Bindu Chetty and Hamed Ahmadi and Sachin Sharma
and Avishek Nag",
title = "Virtual Network Function Embedding under Nodal Outage
Using Deep {Q}-Learning",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "82",
day = "23",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030082",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/82",
abstract = "With the emergence of various types of applications
such as delay-sensitive applications, future
communication networks are expected to be increasingly
complex and dynamic. Network Function Virtualization
(NFV) provides the necessary support towards efficient
management of such complex networks, by virtualizing
network functions and placing them on shared commodity
servers. However, one of the critical issues in NFV is
the resource allocation for the highly complex
services; moreover, this problem is classified as an
NP-Hard problem. To solve this problem, our work
investigates the potential of Deep Reinforcement
Learning (DRL) as a swift yet accurate approach (as
compared to integer linear programming) for deploying
Virtualized Network Functions (VNFs) under several
Quality-of-Service (QoS) constraints such as latency,
memory, CPU, and failure recovery requirements. More
importantly, the failure recovery requirements are
focused on the node-outage problem where outage can be
either due to a disaster or unavailability of network
topology information (e.g., due to proprietary and
ownership issues). In DRL, we adopt a Deep Q-Learning
(DQL) based algorithm where the primary network
estimates the action-value function Q, as well as the
predicted Q, highly causing divergence in Q-value's
updates. This divergence increases for the larger-scale
action and state-space causing inconsistency in
learning, resulting in an inaccurate output. Thus, to
overcome this divergence, our work has adopted a
well-known approach, i.e., introducing Target Neural
Networks and Experience Replay algorithms in DQL. The
constructed model is simulated for two real network
topologies-Netrail Topology and BtEurope Topology-with
various capacities of the nodes (e.g., CPU core, VNFs
per Core), links (e.g., bandwidth and latency), several
VNF Forwarding Graph (VNF-FG) complexities, and
different degrees of the nodal outage from 0\% to 50\%.
We can conclude from our work that, with the increase
in network density or nodal capacity or VNF-FG's
complexity, the model took extremely high computation
time to execute the desirable results. Moreover, with
the rise in complexity of the VNF-FG, the resources
decline much faster. In terms of the nodal outage, our
model provided almost 70-90\% Service Acceptance Rate
(SAR) even with a 50\% nodal outage for certain
combinations of scenarios.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Naudts:2021:VCM,
author = "Dries Naudts and Vasilis Maglogiannis and Seilendria
Hadiwardoyo and Daniel van den Akker and Simon Vanneste
and Siegfried Mercelis and Peter Hellinckx and Bart
Lannoo and Johann Marquez-Barja and Ingrid Moerman",
title = "Vehicular Communication Management Framework: a
Flexible Hybrid Connectivity Platform for {CCAM}
Services",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "81",
day = "22",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030081",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/81",
abstract = "In the upcoming decade and beyond, the Cooperative,
Connected and Automated Mobility (CCAM) initiative will
play a huge role in increasing road safety, traffic
efficiency and comfort of driving in Europe. While
several individual vehicular wireless communication
technologies exist, there is still a lack of real
flexible and modular platforms that can support the
need for hybrid communication. In this paper, we
propose a novel vehicular communication management
framework (CAMINO), which incorporates flexible support
for both short-range direct and long-range cellular
technologies and offers built-in Cooperative
Intelligent Transport Systems' (C-ITS) services for
experimental validation in real-life settings.
Moreover, integration with vehicle and infrastructure
sensors/actuators and external services is enabled
using a Distributed Uniform Streaming (DUST) framework.
The framework is implemented and evaluated in the Smart
Highway test site for two targeted use cases, proofing
the functional operation in realistic environments. The
flexibility and the modular architecture of the hybrid
CAMINO framework offers valuable research potential in
the field of vehicular communications and CCAM services
and can enable cross-technology vehicular
connectivity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vrysis:2021:WIA,
author = "Lazaros Vrysis and Nikolaos Vryzas and Rigas Kotsakis
and Theodora Saridou and Maria Matsiola and Andreas
Veglis and Carlos Arcila-Calder{\'o}n and Charalampos
Dimoulas",
title = "A {Web} Interface for Analyzing Hate Speech",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "80",
day = "22",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030080",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/80",
abstract = "Social media services make it possible for an
increasing number of people to express their opinion
publicly. In this context, large amounts of hateful
comments are published daily. The PHARM project aims at
monitoring and modeling hate speech against refugees
and migrants in Greece, Italy, and Spain. In this
direction, a web interface for the creation and the
query of a multi-source database containing hate
speech-related content is implemented and evaluated.
The selected sources include Twitter, YouTube, and
Facebook comments and posts, as well as comments and
articles from a selected list of websites. The
interface allows users to search in the existing
database, scrape social media using keywords, annotate
records through a dedicated platform and contribute new
content to the database. Furthermore, the functionality
for hate speech detection and sentiment analysis of
texts is provided, making use of novel methods and
machine learning models. The interface can be accessed
online with a graphical user interface compatible with
modern internet browsers. For the evaluation of the
interface, a multifactor questionnaire was formulated,
targeting to record the users' opinions about the web
interface and the corresponding functionality.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Safavi:2021:RPR,
author = "Sadaf Safavi and Mehrdad Jalali",
title = "{RecPOID}: {POI} Recommendation with Friendship Aware
and Deep {CNN}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "79",
day = "22",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030079",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/79",
abstract = "In location-based social networks (LBSNs), exploit
several key features of points-of-interest (POIs) and
users on precise POI recommendation be significant. In
this work, a novel POI recommendation pipeline based on
the convolutional neural network named RecPOID is
proposed, which can recommend an accurate sequence of
top-k POIs and considers only the effect of the most
similar pattern friendship rather than all user's
friendship. We use the fuzzy c-mean clustering method
to find the similarity. Temporal and spatial features
of similar friends are fed to our Deep CNN model. The
10-layer convolutional neural network can predict
longitude and latitude and the Id of the next proper
locations; after that, based on the shortest time
distance from a similar pattern's friendship, select
the smallest distance locations. The proposed structure
uses six features, including user's ID, month, day,
hour, minute, and second of visiting time by each user
as inputs. RecPOID based on two accessible LBSNs
datasets is evaluated. Experimental outcomes illustrate
considering most similar friendship could improve the
accuracy of recommendations and the proposed RecPOID
for POI recommendation outperforms state-of-the-art
approaches.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2021:ATF,
author = "Chuanhong Li and Lei Song and Xuewen Zeng",
title = "An Adaptive Throughput-First Packet Scheduling
Algorithm for {DPDK}-Based Packet Processing Systems",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "78",
day = "19",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030078",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/78",
abstract = "The continuous increase in network traffic has sharply
increased the demand for high-performance packet
processing systems. For a high-performance packet
processing system based on multi-core processors, the
packet scheduling algorithm is critical because of the
significant role it plays in load distribution, which
is related to system throughput, attracting intensive
research attention. However, it is not an easy task
since the canonical flow-level packet scheduling
algorithm is vulnerable to traffic locality, while the
packet-level packet scheduling algorithm fails to
maintain cache affinity. In this paper, we propose an
adaptive throughput-first packet scheduling algorithm
for DPDK-based packet processing systems. Combined with
the feature of DPDK burst-oriented packet receiving and
transmitting, we propose using Subflow as the
scheduling unit and the adjustment unit making the
proposed algorithm not only maintain the advantages of
flow-level packet scheduling algorithms when the
adjustment does not happen but also avoid packet loss
as much as possible when the target core may be
overloaded Experimental results show that the proposed
method outperforms Round-Robin, HRW (High Random
Weight), and CRC32 on system throughput and packet loss
rate.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Khrais:2021:RMA,
author = "Laith T. Khrais and Abdullah M. Alghamdi",
title = "The Role of Mobile Application Acceptance in Shaping
E-Customer Service",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "77",
day = "19",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030077",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/77",
abstract = "Most retailers are integrating their practices with
modern technologies to enhance the effectiveness of
their operations. The adoption of technology aims to
enable businesses to accurately meet customer needs and
expectations. This study focused on examining the role
of mobile application (app) acceptance in shaping
customer electronic experience. A mixed method was
adopted, in which qualitative data were collected using
interviews, and quantitative data were gathered using
the questionnaires. The results indicate that mobile
app acceptance contributes to a positive customer
experience while purchasing products and services from
online retailers. Mobile apps are associated with
benefits, such as convenience, ease of use, and the
ability to access various products and services. With
the rapid development in technology, e-commerce
retailers should leverage such innovations to meet
customer needs.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lotito:2021:RAS,
author = "Quintino Francesco Lotito and Davide Zanella and Paolo
Casari",
title = "Realistic Aspects of Simulation Models for Fake News
Epidemics over Social Networks",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "76",
day = "17",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030076",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/76",
abstract = "The pervasiveness of online social networks has
reshaped the way people access information. Online
social networks make it common for users to inform
themselves online and share news among their peers, but
also favor the spreading of both reliable and fake news
alike. Because fake news may have a profound impact on
the society at large, realistically simulating their
spreading process helps evaluate the most effective
countermeasures to adopt. It is customary to model the
spreading of fake news via the same epidemic models
used for common diseases; however, these models often
miss concepts and dynamics that are peculiar to fake
news spreading. In this paper, we fill this gap by
enriching typical epidemic models for fake news
spreading with network topologies and dynamics that are
typical of realistic social networks. Specifically, we
introduce agents with the role of influencers and bots
in the model and consider the effects of dynamical
network access patterns, time-varying engagement, and
different degrees of trust in the sources of
circulating information. These factors concur with
making the simulations more realistic. Among other
results, we show that influencers that share fake news
help the spreading process reach nodes that would
otherwise remain unaffected. Moreover, we emphasize
that bots dramatically speed up the spreading process
and that time-varying engagement and network access
change the effectiveness of fake news spreading.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhao:2021:DPP,
author = "Yuexuan Zhao and Jing Huang",
title = "{Dirichlet} Process Prior for {Student}'s $t$ Graph
Variational Autoencoders",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "75",
day = "16",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030075",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/75",
abstract = "Graph variational auto-encoder (GVAE) is a model that
combines neural networks and Bayes methods, capable of
deeper exploring the influential latent features of
graph reconstruction. However, several pieces of
research based on GVAE employ a plain prior
distribution for latent variables, for instance,
standard normal distribution (N(0,1)). Although this
kind of simple distribution has the advantage of
convenient calculation, it will also make latent
variables contain relatively little helpful
information. The lack of adequate expression of nodes
will inevitably affect the process of generating
graphs, which will eventually lead to the discovery of
only external relations and the neglect of some complex
internal correlations. In this paper, we present a
novel prior distribution for GVAE, called Dirichlet
process (DP) construction for Student's t (St)
distribution. The DP allows the latent variables to
adapt their complexity during learning and then
cooperates with heavy-tailed St distribution to
approach sufficient node representation. Experimental
results show that this method can achieve a relatively
better performance against the baselines.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hernandez-Orellana:2021:CDI,
author = "Marisol Hern{\'a}ndez-Orellana and Adolfina
P{\'e}rez-Garcias and {\'A}ngel Roco-Videla",
title = "Characterization of the Digital Identity of {Chilean}
University Students Considering Their Personal Learning
Environments",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "74",
day = "16",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030074",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/74",
abstract = "At present, our online activity is almost constant,
either producing information or consuming it, both for
the social and academic fields. The spaces in which
people move and travel every day, innocently divided
between the face-to-face and the virtual, affect the
way we communicate and perceive ourselves. In this
document, a characterization of the academic digital
identity of Chilean university students is proposed and
an invitation to teachers to redefine learning spaces
is made, allowing integrating all those technological
tools that the student actually uses. This study was
developed within the logic of pragmatism based on mixed
methodology, non-experimental design, and a
descriptive-quantitative cross-sectional approach. A
non-probabilistic sample was made up of 509 students,
who participated voluntarily with an online
questionnaire. The Stata Version-14 program was used,
applying the Mann-Whitney-Wilcoxon and Kruskal-Wallis U
tests. To develop characterizations, a conglomerate
analysis was performed with a hierarchical dissociative
method. In general, Chilean university students are
highly truthful on the Internet without making
significant differences between face-to-face and
digital interactions, with low awareness of their ID,
being easily recognizable on the Web. Regarding their
educational process, they manage it with
analogical/face-to-face mixing formal and informal
technological tools to optimize their learning process.
These students manifest a hybrid academic digital
identity, without gender difference in the deployment
of their PLEs, but maintaining stereotypical gender
behaviors in the construction of their digital identity
on the Web, which shows a human-technological
development similar to that of young Asians and
Europeans.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhou:2021:DMP,
author = "Xingchen Zhou and Ming Xu and Yiming Wu and Ning
Zheng",
title = "Deep Model Poisoning Attack on Federated Learning",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "73",
day = "14",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030073",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/73",
abstract = "Federated learning is a novel distributed learning
framework, which enables thousands of participants to
collaboratively construct a deep learning model. In
order to protect confidentiality of the training data,
the shared information between server and participants
are only limited to model parameters. However, this
setting is vulnerable to model poisoning attack, since
the participants have permission to modify the model
parameters. In this paper, we perform systematic
investigation for such threats in federated learning
and propose a novel optimization-based model poisoning
attack. Different from existing methods, we primarily
focus on the effectiveness, persistence and stealth of
attacks. Numerical experiments demonstrate that the
proposed method can not only achieve high attack
success rate, but it is also stealthy enough to bypass
two existing defense methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chen:2021:PRIa,
author = "Shengbo Chen and Hongchang Zhang and Zhou Lei",
title = "Person Re-Identification Based on Attention Mechanism
and Context Information Fusion",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "72",
day = "13",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030072",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/72",
abstract = "Person re-identification (ReID) plays a significant
role in video surveillance analysis. In the real world,
due to illumination, occlusion, and deformation,
pedestrian features extraction is the key to person
ReID. Considering the shortcomings of existing methods
in pedestrian features extraction, a method based on
attention mechanism and context information fusion is
proposed. A lightweight attention module is introduced
into ResNet50 backbone network equipped with a small
number of network parameters, which enhance the
significant characteristics of person and suppress
irrelevant information. Aiming at the problem of person
context information loss due to the over depth of the
network, a context information fusion module is
designed to sample the shallow feature map of
pedestrians and cascade with the high-level feature
map. In order to improve the robustness, the model is
trained by combining the loss of margin sample mining
with the loss function of cross entropy. Experiments
are carried out on datasets Market1501 and
DukeMTMC-reID, our method achieves rank-1 accuracy of
95.9\% on the Market1501 dataset, and 90.1\% on the
DukeMTMC-reID dataset, outperforming the current
mainstream method in case of only using global
feature.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wu:2021:TLM,
author = "Pin Wu and Rukang Zhu and Zhidan Lei",
title = "Transfer Learning for Multi-Premise Entailment with
Relationship Processing Module",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "71",
day = "13",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030071",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/71",
abstract = "Using the single premise entailment (SPE) model to
accomplish the multi-premise entailment (MPE) task can
alleviate the problem that the neural network cannot be
effectively trained due to the lack of labeled
multi-premise training data. Moreover, the abundant
judgment methods for the relationship between sentence
pairs can also be applied in this task. However, the
single-premise pre-trained model does not have a
structure for processing multi-premise relationships,
and this structure is a crucial technique for solving
MPE problems. This paper proposes adding a
multi-premise relationship processing module based on
not changing the structure of the pre-trained model to
compensate for this deficiency. Moreover, we proposed a
three-step training method combining this module, which
ensures that the module focuses on dealing with the
multi-premise relationship during matching, thus
applying the single-premise model to multi-premise
tasks. Besides, this paper also proposes a specific
structure of the relationship processing module, i.e.,
we call it the attention-backtracking mechanism.
Experiments show that this structure can fully consider
the context of multi-premise, and the structure
combined with the three-step training can achieve
better accuracy on the MPE test set than other transfer
methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yu:2021:JOE,
author = "Zhiyan Yu and Gaochao Xu and Yang Li and Peng Liu and
Long Li",
title = "Joint Offloading and Energy Harvesting Design in
Multiple Time Blocks for {FDMA} Based Wireless Powered
{MEC}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "70",
day = "12",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030070",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/70",
abstract = "The combination of mobile edge computing (MEC) and
wireless power transfer (WPT) is recognized as a
promising technology to solve the problem of limited
battery capacities and insufficient computation
capabilities of mobile devices. This technology can
transfer energy to users by radio frequency (RF) in
wireless powered mobile edge computing. The user
converts the harvested energy, stores it in the
battery, and utilizes the harvested energy to execute
corresponding local computing and offloading tasks.
This paper adopts the Frequency Division Multiple
Access (FDMA) technique to achieve task offloading from
multiple mobile devices to the MEC server
simultaneously. Our objective is to study multiuser
dynamic joint optimization of computation and wireless
resource allocation under multiple time blocks to solve
the problem of maximizing residual energy. To this end,
we formalize it as a nonconvex problem that jointly
optimizes the number of offloaded bits, energy
harvesting time, and transmission bandwidth. We adopt
convex optimization technology, combine with
Karush--Kuhn--Tucker (KKT) conditions, and finally
transform the problem into a univariate constrained
convex optimization problem. Furthermore, to solve the
problem, we propose a combined method of Bisection
method and sequential unconstrained minimization based
on Reformulation-Linearization Technique (RLT).
Numerical results demonstrate that the performance of
our joint optimization method outperforms other
benchmark schemes for the residual energy maximization
problem. Besides, the algorithm can maximize the
residual energy, reduce the computation complexity, and
improve computation efficiency.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lin:2021:ETN,
author = "Yi-Bing Lin and Chien-Chao Tseng and Ming-Hung Wang",
title = "Effects of Transport Network Slicing on {5G}
Applications",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "69",
day = "11",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030069",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/69",
abstract = "Network slicing is considered a key technology in
enabling the underlying 5G mobile network
infrastructure to meet diverse service requirements. In
this article, we demonstrate how transport network
slicing accommodates the various network service
requirements of Massive IoT (MIoT), Critical IoT
(CIoT), and Mobile Broadband (MBB) applications. Given
that most of the research conducted previously to
measure 5G network slicing is done through simulations,
we utilized SimTalk, an IoT application traffic
emulator, to emulate large amounts of realistic traffic
patterns in order to study the effects of transport
network slicing on IoT and MBB applications.
Furthermore, we developed several MIoT, CIoT, and MBB
applications that operate sustainably on several
campuses and directed both real and emulated traffic
into a Programming Protocol-Independent Packet
Processors (P4)-based 5G testbed. We then examined the
performance in terms of throughput, packet loss, and
latency. Our study indicates that applications with
different traffic characteristics need different
corresponding Committed Information Rate (CIR) ratios.
The CIR ratio is the CIR setting for a P4 meter in
physical switch hardware over the aggregated data rate
of applications of the same type. A low CIR ratio
adversely affects the application's performance because
P4 switches will dispatch application packets to the
low-priority queue if the packet arrival rate exceeds
the CIR setting for the same type of applications. In
our testbed, both exemplar MBB applications required a
CIR ratio of 140\% to achieve, respectively, a near
100\% throughput percentage with a 0.0035\% loss rate
and an approximate 100\% throughput percentage with a
0.0017\% loss rate. However, the exemplar CIoT and MIoT
applications required a CIR ratio of 120\% and 100\%,
respectively, to reach a 100\% throughput percentage
without any packet loss. With the proper CIR settings
for the P4 meters, the proposed transport network
slicing mechanism can enforce the committed rates and
fulfill the latency and reliability requirements for 5G
MIoT, CIoT, and MBB applications in both TCP and UDP.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Flanagan:2021:IMC,
author = "Steven Knowles Flanagan and Zuoyin Tang and Jianhua He
and Irfan Yusoff",
title = "Investigating and Modeling of Cooperative
Vehicle-to-Vehicle Safety Stopping Distance",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "68",
day = "10",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030068",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/68",
abstract = "Dedicated Short-Range Communication (DSRC) or IEEE
802.11p/OCB (Out of the Context of a Base-station) is
widely considered to be a primary technology for
Vehicle-to-Vehicle (V2V) communication, and it is aimed
toward increasing the safety of users on the road by
sharing information between one another. The
requirements of DSRC are to maintain real-time
communication with low latency and high reliability. In
this paper, we investigate how communication can be
used to improve stopping distance performance based on
fieldwork results. In addition, we assess the impacts
of reduced reliability, in terms of distance
independent, distance dependent and density-based
consecutive packet losses. A model is developed based
on empirical measurements results depending on
distance, data rate, and traveling speed. With this
model, it is shown that cooperative V2V communications
can effectively reduce reaction time and increase
safety stop distance, and highlight the importance of
high reliability. The obtained results can be further
used for the design of cooperative V2V-based driving
and safety applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hitimana:2021:IIF,
author = "Eric Hitimana and Gaurav Bajpai and Richard Musabe and
Louis Sibomana and Jayavel Kayalvizhi",
title = "Implementation of {IoT} Framework with Data Analysis
Using Deep Learning Methods for Occupancy Prediction in
a Building",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "67",
day = "09",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030067",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/67",
abstract = "Many countries worldwide face challenges in
controlling building incidence prevention measures for
fire disasters. The most critical issues are the
localization, identification, detection of the room
occupant. Internet of Things (IoT) along with machine
learning proved the increase of the smartness of the
building by providing real-time data acquisition using
sensors and actuators for prediction mechanisms. This
paper proposes the implementation of an IoT framework
to capture indoor environmental parameters for
occupancy multivariate time-series data. The
application of the Long Short Term Memory (LSTM) Deep
Learning algorithm is used to infer the knowledge of
the presence of human beings. An experiment is
conducted in an office room using multivariate
time-series as predictors in the regression forecasting
problem. The results obtained demonstrate that with the
developed system it is possible to obtain, process, and
store environmental information. The information
collected was applied to the LSTM algorithm and
compared with other machine learning algorithms. The
compared algorithms are Support Vector Machine,
Na{\"\i}ve Bayes Network, and Multilayer Perceptron
Feed-Forward Network. The outcomes based on the
parametric calibrations demonstrate that LSTM performs
better in the context of the proposed application.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Georgiou:2021:DPI,
author = "Dimitra Georgiou and Costas Lambrinoudakis",
title = "Data Protection Impact Assessment {(DPIA)} for
Cloud-Based Health Organizations",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "66",
day = "07",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030066",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/66",
abstract = "The General Data Protection Regulation (GDPR)
harmonizes personal data protection laws across the
European Union, affecting all sectors including the
healthcare industry. For processing operations that
pose a high risk for data subjects, a Data Protection
Impact Assessment (DPIA) is mandatory from May 2018.
Taking into account the criticality of the process and
the importance of its results, for the protection of
the patients' health data, as well as the complexity
involved and the lack of past experience in applying
such methodologies in healthcare environments, this
paper presents the main steps of a DPIA study and
provides guidelines on how to carry them out
effectively. To this respect, the Privacy Impact
Assessment, Commission Nationale de l'Informatique et
des Libert{\'e}s (PIA-CNIL) methodology has been
employed, which is also compliant with the privacy
impact assessment tasks described in ISO/IEC
29134:2017. The work presented in this paper focuses on
the first two steps of the DPIA methodology and more
specifically on the identification of the Purposes of
Processing and of the data categories involved in each
of them, as well as on the evaluation of the
organization's GDPR compliance level and of the gaps (
Gap Analysis ) that must be filled-in. The main
contribution of this work is the identification of the
main organizational and legal requirements that must be
fulfilled by the health care organization. This
research sets the legal grounds for data processing,
according to the GDPR and is highly relevant to any
processing of personal data, as it helps to structure
the process, as well as be aware of data protection
issues and the relevant legislation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lin:2021:ETB,
author = "Jhan-Jia Lin and Yu-Tse Lee and Ja-Ling Wu",
title = "The Effect of Thickness-Based Dynamic Matching
Mechanism on a Hyperledger Fabric-Based {TimeBank}
System",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "65",
day = "06",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030065",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/65",
abstract = "In a community with an aging population, helping each
other is a must society function. Lacking mutual trust
makes the need for a fair and transparent service
exchange platform on top of the public service
administration's list. We present an efficient
blockchain-based TimeBank realization with a newly
proposed dynamic service matching algorithm (DSMA) in
this work. The Hyperledger Fabric (or Fabric in short),
one of the well-known Consortium Blockchains, is chosen
as our system realization platform. It provides the
identity certification mechanism and has an extendable
network structure. The performance of a DSMA is
measured by the waiting time for a service to get a
match, called the service-matching waiting time (SMWT).
In our DSMA, the decision as to whether a service is to
get a match or wait for a later chance depends
dynamically on the total number of contemporarily
available services (i.e., the thickness of the service
market). To better the proposed TimeBank system's
service quality, a Dynamic Tuning Strategy (DTS) is
designed to thicken the market size. Experimental
results show that a thicker market makes on-chain nodes
have more links, and in turn, they find a match easier
(i.e., consume a shorter SMWT).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yu:2021:CMA,
author = "Jie Yu and Yaliu Li and Chenle Pan and Junwei Wang",
title = "A Classification Method for Academic Resources Based
on a Graph Attention Network",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "64",
day = "04",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030064",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/64",
abstract = "Classification of resource can help us effectively
reduce the work of filtering massive academic
resources, such as selecting relevant papers and
focusing on the latest research by scholars in the same
field. However, existing graph neural networks do not
take into account the associations between academic
resources, leading to unsatisfactory classification
results. In this paper, we propose an Association
Content Graph Attention Network (ACGAT), which is based
on the association features and content attributes of
academic resources. The semantic relevance and academic
relevance are introduced into the model. The ACGAT
makes full use of the association commonality and the
influence information of resources and introduces an
attention mechanism to improve the accuracy of academic
resource classification. We conducted experiments on a
self-built scholar network and two public citation
networks. Experimental results show that the ACGAT has
better effectiveness than existing classification
methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Morshedi:2021:EPV,
author = "Maghsoud Morshedi and Josef Noll",
title = "Estimating {PQoS} of Video Conferencing on {Wi-Fi}
Networks Using Machine Learning",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "63",
day = "03",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030063",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/63",
abstract = "Video conferencing services based on web real-time
communication (WebRTC) protocol are growing in
popularity among Internet users as multi-platform
solutions enabling interactive communication from
anywhere, especially during this pandemic era.
Meanwhile, Internet service providers (ISPs) have
deployed fiber links and customer premises equipment
that operate according to recent 802.11ac/ax standards
and promise users the ability to establish
uninterrupted video conferencing calls with
ultra-high-definition video and audio quality. However,
the best-effort nature of 802.11 networks and the high
variability of wireless medium conditions hinder users
experiencing uninterrupted high-quality video
conferencing. This paper presents a novel approach to
estimate the perceived quality of service (PQoS) of
video conferencing using only 802.11-specific network
performance parameters collected from Wi-Fi access
points (APs) on customer premises. This study produced
datasets comprising 802.11-specific network performance
parameters collected from off-the-shelf Wi-Fi APs
operating at 802.11g/n/ac/ax standards on both 2.4 and
5 GHz frequency bands to train machine learning
algorithms. In this way, we achieved classification
accuracies of 92-98\% in estimating the level of PQoS
of video conferencing services on various Wi-Fi
networks. To efficiently troubleshoot wireless issues,
we further analyzed the machine learning model to
correlate features in the model with the root cause of
quality degradation. Thus, ISPs can utilize the
approach presented in this study to provide predictable
and measurable wireless quality by implementing a
non-intrusive quality monitoring approach in the form
of edge computing that preserves customers' privacy
while reducing the operational costs of monitoring and
data analytics.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Antal:2021:DLT,
author = "Claudia Antal and Tudor Cioara and Ionut Anghel and
Marcel Antal and Ioan Salomie",
title = "Distributed Ledger Technology Review and Decentralized
Applications Development Guidelines",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "62",
day = "27",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030062",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/62",
abstract = "The Distributed Ledger Technology (DLT) provides an
infrastructure for developing decentralized
applications with no central authority for registering,
sharing, and synchronizing transactions on digital
assets. In the last years, it has drawn high interest
from the academic community, technology developers, and
startups mostly by the advent of its most popular type,
blockchain technology. In this paper, we provide a
comprehensive overview of DLT analyzing the challenges,
provided solutions or alternatives, and their usage for
developing decentralized applications. We define a
three-tier based architecture for DLT applications to
systematically classify the technology solutions
described in over 100 papers and startup initiatives.
Protocol and Network Tier contains solutions for
digital assets registration, transactions, data
structure, and privacy and business rules
implementation and the creation of peer-to-peer
networks, ledger replication, and consensus-based state
validation. Scalability and Interoperability Tier
solutions address the scalability and interoperability
issues with a focus on blockchain technology, where
they manifest most often, slowing down its large-scale
adoption. The paper closes with a discussion on
challenges and opportunities for developing
decentralized applications by providing a multi-step
guideline for decentralizing the design and
implementation of traditional systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cappellari:2021:CBD,
author = "Max Cappellari and John Belstner and Bryan Rodriguez
and Jeff Sedayao",
title = "A Cloud-Based Data Collaborative to Combat the
{COVID-19} Pandemic and to Solve Major Technology
Challenges",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "61",
day = "27",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030061",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/61",
abstract = "The XPRIZE Foundation designs and operates
multi-million-dollar, global competitions to
incentivize the development of technological
breakthroughs that accelerate humanity toward a better
future. To combat the COVID-19 pandemic, the foundation
coordinated with several organizations to make datasets
about different facets of the disease available and to
provide the computational resources needed to analyze
those datasets. This paper is a case study of the
requirements, design, and implementation of the XPRIZE
Data Collaborative, which is a Cloud-based
infrastructure that enables the XPRIZE to meet its
COVID-19 mission and host future data-centric
competitions. We examine how a Cloud Native Application
can use an unexpected variety of Cloud technologies,
ranging from containers, serverless computing, to even
older ones such as Virtual Machines. We also search and
document the effects that the pandemic had on
application development in the Cloud. We include our
experiences of having users successfully exercise the
Data Collaborative, detailing the challenges
encountered and areas for improvement and future
work.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Axelsson:2021:LHS,
author = "Carl-Anton Werner Axelsson and Mona Guath and Thomas
Nygren",
title = "Learning How to Separate Fake from Real News: Scalable
Digital Tutorials Promoting Students' Civic Online
Reasoning",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "60",
day = "27",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030060",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/60",
abstract = "With the rise of misinformation, there is a great need
for scalable educational interventions supporting
students' abilities to determine the trustworthiness of
digital news. We address this challenge in our study by
developing an online intervention tool based on
tutorials in civic online reasoning that aims to teach
adolescents how to critically assess online information
comprising text, videos and images. Our findings from
an online intervention with 209 upper secondary
students highlight how observational learning and
feedback support their ability to read laterally and
improve their performance in determining the
credibility of digital news and social media posts.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Weichselbraun:2021:ADD,
author = "Albert Weichselbraun and Philipp Kuntschik and
Vincenzo Francolino and Mirco Saner and Urs Dahinden
and Vinzenz Wyss",
title = "Adapting Data-Driven Research to the Fields of Social
Sciences and the Humanities",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "59",
day = "26",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030059",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/59",
abstract = "Recent developments in the fields of computer science,
such as advances in the areas of big data, knowledge
extraction, and deep learning, have triggered the
application of data-driven research methods to
disciplines such as the social sciences and humanities.
This article presents a collaborative,
interdisciplinary process for adapting data-driven
research to research questions within other
disciplines, which considers the methodological
background required to obtain a significant impact on
the target discipline and guides the systematic
collection and formalization of domain knowledge, as
well as the selection of appropriate data sources and
methods for analyzing, visualizing, and interpreting
the results. Finally, we present a case study that
applies the described process to the domain of
communication science by creating approaches that aid
domain experts in locating, tracking, analyzing, and,
finally, better understanding the dynamics of media
criticism. The study clearly demonstrates the potential
of the presented method, but also shows that
data-driven research approaches require a tighter
integration with the methodological framework of the
target discipline to really provide a significant
impact on the target discipline.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chatzoglou:2021:MTS,
author = "Efstratios Chatzoglou and Georgios Kambourakis and
Vasileios Kouliaridis",
title = "A Multi-Tier Security Analysis of Official Car
Management Apps for {Android}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "58",
day = "25",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030058",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/58",
abstract = "Using automotive smartphone applications (apps)
provided by car manufacturers may offer numerous
advantages to the vehicle owner, including improved
safety, fuel efficiency, anytime monitoring of vehicle
data, and timely over-the-air delivery of software
updates. On the other hand, the continuous tracking of
the vehicle data by such apps may also pose a risk to
the car owner, if, say, sensitive pieces of information
are leaked to third parties or the app is vulnerable to
attacks. This work contributes the first to our
knowledge full-fledged security assessment of all the
official single-vehicle management apps offered by
major car manufacturers who operate in Europe. The apps
are scrutinised statically with the purpose of not only
identifying surfeits, say, in terms of the permissions
requested, but also from a vulnerability assessment
viewpoint. On top of that, we run each app to identify
possible weak security practices in the owner-to-app
registration process. The results reveal a multitude of
issues, ranging from an over-claim of sensitive
permissions and the use of possibly privacy-invasive
API calls, to numerous potentially exploitable CWE and
CVE-identified weaknesses and vulnerabilities, the, in
some cases, excessive employment of third-party
trackers, and a number of other flaws related to the
use of third-party software libraries, unsanitised
input, and weak user password policies, to mention just
a few.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Samala:2021:IDU,
author = "Thirupathi Samala and Vijaya Kumar Manupati and Maria
Leonilde R. Varela and Goran Putnik",
title = "Investigation of Degradation and Upgradation Models
for Flexible Unit Systems: a Systematic Literature
Review",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "57",
day = "25",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030057",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/57",
abstract = "Research on flexible unit systems (FUS) with the
context of descriptive, predictive, and prescriptive
analysis have remarkably progressed in recent times,
being now reinforced in the current Industry 4.0 era
with the increased focus on integration of distributed
and digitalized systems. In the existing literature,
most of the work focused on the individual
contributions of the above mentioned three analyses.
Moreover, the current literature is unclear with
respect to the integration of degradation and
upgradation models for FUS. In this paper, a systematic
literature review on degradation, residual life
distribution, workload adjustment strategy,
upgradation, and predictive maintenance as major
performance measures to investigate the performance of
the FUS has been considered. In order to identify the
key issues and research gaps in the existing
literature, the 59 most relevant papers from 2009 to
2020 have been sorted and analyzed. Finally, we
identify promising research opportunities that could
expand the scope and depth of FUS.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ahadi:2021:OPL,
author = "Alireza Ahadi and Matt Bower and Abhay Singh and
Michael Garrett",
title = "Online Professional Learning in Response to {COVID-19}
--- Towards Robust Evaluation",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "3",
pages = "56",
day = "24",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13030056",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 26 12:47:18 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/3/56",
abstract = "As COVID-19 continues to impact upon education
worldwide, systems and organizations are rapidly
transiting their professional learning to online mode.
This raises concerns, not simply about whether online
professional learning can result in equivalent outcomes
to face-to-face learning, but more importantly about
how to best evaluate online professional learning so we
can iteratively improve our approaches. This case study
analyses the evaluation of an online teacher
professional development workshop for the purpose of
critically reflecting upon the efficacy of workshop
evaluation techniques. The evaluation approach was
theoretically based in a synthesis of six seminal
workshop evaluation models, and structured around eight
critical dimensions of educational technology
evaluation. The approach involving collection of
pre-workshop participant background information,
pre-/post-teacher perceptions data, and post-workshop
focus group perceptions, enabled the changes in teacher
knowledge, skills, and beliefs to be objectively
evaluated, at the same time as providing qualitative
information to effectively improve future iterations of
the workshops along a broad range of dimensions. The
evaluation approach demonstrated that the professional
learning that was shifted into online mode in response
to COVID-19 could unequivocally result in significant
improvements to professional learning outcomes. More
importantly, the evaluation approach is critically
contrasted with previous evaluation models, and a
series of recommendations for the evaluation of
technology-enhanced teacher professional development
workshops are proposed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ferreira:2021:PIM,
author = "Ana Teresa Ferreira and Carlos Fernandes and Jos{\'e}
Vieira and Filipe Portela",
title = "Pervasive Intelligent Models to Predict the Outcome of
{COVID-19} Patients",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "4",
pages = "102",
day = "20",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13040102",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 23 17:52:28 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/4/102",
abstract = "Nowadays, there is an increasing need to understand
the behavior of COVID-19. After the Directorate-General
of Health of Portugal made available the infected
patient's data, it became possible to analyze it and
gather some conclusions, obtaining a better
understanding of the matter. In this context, the
project developed-ioCOVID19-Intelligent Decision
Support Platform aims to identify patterns and develop
intelligent models to predict and support clinical
decisions. This article explores which typologies are
associated with different outcomes to help clinicians
fight the virus with a decision support system. So, to
achieve this purpose, classification algorithms were
used, and one target was studied-Patients outcome, that
is, to predict if the patient will die or recover.
Regarding the obtained results, the model that stood
out is composed of scenario s4 (composed of all
comorbidities, symptoms, and age), the decision tree
algorithm, and the oversampling sampling method. The
obtained results by the studied metrics were (in order
of importance): Sensitivity of 95.20\%, Accuracy of
90.67\%, and Specificity of 86.08\%. The models were
deployed as a service, and they are part of a clinical
decision support system that is available for
authorized users anywhere and anytime.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dorobantiu:2021:CCE,
author = "Alexandru Dorobantiu and Valentin Ogrean and Remus
Brad",
title = "Coronary Centerline Extraction from {CCTA} Using
{$3$D-UNet}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "4",
pages = "101",
day = "19",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13040101",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 23 17:52:28 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/4/101",
abstract = "The mesh-type coronary model, obtained from
three-dimensional reconstruction using the sequence of
images produced by computed tomography (CT), can be
used to obtain useful diagnostic information, such as
extracting the projection of the lumen (planar
development along an artery). In this paper, we have
focused on automated coronary centerline extraction
from cardiac computed tomography angiography (CCTA)
proposing a {$3$D} version of U-Net architecture,
trained with a novel loss function and with augmented
patches. We have obtained promising results for
accuracy (between 90-95\%) and overlap (between
90-94\%) with various network training configurations
on the data from the Rotterdam Coronary Artery
Centerline Extraction benchmark. We have also
demonstrated the ability of the proposed network to
learn despite the huge class imbalance and sparse
annotation present in the training data.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sansevere:2021:LPB,
author = "Kayla S. Sansevere and Nathan Ward",
title = "Linking Phubbing Behavior to Self-Reported Attentional
Failures and Media Multitasking",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "4",
pages = "100",
day = "14",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13040100",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 23 17:52:28 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/4/100",
abstract = "Phubbing, or using a phone to snub another person, has
been investigated through social and personality
frameworks. Phubbing involves attending to and
performing competing tasks, implying the involvement of
attentional abilities. Yet, past research has not yet
used a cognitive framework to establish a link between
phubbing and attention. Using self-report data from a
large online sample, we explored the associations
between phubbing and everyday attentional failures.
Phubbing was associated with difficulties in
attentional shifting and distractibility, frequent
attentional lapses, spontaneous and deliberate mind
wandering, and attention-related cognitive errors. When
examining these attention variables alongside several
psychosocial and personality variables,
attention-related cognitive errors acted as the biggest
predictor of phubbing behavior. Phubbing was also
positively correlated with media multitasking, which is
a conceptually similar yet distinct technology use
behavior. The results suggest that perceived everyday
attentional failures are strongly associated with, and
to an extent can predict, phubbing behavior, even more
so than some social and personality variables.
Technology has incorporated itself as a necessity, or
at the very least a favored convenience, in most
people's lives. Characterizing technology multitasking
behaviors from a variety of frameworks can help us
better understand who is engaging in these behaviors
and why.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vazquez-Lopez:2021:IRA,
author = "Alba V{\'a}zquez-L{\'o}pez and Mart{\'\i}n
Barrasa-Rioja and Manuel Marey-Perez",
title = "{ICT} in Rural Areas from the Perspective of Dairy
Farming: a Systematic Review",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "4",
pages = "99",
day = "13",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13040099",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 23 17:52:28 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/4/99",
abstract = "This study presents a systematic review of 169 papers
concerning the ICT (Information and Communication
Technologies) related to rural areas, specifically to
dairy farms. The objective was to delve into the
relationship between dairy farmers and the
administrative authorities via e-government, comparing
this area to another eight concerning the farmer's
needs and expectations in relation to the ICT in
different fields of their business. We observed that
areas such as connectivity and digital inclusion are
the most covered areas not only at the study level but
also at the government level since countries all over
the world are trying to develop politics to put an end
to the so-called ``digital divide,'' which affects
rural areas more intensely. This is increasing due to
the growing technological innovations. The areas of the
market, production, financial development, management
and counseling, Smart Farming, and Internet of Things
have been approached, associated with the ICT in dairy
farms, showing in the latter two an increasing number
of papers in the last few years. The area of public
administration in relation to dairy farms has also been
covered, being remarkable the low number of pieces of
research concerning the interaction by the farmers,
more specifically by dairy farmers, with the public
administration, which is surprising due to the new
global need and especially in the European Union (EU)
of interacting with it telematically by all legal
entities. The results show that there are still
barriers to the implementation of the electronic
government (e-government) since the websites do not
meet the user's expectations. Therefore, this study
lays the ground for future research on this area. As a
graphical abstract of the contributions of this paper,
we present a graphic summary, where the different
contributions by areas and expressed in percentage
values are shown.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jimenez:2021:DTB,
author = "Mar{\'\i}a Artemisa Sangerm{\'a}n Jim{\'e}nez and
Pedro Ponce",
title = "Differentiated Teaching Based on Standardized Metrics
Integrating Fuzzy Logic Type 2 Detection Theory: High
School Case-{PrepaTec}, {Mexico}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "4",
pages = "98",
day = "13",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13040098",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 23 17:52:28 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/4/98",
abstract = "Universities and high schools constantly research and
develop educational methods to improve the student
learning process. This paper presents a novel
educational methodology for students to obtain better
learning results in Spanish grammar through an
intervention that fuses differentiated instructions,
standardized evaluation, and a Fuzzy Logic Type 2
system. This successful case study in a Mexico City
high school reports improved Spanish grammar outcomes
after the intervention. Before then, 79\% of the
students did not obtain satisfactory scores in a
national Spanish evaluation. This educational
methodology uses a flexible intervention plan that
could be replicated or tailored for various educational
scenarios and topics using the same framework.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Villegas-Ch:2021:IVA,
author = "William Villegas-Ch and Joselin Garc{\'\i}a-Ortiz and
Karen Mullo-Ca and Santiago S{\'a}nchez-Viteri and
Milton Roman-Ca{\~n}izares",
title = "Implementation of a Virtual Assistant for the Academic
Management of a University with the Use of Artificial
Intelligence",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "4",
pages = "97",
day = "13",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13040097",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 23 17:52:28 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/4/97",
abstract = "Currently, private universities, as a result of the
pandemic that the world is facing, are going through
very delicate moments in several areas, both academic
and financial. Academically, there are learning
problems and these are directly related to the dropout
rate, which brings financial problems. Added to this
are the economic problems caused by the pandemic, where
the rates of students who want to access a private
education have dropped considerably. For this reason,
it is necessary for all private universities to have
support to improve their student income and avoid cuts
in budgets and resources. However, the academic part
represents a great effort to fulfill their academic
activities, which are the priority, with attention on
those interested in pursuing a training programs. To
solve these problems, it is important to integrate
technologies such as Chatbots, which use artificial
intelligence in such a way that tasks such as providing
information on an academic courses are addressed by
them, reducing the administrative burden and improving
the user experience. At the same time, this encourages
people to be a part of the college.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Khan:2021:SCL,
author = "Shawal Khan and Ishita Sharma and Mazzamal Aslam and
Muhammad Zahid Khan and Shahzad Khan",
title = "Security Challenges of Location Privacy in {VANETs}
and State-of-the-Art Solutions: a Survey",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "4",
pages = "96",
day = "10",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13040096",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 23 17:52:28 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/4/96",
abstract = "A Vehicular Ad-hoc Network (VANET) comprises a group
of moving or stationary vehicles connected by a
wireless network. VANETs play a vital role in providing
safety and comfort to drivers in vehicular
environments. They provide smart traffic control and
real-time information, event allocation. VANETs have
received attention in support of safe driving,
intelligent navigation, emergency and entertainment
applications in vehicles. Nevertheless, these
increasingly linked vehicles pose a range of new safety
and security risks to both the host and its associated
properties and may even have fatal consequences.
Violations of national privacy and vehicle identities
are a major obstacle to introducing forced contact
protocols in vehicles. Location privacy refers to the
privacy of the vehicle (driver) and the location of the
vehicle. Whenever a vehicle sends a message, no one but
authorized entities should know their real identity and
location of the vehicle. All the messages sent by the
vehicle must be authenticated before processing, hence
location privacy is an important design aspect to be
considered in VANETs operations. The novelty of this
paper is that it specifically reviews location privacy
in VANETs in terms of operational and safety concerns.
Furthermore, it presents a critical analysis of various
attacks, identity thefts, manipulation and other
techniques in vogue for location privacy protection
available in state-of-the-art solutions for VANETs. The
efforts in this paper will help researchers to develop
a great breadth of understanding pertaining to location
privacy issues and various security threats encountered
by VANETs and present the critical analysis of the
available state-of-the- art solutions to maintain
location privacy in VANETs.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rocha:2021:BAA,
author = "Geneci da Silva Ribeiro Rocha and Let{\'\i}cia de
Oliveira and Edson Talamini",
title = "Blockchain Applications in Agribusiness: a Systematic
Review",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "4",
pages = "95",
day = "08",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13040095",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 23 17:52:28 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/4/95",
abstract = "Blockchain is a technology that can be applied in
different sectors to solve various problems. As a
complex system, agribusiness presents many
possibilities to take advantage of blockchain
technology. The main goal of this paper is to identify
the purposes for which blockchain has been applied in
the agribusiness sector, for which a PRISMA-based
systematic review was carried out. The scientific
literature corpus was accessed and selected from
Elsevier's Scopus and ISI of Knowledge's Web of Science
(WoS) platforms, using the PRISMA protocol procedures.
Seventy-one articles were selected for analysis.
Blockchain application in agribusiness is a novel
topic, with the first publication dating from 2016. The
technological development prevails more than blockchain
applications since it has been addressed mainly in the
Computer Sciences and Engineering. Blockchain
applications for agribusiness management of financial,
energy, logistical, environmental, agricultural,
livestock, and industrial purposes have been reported
in the literature. The findings suggest that blockchain
brings many benefits when used in agribusiness supply
chains. We concluded that the research on blockchain
applications in agribusiness is only at an early stage,
as many prototypes are being developed and tested in
the laboratory. In the near future, blockchain will be
increasingly applied across all economic sectors,
including agribusiness, promoting greater reliability
and agility in information with a reduced cost. Several
gaps for future studies were observed, with significant
value for science, industry, and society.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fang:2021:PPM,
author = "Haokun Fang and Quan Qian",
title = "Privacy Preserving Machine Learning with Homomorphic
Encryption and Federated Learning",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "4",
pages = "94",
day = "08",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13040094",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 23 17:52:28 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/4/94",
abstract = "Privacy protection has been an important concern with
the great success of machine learning. In this paper,
it proposes a multi-party privacy preserving machine
learning framework, named PFMLP, based on partially
homomorphic encryption and federated learning. The core
idea is all learning parties just transmitting the
encrypted gradients by homomorphic encryption. From
experiments, the model trained by PFMLP has almost the
same accuracy, and the deviation is less than 1\%.
Considering the computational overhead of homomorphic
encryption, we use an improved Paillier algorithm which
can speed up the training by 25-28\%. Moreover,
comparisons on encryption key length, the learning
network structure, number of learning clients, etc. are
also discussed in detail in the paper.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Khalil:2021:IDI,
author = "Samar Samir Khalil and Sherin M. Youssef and Sherine
Nagy Saleh",
title = "{iCaps-Dfake}: an Integrated Capsule-Based Model for
Deepfake Image and Video Detection",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "4",
pages = "93",
day = "05",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13040093",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 23 17:52:28 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/4/93",
abstract = "Fake media is spreading like wildfire all over the
internet as a result of the great advancement in
deepfake creation tools and the huge interest
researchers and corporations are showing to explore its
limits. Now anyone can create manipulated unethical
media forensics, defame, humiliate others or even scam
them out of their money with a click of a button. In
this research a new deepfake detection approach,
iCaps-Dfake, is proposed that competes with
state-of-the-art techniques of deepfake video detection
and addresses their low generalization problem. Two
feature extraction methods are combined, texture-based
Local Binary Patterns (LBP) and Convolutional Neural
Networks (CNN) based modified High-Resolution Network
(HRNet), along with an application of capsule neural
networks (CapsNets) implementing a concurrent routing
technique. Experiments have been conducted on large
benchmark datasets to evaluate the performance of the
proposed model. Several performance metrics are applied
and experimental results are analyzed. The proposed
model was primarily trained and tested on the
DeepFakeDetectionChallenge-Preview (DFDC-P) dataset
then tested on Celeb-DF to examine its generalization
capability. Experiments achieved an Area-Under Curve
(AUC) score improvement of 20.25\% over
state-of-the-art models.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Augello:2021:SEE,
author = "Agnese Augello and Ignazio Infantino and Giovanni
Pilato and Gianpaolo Vitale",
title = "Site Experience Enhancement and Perspective in
Cultural Heritage Fruition --- a Survey on New
Technologies and Methodologies Based on a
{``Four-Pillars''} Approach",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "4",
pages = "92",
day = "04",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13040092",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 23 17:52:28 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/4/92",
abstract = "This paper deals with innovative fruition modalities
of cultural heritage sites. Based on two ongoing
experiments, four pillars are considered, that is, User
Localization, Multimodal Interaction, User
Understanding and Gamification. A survey of the
existing literature regarding one or more issues
related to the four pillars is proposed. It aims to put
in evidence the exploitation of these contributions to
cultural heritage. It is discussed how a cultural site
can be enriched, extended and transformed into an
intelligent multimodal environment in this perspective.
This new augmented environment can focus on the
visitor, analyze his activity and behavior, and make
his experience more satisfying, fulfilling and unique.
After an in-depth overview of the existing technologies
and methodologies for the fruition of cultural interest
sites, the two experiments are described in detail and
the authors' vision of the future is proposed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ramirez-Montoya:2021:CTP,
author = "Mar{\'\i}a Soledad Ram{\'\i}rez-Montoya and Mar{\'\i}a
Isabel Loaiza-Aguirre and Alexandra
Z{\'u}{\~n}iga-Ojeda and May Portuguez-Castro",
title = "Characterization of the Teaching Profile within the
Framework of Education 4.0",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "4",
pages = "91",
day = "01",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13040091",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 23 17:52:28 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/4/91",
abstract = "The authors of the Education 4.0 concept postulated a
flexible combination of digital literacy, critical
thinking, and problem-solving in educational
environments linked to real-world scenarios. Therefore,
teachers have been challenged to develop new methods
and resources to integrate into their planning in order
to help students develop these desirable and necessary
skills; hence, the question: What are the
characteristics of a teacher to consider within the
framework of Education 4.0? This study was conducted in
a higher education institution in Ecuador, with the aim
to identify the teaching profile required in new
undergraduate programs within the framework of
Education 4.0 in order to contribute to decision-making
about teacher recruitment, professional training and
evaluation, human talent management, and institutional
policies interested in connecting competencies with the
needs of society. Descriptive and exploratory
approaches, where we applied quantitative and
qualitative instruments (surveys) to 337 undergraduate
students in education programs and 313 graduates, were
used. We also included interviews with 20 experts in
the educational field and five focus groups with 32
chancellors, school principals, university professors,
and specialists in the educational area. The data were
triangulated, and the results were organized into the
categories of (a) processes as facilitators (b), soft
skills, (c) human sense, and (d) the use of
technologies. The results outlined the profile of a
professor as a specialized professional with
competencies for innovation, complex problem solving,
entrepreneurship, collaboration, international
perspective, leadership, and connection with the needs
of society. This research study may be of value to
administrators, educational and social entrepreneurs,
trainers, and policy-makers interested in implementing
innovative training programs and in supporting
management and policy decisions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kaddoura:2021:PDD,
author = "Sanaa Kaddoura and Ramzi A. Haraty and Karam {Al
Kontar} and Omar Alfandi",
title = "A Parallelized Database Damage Assessment Approach
after Cyberattack for Healthcare Systems",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "4",
pages = "90",
day = "31",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13040090",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 23 17:52:28 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/4/90",
abstract = "In the current Internet of things era, all companies
shifted from paper-based data to the electronic format.
Although this shift increased the efficiency of data
processing, it has security drawbacks. Healthcare
databases are a precious target for attackers because
they facilitate identity theft and cybercrime. This
paper presents an approach for database damage
assessment for healthcare systems. Inspired by the
current behavior of COVID-19 infections, our approach
views the damage assessment problem the same way. The
malicious transactions will be viewed as if they are
COVID-19 viruses, taken from infection onward. The
challenge of this research is to discover the infected
transactions in a minimal time. The proposed parallel
algorithm is based on the transaction dependency
paradigm, with a time complexity $ O((M + N Q + N^3) /
L) $ ($M$ = total number of transactions under
scrutiny, $N$ = number of malicious and affected
transactions in the testing list, $Q$ = time for
dependency check, and $L$ = number of threads used).
The memory complexity of the algorithm is $ O(N + K L)$
($N$ = number of malicious and affected transactions,
$K$ = number of transactions in one area handled by one
thread, and $L$ = number of threads). Since the damage
assessment time is directly proportional to the
denial-of-service time, the proposed algorithm provides
a minimized execution time. Our algorithm is a novel
approach that outperforms other existing algorithms in
this domain in terms of both time and memory, working
up to four times faster in terms of time and with
120,000 fewer bytes in terms of memory.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Peng:2021:OCD,
author = "Yubo Peng and Bofeng Zhang and Furong Chang",
title = "Overlapping Community Detection of Bipartite Networks
Based on a Novel Community Density",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "4",
pages = "89",
day = "31",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13040089",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 23 17:52:28 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/4/89",
abstract = "Community detection plays an essential role in
understanding network topology and mining underlying
information. A bipartite network is a complex network
with more important authenticity and applicability than
a one-mode network in the real world. There are many
communities in the network that present natural
overlapping structures in the real world. However, most
of the research focuses on detecting non-overlapping
community structures in the bipartite network, and the
resolution of the existing evaluation function for the
community structure's merits are limited. So, we
propose a novel function for community detection and
evaluation of the bipartite network, called community
density D. And based on community density, a bipartite
network community detection algorithm DSNE (Density
Sub-community Node-pair Extraction) is proposed, which
is effective for overlapping community detection from a
micro point of view. The experiments based on
artificially-generated networks and real-world networks
show that the DSNE algorithm is superior to some
existing excellent algorithms; in comparison, the
community density (D) is better than the bipartite
network's modularity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2021:RIG,
author = "Xiaoyuan Wang and Junyan Han and Chenglin Bai and
Huili Shi and Jinglei Zhang and Gang Wang",
title = "Research on the Impacts of Generalized Preceding
Vehicle Information on Traffic Flow in {V2X}
Environment",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "4",
pages = "88",
day = "30",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13040088",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 23 17:52:28 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/4/88",
abstract = "With the application of vehicles to everything (V2X)
technologies, drivers can obtain massive traffic
information and adjust their car-following behavior
according to the information. The macro-characteristics
of traffic flow are essentially the overall expression
of the micro-behavior of drivers. There are some
shortcomings in the previous researches on traffic flow
in the V2X environment, which result in difficulties to
employ the related models or methods in exploring the
characteristics of traffic flow affected by the
information of generalized preceding vehicles (GPV).
Aiming at this, a simulation framework based on the
car-following model and the cellular automata (CA) is
proposed in this work, then the traffic flow affected
by the information of GPV is simulated and analyzed
utilizing this framework. The research results suggest
that the traffic flow, which is affected by the
information of GPV in the V2X environment, would
operate with a higher value of velocity, volume as well
as jamming density and can maintain the free flow state
with a much higher density of vehicles. The simulation
framework constructed in this work can provide a
reference for further research on the characteristics
of traffic flow affected by various information in the
V2X environment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bouloukakis:2021:PAI,
author = "Georgios Bouloukakis and Ioannis Moscholios and
Nikolaos Georgantas and Val{\'e}rie Issarny",
title = "Performance Analysis of {Internet of Things}
Interactions via Simulation-Based Queueing Models",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "4",
pages = "87",
day = "29",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13040087",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 23 17:52:28 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/4/87",
abstract = "Numerous middleware application programming interfaces
(APIs) and protocols were introduced in the literature
in order to facilitate the application development of
the Internet of Things (IoT). Such applications are
built on reliable or even unreliable protocols that may
implement different quality-of-service (QoS) delivery
modes. The exploitation of these protocols, APIs and
QoS modes, can satisfy QoS requirements in critical IoT
applications (e.g., emergency response operations). To
study QoS in IoT applications, it is essential to
leverage a performance analysis methodology.
Queueing-network models offer a modeling and analysis
framework that can be adopted for the IoT interactions
of QoS representation through either analytical or
simulation models. In this paper, various types of
queueing models are presented that can be used for the
representation of various QoS settings of IoT
interactions. In particular, we propose queueing models
to represent message-drop probabilities, intermittent
mobile connectivity, message availability or validity,
the prioritization of important information, and the
processing or transmission of messages. Our simulation
models demonstrate the significant effect on delivery
success rates and response times when QoS settings are
varied.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yiu:2021:TBE,
author = "Neo C. K. Yiu",
title = "Toward Blockchain-Enabled Supply Chain
Anti-Counterfeiting and Traceability",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "4",
pages = "86",
day = "29",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13040086",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 23 17:52:28 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/4/86",
abstract = "Existing product anti-counterfeiting and traceability
solutions across today's internationally spanning
supply chain networks are indeed developed and
implemented with centralized system architecture
relying on centralized authorities or intermediaries.
Vulnerabilities of centralized product
anti-counterfeiting solutions could possibly lead to
system failure or susceptibility of malicious
modifications performed on product records or various
potential attacks to the system components by dishonest
participant nodes traversing along the supply chain.
Blockchain technology has progressed from simply being
a use case of immutable ledger for cryptocurrency
transactions, to a programmable interactive environment
of developing decentralized and reliable applications
addressing different use cases globally. Key areas of
decentralization, fundamental system requirements, and
feasible mechanisms of developing decentralized product
anti-counterfeiting and traceability ecosystems
utilizing blockchain technology are identified in this
research, via a series of security analyses performed
against solutions currently implemented in supply chain
industry with centralized architecture. The
decentralized solution will be a secure and immutable
scientific data provenance tracking and management
platform where provenance records, providing compelling
properties on data integrity of luxurious goods, are
recorded and verified automatically across the supply
chain.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Reali:2021:TLN,
author = "Gianluca Reali and Mauro Femminella",
title = "Two-Layer Network Caching for Different Service
Requirements",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "4",
pages = "85",
day = "27",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13040085",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 23 17:52:28 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/4/85",
abstract = "Network caching is a technique used to speed-up user
access to frequently requested contents in complex data
networks. This paper presents a two-layer overlay
network caching system for content distribution. It is
used to define some caching scenarios with increasing
complexity, which refers to real situations, including
mobile 5G connectivity. For each scenario our aim is to
maximize the hit ratio, which leads to the formulation
of NP-complete optimization problems. The heuristic
solutions proposed are based on the theory of the
maximization of monotone submodular functions under
matroid constraints. After the determination of the
approximation ratio of the greedy heuristic algorithms
proposed, a numerical performance analysis is shown.
This analysis includes a comparison with the
Least-Frequently Used (LFU) eviction strategy adapted
to the analyzed systems. Results show very good
performance, under the hypotheses of either known or
unknown popularity of contents.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yiu:2021:DSC,
author = "Neo C. K. Yiu",
title = "Decentralizing Supply Chain Anti-Counterfeiting and
Traceability Systems Using Blockchain Technology",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "4",
pages = "84",
day = "25",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13040084",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 23 17:52:28 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/4/84",
abstract = "An interesting research problem in the supply chain
industry is evaluating and determining the provenance
of physical goods-demonstrating the authenticity of
luxury goods such as bottled wine. However, many supply
chain systems and networks have been built and
implemented with centralized system architecture,
relying on centralized authorities or any form of
intermediary, and leading to issues such as
single-point processing, storage and failure, which
could be susceptible to malicious modifications to
product records or various potential attacks to system
components by dishonest participant nodes traversing
along the supply chain. Blockchain technology has
evolved from merely being a decentralized, distributed
and immutable ledger of cryptocurrency transactions to
a programmable interactive environment for building
decentralized and reliable applications addressing
different use-cases and existing problems in the world.
In this research, with a chosen research method of
proof-by-demonstration, the Decentralized NFC-Enabled
Anti-Counterfeiting System (dNAS) is proposed and
developed, decentralizing a legacy anti-counterfeiting
system of the supply-chain industry using Blockchain
technology to facilitate trustworthy data provenance
retrieval, verification and management, as well as
strengthening the capability of the product's
anti-counterfeiting and traceability qualities in the
wine industry, with the capacity to further extend this
to the supply chain industry as a whole. The proposed
dNAS utilizes a decentralized blockchain network with a
consensus protocol compatible with the concept of
enterprise blockchain, programmable smart contracts and
a distributed file storage system to develop a secure
and immutable scientific-data provenance tracking and
management platform on which provenance records,
providing compelling properties of the data integrity
of luxurious goods, are recorded, verified and
validated automatically.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bendechache:2021:SER,
author = "Malika Bendechache and Sergej Svorobej and Patricia
Takako Endo and Adrian Mihai and Theo Lynn",
title = "Simulating and Evaluating a Real-World {ElasticSearch}
System Using the {RECAP DES} Simulator",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "4",
pages = "83",
day = "24",
month = mar,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13040083",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 23 17:52:28 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/13/4/83",
abstract = "Simulation has become an indispensable technique for
modelling and evaluating the performance of large-scale
systems efficiently and at a relatively low cost.
ElasticSearch (ES) is one of the most popular open
source large-scale distributed data indexing systems
worldwide. In this paper, we use the RECAP Discrete
Event Simulator (DES) simulator, an extension of
CloudSimPlus, to model and evaluate the performance of
a real-world cloud-based ES deployment by an Irish
small and medium-sized enterprise (SME), Opening.io.
Following simulation experiments that explored how much
query traffic the existing Opening.io architecture
could cater for before performance degradation, a
revised architecture was proposed, adding a new virtual
machine in order to dissolve the bottleneck. The
simulation results suggest that the proposed improved
architecture can handle significantly larger query
traffic (about 71\% more) than the current architecture
used by Opening.io. The results also suggest that the
RECAP DES simulator is suitable for simulating ES
systems and can help companies to understand their
infrastructure bottlenecks under various traffic
scenarios and inform optimisation and scalability
decisions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Libbi:2021:GST,
author = "Claudia Alessandra Libbi and Jan Trienes and Dolf
Trieschnigg and Christin Seifert",
title = "Generating Synthetic Training Data for Supervised
De-Identification of Electronic Health Records",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "136",
day = "20",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050136",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/136",
abstract = "A major hurdle in the development of natural language
processing (NLP) methods for Electronic Health Records
(EHRs) is the lack of large, annotated datasets.
Privacy concerns prevent the distribution of EHRs, and
the annotation of data is known to be costly and
cumbersome. Synthetic data presents a promising
solution to the privacy concern, if synthetic data has
comparable utility to real data and if it preserves the
privacy of patients. However, the generation of
synthetic text alone is not useful for NLP because of
the lack of annotations. In this work, we propose the
use of neural language models (LSTM and GPT-2) for
generating artificial EHR text jointly with annotations
for named-entity recognition. Our experiments show that
artificial documents can be used to train a supervised
named-entity recognition model for de-identification,
which outperforms a state-of-the-art rule-based
baseline. Moreover, we show that combining real data
with synthetic data improves the recall of the method,
without manual annotation effort. We conduct a user
study to gain insights on the privacy of artificial
text. We highlight privacy risks associated with
language models to inform future research on
privacy-preserving automated text generation and
metrics for evaluating privacy-preservation during text
generation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Scata:2021:CPN,
author = "Marialisa Scat{\'a} and Barbara Attanasio and Aurelio
{La Corte}",
title = "Cognitive Profiling of Nodes in {6G} through Multiplex
Social Network and Evolutionary Collective Dynamics",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "135",
day = "20",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050135",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/135",
abstract = "Complex systems are fully described by the
connectedness of their elements studying how these
develop a collective behavior, interacting with each
other following their inner features, and the structure
and dynamics of the entire system. The forthcoming 6G
will attempt to rewrite the communication networks'
perspective, focusing on a radical revolution in the
way entities and technologies are conceived, integrated
and used. This will lead to innovative approaches with
the aim of providing new directions to deal with future
network challenges posed by the upcoming 6G, thus the
complex systems could become an enabling set of tools
and methods to design a self-organized, resilient and
cognitive network, suitable for many application
fields, such as digital health or smart city living
scenarios. Here, we propose a complex profiling
approach of heterogeneous nodes belonging to the
network with the goal of including the multiplex social
network as a mathematical representation that enables
us to consider multiple types of interactions, the
collective dynamics of diffusion and competition,
through social contagion and evolutionary game theory,
and the mesoscale organization in communities to drive
learning and cognition. Through a framework, we detail
the step by step modeling approach and show and discuss
our findings, applying it to a real dataset, by
demonstrating how the proposed model allows us to
detect deeply complex knowable roles of nodes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kenyeres:2021:CSD,
author = "Martin Kenyeres and Jozef Kenyeres",
title = "Comparative Study of Distributed Consensus Gossip
Algorithms for Network Size Estimation in Multi-Agent
Systems",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "134",
day = "18",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050134",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/134",
abstract = "Determining the network size is a critical process in
numerous areas (e.g., computer science, logistic,
epidemiology, social networking services, mathematical
modeling, demography, etc.). However, many modern
real-world systems are so extensive that measuring
their size poses a serious challenge. Therefore, the
algorithms for determining/estimating this parameter in
an effective manner have been gaining popularity over
the past decades. In the paper, we analyze five
frequently applied distributed consensus gossip-based
algorithms for network size estimation in multi-agent
systems (namely, the Randomized gossip algorithm, the
Geographic gossip algorithm, the Broadcast gossip
algorithm, the Push-Sum protocol, and the Push-Pull
protocol). We examine the performance of the mentioned
algorithms with bounded execution over random geometric
graphs by applying two metrics: the number of sent
messages required for consensus achievement and the
estimation precision quantified as the median deviation
from the real value of the network size. The
experimental part consists of two scenarios-the
consensus achievement is conditioned by either the
values of the inner states or the network size
estimates-and, in both scenarios, either the
best-connected or the worst-connected agent is chosen
as the leader. The goal of this paper is to identify
whether all the examined algorithms are applicable to
estimating the network size, which algorithm provides
the best performance, how the leader selection can
affect the performance of the algorithms, and how to
most effectively configure the applied stopping
criterion.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jung:2021:BIM,
author = "Hyunjun Jung and Dongwon Jeong",
title = "Blockchain Implementation Method for Interoperability
between {CBDCs}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "133",
day = "18",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050133",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/133",
abstract = "Central Bank Digital Currency (CBDC) is a digital
currency issued by a central bank. Motivated by the
financial crisis and prospect of a cashless society,
countries are researching CBDC. Recently, global
consideration has been given to paying basic income to
avoid consumer sentiment shrinkage and recession due to
epidemics. CBDC is coming into the spotlight as the way
to manage the public finance policy of nations
comprehensively. CBDC is studied by many countries. The
bank of the Bahamas released Sand Dollar. Each
country's central bank should consider the situation in
which CBDCs are exchanged. The transaction of the CDDB
is open data. Transaction registers CBDC exchange
information of the central bank in the blockchain. Open
data on currency exchange between countries will
provide information on the flow of money between
countries. This paper proposes a blockchain system and
management method based on the ISO/IEC 11179 metadata
registry for exchange between CBDCs that records
transactions between registered CBDCs. Each country's
CBDC will have a different implementation and time of
publication. We implement the blockchain system and
experiment with the operation method, measuring the
block generation time of blockchains using the proposed
method.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pickering:2021:TVI,
author = "Brian Pickering",
title = "Trust, but Verify: Informed Consent, {AI}
Technologies, and Public Health Emergencies",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "132",
day = "18",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050132",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/132",
abstract = "To use technology or engage with research or medical
treatment typically requires user consent: agreeing to
terms of use with technology or services, or providing
informed consent for research participation, for
clinical trials and medical intervention, or as one
legal basis for processing personal data. Introducing
AI technologies, where explainability and
trustworthiness are focus items for both government
guidelines and responsible technologists, imposes
additional challenges. Understanding enough of the
technology to be able to make an informed decision, or
consent, is essential but involves an acceptance of
uncertain outcomes. Further, the contribution of
AI-enabled technologies not least during the COVID-19
pandemic raises ethical concerns about the governance
associated with their development and deployment. Using
three typical scenarios-contact tracing, big data
analytics and research during public emergencies-this
paper explores a trust-based alternative to consent.
Unlike existing consent-based mechanisms, this approach
sees consent as a typical behavioural response to
perceived contextual characteristics. Decisions to
engage derive from the assumption that all relevant
stakeholders including research participants will
negotiate on an ongoing basis. Accepting dynamic
negotiation between the main stakeholders as proposed
here introduces a specifically socio-psychological
perspective into the debate about human responses to
artificial intelligence. This trust-based consent
process leads to a set of recommendations for the
ethical use of advanced technologies as well as for the
ethical review of applied research projects.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2021:HCS,
author = "Hongyu Liu and Rui Han",
title = "A Hierarchical Cache Size Allocation Scheme Based on
Content Dissemination in Information-Centric Networks",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "131",
day = "15",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050131",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/131",
abstract = "With the rapid growth of mass content retrieval on the
Internet, Information-Centric Network (ICN) has become
one of the hotspots in the field of future network
architectures. The in-network cache is an important
feature of ICN. For better network performance in ICN,
the cache size on each node should be allocated in
proportion to its importance. However, in some current
studies, the importance of cache nodes is usually
determined by their location in the network topology,
ignoring their roles in the actual content transmission
process. In this paper, we focus on the allocation of
cache size for each node within a given total cache
space budget. We explore the impact of heterogeneous
cache allocation on content dissemination under the
same ICN infrastructure and we quantify the importance
of nodes from content dissemination and network
topology. To this purpose, we implement a hierarchy
partitioning method based on content dissemination,
then we formulate a set of weight calculation methods
for these hierarchies and to provide a per-node cache
space allocation to allocate the total cache space
budget to each node in the network. The performance of
the scheme is evaluated on the Garr topology, and the
average hit ratio, latency, and load are compared to
show that the proposed scheme has better performance in
these aspects than other schemes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Goodell:2021:DCA,
author = "Geoffrey Goodell and Hazem Danny Al-Nakib and Paolo
Tasca",
title = "A Digital Currency Architecture for Privacy and
Owner-Custodianship",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "130",
day = "14",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050130",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/130",
abstract = "In recent years, electronic retail payment mechanisms,
especially e-commerce and card payments at the point of
sale, have increasingly replaced cash in many developed
countries. As a result, societies are losing a critical
public retail payment option, and retail consumers are
losing important rights associated with using cash. To
address this concern, we propose an approach to digital
currency that would allow people without banking
relationships to transact electronically and privately,
including both e-commerce purchases and point-of-sale
purchases that are required to be cashless. Our
proposal introduces a government-backed,
privately-operated digital currency infrastructure to
ensure that every transaction is registered by a bank
or money services business, and it relies upon
non-custodial wallets backed by privacy-enhancing
technology, such as blind signatures or zero-knowledge
proofs, to ensure that transaction counterparties are
not revealed. Our approach to digital currency can also
facilitate more efficient and transparent clearing,
settlement, and management of systemic risk. We argue
that our system can restore and preserve the salient
features of cash, including privacy,
owner-custodianship, fungibility, and accessibility,
while also preserving fractional reserve banking and
the existing two-tiered banking system. We also show
that it is possible to introduce regulation of digital
currency transactions involving non-custodial wallets
that unconditionally protect the privacy of
end-users.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alsini:2021:HRM,
author = "Areej Alsini and Du Q. Huynh and Amitava Datta",
title = "Hashtag Recommendation Methods for {Twitter} and {Sina
Weibo}: a Review",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "129",
day = "14",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050129",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/129",
abstract = "Hashtag recommendation suggests hashtags to users
while they write microblogs in social media platforms.
Although researchers have investigated various methods
and factors that affect the performance of hashtag
recommendations in Twitter and Sina Weibo, a systematic
review of these methods is lacking. The objectives of
this study are to present a comprehensive overview of
research on hashtag recommendation for tweets and
present insights from previous research papers. In this
paper, we search for articles related to our research
between 2010 and 2020 from CiteSeer, IEEE Xplore,
Springer and ACM digital libraries. From the 61
articles included in this study, we notice that most of
the research papers were focused on the textual content
of tweets instead of other data. Furthermore,
collaborative filtering methods are seldom used solely
in hashtag recommendation. Taking this perspective, we
present a taxonomy of hashtag recommendation based on
the research methodologies that have been used. We
provide a critical review of each of the classes in the
taxonomy. We also discuss the challenges remaining in
the field and outline future research directions in
this area of study.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2021:RTO,
author = "Jun Liu and Xiaohui Lian and Chang Liu",
title = "Research on Task-Oriented Computation Offloading
Decision in Space--Air--Ground Integrated Network",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "128",
day = "13",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050128",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/128",
abstract = "In Space-Air-Ground Integrated Networks (SAGIN),
computation offloading technology is a new way to
improve the processing efficiency of node tasks and
improve the limitation of computing storage resources.
To solve the problem of large delay and energy
consumption cost of task computation offloading, which
caused by the complex and variable network offloading
environment and a large amount of offloading tasks, a
computation offloading decision scheme based on Markov
and Deep Q Networks (DQN) is proposed. First, we select
the optimal offloading network based on the
characteristics of the movement of the task offloading
process in the network. Then, the task offloading
process is transformed into a Markov state transition
process to build a model of the computational
offloading decision process. Finally, the delay and
energy consumption weights are introduced into the DQN
algorithm to update the computation offloading decision
process, and the optimal offloading decision under the
low cost is achieved according to the task attributes.
The simulation results show that compared with the
traditional Lyapunov-based offloading decision scheme
and the classical Q-learning algorithm, the delay and
energy consumption are respectively reduced by 68.33\%
and 11.21\%, under equal weights when the offloading
task volume exceeds 500 Mbit. Moreover, compared with
offloading to edge nodes or backbone nodes of the
network alone, the proposed mixed offloading model can
satisfy more than 100 task requests with low energy
consumption and low delay. It can be seen that the
computation offloading decision proposed in this paper
can effectively reduce the delay and energy consumption
during the task computation offloading in the
Space-Air-Ground Integrated Network environment, and
can select the optimal offloading sites to execute the
tasks according to the characteristics of the task
itself.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Al-Maroof:2021:UAS,
author = "Rana Saeed Al-Maroof and Khadija Alhumaid and Ahmad
Qasim Alhamad and Ahmad Aburayya and Said Salloum",
title = "User Acceptance of Smart Watch for Medical Purposes:
an Empirical Study",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "127",
day = "12",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050127",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/127",
abstract = "This study aims to investigate the most effective and
interesting variables that urge use of the smartwatch
(SW) in a medical environment. To achieve this aim, the
study was framed using an innovative and integrated
research model, which is based on combining constructs
from a well-established theoretical model's TAM and
other features that are critical to the effectiveness
of SW which are content richness and personal
innovativeness. The Technology Acceptance Model (TAM)
is used to detect the determinants affecting the
adoption of SW. The current study depends on an online
questionnaire that is composed of (20) items. The
questionnaire is distributed among a group of doctors,
nurses, and administration staff in medical centers
within the UAE. The total number of respondents is
(325). The collected data were implemented to test the
study model and the proposed constructs and hypotheses
depending on the Smart PLS Software. The results of the
current study show that the main constructs in the
model contribute differently to the acceptance of SW.
Based on the previous assumption, content richness and
innovativeness are critical factors that enrich the
user's perceived usefulness. In addition, perceived
ease of use was significantly predictive of either
perceived usefulness or behavioral intention. Overall
findings suggest that SW is in high demand in the
medical field and is used as a common channel among
doctors and their patients and it facilitates the role
of transmitting information among its users. The
outcomes of the current study indicate the importance
of certain external factors for the acceptance of the
technology. The genuine value of this study lies in the
fact that it is based on a conceptual framework that
emphasizes the close relationship between the TAM
constructs of perceived usefulness and perceived ease
of use to the construct of content richness, and
innovativeness. Finally, this study helps us recognize
the embedded motives for using SW in a medical
environment, where the main motive is to enhance and
facilitate the effective roles of doctors and
patients.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rossler:2021:RVF,
author = "Jannik R{\"o}{\ss}ler and Jiachen Sun and Peter
Gloor",
title = "Reducing Videoconferencing Fatigue through Facial
Emotion Recognition",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "126",
day = "12",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050126",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/126",
abstract = "In the last 14 months, COVID-19 made face-to-face
meetings impossible and this has led to rapid growth in
videoconferencing. As highly social creatures, humans
strive for direct interpersonal interaction, which
means that in most of these video meetings the webcam
is switched on and people are ``looking each other in
the eyes''. However, it is far from clear what the
psychological consequences of this shift to virtual
face-to-face communication are and if there are methods
to alleviate ``videoconferencing fatigue''. We have
studied the influence of emotions of meeting
participants on the perceived outcome of video
meetings. Our experimental setting consisted of 35
participants collaborating in eight teams over Zoom in
a one semester course on Collaborative Innovation
Networks in bi-weekly video meetings, where each team
presented its progress. Emotion was tracked through
Zoom face video snapshots using facial emotion
recognition that recognized six emotions (happy, sad,
fear, anger, neutral, and surprise). Our dependent
variable was a score given after each presentation by
all participants except the presenter. We found that
the happier the speaker is, the happier and less
neutral the audience is. More importantly, we found
that the presentations that triggered wide swings in
``fear'' and ``joy'' among the participants are
correlated with a higher rating. Our findings provide
valuable input for online video presenters on how to
conduct better and less tiring meetings; this will lead
to a decrease in ``videoconferencing fatigue''.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vladyko:2021:TPA,
author = "Andrei Vladyko and Anastasia Spirkina and Vasiliy
Elagin",
title = "Towards Practical Applications in Modeling Blockchain
System",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "125",
day = "12",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050125",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/125",
abstract = "Like multiservice networks, blockchain technology is
currently experiencing significant development because
of its decentralization and ability to organize secure,
seamless, reliable data exchange and storage. Due to
the significant demand for the technology, there is a
need to analyze the impact of these technology
processes on network characteristics to predict traffic
behavior and ensure required quality indicators, as
well as on the stability of public communication
network elements when blockchain technology operates.
Conducting a full-scale experiment is a time-consuming
task that cannot always be accomplished, so in this
paper, the authors propose considering approaches to
modeling these systems and, as an example, propose to
use a simulation system to assess the performance of
the network and its elements.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Son:2021:DKG,
author = "Jiseong Son and Chul-Su Lim and Hyoung-Seop Shim and
Ji-Sun Kang",
title = "Development of Knowledge Graph for Data Management
Related to Flooding Disasters Using Open Data",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "124",
day = "11",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050124",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/124",
abstract = "Despite the development of various technologies and
systems using artificial intelligence (AI) to solve
problems related to disasters, difficult challenges are
still being encountered. Data are the foundation to
solving diverse disaster problems using AI, big data
analysis, and so on. Therefore, we must focus on these
various data. Disaster data depend on the domain by
disaster type and include heterogeneous data and lack
interoperability. In particular, in the case of open
data related to disasters, there are several issues,
where the source and format of data are different
because various data are collected by different
organizations. Moreover, the vocabularies used for each
domain are inconsistent. This study proposes a
knowledge graph to resolve the heterogeneity among
various disaster data and provide interoperability
among domains. Among disaster domains, we describe the
knowledge graph for flooding disasters using Korean
open datasets and cross-domain knowledge graphs.
Furthermore, the proposed knowledge graph is used to
assist, solve, and manage disaster problems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Shi:2021:CMS,
author = "Yanjun Shi and Hao Yu and Yijia Guo and Zhiheng Yuan",
title = "A Collaborative Merging Strategy with Lane Changing in
Multilane Freeway On-Ramp Area with {V2X} Network",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "123",
day = "10",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050123",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/123",
abstract = "The merging area of the freeway is an area with a high
incidence of traffic accidents. With the development of
connected and automated vehicles (CAVs) and V2X
technology, the traffic efficiency of freeway ramp
areas has been significantly improved. However, current
research mostly focuses on merging a single mainline
lane and ramp, and there are few cases of multiple
lanes. In this paper, we present a collaborative
merging model with a rule-based lane-changing strategy
in a V2X environment. First, the vehicle selects the
appropriate gap to change lanes safely without
affecting other vehicles. Meanwhile, we established a
linear time discrete model to optimize the trajectory
of vehicles in real-time. Finally, the proposed model
and strategy were implemented in SUMO and Python. The
simulation results showed that the merging model we
proposed based on the lane-changing strategy had good
performance in terms of the number of stops, average
delay, and average speed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Polasko:2021:IMU,
author = "Ken Polasko and Pedro Ponce and Arturo Molina",
title = "An Income Model Using Historical Data, Power-Law
Distributions and {Monte Carlo} Method for University
Technology Transfer Offices",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "122",
day = "06",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050122",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/122",
abstract = "Engineering education pushes the creation of new
technology to solve community problems. The process of
technology transfer promotes educational innovation in
universities, a vital process that can improve
citizens' quality of life in cities and rural
communities. As a result, university technology
transfer offices (TTOs) have to create strategies that
motivate students and researchers to generate
technology. Thus, a primary challenge that TTOs face is
to know and communicate the income potential compared
to their much more predictable and limited expense
budgets. Institutional budgeting for a TTO's growth
would be simplified if the office were on a solid
financial footing, i.e., breaking even or making a
financial return. Many offices assume that income is
unpredictable, that it is a lottery, luck, and more
stakes in the fire improve the odds of hitting a
winner, etc. These common assumptions or beliefs
provide only a vague insight into how to move an
intellectual property (IP) portfolio strategy forward.
How can a TTO be assessed for quantitative value and
not just be a cost center adding qualitative value?
This paper illustrates the first steps to understanding
how to project potential income versus a much more
predictable expense budget, which would allow
universities to improve their technology transfer
strategy and results. As a result, TTOs would operate
under a more sustainable IP portfolio strategy, promote
educational innovation in universities, and generate a
more significant community impact.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cantini:2021:EML,
author = "Riccardo Cantini and Fabrizio Marozzo and Alessio
Orsino and Domenico Talia and Paolo Trunfio",
title = "Exploiting Machine Learning for Improving In-Memory
Execution of Data-Intensive Workflows on Parallel
Machines",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "121",
day = "05",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050121",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/121",
abstract = "Workflows are largely used to orchestrate complex sets
of operations required to handle and process huge
amounts of data. Parallel processing is often vital to
reduce execution time when complex data-intensive
workflows must be run efficiently, and at the same
time, in-memory processing can bring important benefits
to accelerate execution. However, optimization
techniques are necessary to fully exploit in-memory
processing, avoiding performance drops due to memory
saturation events. This paper proposed a novel
solution, called the Intelligent In-memory Workflow
Manager (IIWM), for optimizing the in-memory execution
of data-intensive workflows on parallel machines. IIWM
is based on two complementary strategies: (1) a machine
learning strategy for predicting the memory occupancy
and execution time of workflow tasks; (2) a scheduling
strategy that allocates tasks to a computing node,
taking into account the (predicted) memory occupancy
and execution time of each task and the memory
available on that node. The effectiveness of the
machine learning-based predictor and the scheduling
strategy were demonstrated experimentally using as a
testbed, Spark, a high-performance Big Data processing
framework that exploits in-memory computing to speed up
the execution of large-scale applications. In
particular, two synthetic workflows were prepared for
testing the robustness of the IIWM in scenarios
characterized by a high level of parallelism and a
limited amount of memory reserved for execution.
Furthermore, a real data analysis workflow was used as
a case study, for better assessing the benefits of the
proposed approach. Thanks to high accuracy in
predicting resources used at runtime, the IIWM was able
to avoid disk writes caused by memory saturation,
outperforming a traditional strategy in which only
dependencies among tasks are taken into account.
Specifically, the IIWM achieved up to a 31\% 31\% 31\%
and a 40\% 40\% 40\% reduction of makespan and a
performance improvement up to 1.45$ \times $ 1.45$
\times $ 1.45$ \times $ and 1.66$ \times $ 1.66$ \times
$ 1.66$ \times $ on the synthetic workflows and the
real case study, respectively.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhao:2021:APA,
author = "Yulin Zhao and Junke Li and Jiang-E Wang",
title = "Analysis and Prediction of {``AI + Education''}
Attention Based on {Baidu} Index --- Taking {Guizhou
Province} as an Example",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "120",
day = "30",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050120",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/120",
abstract = "Studying the attention of ``artificial intelligence +
education'' in ethnic areas is of great significance
for China for promoting the integrated development of
new educational modes and modern technology in the
western region. Guizhou province is an area inhabited
by ethnic minorities, located in the heart of Southwest
China. The development of its intelligent education has
strong enlightenment for the whole country and the
region. Therefore, this paper selects the Baidu Index
of ``artificial intelligence (AI) + education'' in
Guizhou province from 2013 to 2020, analyzes the
spatial-temporal characteristics of its network
attention by using the elastic coefficient method, and
builds the ARIMA model on this basis to predict future
development. The results show that the public's
attention to ``AI + education'' differs significantly
in time and space. Then, according to the prediction
results, this paper puts forward relevant suggestions
for the country to promote the sustainable development
of education in western ethnic areas.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hueso-Romero:2021:STM,
author = "Jos{\'e} Javier Hueso-Romero and Javier Gil-Quintana
and Helen Hasbun and Sara Osuna-Acedo",
title = "The Social and Transfer Massive Open Online Course:
Post-Digital Learning",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "119",
day = "30",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050119",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/119",
abstract = "This research provides a current view on post-digital
learning experiences with a massive open online course
(MOOC), in relation to user profiles, universal
instructional design, digital resources, inclusive
activities and collaborative assessment. The study is
based on a mixed research methodology, creating a
questionnaire aimed at people with experience in any
MOOC typology, in which the learning methodology, the
instructional didactic design of the MOOCs, the
resources, proposed activities, and accessibility are
analyzed. Additionally, interviews and focus groups
were carried out with the creators of massive open
online social courses alongside the students of the
official Master of Communication and Education on the
Internet, offered by the UNED (Universidad Nacional de
Educaci{\'o}n a Distancia-Spain), with the subject of
virtual participation scenarios. The data obtained are
subjected to statistical tests to determine the
scientific rigor, such as Cronbach's alpha, the
Kolmogorov--Smirnov normality test, and the
non-parametric tests of Spearman's correlation
coefficient and Kendall's Tau b. In conclusion, the
social massive open online course/transfer massive open
online course model is evidenced as a projected
approach in social networks. The sMOOC and tMOOC are
online training models, which are in constant
development and evolution, as a social, creative,
collaborative, interactive, and inclusive learning
methodology, offering new challenges for the digital
distance education of the future. The research carried
out is only related and linked to the experiences of
different people with the sMOOC and tMOOC.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Al-Ansi:2021:SIE,
author = "Ahmed Al-Ansi and Abdullah M. Al-Ansi and Ammar
Muthanna and Ibrahim A. Elgendy and Andrey
Koucheryavy",
title = "Survey on Intelligence Edge Computing in {6G}:
Characteristics, Challenges, Potential Use Cases, and
Market Drivers",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "118",
day = "30",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050118",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/118",
abstract = "Intelligence Edge Computing (IEC) is the key enabler
of emerging 5G technologies networks and beyond. IEC is
considered to be a promising backbone of future
services and wireless communication systems in 5G
integration. In addition, IEC enables various use cases
and applications, including autonomous vehicles,
augmented and virtual reality, big data analytic, and
other customer-oriented services. Moreover, it is one
of the 5G technologies that most enhanced market
drivers in different fields such as customer service,
healthcare, education methods, IoT in agriculture and
energy sustainability. However, 5G technological
improvements face many challenges such as traffic
volume, privacy, security, digitization capabilities,
and required latency. Therefore, 6G is considered to be
promising technology for the future. To this end,
compared to other surveys, this paper provides a
comprehensive survey and an inclusive overview of
Intelligence Edge Computing (IEC) technologies in 6G
focusing on main up-to-date characteristics,
challenges, potential use cases and market drivers.
Furthermore, we summarize research efforts on IEC in 5G
from 2014 to 2021, in which the integration of IEC and
5G technologies are highlighted. Finally, open research
challenges and new future directions in IEC with 6G
networks will be discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ferretti:2021:HSI,
author = "Marco Ferretti and Serena Nicolazzo and Antonino
Nocera",
title = "{H2O}: Secure Interactions in {IoT} via Behavioral
Fingerprinting",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "117",
day = "30",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050117",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/117",
abstract = "Sharing data and services in the Internet of Things
(IoT) can give rise to significant security concerns
with information being sensitive and vulnerable to
attacks. In such an environment, objects can be either
public resources or owned by humans. For this reason,
the need of monitoring the reliability of all involved
actors, both persons and smart objects, assuring that
they really are who they claim to be, is becoming an
essential property of the IoT, with the increase in the
pervasive adoption of such a paradigm. In this paper,
we tackle this problem by proposing a new framework,
called H2O (Human to Object). Our solution is able to
continuously authenticate an entity in the network,
providing a reliability assessment mechanism based on
behavioral fingerprinting. A detailed security analysis
evaluates the robustness of the proposed protocol;
furthermore, a performance analysis shows the
feasibility of our approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Nikou:2021:FMA,
author = "Stavros A. Nikou and Anastasios A. Economides",
title = "A Framework for Mobile-Assisted Formative Assessment
to Promote Students' Self-Determination",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "116",
day = "30",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050116",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/116",
abstract = "Motivation is an important issue to consider when
designing learning activities, including mobile
learning and assessment. While previous research
provides evidence for the motivational impact of mobile
learning, not many pedagogical frameworks exist for the
design of mobile-assisted learning and assessment. The
current study is grounded in the Self-Determination
Theory of motivation and proposes a pedagogical
framework for mobile-assisted formative assessment,
aiming at enhancing student motivation. For a
preliminary evaluation of the framework, fifty-one
students from a public European high school
participated in a series of formative assessment
activities. The tasks that were implemented according
to the proposed mobile-based formative assessment
framework had a significant positive impact on student
perceived levels of autonomy, competence, and
relatedness, enhancing students' intrinsic motivation
levels. Study findings highlighted the capacity of the
proposed framework to guide the design of mobile-based
formative assessment activities that enhance and
promote student motivation. The study makes a
theoretical contribution by proposing a framework that
aligns mobile learning and assessment with elements of
the Self-Determination Theory of motivation and also
has a practical contribution by implementing mobile
learning and assessment practices that have the
potential to promote student motivation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ojo:2021:EEL,
author = "Mike Oluwatayo Ojo and Davide Adami and Stefano
Giordano",
title = "Experimental Evaluation of a {LoRa} Wildlife
Monitoring Network in a Forest Vegetation Area",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "115",
day = "29",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050115",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/115",
abstract = "Smart agriculture and wildlife monitoring are one of
the recent trends of Internet of Things (IoT)
applications, which are evolving in providing
sustainable solutions from producers. This article
details the design, development and assessment of a
wildlife monitoring application for IoT animal
repelling devices that is able to cover large areas,
thanks to the low power wide area networks (LPWAN),
which bridge the gap between cellular technologies and
short range wireless technologies. LoRa, the global
de-facto LPWAN, continues to attract attention given
its open specification and ready availability of
off-the-shelf hardware, with claims of several
kilometers of range in harsh challenging environments.
At first, this article presents a survey of the LPWAN
for smart agriculture applications. We proceed to
evaluate the performance of LoRa transmission
technology operating in the 433 MHz and 868 MHz bands,
aimed at wildlife monitoring in a forest vegetation
area. To characterize the communication link, we mainly
use the signal-to-noise ratio (SNR), received signal
strength indicator (RSSI) and packet delivery ratio
(PDR). Findings from this study show that achievable
performance can greatly vary between the 433 MHz and
868 MHz bands, and prompt caution is required when
taking numbers at face value, as this can have
implications for IoT applications. In addition, our
results show that the link reaches up to 860 m in the
highly dense forest vegetation environment, while in
the not so dense forest vegetation environment, it
reaches up to 2050 m.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Helmstetter:2021:CLS,
author = "Stefan Helmstetter and Heiko Paulheim",
title = "Collecting a Large Scale Dataset for Classifying Fake
News Tweets Using Weak Supervision",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "114",
day = "29",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050114",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/114",
abstract = "The problem of automatic detection of fake news in
social media, e.g., on Twitter, has recently drawn some
attention. Although, from a technical perspective, it
can be regarded as a straight-forward, binary
classification problem, the major challenge is the
collection of large enough training corpora, since
manual annotation of tweets as fake or non-fake news is
an expensive and tedious endeavor, and recent
approaches utilizing distributional semantics require
large training corpora. In this paper, we introduce an
alternative approach for creating a large-scale dataset
for tweet classification with minimal user
intervention. The approach relies on weak supervision
and automatically collects a large-scale, but very
noisy, training dataset comprising hundreds of
thousands of tweets. As a weak supervision signal, we
label tweets by their source, i.e., trustworthy or
untrustworthy source, and train a classifier on this
dataset. We then use that classifier for a different
classification target, i.e., the classification of fake
and non-fake tweets. Although the labels are not
accurate according to the new classification target
(not all tweets by an untrustworthy source need to be
fake news, and vice versa), we show that despite this
unclean, inaccurate dataset, the results are comparable
to those achieved using a manually labeled set of
tweets. Moreover, we show that the combination of the
large-scale noisy dataset with a human labeled one
yields more advantageous results than either of the two
alone.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bonanni:2021:DCA,
author = "Michele Bonanni and Francesco Chiti and Romano
Fantacci and Laura Pierucci",
title = "Dynamic Control Architecture Based on Software Defined
Networking for the {Internet of Things}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "113",
day = "28",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050113",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/113",
abstract = "Software Defined Networking (SDN) provides a new
perspective for the Internet of Things (IoT), since,
with the separation of the control from the data
planes, it is viable to optimise the traditional
networks operation management. In particular, the SDN
Controller has a global vision of the network of
sensors/actuators domain, allowing real-time network
nodes and data flows reconfiguration. As a consequence,
devices, usually facing limited communications and
computing resources, are relieved of the route
selection task in a distributed and, thus, suboptimal
way. This paper proposes a SDN-IoT architecture,
specifically focusing on the Controller design, which
dynamically optimises in real time the end-to-end flows
delivery. In particular, the dynamic routing policy
adaptation is based on the real-time estimation of the
network status and it allows jointly minimising the
end-to-end latency and energy consumption and,
consequently, to improve the network life time. The
performance of the proposed approach is analysed in
terms of the average latency, energy consumption and
overhead, pointing out a better behaviour in comparison
with the existing distributed approaches.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Herrera:2021:ERL,
author = "Mauricio Herrera and Alex Godoy-Fa{\'u}ndez",
title = "Exploring the Roles of Local Mobility Patterns,
Socioeconomic Conditions, and Lockdown Policies in
Shaping the Patterns of {COVID-19} Spread",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "112",
day = "28",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050112",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/112",
abstract = "The COVID-19 crisis has shown that we can only prevent
the risk of mass contagion through timely, large-scale,
coordinated, and decisive actions. This pandemic has
also highlighted the critical importance of generating
rigorous evidence for decision-making, and actionable
insights from data, considering further the intricate
web of causes and drivers behind observed patterns of
contagion diffusion. Using mobility, socioeconomic, and
epidemiological data recorded throughout the pandemic
development in the Santiago Metropolitan Region, we
seek to understand the observed patterns of contagion.
We characterize human mobility patterns during the
pandemic through different mobility indices and
correlate such patterns with the observed contagion
diffusion, providing data-driven models for insights,
analysis, and inferences. Through these models, we
examine some effects of the late application of
mobility restrictions in high-income urban regions that
were affected by high contagion rates at the beginning
of the pandemic. Using augmented synthesis control
methods, we study the consequences of the early lifting
of mobility restrictions in low-income sectors
connected by public transport to high-risk and
high-income communes. The Santiago Metropolitan Region
is one of the largest Latin American metropolises with
features that are common to large cities. Therefore, it
can be used as a relevant case study to unravel complex
patterns of the spread of COVID-19.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alzahrani:2021:DNI,
author = "Abdulsalam O. Alzahrani and Mohammed J. F. Alenazi",
title = "Designing a Network Intrusion Detection System Based
on Machine Learning for Software Defined Networks",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "111",
day = "28",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050111",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/111",
abstract = "Software-defined Networking (SDN) has recently
developed and been put forward as a promising and
encouraging solution for future internet architecture.
Managed, the centralized and controlled network has
become more flexible and visible using SDN. On the
other hand, these advantages bring us a more vulnerable
environment and dangerous threats, causing network
breakdowns, systems paralysis, online banking frauds
and robberies. These issues have a significantly
destructive impact on organizations, companies or even
economies. Accuracy, high performance and real-time
systems are essential to achieve this goal
successfully. Extending intelligent machine learning
algorithms in a network intrusion detection system
(NIDS) through a software-defined network (SDN) has
attracted considerable attention in the last decade.
Big data availability, the diversity of data analysis
techniques, and the massive improvement in the machine
learning algorithms enable the building of an
effective, reliable and dependable system for detecting
different types of attacks that frequently target
networks. This study demonstrates the use of machine
learning algorithms for traffic monitoring to detect
malicious behavior in the network as part of NIDS in
the SDN controller. Different classical and advanced
tree-based machine learning techniques, Decision Tree,
Random Forest and XGBoost are chosen to demonstrate
attack detection. The NSL-KDD dataset is used for
training and testing the proposed methods; it is
considered a benchmarking dataset for several
state-of-the-art approaches in NIDS. Several advanced
preprocessing techniques are performed on the dataset
in order to extract the best form of the data, which
produces outstanding results compared to other systems.
Using just five out of 41 features of NSL-KDD, a
multi-class classification task is conducted by
detecting whether there is an attack and classifying
the type of attack (DDoS, PROBE, R2L, and U2R),
accomplishing an accuracy of 95.95\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Duradoni:2021:RSI,
author = "Mirko Duradoni and Stefania Collodi and Serena
Coppolino Perfumi and Andrea Guazzini",
title = "Reviewing Stranger on the {Internet}: The Role of
Identifiability through {``Reputation''} in Online
Decision Making",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "110",
day = "27",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050110",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/110",
abstract = "The stranger on the Internet effect has been studied
in relation to self-disclosure. Nonetheless,
quantitative evidence about how people mentally
represent and perceive strangers online is still
missing. Given the dynamic development of web
technologies, quantifying how much strangers can be
considered suitable for pro-social acts such as
self-disclosure appears fundamental for a whole series
of phenomena ranging from privacy protection to fake
news spreading. Using a modified and online version of
the Ultimatum Game (UG), we quantified the mental
representation of the stranger on the Internet effect
and tested if people modify their behaviors according
to the interactors' identifiability (i.e., reputation).
A total of 444 adolescents took part in a 2 $ \times $
2 design experiment where reputation was set active or
not for the two traditional UG tasks. We discovered
that, when matched with strangers, people donate the
same amount of money as if the other has a good
reputation. Moreover, reputation significantly affected
the donation size, the acceptance rate and the feedback
decision making as well.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tosi:2021:HSA,
author = "Davide Tosi and Alessandro Siro Campi",
title = "How Schools Affected the {COVID-19} Pandemic in
{Italy}: Data Analysis for {Lombardy Region}, {Campania
Region}, and {Emilia Region}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "109",
day = "27",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050109",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/109",
abstract = "Background: Coronavirus Disease 2019 (COVID-19) is the
main discussed topic worldwide in 2020 and at the
beginning of the Italian epidemic, scientists tried to
understand the virus diffusion and the epidemic curve
of positive cases with controversial findings and
numbers. Objectives: In this paper, a data analytics
study on the diffusion of COVID-19 in Lombardy Region
and Campania Region is developed in order to identify
the driver that sparked the second wave in Italy.
Methods: Starting from all the available official data
collected about the diffusion of COVID-19, we analyzed
Google mobility data, school data and infection data
for two big regions in Italy: Lombardy Region and
Campania Region, which adopted two different approaches
in opening and closing schools. To reinforce our
findings, we also extended the analysis to the Emilia
Romagna Region. Results: The paper shows how different
policies adopted in school opening/closing may have had
an impact on the COVID-19 spread, while other factors
related to citizen mobility did not affect the second
Italian wave. Conclusions: The paper shows that a clear
correlation exists between the school contagion and the
subsequent temporal overall contagion in a geographical
area. Moreover, it is clear that highly populated
provinces have the greatest spread of the virus.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Guarino:2021:IUS,
author = "Stefano Guarino and Enrico Mastrostefano and Massimo
Bernaschi and Alessandro Celestini and Marco
Cianfriglia and Davide Torre and Lena Rebecca Zastrow",
title = "Inferring Urban Social Networks from Publicly
Available Data",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "108",
day = "26",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050108",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/108",
abstract = "The definition of suitable generative models for
synthetic yet realistic social networks is a widely
studied problem in the literature. By not being tied to
any real data, random graph models cannot capture all
the subtleties of real networks and are inadequate for
many practical contexts-including areas of research,
such as computational epidemiology, which are recently
high on the agenda. At the same time, the so-called
contact networks describe interactions, rather than
relationships, and are strongly dependent on the
application and on the size and quality of the sample
data used to infer them. To fill the gap between these
two approaches, we present a data-driven model for
urban social networks, implemented and released as open
source software. By using just widely available
aggregated demographic and social-mixing data, we are
able to create, for a territory of interest, an
age-stratified and geo-referenced synthetic population
whose individuals are connected by ``strong ties'' of
two types: intra-household (e.g., kinship) or
friendship. While household links are entirely
data-driven, we propose a parametric probabilistic
model for friendship, based on the assumption that
distances and age differences play a role, and that not
all individuals are equally sociable. The demographic
and geographic factors governing the structure of the
obtained network, under different configurations, are
thoroughly studied through extensive simulations
focused on three Italian cities of different size.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Carchiolo:2021:MIU,
author = "Vincenza Carchiolo and Alessandro Longheu and Michele
Malgeri and Giuseppe Mangioni and Marialaura Previti",
title = "Mutual Influence of Users Credibility and News
Spreading in Online Social Networks",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "107",
day = "25",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050107",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/107",
abstract = "A real-time news spreading is now available for
everyone, especially thanks to Online Social Networks
(OSNs) that easily endorse gate watching, so the
collective intelligence and knowledge of dedicated
communities are exploited to filter the news flow and
to highlight and debate relevant topics. The main
drawback is that the responsibility for judging the
content and accuracy of information moves from editors
and journalists to online information users, with the
side effect of the potential growth of fake news. In
such a scenario, trustworthiness about information
providers cannot be overlooked anymore, rather it more
and more helps in discerning real news from fakes. In
this paper we evaluate how trustworthiness among OSN
users influences the news spreading process. To this
purpose, we consider the news spreading as a
Susceptible-Infected-Recovered (SIR) process in OSN,
adding the contribution credibility of users as a layer
on top of OSN. Simulations with both fake and true news
spreading on such a multiplex network show that the
credibility improves the diffusion of real news while
limiting the propagation of fakes. The proposed
approach can also be extended to real social
networks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Standl:2021:PMM,
author = "Bernhard Standl and Nadine Schlomske-Bodenstein",
title = "A Pattern Mining Method for Teaching Practices",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "106",
day = "23",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050106",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/106",
abstract = "When integrating digital technology into teaching,
many teachers experience similar challenges.
Nevertheless, sharing experiences is difficult as it is
usually not possible to transfer teaching scenarios
directly from one subject to another because
subject-specific characteristics make it difficult to
reuse them. To address this problem, instructional
scenarios can be described as patterns, which has
already been applied in educational contexts. Patterns
capture proven teaching strategies and describe
teaching scenarios in a unified structure that can be
reused. Since priorities for content, methods, and
tools are different in each subject, we show an
approach to develop a domain-independent graph database
to collect digital teaching practices from a taxonomic
structure via the intermediate step of an ontology.
Furthermore, we outline a method to identify effective
teaching practices from interdisciplinary data as
patterns from the graph database using an association
rule algorithm. The results show that an
association-based analysis approach can derive initial
indications of effective teaching scenarios.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yousif:2021:ITD,
author = "Mohamed Yousif and Chaminda Hewage and Liqaa Nawaf",
title = "{IoT} Technologies during and Beyond {COVID-19}: a
Comprehensive Review",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "105",
day = "23",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050105",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/105",
abstract = "The COVID-19 pandemic provided a much-needed sanity
check for IoT-inspired frameworks and solutions. IoT
solutions such as remote health monitoring and contact
tracing provided support for authorities to
successfully manage the spread of the coronavirus. This
article provides the first comprehensive review of key
IoT solutions that have had an impact on COVID-19 in
healthcare, contact tracing, and transportation during
the pandemic. Each sector is investigated in depth; and
potential applications, social and economic impact, and
barriers for mass adaptation are discussed in detail.
Furthermore, it elaborates on the challenges and
opportunities for IoT framework solutions in the
immediate post-COVID-19 era. To this end, privacy and
security concerns of IoT applications are analyzed in
depth and emerging standards and code of practices for
mass adaptation are also discussed. The main
contribution of this review paper is the in-depth
analysis and categorization of sector-wise IoT
technologies, which have the potential to be prominent
applications in the new normal. IoT applications in
each selected sector are rated for their potential
economic and social impact, timeline for mass
adaptation, and Technology Readiness Level (TRL). In
addition, this article outlines potential research
directions for next-generation IoT applications that
would facilitate improved performance with preserved
privacy and security, as well as wider adaptation by
the population at large.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Al-Naime:2021:RMM,
author = "Khalid Al-Naime and Adnan Al-Anbuky and Grant
Mawston",
title = "Remote Monitoring Model for the Preoperative
Prehabilitation Program of Patients Requiring Abdominal
Surgery",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "104",
day = "22",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050104",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/104",
abstract = "Physical fitness and level of activity are considered
important factors for patients with cancer undergoing
major abdominal surgery. Cancer patients with low
fitness capacity are at greater risk of postoperative
complications, longer hospital stays, and mortality.
One of the main challenges facing both healthcare
providers and patients is to improve the patient's
physical fitness within the available short period
(four to six weeks) prior to surgery. Supervised and
unsupervised physical prehabilitation programs are the
most common recommended methods for enhancing
postoperative outcomes in patients undergoing abdominal
surgery. Due to obstacles such as geographical
isolation, many patients have limited access to medical
centers and facilities that provide onsite
prehabilitation programs. This article presents a
review of the literature and the development of a model
that can remotely monitor physical activities during
the prehabilitation period. The mixed prehabilitation
model includes the identification of fundamental
parameters of physical activities (type, intensity,
frequency, and duration) over time. A mathematical
model has been developed to offer a solution for both
the healthcare provider and patients. This offers the
opportunity for physicians or physiotherapists to
monitor patients performing their prescribed physical
exercises in real time. The model that has been
developed is embedded within the internet of things
(IoT) system, which calculates the daily and weekly
efforts made by the patients and automatically stores
this in a comma-separated values (CSV) file that
medical staff can access. In addition, this model
allows the patient to compensate for missed prescribed
activity by adding additional efforts to meet the
prehabilitation requirements. As a result, healthcare
staff are provided with feedback on patient engagement
in prescribed exercise during the period of the
prehabilitation program.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bressan:2021:DLB,
author = "Giulia Bressan and Giulia Cisotto and Gernot R.
M{\"u}ller-Putz and Selina Christin Wriessnegger",
title = "Deep Learning-Based Classification of Fine Hand
Movements from Low Frequency {EEG}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "5",
pages = "103",
day = "21",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13050103",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 28 20:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/5/103",
abstract = "The classification of different fine hand movements
from electroencephalogram (EEG) signals represents a
relevant research challenge, e.g., in BCI applications
for motor rehabilitation. Here, we analyzed two
different datasets where fine hand movements (touch,
grasp, palmar, and lateral grasp) were performed in a
self-paced modality. We trained and tested a newly
proposed CNN, and we compared its classification
performance with two well-established machine learning
models, namely, shrinkage-linear discriminant analysis
(LDA) and Random Forest (RF). Compared to previous
literature, we included neuroscientific evidence, and
we trained our Convolutional Neural Network (CNN) model
on the so-called movement-related cortical potentials
(MRCPs). They are EEG amplitude modulations at low
frequencies, i.e., (0.3,3) Hz that have been proved to
encode several properties of the movements, e.g., type
of grasp, force level, and speed. We showed that CNN
achieved good performance in both datasets (accuracy of
0.70\pm 0.11 and 0.64\pm 0.10, for the two datasets,
respectively), and they were similar or superior to the
baseline models (accuracy of 0.68\pm 0.10 and 0.62\pm
0.07 with sLDA; accuracy of 0.70\pm 0.15 and 0.61\pm
0.07 with RF, with comparable performance in precision
and recall). In addition, compared to the baseline, our
CNN requires a faster pre-processing procedure, paving
the way for its possible use in online BCI
applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tsourma:2021:AEF,
author = "Maria Tsourma and Alexandros Zamichos and Efthymios
Efthymiadis and Anastasios Drosou and Dimitrios
Tzovaras",
title = "An {AI}-Enabled Framework for Real-Time Generation of
News Articles Based on Big {EO} Data for Disaster
Reporting",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "161",
day = "19",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060161",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/161",
abstract = "In the field of journalism, the collection and
processing of information from different heterogeneous
sources are difficult and time-consuming processes. In
the context of the theory of journalism 3.0, where
multimedia data can be extracted from different sources
on the web, the possibility of creating a tool for the
exploitation of Earth observation (EO) data, especially
images by professionals belonging to the field of
journalism, is explored. With the production of massive
volumes of EO image data, the problem of their
exploitation and dissemination to the public,
specifically, by professionals in the media industry,
arises. In particular, the exploitation of satellite
image data from existing tools is difficult for
professionals who are not familiar with image
processing. In this scope, this article presents a new
innovative platform that automates some of the
journalistic practices. This platform includes several
mechanisms allowing users to early detect and receive
information about breaking news in real-time, retrieve
EO Sentinel-2 images upon request for a certain event,
and automatically generate a personalized article
according to the writing style of the author. Through
this platform, the journalists or editors can also make
any modifications to the generated article before
publishing. This platform is an added-value tool not
only for journalists and the media industry but also
for freelancers and article writers who use information
extracted from EO data in their articles.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hu:2021:SCA,
author = "Minda Hu and Ashwin Rao and Mayank Kejriwal and
Kristina Lerman",
title = "Socioeconomic Correlates of Anti-Science Attitudes in
the {US}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "160",
day = "19",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060160",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/160",
abstract = "Successful responses to societal challenges require
sustained behavioral change. However, as responses to
the COVID-19 pandemic in the US showed, political
partisanship and mistrust of science can reduce public
willingness to adopt recommended behaviors such as
wearing a mask or receiving a vaccination. To better
understand this phenomenon, we explored attitudes
toward science using social media posts (tweets) that
were linked to counties in the US through their
locations. The data allowed us to study how attitudes
towards science relate to the socioeconomic
characteristics of communities in places from which
people tweet. Our analysis revealed three types of
communities with distinct behaviors: those in large
metro centers, smaller urban places, and rural areas.
While partisanship and race are strongly associated
with the share of anti-science users across all
communities, income was negatively and positively
associated with anti-science attitudes in suburban and
rural areas, respectively. We observed that emotions in
tweets, specifically negative high arousal emotions,
are expressed among suburban and rural communities by
many anti-science users, but not in communities in
large urban places. These trends were not apparent when
pooled across all counties. In addition, we found that
anti-science attitudes expressed five years earlier
were significantly associated with lower COVID-19
vaccination rates. Our analysis demonstrates the
feasibility of using spatially resolved social media
data to monitor public attitudes on issues of social
importance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Barakat:2021:OAI,
author = "Basel Barakat and Ahmad Taha and Ryan Samson and Aiste
Steponenaite and Shuja Ansari and Patrick M. Langdon
and Ian J. Wassell and Qammer H. Abbasi and Muhammad
Ali Imran and Simeon Keates",
title = "{6G} Opportunities Arising from {Internet of Things}
Use Cases: a Review Paper",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "159",
day = "18",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060159",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/159",
abstract = "The race for the 6th generation of wireless networks
(6G) has begun. Researchers around the world have
started to explore the best solutions for the
challenges that the previous generations have
experienced. To provide the readers with a clear map of
the current developments, several review papers shared
their vision and critically evaluated the state of the
art. However, most of the work is based on general
observations and the big picture vision, and lack the
practical implementation challenges of the Internet of
Things (IoT) use cases. This paper takes a novel
approach in the review, as we present a sample of IoT
use cases that are representative of a wide variety of
its implementations. The chosen use cases are from the
most research-active sectors that can benefit from 6G
and its enabling technologies. These sectors are
healthcare, smart grid, transport, and Industry 4.0.
Additionally, we identified some of the practical
challenges and the lessons learned in the
implementation of these use cases. The review
highlights the cases' main requirements and how they
overlap with the key drivers for the future generation
of wireless networks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sikelis:2021:OBF,
author = "Konstantinos Sikelis and George E. Tsekouras and
Konstantinos Kotis",
title = "Ontology-Based Feature Selection: a Survey",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "158",
day = "18",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060158",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/158",
abstract = "The Semantic Web emerged as an extension to the
traditional Web, adding meaning (semantics) to a
distributed Web of structured and linked information.
At its core, the concept of ontology provides the means
to semantically describe and structure information, and
expose it to software and human agents in a machine and
human-readable form. For software agents to be
realized, it is crucial to develop powerful artificial
intelligence and machine-learning techniques, able to
extract knowledge from information sources, and
represent it in the underlying ontology. This survey
aims to provide insight into key aspects of
ontology-based knowledge extraction from various
sources such as text, databases, and human expertise,
realized in the realm of feature selection. First,
common classification and feature selection algorithms
are presented. Then, selected approaches, which utilize
ontologies to represent features and perform feature
selection and classification, are described. The
selective and representative approaches span diverse
application domains, such as document classification,
opinion mining, manufacturing, recommendation systems,
urban management, information security systems, and
demonstrate the feasibility and applicability of such
methods. This survey, in addition to the criteria-based
presentation of related works, contributes a number of
open issues and challenges related to this still active
research topic.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jussila:2021:TAM,
author = "Jari Jussila and Anu Helena Suominen and Atte Partanen
and Tapani Honkanen",
title = "Text Analysis Methods for Misinformation-Related
Research on {Finnish} Language {Twitter}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "157",
day = "17",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060157",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/157",
abstract = "The dissemination of disinformation and fabricated
content on social media is growing. Yet little is known
of what the functional Twitter data analysis methods
are for languages (such as Finnish) that include word
formation with endings and word stems together with
derivation and compounding. Furthermore, there is a
need to understand which themes linked with
misinformation-and the concepts related to it-manifest
in different countries and language areas in Twitter
discourse. To address this issue, this study explores
misinformation and its related concepts:
disinformation, fake news, and propaganda in Finnish
language tweets. We utilized (1) word cloud clustering,
(2) topic modeling, and (3) word count analysis and
clustering to detect and analyze misinformation-related
concepts and themes connected to those concepts in
Finnish language Twitter discussions. Our results are
two-fold: (1) those concerning the functional data
analysis methods and (2) those about the themes
connected in discourse to the misinformation-related
concepts. We noticed that each utilized method
individually has critical limitations, especially all
the automated analysis methods processing for the
Finnish language, yet when combined they bring value to
the analysis. Moreover, we discovered that politics,
both internal and external, are prominent in the
Twitter discussions in connection with misinformation
and its related concepts of disinformation, fake news,
and propaganda.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Muller:2021:DCH,
author = "Romy M{\"u}ller and Franziska Kessler and David W.
Humphrey and Julian Rahm",
title = "Data in Context: How Digital Transformation Can
Support Human Reasoning in Cyber-Physical Production
Systems",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "156",
day = "17",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060156",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/156",
abstract = "In traditional production plants, current technologies
do not provide sufficient context to support
information integration and interpretation. Digital
transformation technologies have the potential to
support contextualization, but it is unclear how this
can be achieved. The present article presents a
selection of the psychological literature in four areas
relevant to contextualization: information sampling,
information integration, categorization, and causal
reasoning. Characteristic biases and limitations of
human information processing are discussed. Based on
this literature, we derive functional requirements for
digital transformation technologies, focusing on the
cognitive activities they should support. We then
present a selection of technologies that have the
potential to foster contextualization. These
technologies enable the modelling of system relations,
the integration of data from different sources, and the
connection of the present situation with historical
data. We illustrate how these technologies can support
contextual reasoning, and highlight challenges that
should be addressed when designing human-machine
cooperation in cyber-physical production systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Din:2021:ANA,
author = "Fareed Ud Din and David Paul and Joe Ryan and Frans
Henskens and Mark Wallis",
title = "{AOSR 2.0}: a Novel Approach and Thorough Validation
of an Agent-Oriented Storage and Retrieval {WMS}
Planner for {SMEs}, under {Industry 4.0}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "155",
day = "15",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060155",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/155",
abstract = "The Fourth Industrial Revolution (Industry 4.0), with
the help of cyber-physical systems (CPS), the Internet
of Things (IoT), and Artificial Intelligence (AI), is
transforming the way industrial setups are designed.
Recent literature has provided insight about large
firms gaining benefits from Industry 4.0, but many of
these benefits do not translate to SMEs. The
agent-oriented smart factory (AOSF) framework provides
a solution to help bridge the gap between Industry 4.0
frameworks and SME-oriented setups by providing a
general and high-level supply chain (SC) framework and
an associated agent-oriented storage and retrieval
(AOSR)-based warehouse management strategy. This paper
presents the extended heuristics of the AOSR algorithm
and details how it improves the performance efficiency
in an SME-oriented warehouse. A detailed discussion on
the thorough validation via scenario-based
experimentation and test cases explain how AOSR yielded
60-148\% improved performance metrics in certain key
areas of a warehouse.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Butnaru:2021:TLU,
author = "Andrei Butnaru and Alexios Mylonas and Nikolaos
Pitropakis",
title = "Towards Lightweight {URL}-Based Phishing Detection",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "154",
day = "13",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060154",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/154",
abstract = "Nowadays, the majority of everyday computing devices,
irrespective of their size and operating system, allow
access to information and online services through web
browsers. However, the pervasiveness of web browsing in
our daily life does not come without security risks.
This widespread practice of web browsing in combination
with web users' low situational awareness against cyber
attacks, exposes them to a variety of threats, such as
phishing, malware and profiling. Phishing attacks can
compromise a target, individual or enterprise, through
social interaction alone. Moreover, in the current
threat landscape phishing attacks typically serve as an
attack vector or initial step in a more complex
campaign. To make matters worse, past work has
demonstrated the inability of denylists, which are the
default phishing countermeasure, to protect users from
the dynamic nature of phishing URLs. In this context,
our work uses supervised machine learning to block
phishing attacks, based on a novel combination of
features that are extracted solely from the URL. We
evaluate our performance over time with a dataset which
consists of active phishing attacks and compare it with
Google Safe Browsing (GSB), i.e., the default security
control in most popular web browsers. We find that our
work outperforms GSB in all of our experiments, as well
as performs well even against phishing URLs which are
active one year after our model's training.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cretan:2021:ISE,
author = "Adina Cretan and Cristina Nica and Carlos Coutinho and
Ricardo Jardim-Goncalves and Ben Bratu",
title = "An Intelligent System to Ensure Interoperability for
the Dairy Farm Business Model",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "153",
day = "12",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060153",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/153",
abstract = "Picking reliable partners, negotiating synchronously
with all partners, and managing similar proposals are
challenging tasks for any manager. This challenge is
even harder when it concerns small and medium
enterprises (SMEs) who need to deal with short budgets
and evident size limitations, often leading them to
avoid handling very large contracts. This size problem
can only be mitigated by collaboration efforts between
multiple SMEs, but then again this brings back the
initially stated issues. To address these problems,
this paper proposes a collaborative negotiation system
that automates the outsourcing part by assisting the
manager throughout a negotiation. The described system
provides a comprehensive view of all negotiations,
facilitates simultaneous bilateral negotiations, and
provides support for ensuring interoperability among
multiple partners negotiating on a task described by
multiple attributes. In addition, it relies on an
ontology to cope with the challenges of semantic
interoperability, it automates the selection of
reliable partners by using a lattice-based approach,
and it manages similar proposals by allowing domain
experts to define a satisfaction degree for each SME.
To showcase this method, this research focused on small
and medium-size dairy farms (DFs) and describes a
negotiation scenario in which a few DFs are able to
assess and generate proposals.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rodriguez-Ferrandiz:2021:MDS,
author = "Ra{\'u}l Rodr{\'\i}guez-Ferr{\'a}ndiz and Cande
S{\'a}nchez-Olmos and Tatiana Hidalgo-Mar{\'\i} and
Estela Saquete-Boro",
title = "Memetics of Deception: Spreading Local Meme Hoaxes
during {COVID-19} 1st Year",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "152",
day = "10",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060152",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/152",
abstract = "The central thesis of this paper is that memetic
practices can be crucial to understanding deception at
present when hoaxes have increased globally due to
COVID-19. Therefore, we employ existing memetic theory
to describe the qualities and characteristics of meme
hoaxes in terms of the way they are replicated by
altering some aspects of the original, and then shared
on social media platforms in order to connect global
and local issues. Criteria for selecting the sample
were hoaxes retrieved from and related to the local
territory in the province of Alicante (Spain) during
the first year of the pandemic ( n = 35). Once
typology, hoax topics and their memetic qualities were
identified, we analysed their characteristics according
to form in terms of Shifman (2014) and, secondly, their
content and stance concordances both within and outside
our sample (Spain and abroad). The results show,
firstly, that hoaxes are mainly disinformation and they
are related to the pandemic. Secondly, despite the
notion that local hoaxes are linked to local
circumstances that are difficult to extrapolate, our
conclusions demonstrate their extraordinary memetic and
``glocal'' capacity: they rapidly adapt other hoaxes
from other places to local areas, very often
supplanting reliable sources, and thereby demonstrating
consistency and opportunism.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Padilla-Cuevas:2021:OBC,
author = "Josu{\'e} Padilla-Cuevas and Jos{\'e} A. Reyes-Ortiz
and Maricela Bravo",
title = "Ontology-Based Context Event Representation,
Reasoning, and Enhancing in Academic Environments",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "151",
day = "10",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060151",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/151",
abstract = "An Ambient Intelligence responds to user requests
based on several contexts. A relevant context is
related to what has happened in the ambient; therefore,
it focuses a primordial interest on events. These
involve information about time, space, or people, which
is significant for modeling the context. In this paper,
we propose an event-driven approach for context
representation based on an ontological model. This
approach is extendable and adaptable for academic
domains. Moreover, the ontological model to be proposed
is used in reasoning and enrichment processes with the
context event information. Our event-driven approach
considers five contexts as a modular perspective in the
model: Person, temporal (time), physical space
(location), network (resources to acquire data from the
ambient), and academic events. We carried out an
evaluation process for the approach based on an
ontological model focused on (a) the extensibility and
adaptability of use case scenarios for events in an
academic environment, (b) the level of reasoning by
using competence questions related to events, (c) and
the consistency and coherence in the proposed model.
The evaluation process shows promising results for our
event-driven approach for context representation based
on the ontological model.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pena-Fernandez:2021:REE,
author = "Sim{\'o}n Pe{\~n}a-Fern{\'a}ndez and Miguel {\'A}ngel
Casado-del-R{\'\i}o and Daniel
Garc{\'\i}a-Gonz{\'a}lez",
title = "From Rigidity to Exuberance: Evolution of News on
Online Newspaper Homepages",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "150",
day = "09",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060150",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/150",
abstract = "Since their emergence in the mid-90s, online media
have evolved from simple digital editions that merely
served to dump content from print newspapers, to
sophisticated multi-format products with multimedia and
interactive features. In order to discover their visual
evolution, this article conducts a longitudinal study
of the design of online media by analyzing the front
pages of five general-information Spanish newspapers
(elpais.com, elmundo.es, abc.es, lavanguardia.com, and
elperiodico.com) over the past 25 years (1996-2020).
Moreover, some of their current features are listed. To
this end, six in-depth interviews were conducted with
managers of different online media outlets. The results
indicate that the media analysed have evolved from a
static, rigid format, to a dynamic, mobile, and
multi-format model. Regarding the language used, along
with increased multimedia and interactive
possibilities, Spanish online media currently display a
balance between text and images on their front pages.
Lastly, audience information consumption habits,
largely superficial and sporadic, and the increasing
technification and speed of production processes, means
that news media have lost in terms of the design part
of the individual personality they had in their print
editions. However, they maintain their index-type front
pages as one of their most characteristic elements,
which are very vertical and highly saturated.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Song:2021:TLC,
author = "Yaqin Song and Hong Ni and Xiaoyong Zhu",
title = "Two-Level Congestion Control Mechanism {(2LCCM)} for
Information-Centric Networking",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "149",
day = "07",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060149",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/149",
abstract = "As an emerging network architecture,
Information-Centric Networking (ICN) is considered to
have the potential to meet the new requirements of the
Fifth Generation (5G) networks. ICN uses a name
decoupled from location to identify content, supports
the in-network caching technology, and adopts a
receiver-driven model for data transmission. Existing
ICN congestion control mechanisms usually first select
a nearby replica by opportunistic cache-hits and then
insist on adjusting the transmission rate regardless of
the congestion state, which cannot fully utilize the
characteristics of ICN to improve the performance of
data transmission. To solve this problem, this paper
proposes a two-level congestion control mechanism,
called 2LCCM. It switches the replica location based on
a node state table to avoid congestion paths when heavy
congestion happens. This 2LCCM mechanism also uses a
receiver-driven congestion control algorithm to adjust
the request sending rate, in order to avoid link
congestion under light congestion. In this paper, the
design and implementation of the proposed mechanism are
described in detail, and the experimental results show
that 2LCCM can effectively reduce the transmission
delay when heavy congestion occurs, and the
bandwidth-delay product-based congestion control
algorithm has better transmission performance compared
with a loss-based algorithm.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Popescu:2021:ISR,
author = "Traian Mihai Popescu and Alina Madalina Popescu and
Gabriela Prostean",
title = "{IoT} Security Risk Management Strategy Reference
Model {(IoTSRM2)}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "148",
day = "04",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060148",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/148",
abstract = "Nowadays, Internet of Things (IoT) adoptions are
burgeoning and deemed the lynchpin towards achieving
ubiquitous connectivity. In this context, defining and
leveraging robust IoT security risk management
strategies are paramount for secure IoT adoptions.
Thus, this study aims to support IoT adopters from any
sector to formulate or reframe their IoT security risk
management strategies to achieve robust strategies that
effectively address IoT security issues. In a nutshell,
this article relies on a mixed methods research
methodology and proposes a reference model for IoT
security risk management strategy. The proposed IoT
security risk management strategy reference model
(IoTSRM2) relies on the 25 selected IoT security best
practices which are outlined using a proposed taxonomic
hierarchy, and on the proposed three-phased methodology
that consists of nine steps and outputs. The main
contribution of this work is the proposed IoTSRM2 which
consists of six domains, 16 objectives, and 30
prioritized controls. Furthermore, prior to providing
the related work, this article provides a critical
evaluation of selected informative references of
IoTSRM2 based on their percentage-wise linkage to the
IoTSRM2 domains and to the entire IoTSRM2. The findings
of the critical evaluation illustrate, inter alia, the
selected informative references that are the top three
most and least linked to the entire IoTSRM2.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chen:2021:MMA,
author = "Yanbo Chen and Jingsha He and Wei Wei and Nafei Zhu
and Cong Yu",
title = "A Multi-Model Approach for User Portrait",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "147",
day = "31",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060147",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/147",
abstract = "Age, gender, educational background, and so on are the
most basic attributes for identifying and portraying
users. It is also possible to conduct in-depth mining
analysis and high-level predictions based on such
attributes to learn users' preferences and
personalities so as to enhance users' online experience
and to realize personalized services in real
applications. In this paper, we propose using
classification algorithms in machine learning to
predict users' demographic attributes, such as gender,
age, and educational background, based on one month of
data collected with the Sogou search engine with the
goal of making user portraits. A multi-model approach
using the fusion algorithms is adopted and hereby
described in the paper. The proposed model is a
two-stage structure using one month of data with
demographic labels as the training data. The first
stage of the structure is based on traditional machine
learning models and neural network models, whereas the
second one is a combination of the models from the
first stage. Experimental results show that our
proposed multi-model method can achieve more accurate
results than the single-model methods in predicting
user attributes. The proposed approach also has
stronger generalization ability in predicting users'
demographic attributes, making it more adequate to
profile users.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dey:2021:TCM,
author = "Somdip Dey and Amit Kumar Singh and Klaus
McDonald-Maier",
title = "{ThermalAttackNet}: Are {CNNs} Making It Easy to
Perform Temperature Side-Channel Attack in Mobile Edge
Devices?",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "146",
day = "31",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060146",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/146",
abstract = "Side-channel attacks remain a challenge to information
flow control and security in mobile edge devices till
this date. One such important security flaw could be
exploited through temperature side-channel attacks,
where heat dissipation and propagation from the
processing cores are observed over time in order to
deduce security flaws. In this paper, we study how
computer vision-based convolutional neural networks
(CNNs) could be used to exploit temperature (thermal)
side-channel attack on different Linux governors in
mobile edge device utilizing multi-processor
system-on-chip (MPSoC). We also designed a power- and
memory-efficient CNN model that is capable of
performing thermal side-channel attack on the MPSoC and
can be used by industry practitioners and academics as
a benchmark to design methodologies to secure against
such an attack in MPSoC.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Massaro:2021:IAE,
author = "Alessandro Massaro and Daniele Giannone and Vitangelo
Birardi and Angelo Maurizio Galiano",
title = "An Innovative Approach for the Evaluation of the {Web}
Page Impact Combining User Experience and Neural
Network Score",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "145",
day = "31",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060145",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/145",
abstract = "The proposed paper introduces an innovative
methodology useful to assign intelligent scores to web
pages. The approach is based on the simultaneous use of
User eXperience (UX), Artificial Neural Network (ANN),
and Long Short-Term Memory (LSTM) algorithms, providing
the web page scoring and taking into account outlier
conditions to construct the training dataset.
Specifically, the UX tool analyses different parameters
addressing the score, such as navigation time, number
of clicks, and mouse movements for page, finding
possible outliers, the ANN are able to predict
outliers, and the LSTM processes the web pages tags
together with UX and user scores. The final web page
score is assigned by the LSTM model corrected by the UX
output and improved by the navigation user score. This
final score is useful for the designer by suggesting
the tags typologies structuring a new web page layout
of a specific topic. By using the proposed methodology,
the web designer is addressed to allocate contents in
the web page layout. The work has been developed within
a framework of an industry project oriented on the
formulation of an innovative AI interface for web
designers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Aldabbagh:2021:RCD,
author = "Ghadah Aldabbagh and Nikos Dimitriou and Samar
Alkhuraiji and Omaimah Bamasag",
title = "Radio Coverage and Device Capacity Dimensioning
Methodologies for {IoT} {LoRaWAN} and {NB-IoT}
Deployments in Urban Environments",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "144",
day = "30",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060144",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/144",
abstract = "This paper focuses on the study of IoT network
deployments, in both unlicensed and licensed bands,
considering LoRaWAN and NB-IoT standards, respectively.
The objective is to develop a comprehensive and
detailed network planning and coverage dimensioning
methodology for assessing key metrics related to the
achieved throughput and capacity for specific
requirements in order to identify tradeoffs and key
issues that are related to the applicability of IoT
access technologies for representative use case types.
This paper will provide a concise overview of key
characteristics of IoT representative IoT access
network standards that are considered for being
deployed in unlicensed and licensed bands and will
present a methodology for modeling the characteristics
of both access network technologies in order to assess
their coverage and capacity considering different
parameters.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Shekhtman:2021:EBB,
author = "Louis Shekhtman and Erez Waisbard",
title = "{EngraveChain}: a Blockchain-Based Tamper-Proof
Distributed Log System",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "143",
day = "29",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060143",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/143",
abstract = "A reliable log system is a prerequisite for many
applications. Financial systems need to have
transactions logged in a precise manner, medical
systems rely on having trusted medical records and
security logs record system access requests in order to
trace malicious attempts. Keeping multiple copies helps
to achieve availability and reliability against such
hackers. Unfortunately, maintaining redundant copies in
a distributed manner in a byzantine setting has always
been a challenging task, however it has recently become
simpler given advances in blockchain technologies. In
this work, we present a tamper-resistant log system
through the use of a blockchain. We leverage the
immutable write action and distributed storage provided
by the blockchain as a basis to develop a secure log
system, but we also add a privacy preserving layer that
is essential for many applications. We detail the
security and privacy aspects of our solution, as well
as how they relate to performance needs in relevant
settings. Finally, we implement our system over
Hyperledger Fabric and demonstrate the system's value
for several use cases. In addition, we provide a
scalability analysis for applying our solution in a
large-scale system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Spradling:2021:PFN,
author = "Matthew Spradling and Jeremy Straub and Jay Strong",
title = "Protection from `Fake News': The Need for Descriptive
Factual Labeling for Online Content",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "142",
day = "28",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060142",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/142",
abstract = "So-called `fake news'-deceptive online content that
attempts to manipulate readers-is a growing problem. A
tool of intelligence agencies, scammers and marketers
alike, it has been blamed for election interference,
public confusion and other issues in the United States
and beyond. This problem is made particularly
pronounced as younger generations choose social media
sources over journalistic sources for their
information. This paper considers the prospective
solution of providing consumers with `nutrition
facts'-style information for online content. To this
end, it reviews prior work in product labeling and
considers several possible approaches and the arguments
for and against such labels. Based on this analysis, a
case is made for the need for a nutrition facts-based
labeling scheme for online content.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sanchez-Romero:2021:SEC,
author = "Cristina S{\'a}nchez-Romero and Eva Mar{\'\i}a
Mu{\~n}oz-Jim{\'e}nez",
title = "Social and Educational Coexistence in Adolescents'
Perception in Current Social Problems through
Networks",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "141",
day = "27",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060141",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/141",
abstract = "The use of social networks as a social and educational
environment emphasizes an approach to social problems
(bullying, cyberbullying, sexism, racism) that has
emerged in today's society. Social networks offer a
unique opportunity to increase channels for
communication and socialization. The aim of this study
is to analyze the adolescents' attitudes in sports
practice in their extracurricular environment, and it
highlights the importance of didactic communication as
a tool for social cohesion to guarantee the interaction
between adolescents. This objective has been evaluated
through the ``Sport and Social Integration. Survey on
Secondary Schools in Italy'' questionnaire. In this
paper, we focus our attention on Section II to go
deeper into the participants' opinion on previously
mentioned social problems. The methods of research for
this study were conducted through a descriptive,
inferential, quantitative, and ex post facto design.
The sample consisted of 286 Italian adolescents aged
between 12 and 15 years old. Results show that there
are positive correlations in the following variables:
gender and verbal, psychological, or physical violence
(Bullying) (r = 0.260) (Sig. = 0.000); gender and
threats, crimes, and persecutions through the Internet
(Cyberbullying) (r = 0.226) (Sig. = 0.000); gender and
discrimination against women (Sexism) (r = 0.133) (Sig.
= 0.025). In conclusion, this article underlines the
importance of investing more systematically in the
effort to prevent bullying and digital inclusion from
an early age for the critical use of mobile devices and
social networks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Villegas-Ch:2021:ASL,
author = "William Villegas-Ch. and Milton Roman-Ca{\~n}izares
and Santiago S{\'a}nchez-Viteri and Joselin
Garc{\'\i}a-Ortiz and Walter Gaibor-Naranjo",
title = "Analysis of the State of Learning in {University}
Students with the Use of a {Hadoop} Framework",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "140",
day = "24",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060140",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/140",
abstract = "Currently, education is going through a critical
moment due to the 2019 coronavirus disease that has
been declared a pandemic. This has forced many
organizations to undergo a significant transformation,
rethinking key elements of their processes and the use
of technology to maintain operations. The continuity of
education has become dependent on technological tools,
as well as on the ability of universities to cope with
a precipitous transition to a remote educational model.
That has generated problems that affect student
learning. This work proposes the implementation of a
Big Data framework to identify the factors that affect
student performance and decision-making to improve
learning. Similar works cover two main research topics
under Big Data in education, the modeling and storage
of educational data. However, they do not consider
issues such as student performance and the improvement
of the educational system with the integration of Big
Data. In addition, this work provides a guide for
future studies and highlights new insights and
directions for the successful use of Big Data in
education. Real-world data were collected for the
evaluation of the proposed framework, the collection of
these being the existing limitation in all research due
to generalized rejection of data consent.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Contu:2021:ABA,
author = "Francesco Contu and Andrea Demontis and Stefano
Dess{\`\i} and Marco Muscas and Daniele Riboni",
title = "{AI}-Based Analysis of Policies and Images for
Privacy-Conscious Content Sharing",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "139",
day = "21",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060139",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/139",
abstract = "Thanks to the popularity of personal mobile devices,
more and more of the different types of private
content, such as images and videos, are shared on
social networking applications. While content sharing
may be an effective practice to enhance social
relationships, it is also a source of relevant privacy
issues. Unfortunately, users find it difficult to
understanding the terms and implications of the privacy
policies of apps and services. Moreover, taking privacy
decisions about content sharing on social networks is
cumbersome and prone to errors that could determine
privacy leaks. In this paper, we propose two techniques
aimed at supporting the user in taking privacy choices
about sharing personal content online. Our techniques
are based on machine learning and natural language
processing to analyze privacy policies, and on computer
vision to assist the user in the privacy-conscious
sharing of multimedia content. Experiments with
real-world data show the potential of our solutions. We
also present ongoing work on a system prototype and
chatbot for natural language user assistance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Theodorou:2021:AES,
author = "Traianos-Ioannis Theodorou and Alexandros Zamichos and
Michalis Skoumperdis and Anna Kougioumtzidou and
Kalliopi Tsolaki and Dimitris Papadopoulos and Thanasis
Patsios and George Papanikolaou and Athanasios
Konstantinidis and Anastasios Drosou and Dimitrios
Tzovaras",
title = "An {AI}-Enabled Stock Prediction Platform Combining
News and Social Sensing with Financial Statements",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "138",
day = "21",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060138",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/138",
abstract = "In recent years, the area of financial forecasting has
attracted high interest due to the emergence of huge
data volumes (big data) and the advent of more powerful
modeling techniques such as deep learning. To generate
the financial forecasts, systems are developed that
combine methods from various scientific fields, such as
information retrieval, natural language processing and
deep learning. In this paper, we present ASPENDYS, a
supportive platform for investors that combines various
methods from the aforementioned scientific fields
aiming to facilitate the management and the decision
making of investment actions through personalized
recommendations. To accomplish that, the system takes
into account both financial data and textual data from
news websites and the social networks Twitter and
Stocktwits. The financial data are processed using
methods of technical analysis and machine learning,
while the textual data are analyzed regarding their
reliability and then their sentiments towards an
investment. As an outcome, investment signals are
generated based on the financial data analysis and the
sensing of the general sentiment towards a certain
investment and are finally recommended to the
investors.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dikhanbayeva:2021:CFI,
author = "Dinara Dikhanbayeva and Akmaral Tokbergenova and
Yevgeniy Lukhmanov and Essam Shehab and Zbigniew
Pastuszak and Ali Turkyilmaz",
title = "Critical Factors of {Industry 4.0} Implementation in
an Emerging Country: Empirical Study",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "6",
pages = "137",
day = "21",
month = may,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13060137",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Jun 26 11:42:17 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/6/137",
abstract = "The concept of Industry 4.0 is becoming more and more
popular all over the world. The implementation of its
assumptions in business practice changes the way
companies operate. The enormous innovative potential of
the Industry 4.0 concept and the intensive use of
processes based on the implementation of advanced
technologies in its assumptions have an impact on
various industries in each country. The article
attempts to analyze the critical factors for the
implementation of Industry 4.0 in Kazakhstan. Primary
and secondary data sources were used for this purpose.
The majority of existing government initiatives and
reports do not reflect the actual situation.
Additionally, these materials do not always represent
the experiences or positions of all the parties
involved. Opinions of companies and organizations
implementing Industry 4.0 solutions remain unexplored.
The primary goal of the paper is to fill the cognitive
gap by analyzing stakeholder responses and identifying
the actual level of their awareness of the development
of Industry 4.0. An additional intention of the authors
was to empirically establish barriers that companies
face while implementing the most desirable
technologies, as well as to establish other critical
factors, taking into account the specificity of the
country under study. The results of the research can be
used by policymakers, scientists and other stakeholders
to develop forecasts and strategic plans, as well as to
develop and conduct further research on the
implementation processes of Industry 4.0 in
Kazakhstan.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Beschastnyi:2021:QDM,
author = "Vitalii Beschastnyi and Daria Ostrikova and Roman
Konyukhov and Elizaveta Golos and Alexander Chursin and
Dmitri Moltchanov and Yuliya Gaidamaka",
title = "Quantifying the Density of {mmWave} {NR} Deployments
for Provisioning Multi-Layer {VR} Services",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "185",
day = "20",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070185",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/185",
abstract = "The 5G New Radio (NR) technology operating in
millimeter wave (mmWave) frequency band is designed for
support bandwidth-greedy applications requiring
extraordinary rates at the access interface. However,
the use of directional antenna radiation patterns, as
well as extremely large path losses and blockage
phenomenon, requires efficient algorithms to support
these services. In this study, we consider the
multi-layer virtual reality (VR) service that utilizes
multicast capabilities for baseline layer and unicast
transmissions for delivering an enhanced experience. By
utilizing the tools of stochastic geometry and queuing
theory we develop a simple algorithm allowing to
estimate the deployment density of mmWave NR base
stations (BS) supporting prescribed delivery
guarantees. Our numerical results show that the highest
gains of utilizing multicast service for distributing
base layer is observed for high UE densities. Despite
of its simplicity, the proposed multicast group
formation scheme operates close to the state-of-the-art
algorithms utilizing the widest beams with longest
coverage distance in approximately 50-70\% of cases
when UE density is $ \lambda \geq 0.3 $. Among other
parameters, QoS profile and UE density have a profound
impact on the required density of NR BSs while the
effect of blockers density is non-linear having the
greatest impact on strict QoS profiles. Depending on
the system and service parameters the required density
of NR BSs may vary in the range of 20--250 BS/km 2.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sun:2021:APP,
author = "Jiachen Sun and Peter A. Gloor",
title = "Assessing the Predictive Power of Online Social Media
to Analyze {COVID-19} Outbreaks in the 50 {U.S.}
States",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "184",
day = "20",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070184",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/184",
abstract = "As the coronavirus disease 2019 (COVID-19) continues
to rage worldwide, the United States has become the
most affected country, with more than 34.1 million
total confirmed cases up to 1 June 2021. In this work,
we investigate correlations between online social media
and Internet search for the COVID-19 pandemic among 50
U.S. states. By collecting the state-level daily trends
through both Twitter and Google Trends, we observe a
high but state-different lag correlation with the
number of daily confirmed cases. We further find that
the accuracy measured by the correlation coefficient is
positively correlated to a state's demographic, air
traffic volume and GDP development. Most importantly,
we show that a state's early infection rate is
negatively correlated with the lag to the previous peak
in Internet searches and tweeting about COVID-19,
indicating that earlier collective awareness on
Twitter/Google correlates with a lower infection rate.
Lastly, we demonstrate that correlations between online
social media and search trends are sensitive to time,
mainly due to the attention shifting of the public.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Treiblmaier:2021:ENW,
author = "Horst Treiblmaier",
title = "Exploring the Next Wave of Blockchain and Distributed
Ledger Technology: The Overlooked Potential of Scenario
Analysis",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "183",
day = "19",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070183",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/183",
abstract = "Blockchain is predicted to disrupt industries,
economies, and societies. The properties of distributed
ledgers allow the creation of immutable data structures
that facilitate shared access in real time and enable a
plethora of innovative applications. However,
blockchain is not a uniform technology but rather a
bundle of evolving components whose implications are
notoriously hard to predict. At present, it is not
clear how current trends will evolve, with technical
evolution, legislation, and public policy being three
contingency factors that make ongoing disruptive
transformations particularly hard to predict. In light
of blockchain's potential disruptive impact, it is
surprising that scenario analysis has hitherto been
largely ignored in academic research. Therefore, in
this paper, we introduce the technique, clarify several
misconceptions, and provide examples illustrating how
this method can help to overcome the limitations of
existing technology impact research. We conclude that
if applied correctly, scenario analysis represents the
ideal tool to rigorously explore uncertain future
developments and to create a comprehensive foundation
for future research.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Isobe:2021:MAL,
author = "Shinnosuke Isobe and Satoshi Tamura and Satoru
Hayamizu and Yuuto Gotoh and Masaki Nose",
title = "Multi-Angle Lipreading with Angle Classification-Based
Feature Extraction and Its Application to Audio-Visual
Speech Recognition",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "182",
day = "15",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070182",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/182",
abstract = "Recently, automatic speech recognition (ASR) and
visual speech recognition (VSR) have been widely
researched owing to the development in deep learning.
Most VSR research works focus only on frontal face
images. However, assuming real scenes, it is obvious
that a VSR system should correctly recognize spoken
contents from not only frontal but also diagonal or
profile faces. In this paper, we propose a novel VSR
method that is applicable to faces taken at any angle.
Firstly, view classification is carried out to estimate
face angles. Based on the results, feature extraction
is then conducted using the best combination of
pre-trained feature extraction models. Next, lipreading
is carried out using the features. We also developed
audio-visual speech recognition (AVSR) using the VSR in
addition to conventional ASR. Audio results were
obtained from ASR, followed by incorporating audio and
visual results in a decision fusion manner. We
evaluated our methods using OuluVS2, a multi-angle
audio-visual database. We then confirmed that our
approach achieved the best performance among
conventional VSR schemes in a phrase classification
task. In addition, we found that our AVSR results are
better than ASR and VSR results.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yolchuyev:2021:DCP,
author = "Agil Yolchuyev and Janos Levendovszky",
title = "Data Chunks Placement Optimization for Hybrid Storage
Systems",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "181",
day = "11",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070181",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/181",
abstract = "''Hybrid Cloud Storage'' (HCS) is a widely adopted
framework that combines the functionality of public and
private cloud storage models to provide storage
services. This kind of storage is especially ideal for
organizations that seek to reduce the cost of their
storage infrastructure with the use of ``Public Cloud
Storage'' as a backend to on-premises primary storage.
Despite the higher performance, the hybrid cloud has
latency issues, related to the distance and bandwidth
of the public storage, which may cause a significant
drop in the performance of the storage systems during
data transfer. This issue can become a major problem
when one or more private storage nodes fail. In this
paper, we propose a new framework for optimizing the
data uploading process that is currently used with
hybrid cloud storage systems. The optimization is
concerned with spreading the data over the multiple
storages in the HCS system according to some predefined
objective functions. Furthermore, we also used Network
Coding technics for minimizing data transfer latency
between the receiver (private storages) and transmitter
nodes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hoppari:2021:PGI,
author = "Mika Hoppari and Mikko Uitto and Jukka M{\"a}kel{\"a}
and Ilkka Harjula and Seppo Rantala",
title = "Performance of the 5th Generation Indoor Wireless
Technologies --- Empirical Study",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "180",
day = "09",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070180",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/180",
abstract = "The evolution of 5th generation (5G) cellular
technology has introduced several enhancements and
provides better performance compared to previous
generations. To understand the real capabilities, the
importance of the empirical studies is significant to
also understand the possible limitations. This is very
important especially from the service and use case
point of view. Several test sites exist around the
globe for introducing, testing, and evaluating new
features, use cases, and performance in restricted and
secure environments alongside the commercial operators.
Test sites equipped with the standard technology are
the perfect places for performing deep analysis of the
latest wireless and cellular technologies in real
operating environments. The testing sites provide
valuable information with sophisticated quality of
service (QoS) indicators when the 5G vertical use cases
are evaluated using the actual devices in the carrier
grade network. In addition, the Wi-Fi standards are
constantly evolving toward higher bit rates and reduced
latency, and their usage in 5G dedicated verticals can
even improve performance, especially when lower
coverage is sufficient. This work presents the detailed
comparative measurements between Wi-Fi 6 and 5G New
Radio (NR) performance in indoor facilities and
extensive results carried out in 5G and beyond test
site located in Finland. The results gathered from the
extensive test sets indicate that the Wi-Fi 6 can
outperform the 5G in the indoor environment in terms of
throughput and latency when distance and coverage do
not increase enormously. In addition, the usage of
wireless technologies allows improved uplink
performance, which is usually more limited in cellular
networks. The gained results of our measurements
provide valuable information for designing, developing,
and implementing the requirements for the
next-generation wireless applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Truong:2021:FFR,
author = "Thanh-Dat Truong and Chi Nhan Duong and Minh-Triet
Tran and Ngan Le and Khoa Luu",
title = "Fast Flow Reconstruction via Robust Invertible $ n
\times n $ Convolution",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "179",
day = "08",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070179",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/179",
abstract = "The evolution of 5th generation (5G) cellular
technology has introduced several enhancements and
provides better performance compared to previous
generations. To understand the real capabilities, the
importance of the empirical studies is significant to
also understand the possible limitations. This is very
important especially from the service and use case
point of view. Several test sites exist around the
globe for introducing, testing, and evaluating new
features, use cases, and performance in restricted and
secure environments alongside the commercial operators.
Test sites equipped with the standard technology are
the perfect places for performing deep analysis of the
latest wireless and cellular technologies in real
operating environments. The testing sites provide
valuable information with sophisticated quality of
service (QoS) indicators when the 5G vertical use cases
are evaluated using the actual devices in the carrier
grade network. In addition, the Wi-Fi standards are
constantly evolving toward higher bit rates and reduced
latency, and their usage in 5G dedicated verticals can
even improve performance, especially when lower
coverage is sufficient. This work presents the detailed
comparative measurements between Wi-Fi 6 and 5G New
Radio (NR) performance in indoor facilities and
extensive results carried out in 5G and beyond test
site located in Finland. The results gathered from the
extensive test sets indicate that the Wi-Fi 6 can
outperform the 5G in the indoor environment in terms of
throughput and latency when distance and coverage do
not increase enormously. In addition, the usage of
wireless technologies allows improved uplink
performance, which is usually more limited in cellular
networks. The gained results of our measurements
provide valuable information for designing, developing,
and implementing the requirements for the
next-generation wireless applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Portela:2021:DSK,
author = "Filipe Portela",
title = "Data Science and Knowledge Discovery",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "178",
day = "07",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070178",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/178",
abstract = "Nowadays, Data Science (DS) is gaining a relevant
impact on the community. The most recent developments
in Computer Science, such as advances in Machine and
Deep Learning, Big Data, Knowledge Discovery, and Data
Analytics, have triggered the development of several
innovative solutions (e.g., approaches, methods,
models, or paradigms). It is a trending topic with many
application possibilities and motivates the researcher
to conduct experiments in these most diverse areas.
This issue created an opportunity to expose some of the
most relevant achievements in the Knowledge Discovery
and Data Science field and contribute to such subjects
as Health, Smart Homes, Social Humanities, Government,
among others. The relevance of this field can be easily
observed by its current achieved numbers: thirteen
research articles, one technical note, and forty-six
authors from fifteen nationalities.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Aiosa:2021:CEE,
author = "Grazia Veronica Aiosa and Barbara Attanasio and
Aurelio {La Corte} and Marialisa Scat{\'a}",
title = "{CoKnowEMe}: an Edge Evaluation Scheme for {QoS} of
{IoMT} Microservices in {6G} Scenario",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "177",
day = "07",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070177",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/177",
abstract = "The forthcoming 6G will attempt to rewrite the
communication networks' perspective focusing on a shift
in paradigm in the way technologies and services are
conceived, integrated and used. In this viewpoint, the
Internet of Medical Things (IoMT) represents a merger
of medical devices and health applications that are
connected through networks, introducing an important
change in managing the disease, treatments and
diagnosis, reducing costs and faults. In 6G, the edge
intelligence moves the innovative abilities from the
central cloud to the edge and jointly with the complex
systems approach will enable the development of a new
category of lightweight applications as microservices.
It requires edge intelligence also for the service
evaluation in order to introduce the same degree of
adaptability. We propose a new evaluation model, called
CoKnowEMe (context knowledge evaluation model), by
introducing an architectural and analytical scheme,
modeled following a complex and dynamical approach,
consisting of three inter-operable level and different
networked attributes, to quantify the quality of IoMT
microservices depending on a changeable context of use.
We conduct simulations to display and quantify the
structural complex properties and performance
statistical estimators. We select and classify suitable
attributes through a further detailed procedure in a
supplementary information document.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dong:2021:DDR,
author = "Shuai Dong and Zhihua Yang and Wensheng Li and Kun
Zou",
title = "Dynamic Detection and Recognition of Objects Based on
Sequential {RGB} Images",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "176",
day = "07",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070176",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/176",
abstract = "Conveyors are used commonly in industrial production
lines and automated sorting systems. Many applications
require fast, reliable, and dynamic detection and
recognition for the objects on conveyors. Aiming at
this goal, we design a framework that involves three
subtasks: one-class instance segmentation (OCIS),
multiobject tracking (MOT), and zero-shot fine-grained
recognition of 3D objects (ZSFGR3D). A new level set
map network (LSMNet) and a multiview redundancy-free
feature network (MVRFFNet) are proposed for the first
and third subtasks, respectively. The level set map
(LSM) is used to annotate instances instead of the
traditional multichannel binary mask, and each peak of
the LSM represents one instance. Based on the LSM,
LSMNet can adopt a pix2pix architecture to segment
instances. MVRFFNet is a generalized zero-shot learning
(GZSL) framework based on the Wasserstein generative
adversarial network for 3D object recognition.
Multi-view features of an object are combined into a
compact registered feature. By treating the registered
features as the category attribution in the GZSL
setting, MVRFFNet learns a mapping function that maps
original retrieve features into a new redundancy-free
feature space. To validate the performance of the
proposed methods, a segmentation dataset and a
fine-grained classification dataset about objects on a
conveyor are established. Experimental results on these
datasets show that LSMNet can achieve a recalling
accuracy close to the light instance segmentation
framework You Only Look At CoefficienTs (YOLACT), while
its computing speed on an NVIDIA GTX1660TI GPU is 80
fps, which is much faster than YOLACT's 25 fps.
Redundancy-free features generated by MVRFFNet perform
much better than original features in the retrieval
task.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Almuqren:2021:ESC,
author = "Latifah Almuqren and Fatma S. Alrayes and Alexandra I.
Cristea",
title = "An Empirical Study on Customer Churn Behaviours
Prediction Using {Arabic Twitter} Mining Approach",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "175",
day = "05",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070175",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/175",
abstract = "With the rising growth of the telecommunication
industry, the customer churn problem has grown in
significance as well. One of the most critical
challenges in the data and voice telecommunication
service industry is retaining customers, thus reducing
customer churn by increasing customer satisfaction.
Telecom companies have depended on historical customer
data to measure customer churn. However, historical
data does not reveal current customer satisfaction or
future likeliness to switch between telecom companies.
The related research reveals that many studies have
focused on developing churner prediction models based
on historical data. These models face delay issues and
lack timelines for targeting customers in real-time. In
addition, these models lack the ability to tap into
Arabic language social media for real-time analysis. As
a result, the design of a customer churn model based on
real-time analytics is needed. Therefore, this study
offers a new approach to using social media mining to
predict customer churn in the telecommunication field.
This represents the first work using Arabic Twitter
mining to predict churn in Saudi Telecom companies. The
newly proposed method proved its efficiency based on
various standard metrics and based on a comparison with
the ground-truth actual outcomes provided by a telecom
company.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2021:NUA,
author = "Xiaohui Li and Andrey V. Savkin",
title = "Networked Unmanned Aerial Vehicles for Surveillance
and Monitoring: a Survey",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "174",
day = "02",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070174",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/174",
abstract = "As a typical cyber-physical system, networked unmanned
aerial vehicles (UAVs) have received much attention in
recent years. Emerging communication technologies and
high-performance control methods enable networked UAVs
to operate as aerial sensor networks to collect more
complete and consistent information with significantly
improved mobility and flexibility than traditional
sensing platforms. One of the main applications of
networked UAVs is surveillance and monitoring, which
constitute essential components of a well-functioning
public safety system and many industrial applications.
Although the existing literature on surveillance and
monitoring UAVs is extensive, a comprehensive survey on
this topic is lacking. This article classifies
publications on networked UAVs for surveillance and
monitoring using the targets of interest and analyzes
several typical problems on this topic, including the
control, navigation, and deployment optimization of
UAVs. The related research gaps and future directions
are also presented.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chua:2021:TUP,
author = "Jiaming Chua and Lee-Yeng Ong and Meng-Chew Leow",
title = "Telehealth Using {PoseNet}-Based System for In-Home
Rehabilitation",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "173",
day = "02",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070173",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/173",
abstract = "The increasing cost of healthcare services is
accelerating the development of the telehealth system
to fulfill the necessity of delivering an efficient and
cost-effective remote healthcare services. Moreover,
the ageing of the global population and the disruption
of the COVID-19 pandemic are creating a rapid rise of
demand for healthcare services. This includes those who
are in need of remote monitoring for chronic conditions
through rehabilitation exercises. Therefore, this paper
presents a telehealth system using PoseNet for in-home
rehabilitation, with built-in statistical computation
for doctors to analyze the patient's recovery status.
This system enables patients to perform rehabilitation
exercises at home using an ordinary webcam. The PoseNet
skeleton-tracking method is applied to detect and track
the patients' angular movements for both elbows and
knees. By using this system, the measurement of the
elbow and knee joint angles can be calculated and
recorded while patients are performing rehabilitation
exercises in front of the laptop webcam. After the
patients complete their rehabilitation exercises, the
skeleton results of four body parts will be generated.
Based on the same actions performed by patients on
selected days, the doctors can examine and evaluate the
deviation rate of patients' angular movements between
different days to determine the recovery rate.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Akbar:2021:ODP,
author = "Zaenal Akbar and Hani Febri Mustika and Dwi Setyo Rini
and Lindung Parningotan Manik and Ariani Indrawati and
Agusdin Dharma Fefirenta and Tutie Djarwaningsih",
title = "An Ontology-Driven Personalized Faceted Search for
Exploring Knowledge Bases of {Capsicum}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "172",
day = "30",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070172",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/172",
abstract = "Capsicum is a genus of flowering plants in the
Solanaceae family in which the members are well known
to have a high economic value. The Capsicum fruits,
which are popularly known as peppers or chili, have
been widely used by people worldwide. It serves as a
spice and raw material for many products such as sauce,
food coloring, and medicine. For many years, scientists
have studied this plant to optimize its production. A
tremendous amount of knowledge has been obtained and
shared, as reflected in multiple knowledge-based
systems, databases, or information systems. An approach
to knowledge-sharing is through the adoption of a
common ontology to eliminate knowledge understanding
discrepancy. Unfortunately, most of the
knowledge-sharing solutions are intended for scientists
who are familiar with the subject. On the other hand,
there are groups of potential users that could benefit
from such systems but have minimal knowledge of the
subject. For these non-expert users, finding relevant
information from a less familiar knowledge base would
be daunting. More than that, users have various degrees
of understanding of the available content in the
knowledge base. This understanding discrepancy raises a
personalization problem. In this paper, we introduce a
solution to overcome this challenge. First, we
developed an ontology to facilitate knowledge-sharing
about Capsicum to non-expert users. Second, we
developed a personalized faceted search algorithm that
provides multiple structured ways to explore the
knowledge base. The algorithm addresses the
personalization problem by identifying the degree of
understanding about the subject from each user. In this
way, non-expert users could explore a knowledge base of
Capsicum efficiently. Our solution characterized users
into four groups. As a result, our faceted search
algorithm defines four types of matching mechanisms,
including three ranking mechanisms as the core of our
solution. In order to evaluate the proposed method, we
measured the predictability degree of produced list of
facets. Our findings indicated that the proposed
matching mechanisms could tolerate various query types,
and a high degree of predictability can be achieved by
combining multiple ranking mechanisms. Furthermore, it
demonstrates that our approach has a high potential
contribution to biodiversity science in general, where
many knowledge-based systems have been developed with
limited access to users outside of the domain.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tsai:2021:SBE,
author = "Pang-Wei Tsai and Aris Cahyadi Risdianto and Meng Hui
Choi and Satis Kumar Permal and Teck Chaw Ling",
title = "{SD-BROV}: an Enhanced {BGP} Hijacking Protection with
Route Validation in Software-Defined {eXchange}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "171",
day = "30",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070171",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/171",
abstract = "In global networks, Border Gateway Protocol (BGP) is
widely used in exchanging routing information. While
the original design of BGP did not focus on security
protection against deliberate or accidental errors
regarding to routing disruption, one of fundamental
vulnerabilities in BGP is a lack of insurance in
validating authority for announcing network layer
reachability. Therefore, a distributed repository
system known as Resource Public Key Infrastructure
(RPKI) has been utilized to mitigate this issue.
However, such a validation requires further deployment
steps for Autonomous System (AS), and it might cause
performance and compatibility problems in legacy
network infrastructure. Nevertheless, with recent
advancements in network innovation, some traditional
networks are planning to be restructured with
Software-Defined Networking (SDN) technology for
gaining more benefits. By using SDN, Internet eXchange
Point (IXP) is able to enhance its capability of
management by applying softwarized control methods,
acting as a Software-Defined eXchange (SDX) center to
handle numerous advertisement adaptively. To use the
SDN method to strengthen routing security of IXP, this
paper proposed an alternative SDX development, SD-BROV,
an SDX-based BGP Route Origin Validation mechanism that
establishes a flexible route exchange scenario with
RPKI validation. The validating application built in
the SDN controller is capable of investigating received
routing information. It aims to support hybrid SDN
environments and help non-SDN BGP neighbors to get
trusted routes and drop suspicious ones in transition.
To verify proposed idea with emulated environment, the
proof-of-concept development is deployed on an SDN
testbed running over Research and Education Networks
(RENs). During BGP hijacking experiment, the results
show that developed SD-BROV is able to detect and stop
legitimate traffic to be redirected by attacker, making
approach to secure traffic forwarding on BGP routers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mountaser:2021:SBE,
author = "Ghizlane Mountaser and Toktam Mahmoodi",
title = "An {SDR}-Based Experimental Study of Reliable and
Low-Latency {Ethernet}-Based Fronthaul with {MAC-PHY}
Split",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "170",
day = "30",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070170",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/170",
abstract = "Cloud-Radio Access Network (RAN) is one of the
architectural solutions for those mobile networks that
aim to provide an infrastructure that satisfies the
communication needs of a wide range of services and
deployments. In Cloud-RAN, functions can be flexibly
split between central and distributed units, which
enables the use of different types of transport
network. Ethernet-based fronthaul can be an attractive
solution for Cloud-RAN. On the one hand, the deployment
of Ethernet-based fronthaul enables Cloud-RAN to
provide more diverse, flexible and cost-efficient
solutions. On the other hand, Ethernet-based fronthaul
requires packetized communication, which imposes
challenges to delivering stringent latency requirements
between RAN functionalities. In this paper, we set up a
hardware experiment based on Cloud-RAN with a low layer
split, particularly between medium access control and
the physical layer. The aim is to demonstrate how
multi-path and channel coding over the fronthaul can
improve fronthaul reliability while ensuring that: (i)
latency results meet the standard requirements; and
(ii) the overall system operates properly. Our results
show that the proposed solution can improve fronthaul
reliability while latency remains below a strict
latency bound required by the 3rd Generation
Partnership Project for this functional split.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chiluveru:2021:DSM,
author = "Rajeshwari Chiluveru and Nishu Gupta and Ariel Soares
Teles",
title = "Distribution of Safety Messages Using Mobility-Aware
Multi-Hop Clustering in Vehicular Ad Hoc Network",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "169",
day = "29",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070169",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/169",
abstract = "Reliability and security when distributing safety
messages among vehicles in an extremely mobile
environment are prominent issues in Vehicular Ad-Hoc
Networks (VANETs). In VANET, data transfer becomes
challenging because of inherent features such as
excessive speed, geographically constrained topologies,
unsteady communication links, diversity in the capacity
of the channel, etc. A major challenge in the multi-hop
framework is maintaining and building a path under such
a rigid environment. With VANET, potency in the traffic
safety applications has performed well because of the
proper design of medium access control (MAC) protocols.
In this article, a protocol is proposed pertaining to
the distribution of safety messages named
mobility-aware multi-hop clustering-based MAC
(MAMC-MAC) to accomplish minimum communication
overhead, high reliability, and delivery of safety
messages in real-time environments. MAMC-MAC has the
ability to establish clustering-based multi-hop
sequence using the time-division multiple access (TDMA)
technique. The protocol was specially developed for
highway outlines to achieve network enhancement and
efficient channel usage and guarantees integrity among
the vehicles. The performance of the proposed protocol
is evaluated using Network Simulator (NS-2), and it
demonstrates its superiority over various standard
protocols in terms of a number of quality-of-service
(QoS)-based parameters. The criteria to select and
assess these parameters are their sensitivity and
importance to the safety-based applications they
provide.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chen:2021:DPB,
author = "Xuan Chen and Shujuan Tian and Kien Nguyen and Hiroo
Sekiya",
title = "Decentralizing Private Blockchain-{IoT} Network with
{OLSR}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "168",
day = "28",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070168",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/168",
abstract = "With data transparency and immutability, the
blockchain can provide trustless and decentralized
services for Internet of Things (IoT) applications.
However, most blockchain-IoT networks, especially those
with a private blockchain, are built on top of an
infrastructure-based wireless network (i.e., using
Wi-Fi access points or cellular base stations). Hence,
they are still under the risk of
Single-Point-of-Failure (SPoF) on the network layer,
hindering the decentralization merit, for example, when
the access points or base stations get failures. This
paper presents an Optimized Link State Routing (OLSR)
protocol-based solution for that issue in a private
blockchain-IoT application. By decentralizing the
underlying network with OLSR, the private blockchain
network can avoid SPoF and automatically recover after
a failure. Single blockchain connections can be
extended to multiple ad hoc hops. Services over
blockchain become flexible to fit various IoT
scenarios. We show the effectiveness of our solution by
constructing a private Ethereum blockchain network
running on IoT devices (i.e., Raspberry Pi model 4)
with environmental data sensing (i.e., Particular
Matter (PM)). The IoT devices use OLSR to form an ad
hoc network. The environment data are collected and
propagated in transactions to a pre-loaded smart
contract periodically. We then evaluate the IoT
blockchain network's recovery time when facing a link
error. The evaluation results show that OLSR can
automatically recover after the failure. We also
evaluate the transaction-oriented latency and
block-oriented latency, which indicates the blocks have
a high transmission quality, while transactions are
transferred individually.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sharma:2021:SMF,
author = "Gourav Prateek Sharma and Wouter Tavernier and Didier
Colle and Mario Pickavet",
title = "Scheduling for Media Function Virtualization",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "167",
day = "28",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070167",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/167",
abstract = "Broadcasters are building studio architectures based
on commercial off-the-shelf (COTS) IT hardware because
of advantages such as cost reduction, ease of
management, and upgradation. Media function
virtualization (MFV) leverages IP networking to
transport media streams between virtual media functions
(VMFs), where they are processed. Media service
deployment in an MFV environment entails solving the
VMF-FG scheduling problem to ensure that the required
broadcast quality guarantees are fulfilled. In this
paper, we formulate the VMF-FG scheduling problem and
propose a greedy-based algorithm to solve it. The
evaluation of the algorithm is carried in terms of the
end-to-end delay and VMF queuing delay. Moreover, the
importance of VMF-FG decomposition in upgradation to
higher-quality formats is also highlighted.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Albeshri:2021:IHB,
author = "Aiiad Albeshri",
title = "An Image Hashing-Based Authentication and Secure Group
Communication Scheme for {IoT}-Enabled {MANETs}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "166",
day = "27",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070166",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/hash.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/166",
abstract = "Mobile ad hoc networks (MANETs) play a highly
significant role in the Internet of Things (IoT) for
managing node mobility. MANET opens the pathway for
different IoT-based communication systems with
effective abilities for a variety of applications in
several domains. In IoT-based systems, it provides the
self-formation and self-connection of networks. A key
advantage of MANETs is that any device or node can
freely join or leave the network; however, this makes
the networks and applications vulnerable to security
attacks. Thus, authentication plays an essential role
in protecting the network or system from several
security attacks. Consequently, secure communication is
an important prerequisite for nodes in MANETs. The main
problem is that the node moving from one group to
another may be attacked on the way by misleading the
device to join the neighboring group. To address this,
in this paper, we present an authentication mechanism
based on image hashing where the network administrator
allows the crosschecking of the identity image of a
soldier (i.e., a node) in the joining group. We propose
the node joining and node migration algorithms where
authentication is involved to ensure secure
identification. The simulation tool NS-2 is employed to
conduct extensive simulations for extracting the
results from the trace files. The results demonstrate
the effectiveness of the proposed scheme based on the
memory storage communication overhead and computational
cost. In our scheme, the attack can be detected
effectively and also provides a highly robust
assurance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cunha:2021:BCB,
author = "Paulo Rupino Cunha and Paulo Melo and Helder
Sebasti{\~a}o",
title = "From Bitcoin to Central Bank Digital Currencies:
Making Sense of the Digital Money Revolution",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "165",
day = "27",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070165",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/165",
abstract = "We analyze the path from cryptocurrencies to official
Central Bank Digital Currencies (CBDCs), to shed some
light on the ultimate dematerialization of money. To
that end, we made an extensive search that resulted in
a review of more than 100 academic and grey literature
references, including official positions from central
banks. We present and discuss the characteristics of
the different CBDC variants being considered-namely,
wholesale, retail, and, for the latter, the
account-based, and token-based-as well as ongoing
pilots, scenarios of interoperability, and open issues.
Our contribution enables decision-makers and society at
large to understand the potential advantages and risks
of introducing CBDCs, and how these vary according to
many technical and economic design choices. The
practical implication is that a debate becomes possible
about the trade-offs that the stakeholders are willing
to accept.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gwyn:2021:FRU,
author = "Tony Gwyn and Kaushik Roy and Mustafa Atay",
title = "Face Recognition Using Popular Deep Net Architectures:
a Brief Comparative Study",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "164",
day = "25",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070164",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/164",
abstract = "In the realm of computer security, the
username/password standard is becoming increasingly
antiquated. Usage of the same username and password
across various accounts can leave a user open to
potential vulnerabilities. Authentication methods of
the future need to maintain the ability to provide
secure access without a reduction in speed. Facial
recognition technologies are quickly becoming integral
parts of user security, allowing for a secondary level
of user authentication. Augmenting traditional username
and password security with facial biometrics has
already seen impressive results; however, studying
these techniques is necessary to determine how
effective these methods are within various parameters.
A Convolutional Neural Network (CNN) is a powerful
classification approach which is often used for image
identification and verification. Quite recently, CNNs
have shown great promise in the area of facial image
recognition. The comparative study proposed in this
paper offers an in-depth analysis of several
state-of-the-art deep learning based-facial recognition
technologies, to determine via accuracy and other
metrics which of those are most effective. In our
study, VGG-16 and VGG-19 showed the highest levels of
image recognition accuracy, as well as F1-Score. The
most favorable configurations of CNN should be
documented as an effective way to potentially augment
the current username/password standard by increasing
the current method's security with additional facial
biometrics.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Song:2021:SAC,
author = "Guizhe Song and Degen Huang",
title = "A Sentiment-Aware Contextual Model for Real-Time
Disaster Prediction Using {Twitter} Data",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "163",
day = "25",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070163",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/163",
abstract = "The massive amount of data generated by social media
present a unique opportunity for disaster analysis. As
a leading social platform, Twitter generates over 500
million Tweets each day. Due to its real-time
characteristic, more agencies employ Twitter to track
disaster events to make a speedy rescue plan. However,
it is challenging to build an accurate predictive model
to identify disaster Tweets, which may lack sufficient
context due to the length limit. In addition, disaster
Tweets and regular ones can be hard to distinguish
because of word ambiguity. In this paper, we propose a
sentiment-aware contextual model named
SentiBERT-BiLSTM-CNN for disaster detection using
Tweets. The proposed learning pipeline consists of
SentiBERT that can generate sentimental contextual
embeddings from a Tweet, a Bidirectional long
short-term memory (BiLSTM) layer with attention, and a
1D convolutional layer for local feature extraction. We
conduct extensive experiments to validate certain
design choices of the model and compare our model with
its peers. Results show that the proposed
SentiBERT-BiLSTM-CNN demonstrates superior performance
in the F1 score, making it a competitive model in
Tweets-based disaster prediction.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gao:2021:IQE,
author = "Hui-Li Gao",
title = "The Impact of Quality of Experience of {Chinese}
College Students on {Internet}-Based Resources
{English} Learning",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "7",
pages = "162",
day = "22",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13070162",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jul 23 15:16:13 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/7/162",
abstract = "Since Internet-based resources provides various and
practical forms of English learning materials,
Internet-based resources English learning is a common
way for the younger generation. However, not like adult
learning, university students need stronger motivation
to learn English from Internet-based resources. This
study surveyed Chinese college students in Central
China to reveal the relationship between cultural
intelligence, hedonic motivation, English
self-efficacy, online experience quality, and
willingness to continue learning online English. Using
online media platforms and convenient sampling methods,
a total of 385 questionnaires were collected. The data
analysis was divided into three phases, descriptive
analysis, measurement model evaluation, and structural
equation model examination. The results showed Internet
quality of experience significantly impacted English
continuous learning intention. Cultural intelligence,
English self-efficacy, and hedonic motivation all
influenced significantly on Internet quality of
experience and hedonic motivation had the strongest
impact. In addition, the mediation effects of Internet
quality of experience to these three factors and
Internet-based resources English continuous learning
intention all existed. Finally, the research results
show cultural intelligence, English self-efficacy, and
hedonic motivation were all examined significantly
impacting Internet quality of experience statistically.
English learning hedonic motivation is the most
influencing factor. Therefore, English learning
material should be attractive, fun, and enjoyable. This
is what the teachers should think of and emphasize when
to recommend learning material for students.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Barchi:2021:SNN,
author = "Francesco Barchi and Luca Zanatta and Emanuele Parisi
and Alessio Burrello and Davide Brunelli and Andrea
Bartolini and Andrea Acquaviva",
title = "Spiking Neural Network-Based Near-Sensor Computing for
Damage Detection in Structural Health Monitoring",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "219",
day = "23",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080219",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/219",
abstract = "In this work, we present an innovative approach for
damage detection of infrastructures on-edge devices,
exploiting a brain-inspired algorithm. The proposed
solution exploits recurrent spiking neural networks
(LSNNs), which are emerging for their theoretical
energy efficiency and compactness, to recognise damage
conditions by processing data from low-cost
accelerometers (MEMS) directly on the sensor node. We
focus on designing an efficient coding of MEMS data to
optimise SNN execution on a low-power microcontroller.
We characterised and profiled LSNN performance and
energy consumption on a hardware prototype sensor node
equipped with an STM32 embedded microcontroller and a
digital MEMS accelerometer. We used a
hardware-in-the-loop environment with virtual sensors
generating data on an SPI interface connected to the
physical microcontroller to evaluate the system with a
data stream from a real viaduct. We exploited this
environment also to study the impact of different
on-sensor encoding techniques, mimicking a bio-inspired
sensor able to generate events instead of
accelerations. Obtained results show that the proposed
optimised embedded LSNN (eLSNN), when using a
spike-based input encoding technique, achieves 54\%
lower execution time with respect to a naive LSNN
algorithm implementation present in the
state-of-the-art. The optimised eLSNN requires around
47 kCycles, which is comparable with the data transfer
cost from the SPI interface. However, the spike-based
encoding technique requires considerably larger input
vectors to get the same classification accuracy,
resulting in a longer pre-processing and sensor access
time. Overall the event-based encoding techniques leads
to a longer execution time (1.49$ \times $) but similar
energy consumption. Moving this coding on the sensor
can remove this limitation leading to an overall more
energy-efficient monitoring system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ghazal:2021:ISC,
author = "Taher M. Ghazal and Mohammad Kamrul Hasan and Muhammad
Turki Alshurideh and Haitham M. Alzoubi and Munir Ahmad
and Syed Shehryar Akbar and Barween {Al Kurdi} and Iman
A. Akour",
title = "{IoT} for Smart Cities: Machine Learning Approaches in
Smart Healthcare --- a Review",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "218",
day = "23",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080218",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/218",
abstract = "Smart city is a collective term for technologies and
concepts that are directed toward making cities
efficient, technologically more advanced, greener and
more socially inclusive. These concepts include
technical, economic and social innovations. This term
has been tossed around by various actors in politics,
business, administration and urban planning since the
2000s to establish tech-based changes and innovations
in urban areas. The idea of the smart city is used in
conjunction with the utilization of digital
technologies and at the same time represents a reaction
to the economic, social and political challenges that
post-industrial societies are confronted with at the
start of the new millennium. The key focus is on
dealing with challenges faced by urban society, such as
environmental pollution, demographic change, population
growth, healthcare, the financial crisis or scarcity of
resources. In a broader sense, the term also includes
non-technical innovations that make urban life more
sustainable. So far, the idea of using IoT-based sensor
networks for healthcare applications is a promising one
with the potential of minimizing inefficiencies in the
existing infrastructure. A machine learning approach is
key to successful implementation of the IoT-powered
wireless sensor networks for this purpose since there
is large amount of data to be handled intelligently.
Throughout this paper, it will be discussed in detail
how AI-powered IoT and WSNs are applied in the
healthcare sector. This research will be a baseline
study for understanding the role of the IoT in smart
cities, in particular in the healthcare sector, for
future research works.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Piao:2021:DSS,
author = "Yangheran Piao and Kai Ye and Xiaohui Cui",
title = "A Data Sharing Scheme for {GDPR}-Compliance Based on
Consortium Blockchain",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "217",
day = "21",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080217",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/217",
abstract = "After the General Data Protection Regulation (GDPR)
was introduced, some organizations and big data
companies shared data without conducting any privacy
protection and compliance authentication, which
endangered user data security, and were punished
financially for this reason. This study proposes a
blockchain-based GDPR compliance data sharing scheme,
aiming to promote compliance with regulations and
provide a tool for interaction between users and
service providers to achieve data security sharing. The
zero-knowledge Succinct Non-Interactive Arguments of
Knowledge (zk-SNARK) algorithm is adopted for
protecting data and ensure that the user's private data
can satisfy the individual requirements of the service
provider without exposing user data. The proposed
scheme ensures mutual authentication through the Proof
of Authority consensus based on the Committee
Endorsement Mechanism (CEM-PoA), and prevents nodes
from doing evil using the reputation incentive
mechanism. Theoretical analysis and performance
comparison indicate that the scheme meets the
confidentiality, availability, and other indicators. It
has superiority in efficiency and privacy protection
compared with other schemes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhao:2021:CPD,
author = "Yu Zhao and Yi Zhu and Qiao Yu and Xiaoying Chen",
title = "Cross-Project Defect Prediction Method Based on
Manifold Feature Transformation",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "216",
day = "20",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080216",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/216",
abstract = "Traditional research methods in software defect
prediction use part of the data in the same project to
train the defect prediction model and predict the
defect label of the remaining part of the data.
However, in the practical realm of software
development, the software project that needs to be
predicted is generally a brand new software project,
and there is not enough labeled data to build a defect
prediction model; therefore, traditional methods are no
longer applicable. Cross-project defect prediction uses
the labeled data of the same type of project similar to
the target project to build the defect prediction
model, so as to solve the problem of data loss in
traditional methods. However, the difference in data
distribution between the same type of project and the
target project reduces the performance of defect
prediction. To solve this problem, this paper proposes
a cross-project defect prediction method based on
manifold feature transformation. This method transforms
the original feature space of the project into a
manifold space, then reduces the difference in data
distribution of the transformed source project and the
transformed target project in the manifold space, and
finally uses the transformed source project to train a
naive Bayes prediction model with better performance. A
comparative experiment was carried out using the Relink
dataset and the AEEEM dataset. The experimental results
show that compared with the benchmark method and
several cross-project defect prediction methods, the
proposed method effectively reduces the difference in
data distribution between the source project and the
target project, and obtains a higher F1 value, which is
an indicator commonly used to measure the performance
of the two-class model.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chang:2021:TLR,
author = "Chin-Chen Chang and Jui-Feng Chang and Wei-Jiun Kao
and Ji-Hwei Horng",
title = "Two-Layer Reversible Data Hiding for {VQ}-Compressed
Images Based on De-Clustering and Indicator-Free
Search-Order Coding",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "215",
day = "20",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080215",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/215",
abstract = "During transmission of digital images, secret messages
can be embedded using data hiding techniques. Such
techniques can transfer private secrets without drawing
the attention of eavesdroppers. To reduce the amount of
transmitted data, image compression methods are widely
applied. Hiding secret data in compressed images is a
hot issue recently. In this paper, we apply the
de-clustering concept and the indicator-free
search-order coding (IFSOC) technique to hide
information into vector quantization (VQ) compressed
images. Experimental results show that the proposed
two-layer reversible data hiding scheme for
IFSOC-encoded VQ index table can hide a large amount of
secret data among state-of-the-art methods with a
relatively lower bit rate and high security.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ivanov:2021:IUM,
author = "Vladimir M. Ivanov and Anton M. Krivtsov and Sergey V.
Strelkov and Nikolay V. Kalakutskiy and Andrey I.
Yaremenko and Marina Yu. Petropavlovskaya and Maria N.
Portnova and Olga V. Lukina and Andrey P. Litvinov",
title = "Intraoperative Use of Mixed Reality Technology in
Median Neck and Branchial Cyst Excision",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "214",
day = "18",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080214",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/214",
abstract = "The paper considers the possibilities, prospects, and
drawbacks of the mixed reality (MR) technology
application using mixed reality smartglasses Microsoft
HoloLens 2. The main challenge was to find and develop
an approach that would allow surgeons to conduct
operations using mixed reality on a large scale,
reducing the preparation time required for the
procedure and without having to create custom solutions
for each patient. Research was conducted in three
clinical cases: two median neck and one branchial cyst
excisions. In each case, we applied a unique approach
of hologram positioning in space based on mixed reality
markers. As a result, we listed a series of positive
and negative aspects related to MR surgery, along with
proposed solutions for using MR in surgery on a daily
basis.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Euttamarajah:2021:EEJ,
author = "Shornalatha Euttamarajah and Yin Hoe Ng and Chee Keong
Tan",
title = "Energy-Efficient Joint Base Station Switching and
Power Allocation for Smart Grid Based Hybrid-Powered
{CoMP}-Enabled {HetNet}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "213",
day = "17",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080213",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/213",
abstract = "With the rapid proliferation of wireless traffic and
the surge of various data-intensive applications, the
energy consumption of wireless networks has
tremendously increased in the last decade, which not
only leads to more CO 2 emission, but also results in
higher operating expenditure. Consequently, energy
efficiency (EE) has been regarded as an essential
design criterion for future wireless networks. This
paper investigates the problem of EE maximisation for a
cooperative heterogeneous network (HetNet) powered by
hybrid energy sources via joint base station (BS)
switching (BS-Sw) and power allocation using
combinatorial optimisation. The cooperation among the
BSs is achieved through a coordinated multi-point
(CoMP) technique. Next, to overcome the complexity of
combinatorial optimisation, Lagrange dual decomposition
is applied to solve the power allocation problem and a
sub-optimal distance-based BS-Sw scheme is proposed.
The main advantage of the distance-based BS-Sw is that
the algorithm is tuning-free as it exploits two dynamic
thresholds, which can automatically adapt to various
user distributions and network deployment scenarios.
The optimal binomial and random BS-Sw schemes are also
studied to serve as benchmarks. Further, to solve the
non-fractional programming component of the EE
maximisation problem, a low-complexity and fast
converging Dinkelbach's method is proposed. Extensive
simulations under various scenarios reveal that in
terms of EE, the proposed joint distance-based BS-Sw
and power allocation technique applied to the
cooperative and harvesting BSs performs around 15-20\%
better than the non-cooperative and non-harvesting BSs
and can achieve near-optimal performance compared to
the optimal binomial method.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Casini:2021:BAI,
author = "Luca Casini and Marco Roccetti",
title = "A {Bayesian} Analysis of the Inversion of the
{SARS-COV-2} Case Rate in the Countries of the {2020
European Football Championship}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "212",
day = "17",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080212",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/212",
abstract = "While Europe was beginning to deal with the resurgence
of COVID-19 due to the Delta variant, the European
football championship took place from 11 June to 11
July 2021. We studied the inversion in the
decreased/increased rate of new SARS-COV-2 infections
in the countries of the tournament, investigating the
hypothesis of an association. Using a Bayesian
piecewise regression with a Poisson generalized linear
model, we looked for a changepoint in the timeseries of
the new SARS-COV-2 cases of each country, expecting it
to appear not later than two to three weeks after the
date of their first match. The two slopes, before and
after the changepoint, were used to discuss the
reversal from a decreasing to an increasing rate of the
infections. For 17 out of 22 countries (77\%) the
changepoint came on average 14.97 days after their
first match (95\% CI 12.29-17.47). For all those 17
countries, the changepoint coincides with an inversion
from a decreasing to an increasing rate of the
infections. Before the changepoint, the new cases were
decreasing, halving on average every 18.07 days (95\%
CI 11.81-29.42). After the changepoint, the cases begin
to increase, doubling every 29.10 days (95\% CI
14.12-9.78). This inversion in the SARS-COV-2 case
rate, which happened during the tournament, provides
evidence in favor of a relationship.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yoon:2021:RPP,
author = "Youngjoon Yoon and Hyogon Kim",
title = "Resolving Persistent Packet Collisions through
Broadcast Feedback in Cellular {V2X} Communication",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "211",
day = "16",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080211",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/211",
abstract = "The Third Generation Partnership Project (3GPP)
Release 16 defines the sensing-based semi-persistent
scheduling (SPS) as the resource allocation scheme for
Sidelink Mode 2 in New Radio (NR)-based
vehicle-to-everything (V2X) communication. A well-known
issue in Mode 2 is the persistent packet collision that
results from two or more vehicles repeatedly using the
same resource for transmission. It may create serious
safety problems when the vehicles are in a situation
where only the broadcast safety beacons can assist in
driving. To resolve this issue, a solution that relies
on the feedback from neighboring vehicles is proposed,
through which the vehicles suffering from persistent
packet collisions can quickly part and select other
resources. Extensive simulations show that the proposed
broadcast feedback scheme reduces persistent packet
collisions by an order of magnitude compared to SPS,
and it is achieved without sacrificing the average
packet reception ratio (PRR). Namely, it is the quality
aspect (i.e., burstiness) of the packet collisions that
the proposed scheme addresses rather than the quantity
(i.e., total number of collision losses). By preventing
extended packet loss events, the proposed scheme is
expected to serve NR V2X better, which requires
stringent QoS in terms of the information update delay
thereby helping to reduce the chances of vehicle
crashes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ghorpade:2021:SLI,
author = "Sheetal Ghorpade and Marco Zennaro and Bharat
Chaudhari",
title = "Survey of Localization for {Internet of Things} Nodes:
Approaches, Challenges and Open Issues",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "210",
day = "16",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080210",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/210",
abstract = "With exponential growth in the deployment of Internet
of Things (IoT) devices, many new innovative and
real-life applications are being developed. IoT
supports such applications with the help of
resource-constrained fixed as well as mobile nodes.
These nodes can be placed in anything from vehicles to
the human body to smart homes to smart factories.
Mobility of the nodes enhances the network coverage and
connectivity. One of the crucial requirements in IoT
systems is the accurate and fast localization of its
nodes with high energy efficiency and low cost. The
localization process has several challenges. These
challenges keep changing depending on the location and
movement of nodes such as outdoor, indoor, with or
without obstacles and so on. The performance of
localization techniques greatly depends on the
scenarios and conditions from which the nodes are
traversing. Precise localization of nodes is very much
required in many unique applications. Although several
localization techniques and algorithms are available,
there are still many challenges for the precise and
efficient localization of the nodes. This paper
classifies and discusses various state-of-the-art
techniques proposed for IoT node localization in
detail. It includes the different approaches such as
centralized, distributed, iterative, ranged based,
range free, device-based, device-free and their
subtypes. Furthermore, the different performance
metrics that can be used for localization, comparison
of the different techniques, some prominent
applications in smart cities and future directions are
also covered.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ellawindy:2021:CFQ,
author = "Ibtihal Ellawindy and Shahram Shah Heydari",
title = "Crowdsourcing Framework for {QoE}-Aware {SD-WAN}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "209",
day = "15",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080209",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/209",
abstract = "Quality of experience (QoE) is an important measure of
users' satisfaction regarding their network-based
services, and it is widely employed today to provide a
real assessment of the service quality as perceived by
the end users. QoE measures can be used to improve
application performance, as well as to optimize network
resources and reallocate them as needed when the
service quality degrades. While quantitative QoE
assessments based on network parameters may provide
insights into users' experience, subjective assessments
through direct feedback from the users have also
gathered interest recently due to their accuracy and
interactive nature. In this paper, we propose a
framework that can be used to collect real-time QoE
feedback through crowdsourcing and forward it to
network controllers to enhance streaming routes. We
analyze how QoE can be affected by different network
conditions, and how different streaming protocols
compare against each other when the network parameters
change dynamically. We also compare the real-time user
feedback to predefined network changes to measure if
participants will be able to identify all degradation
events, as well as to examine which combination of
degradation events are noticeable to the participants.
Our aim is to demonstrate that real-time QoE feedback
can enhance cloud-based services and can adjust service
quality on the basis of real-time, active participants'
interactions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kieseberg:2021:SID,
author = "Peter Kieseberg and Sebastian Schrittwieser and Edgar
Weippl",
title = "Secure Internal Data Markets",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "208",
day = "12",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080208",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/208",
abstract = "The data market concept has gained a lot of momentum
in recent years, fuelled by initiatives to set up such
markets, e.g., on the European level. Still, the
typical data market concept aims at providing a
centralised platform with all of its positive and
negative side effects. Internal data markets, also
called local or on-premise data markets, on the other
hand, are set up to allow data trade inside an
institution (e.g., between divisions of a large
company) or between members of a small, well-defined
consortium, thus allowing the remuneration of providing
data inside these structures. Still, while research on
securing global data markets has garnered some
attention throughout recent years, the internal data
markets have been treated as being more or less similar
in this respect. In this paper, we outline the major
differences between global and internal data markets
with respect to security and why further research is
required. Furthermore, we provide a fundamental model
for a secure internal data market that can be used as a
starting point for the generation of concrete internal
data market models. Finally, we provide an overview on
the research questions we deem most pressing in order
to make the internal data market concept work securely,
thus allowing for more widespread adoption.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alzahrani:2021:SSB,
author = "Bander Alzahrani and Nikos Fotiou",
title = "Securing {SDN}-Based {IoT} Group Communication",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "207",
day = "09",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080207",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/207",
abstract = "IoT group communication allows users to control
multiple IoT devices simultaneously. A convenient
method for implementing this communication paradigm is
by leveraging software-defined networking (SDN) and
allowing IoT endpoints to ``advertise'' the resources
that can be accessed through group communication. In
this paper, we propose a solution for securing this
process by preventing IoT endpoints from advertising
``fake'' resources. We consider group communication
using the constrained application protocol (CoAP), and
we leverage Web of Things (WoT) Thing Description (TD)
to enable resources' advertisement. In order to achieve
our goal, we are using linked-data proofs.
Additionally, we evaluate the application of
zero-knowledge proofs (ZKPs) for hiding certain
properties of a WoT-TD file.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vazquez-Lopez:2021:FAG,
author = "Alba V{\'a}zquez-L{\'o}pez and Manuel Marey-Perez",
title = "Factors Affecting e-Government Adoption by Dairy
Farmers: a Case Study in the {North-West} of {Spain}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "206",
day = "05",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080206",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/206",
abstract = "With the objective of assessing the farmers' situation
regarding the use of the ICT and their relations with
the electronic government, a case study consisting in
the realization of 34 face-to-face surveys was
conducted between February and March 2020 in dairy
farms in the region of Galicia (Spain). The sample was
selected according to one of the most important online
journals in the farming sector at a national level.
From the census, we chose those farms considered most
representative taking into account the main criteria:
the level of PAC (Common Agrarian Politics) subsidies
and milk production (litres/cow and year). The results
show that the majority of the farmers used the
internet, but on many an occasion, they were
discontented in relation to the poor connection quality
in their farms. In regard to the use of the electronic
government for procedures related to their farms, many
of them were able to perform them through the
government website; however, there were procedures
which the users defined as ``complex'' and which had to
be outsourced to authorised entities. The results also
show that the farmers do want to employ the
e-government, mainly because of the time and cost
saving; however, the current web pages do not meet the
users' expectations. Finally, this situation, applied
to a region placed among the 10 most productive regions
of milk, is comparable to what happens in other
regions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tashman:2021:CFC,
author = "Deemah Tashman and Walaa Hamouda",
title = "Cascaded $ \kappa $--$ \mu $ Fading Channels with
Colluding and Non-Colluding Eavesdroppers:
Physical-Layer Security Analysis",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "205",
day = "04",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080205",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/205",
abstract = "In this paper, the physical-layer security for a
three-node wiretap system model is studied. Under the
threat of multiple eavesdroppers, it is presumed that a
transmitter is communicating with a legitimate
receiver. The channels are assumed to be following
cascaded $ \kappa $--$ \mu $ fading distributions. In
addition, two scenarios for eavesdroppers' interception
and information-processing capabilities are
investigated: colluding and non-colluding
eavesdroppers. The positions of these eavesdroppers are
assumed to be random in the non-colluding eavesdropping
scenario, based on a homogeneous Poisson point process
(HPPP). The security is examined in terms of the
secrecy outage probability, the probability of non-zero
secrecy capacity, and the intercept probability. The
exact and asymptotic expressions for the secrecy outage
probability and the probability of non-zero secrecy
capacity are derived. The results demonstrate the
effect of the cascade level on security. Additionally,
the results indicate that as the number of
eavesdroppers rises, the privacy of signals exchanged
between legitimate ends deteriorates. Furthermore, in
this paper, regarding the capabilities of tapping and
processing the information, we provide a comparison
between colluding and non-colluding eavesdropping.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rojas:2021:DBR,
author = "Oscar Rojas and Veronica Gil-Costa and Mauricio
Marin",
title = "A {DFT}-Based Running Time Prediction Algorithm for
{Web} Queries",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "204",
day = "04",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080204",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/204",
abstract = "Web search engines are built from components capable
of processing large amounts of user queries per second
in a distributed way. Among them, the index service
computes the top- k documents that best match each
incoming query by means of a document ranking
operation. To achieve high performance, dynamic pruning
techniques such as the WAND and BM-WAND algorithms are
used to avoid fully processing all of the documents
related to a query during the ranking operation.
Additionally, the index service distributes the ranking
operations among clusters of processors wherein in each
processor multi-threading is applied to speed up query
solution. In this scenario, a query running time
prediction algorithm has practical applications in the
efficient assignment of processors and threads to
incoming queries. We propose a prediction algorithm for
the WAND and BM-WAND algorithms. We experimentally show
that our proposal is able to achieve accurate
prediction results while significantly reducing
execution time and memory consumption as compared
against an alternative prediction algorithm. Our
proposal applies the discrete Fourier transform (DFT)
to represent key features affecting query running time
whereas the resulting vectors are used to train a
feed-forward neural network with back-propagation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kammerer:2021:ASD,
author = "Klaus Kammerer and Manuel G{\"o}ster and Manfred
Reichert and R{\"u}diger Pryss",
title = "Ambalytics: a Scalable and Distributed System
Architecture Concept for Bibliometric Network
Analyses",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "203",
day = "04",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080203",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/203",
abstract = "A deep understanding about a field of research is
valuable for academic researchers. In addition to
technical knowledge, this includes knowledge about
subareas, open research questions, and social
communities (networks) of individuals and organizations
within a given field. With bibliometric analyses,
researchers can acquire quantitatively valuable
knowledge about a research area by using bibliographic
information on academic publications provided by
bibliographic data providers. Bibliometric analyses
include the calculation of bibliometric networks to
describe affiliations or similarities of bibliometric
entities (e.g., authors) and group them into clusters
representing subareas or communities. Calculating and
visualizing bibliometric networks is a nontrivial and
time-consuming data science task that requires highly
skilled individuals. In addition to domain knowledge,
researchers must often provide statistical knowledge
and programming skills or use software tools having
limited functionality and usability. In this paper, we
present the ambalytics bibliometric platform, which
reduces the complexity of bibliometric network analysis
and the visualization of results. It accompanies users
through the process of bibliometric analysis and
eliminates the need for individuals to have programming
skills and statistical knowledge, while preserving
advanced functionality, such as algorithm
parameterization, for experts. As a proof-of-concept,
and as an example of bibliometric analyses outcomes,
the calculation of research fronts networks based on a
hybrid similarity approach is shown. Being designed to
scale, ambalytics makes use of distributed systems
concepts and technologies. It is based on the
microservice architecture concept and uses the
Kubernetes framework for orchestration. This paper
presents the initial building block of a comprehensive
bibliometric analysis platform called ambalytics, which
aims at a high usability for users as well as
scalability.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Balderas:2021:ETB,
author = "David Balderas and Pedro Ponce and Diego Lopez-Bernal
and Arturo Molina",
title = "{Education 4.0}: Teaching the Basis of Motor Imagery
Classification Algorithms for Brain--Computer
Interfaces",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "202",
day = "03",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080202",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/202",
abstract = "Education 4.0 is looking to prepare future scientists
and engineers not only by granting them with knowledge
and skills but also by giving them the ability to apply
them to solve real life problems through the
implementation of disruptive technologies. As a
consequence, there is a growing demand for educational
material that introduces science and engineering
students to technologies, such as Artificial
Intelligence (AI) and Brain-Computer Interfaces (BCI).
Thus, our contribution towards the development of this
material is to create a test bench for BCI given the
basis and analysis on how they can be discriminated
against. This is shown using different AI methods:
Fisher Linear Discriminant Analysis (LDA), Support
Vector Machines (SVM), Artificial Neural Networks
(ANN), Restricted Boltzmann Machines (RBM) and
Self-Organizing Maps (SOM), allowing students to see
how input changes alter their performance. These tests
were done against a two-class Motor Image database.
First, using a large frequency band and no filtering
eye movement. Secondly, the band was reduced and the
eye movement was filtered. The accuracy was analyzed
obtaining values around 70--80\% for all methods,
excluding SVM and SOM mapping. Accuracy and mapping
differentiability increased for some subjects for the
second scenario 70--85\%, meaning either their band
with the most significant information is on that
limited space or the contamination because of eye
movement was better mitigated by the regression method.
This can be translated to saying that these methods
work better under limited spaces. The outcome of this
work is useful to show future scientists and engineers
how BCI experiments are conducted while teaching them
the basics of some AI techniques that can be used in
this and other several experiments that can be carried
on the framework of Education 4.0.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lim:2021:PMV,
author = "Seng Boon Lim and Jalaluddin Abdul Malek and Tan
Yigitcanlar",
title = "Post-Materialist Values of Smart City Societies:
International Comparison of Public Values for Good
Enough Governance",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "201",
day = "03",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080201",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/201",
abstract = "This study aims to analyze the application of good
enough governance in considering the citizens' value
propositions that shape smart city societies. This
paper applied a quantitative method with cross-country
comparisons. Survey data were derived from the World
Values Survey. Malaysia was chosen as the main study
area, and compared with Indonesia and other countries
worldwide. The findings revealed that politics is the
value of least concern across all samples. In terms of
qualities for children to develop, respondents in both
Malaysia and Indonesia were less concerned about
imagination and unselfishness. As for materialist
versus post-materialist, the ratios of Malaysia and
Indonesia were slightly higher than the average; the
post-materialist value of free speech was the lowest
value chosen. In the long term, all countries are
experiencing the trend of moving toward
post-materialist societies. To be sustained under the
Collective and Adaptive System of smart city societies,
good enough governance in Malaysia and Indonesia should
consider the cultural context of the Muslim majority,
prioritize governance content that allows more space
for political participation and free speech, and
cultivate the imagination and unselfishness of
children. The generated insights underline the critical
role that smart societies play in establishing smart
cities.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Moumgiakmas:2021:CVF,
author = "Seraphim S. Moumgiakmas and Gerasimos G. Samatas and
George A. Papakostas",
title = "Computer Vision for Fire Detection on {UAVs} --- From
Software to Hardware",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "200",
day = "31",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080200",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/200",
abstract = "Fire hazard is a condition that has potentially
catastrophic consequences. Artificial intelligence,
through Computer Vision, in combination with UAVs has
assisted dramatically to identify this risk and avoid
it in a timely manner. This work is a literature review
on UAVs using Computer Vision in order to detect fire.
The research was conducted for the last decade in order
to record the types of UAVs, the hardware and software
used and the proposed datasets. The scientific research
was executed through the Scopus database. The research
showed that multi-copters were the most common type of
vehicle and that the combination of RGB with a thermal
camera was part of most applications. In addition, the
trend in the use of Convolutional Neural Networks
(CNNs) is increasing. In the last decade, many
applications and a wide variety of hardware and methods
have been implemented and studied. Many efforts have
been made to effectively avoid the risk of fire. The
fact that state-of-the-art methodologies continue to be
researched, leads to the conclusion that the need for a
more effective solution continues to arouse interest.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liang:2021:END,
author = "Kun Liang and Jingjing Liu and Yiying Zhang",
title = "The Effects of Non-Directional Online Behavior on
Students' Learning Performance: a User Profile Based
Analysis Method",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "199",
day = "31",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080199",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/199",
abstract = "Network behavior analysis is an effective method to
outline user requirements, and can extract user
characteristics by constructing machine learning
models. To protect the privacy of data, the shared
information in the model is limited to non-directional
network behavior information, such as online duration,
traffic, etc., which also hides users' unconscious
needs and habits. However, the value density of this
type of information is low, and it is still unclear how
much student performance is affected by online
behavior; in addition there is a lack of methods for
analyzing the correlation between non-directed online
behavior and academic performance. In this article, we
propose a model for analyzing the correlation between
non-directed surfing behavior and academic performance
based on user portraits. Different from the existing
research, we mainly focus on the public student
behavior information in the campus network system and
conduct in-depth research on it. The experimental
results show that online time and online traffic are
negatively correlated with academic performance,
respectively, and student's academic performance can be
predicted through the study of non-directional online
behavior.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vu:2021:SBI,
author = "Simon Nam Thanh Vu and Mads Stege and Peter Issam
El-Habr and Jesper Bang and Nicola Dragoni",
title = "A Survey on Botnets: Incentives, Evolution, Detection
and Current Trends",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "198",
day = "31",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080198",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/198",
abstract = "Botnets, groups of malware-infected hosts controlled
by malicious actors, have gained prominence in an era
of pervasive computing and the Internet of Things.
Botnets have shown a capacity to perform substantial
damage through distributed denial-of-service attacks,
information theft, spam and malware propagation. In
this paper, a systematic literature review on botnets
is presented to the reader in order to obtain an
understanding of the incentives, evolution, detection,
mitigation and current trends within the field of
botnet research in pervasive computing. The literature
review focuses particularly on the topic of botnet
detection and the proposed solutions to mitigate the
threat of botnets in system security. Botnet detection
and mitigation mechanisms are categorised and briefly
described to allow for an easy overview of the many
proposed solutions. The paper also summarises the
findings to identify current challenges and trends
within research to help identify improvements for
further botnet mitigation research.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fekete:2021:SLT,
author = "D{\'e}nes L{\'a}szl{\'o} Fekete and Attila Kiss",
title = "A Survey of Ledger Technology-Based Databases",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "197",
day = "31",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080197",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/197",
abstract = "The spread of crypto-currencies globally has led to
blockchain technology receiving greater attention in
recent times. This paper focuses more broadly on the
uses of ledger databases as a traditional database
manager. Ledger databases will be examined within the
parameters of two categories. The first of these are
Centralized Ledger Databases (CLD)-based Centralised
Ledger Technology (CLT), of which LedgerDB will be
discussed. The second of these are Permissioned
Blockchain Technology-based Decentralised Ledger
Technology (DLT) where Hyperledger Fabric, FalconDB,
BlockchainDB, ChainifyDB, BigchainDB, and Blockchain
Relational Database will be examined. The strengths and
weaknesses of the reviewed technologies will be
discussed, alongside a comparison of the mentioned
technologies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chiti:2021:TQI,
author = "Francesco Chiti and Romano Fantacci and Roberto Picchi
and Laura Pierucci",
title = "Towards the Quantum {Internet}: Satellite Control
Plane Architectures and Protocol Design",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "196",
day = "30",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080196",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/196",
abstract = "The creation of the future quantum Internet requires
the development of new systems, architectures, and
communications protocols. As a matter of fact, the
optical fiber technology is affected by extremely high
losses; thus, the deployment of a quantum satellite
network (QSN) composed of quantum satellite repeaters
(QSRs) in low Earth orbit would make it possible to
overcome these attenuation problems. For these reasons,
we consider the design of an ad hoc quantum satellite
backbone based on the Software-Defined Networking (SDN)
paradigm with a modular two-tier Control Plane (CP).
The first tier of the CP is embedded into a Master
Control Station (MCS) on the ground, which coordinates
the entire constellation and performs the management of
the CP integrated into the constellation itself. This
second tier is responsible for entanglement generation
and management on the selected path. In addition to
defining the SDN architecture in all its components, we
present a possible protocol to generate entanglement on
the end-to-end (E2E) path. Furthermore, we evaluate the
performance of the developed protocol in terms of the
latency required to establish entanglement between two
ground stations connected via the quantum satellite
backbone.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gupta:2021:IBP,
author = "Akash Gupta and Adnan Al-Anbuky",
title = "{IoT}-Based Patient Movement Monitoring: The
Post-Operative Hip Fracture Rehabilitation Model",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "195",
day = "29",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080195",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/195",
abstract = "Hip fracture incidence is life-threatening and has an
impact on the person's physical functionality and their
ability to live independently. Proper rehabilitation
with a set program can play a significant role in
recovering the person's physical mobility, boosting
their quality of life, reducing adverse clinical
outcomes, and shortening hospital stays. The Internet
of Things (IoT), with advancements in digital health,
could be leveraged to enhance the backup intelligence
used in the rehabilitation process and provide
transparent coordination and information about movement
during activities among relevant parties. This paper
presents a post-operative hip fracture rehabilitation
model that clarifies the involved rehabilitation
process, its associated events, and the main physical
movements of interest across all stages of care. To
support this model, the paper proposes an IoT-enabled
movement monitoring system architecture. The
architecture reflects the key operational
functionalities required to monitor patients in real
time and throughout the rehabilitation process. The
approach was tested incrementally on ten healthy
subjects, particularly for factors relevant to the
recognition and tracking of movements of interest. The
analysis reflects the significance of personalization
and the significance of a one-minute history of data in
monitoring the real-time behavior. This paper also
looks at the impact of edge computing at the gateway
and a wearable sensor edge on system performance. The
approach provides a solution for an architecture that
balances system performance with remote monitoring
functional requirements.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jalata:2021:MAN,
author = "Ibsa K. Jalata and Thanh-Dat Truong and Jessica L.
Allen and Han-Seok Seo and Khoa Luu",
title = "Movement Analysis for Neurological and Musculoskeletal
Disorders Using Graph Convolutional Neural Network",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "194",
day = "28",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080194",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/194",
abstract = "Using optical motion capture and wearable sensors is a
common way to analyze impaired movement in individuals
with neurological and musculoskeletal disorders.
However, using optical motion sensors and wearable
sensors is expensive and often requires highly trained
professionals to identify specific impairments. In this
work, we proposed a graph convolutional neural network
that mimics the intuition of physical therapists to
identify patient-specific impairments based on video of
a patient. In addition, two modeling approaches are
compared: a graph convolutional network applied solely
on skeleton input data and a graph convolutional
network accompanied with a 1-dimensional convolutional
neural network (1D-CNN). Experiments on the dataset
showed that the proposed method not only improves the
correlation of the predicted gait measure with the
ground truth value (speed = 0.791, gait deviation index
(GDI) = 0.792) but also enables faster training with
fewer parameters. In conclusion, the proposed method
shows that the possibility of using video-based data to
treat neurological and musculoskeletal disorders with
acceptable accuracy instead of depending on the
expensive and labor-intensive optical motion capture
systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lopez-Bernal:2021:ETB,
author = "Diego Lopez-Bernal and David Balderas and Pedro Ponce
and Arturo Molina",
title = "{Education 4.0}: Teaching the Basics of {KNN}, {LDA}
and Simple Perceptron Algorithms for Binary
Classification Problems",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "193",
day = "27",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080193",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/193",
abstract = "One of the main focuses of Education 4.0 is to provide
students with knowledge on disruptive technologies,
such as Machine Learning (ML), as well as the skills to
implement this knowledge to solve real-life problems.
Therefore, both students and professors require
teaching and learning tools that facilitate the
introduction to such topics. Consequently, this study
looks forward to contributing to the development of
those tools by introducing the basic theory behind
three machine learning classifying algorithms:
K-Nearest-Neighbor (KNN), Linear Discriminant Analysis
(LDA), and Simple Perceptron; as well as discussing the
diverse advantages and disadvantages of each method.
Moreover, it is proposed to analyze how these methods
work on different conditions through their
implementation over a test bench. Thus, in addition to
the description of each algorithm, we discuss their
application to solving three different binary
classification problems using three different datasets,
as well as comparing their performances in these
specific case studies. The findings of this study can
be used by teachers to provide students the basic
knowledge of KNN, LDA, and perceptron algorithms, and,
at the same time, it can be used as a guide to learn
how to apply them to solve real-life problems that are
not limited to the presented datasets.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tihinen:2021:DMC,
author = "Maarit Tihinen and Ari Pikkarainen and Jukka
Joutsenvaara",
title = "Digital Manufacturing Challenges Education ---
{SmartLab} Concept as a Concrete Example in Tackling
These Challenges",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "192",
day = "26",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080192",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/192",
abstract = "Digitalization is boosting the manufacturing
industry's shift to smart manufacturing systems, which
will efficiently utilize the potential of new
technologies for their business outcomes and value.
However, the literature shows that manufacturing
companies have implemented very little digital
technology due to a lack of the required knowledge and
competences. Increasingly, interconnected, digitalized,
and complex processes lead to new skill requirements in
companies and thereafter also of their workforce's
training needs to respond to the smart manufacturing's
new great expectations. The article provides concrete
examples of tackling challenges in education arising
from digital manufacturing. The case study introduced
in this article concerns the additive manufacturing
(AM) method, which is expected to give rise to
significant changes in various industrial fields,
including digital manufacturing. Advances in digital
manufacturing requires skilled professionals who are
aware of the possibilities and potential of the latest
technology. Education therefore needs to be developed.
This article points out that the built learning and
development environment, SmartLab, supports
multidisciplinary approaches and close collaboration
between several stakeholders like companies,
engineering education courses, students, and RDI
actors. The SmartLab concept is thus also expected to
provide a remarkable competitive advantage for business
in the region.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Iqbal:2021:IPC,
author = "Umar Iqbal and Ashraf Abosekeen and Jacques Georgy and
Areejah Umar and Aboelmagd Noureldin and Michael J.
Korenberg",
title = "Implementation of Parallel Cascade Identification at
Various Phases for Integrated Navigation System",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "191",
day = "26",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080191",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/191",
abstract = "Global navigation satellite systems (GNSS) are widely
used for the navigation of land vehicles. However, the
positioning accuracy of GNSS, such as the global
positioning system (GPS), deteriorates in urban areas
due to signal blockage and multipath effects. GNSS can
be integrated with a micro-electro-mechanical system
(MEMS)-based inertial navigation system (INS), such as
a reduced inertial sensor system (RISS) using a Kalman
filter (KF) to enhance the performance of the
integrated navigation solution in GNSS challenging
environments. The linearized KF cannot model the
low-cost and small-size sensors due to relatively high
noise levels and compound error characteristics. This
paper reviews two approaches to employing parallel
cascade identification (PCI), a non-linear system
identification technique, augmented with KF to enhance
the navigational solution. First, PCI models azimuth
errors for a loosely coupled 2D RISS integrated system
with GNSS to obtain a navigation solution. The
experimental results demonstrated that PCI improved the
integrated 2D RISS/GNSS performance by modeling linear,
non-linear, and other residual azimuth errors. For the
second scenario, PCI is utilized for modeling residual
pseudorange correlated errors of a KF-based tightly
coupled RISS/GNSS navigation solution. Experimental
results have shown that PCI enhances the performance of
the tightly coupled KF by modeling the non-linear
pseudorange errors to provide an enhanced and more
reliable solution. For the first algorithm, the results
demonstrated that PCI can enhance the performance by
77\% as compared to the KF solution during the GNSS
outages. For the second algorithm, the performance
improvement for the proposed PCI technique during the
availability of three satellites was 39\% compared to
the KF solution.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dowdeswell:2021:AAB,
author = "Barry Dowdeswell and Roopak Sinha and Stephen G.
MacDonell",
title = "Architecting an Agent-Based Fault Diagnosis Engine for
{IEC 61499} Industrial Cyber-Physical Systems",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "8",
pages = "190",
day = "23",
month = jul,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13080190",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Aug 26 10:44:38 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/8/190",
abstract = "IEC 61499 is a reference architecture for constructing
Industrial Cyber-Physical Systems (ICPS). However,
current function block development environments only
provide limited fault-finding capabilities. There is a
need for comprehensive diagnostic tools that help
engineers identify faults, both during development and
after deployment. This article presents the software
architecture for an agent-based fault diagnostic engine
that equips agents with domain-knowledge of IEC 61499.
The engine encourages a Model-Driven Development with
Diagnostics methodology where agents work alongside
engineers during iterative cycles of design,
development, diagnosis and refinement. Attribute-Driven
Design (ADD) was used to propose the architecture to
capture fault telemetry directly from the ICPS. A Views
and Beyond Software Architecture Document presents the
architecture. The Architecturally-Significant
Requirement (ASRs) were used to design the views while
an Architectural Trade-off Analysis Method (ATAM)
evaluated critical parts of the architecture. The
agents locate faults during both early-stage
development and later provide long-term fault
management. The architecture introduces dynamic,
low-latency software-in-loop Diagnostic Points (DPs)
that operate under the control of an agent to capture
fault telemetry. Using sound architectural design
approaches and documentation methods, coupled with
rigorous evaluation and prototyping, the article
demonstrates how quality attributes, risks and
architectural trade-offs were identified and mitigated
early before the construction of the engine
commenced.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Saia:2021:WIM,
author = "Roberto Saia and Salvatore Carta and Olaf Bergmann",
title = "Wireless {Internet}, Multimedia, and Artificial
Intelligence: New Applications and Infrastructures",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "9",
pages = "240",
day = "21",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13090240",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Sep 28 10:43:54 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/9/240",
abstract = "The potential offered by the Internet, combined with
the enormous number of connectable devices, offers
benefits in many areas of our modern societies, both
public and private. The possibility of making
heterogeneous devices communicate with each other
through the Internet has given rise to a constantly
growing scenario, which was unthinkable not long ago.
This unstoppable growth takes place thanks to the
continuous availability of increasingly sophisticated
device features, an ever-increasing bandwidth and
reliability of the connections, and the ever-lower
consumption of the devices, which grants them long
autonomy. This scenario of exponential growth also
involves other sectors such as, for example, that of
Artificial Intelligence (AI), which offers us
increasingly sophisticated approaches that can be
synergistically combined with wireless devices and the
Internet in order to create powerful applications for
everyday life. Precisely for the aforementioned
reasons, the community of researchers, year by year,
dedicates more time and resources in this direction. It
should be observed that this happens in an atypical way
concerning the other research fields, and this is
because the achieved progress and the developed
applications have practical applications in numerous
and different domains.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rajpal:2021:FBH,
author = "Danveer Rajpal and Akhil Ranjan Garg and Om Prakash
Mahela and Hassan Haes Alhelou and Pierluigi Siano",
title = "A Fusion-Based Hybrid-Feature Approach for Recognition
of Unconstrained Offline Handwritten {Hindi}
Characters",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "9",
pages = "239",
day = "18",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13090239",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Sep 28 10:43:54 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/9/239",
abstract = "Hindi is the official language of India and used by a
large population for several public services like
postal, bank, judiciary, and public surveys. Efficient
management of these services needs language-based
automation. The proposed model addresses the problem of
handwritten Hindi character recognition using a machine
learning approach. The pre-trained DCNN models namely;
InceptionV3-Net, VGG19-Net, and ResNet50 were used for
the extraction of salient features from the characters'
images. A novel approach of fusion is adopted in the
proposed work; the DCNN-based features are fused with
the handcrafted features received from Bi-orthogonal
discrete wavelet transform. The feature size was
reduced by the Principal Component Analysis method. The
hybrid features were examined with popular classifiers
namely; Multi-Layer Perceptron (MLP) and Support Vector
Machine (SVM). The recognition cost was reduced by
84.37\%. The model achieved significant scores of
precision, recall, and F1-measure-98.78\%, 98.67\%, and
98.69\%-with overall recognition accuracy of 98.73\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fendji:2021:WST,
author = "Jean Louis Ebongue Kedieng Fendji and D{\'e}sir{\'e}
Manuel Taira and Marcellin Atemkeng and Adam Musa Ali",
title = "{WATS-SMS}: a {T5}-Based {French} {Wikipedia}
Abstractive Text Summarizer for {SMS}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "9",
pages = "238",
day = "18",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13090238",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Sep 28 10:43:54 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/9/238",
abstract = "Text summarization remains a challenging task in the
natural language processing field despite the plethora
of applications in enterprises and daily life. One of
the common use cases is the summarization of web pages
which has the potential to provide an overview of web
pages to devices with limited features. In fact,
despite the increasing penetration rate of mobile
devices in rural areas, the bulk of those devices offer
limited features in addition to the fact that these
areas are covered with limited connectivity such as the
GSM network. Summarizing web pages into SMS becomes,
therefore, an important task to provide information to
limited devices. This work introduces WATS-SMS, a
T5-based French Wikipedia Abstractive Text Summarizer
for SMS. It is built through a transfer learning
approach. The T5 English pre-trained model is used to
generate a French text summarization model by
retraining the model on 25,000 Wikipedia pages then
compared with different approaches in the literature.
The objective is twofold: (1) to check the assumption
made in the literature that abstractive models provide
better results compared to extractive ones; and (2) to
evaluate the performance of our model compared to other
existing abstractive models. A score based on ROUGE
metrics gave us a value of 52\% for articles with
length up to 500 characters against 34.2\% for
transformer-ED and 12.7\% for seq-2seq-attention; and a
value of 77\% for articles with larger size against
37\% for transformers-DMCA. Moreover, an architecture
including a software SMS-gateway has been developed to
allow owners of mobile devices with limited features to
send requests and to receive summaries through the GSM
network.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gutierrez:2021:RTP,
author = "Juan Roberto L{\'o}pez Guti{\'e}rrez and Pedro Ponce
and Arturo Molina",
title = "Real-Time Power Electronics Laboratory to Strengthen
Distance Learning Engineering Education on Smart Grids
and Microgrids",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "9",
pages = "237",
day = "17",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13090237",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Sep 28 10:43:54 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/9/237",
abstract = "In the science and engineering fields of study, a
hands-on learning experience is as crucial a part of
the learning process for the student as the theoretical
aspect of a given subject. With the COVID-19 pandemic
in 2020, educational institutions were forced to
migrate to digital platforms to ensure the continuity
of the imparted lectures. The online approach can be
challenging for engineering programs, especially in
courses that employ practical laboratory methods as the
primary teaching strategies. Laboratory courses that
include specialized hardware and software cannot
migrate to a virtual environment without compromising
the advantages that a hands-on method provides to the
engineering student. This work assesses different
approaches in the virtualization process of a
laboratory facility, diving these into key factors such
as required communication infrastructure and available
technologies; it opens a discussion on the trends and
possible obstacles in the virtualization of a Real-Time
(RT) laboratory intended for Microgrid education in a
power electronics laboratory course, exposing the main
simulation strategies that can be used in an RT
environment and how these have different effects on the
learning process of student, as well as addressing the
main competencies an engineering student can strengthen
through interaction with RT simulation technologies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Meng:2021:PNF,
author = "Fanhui Meng and Haoming Sun and Jiarong Xie and
Chengjun Wang and Jiajing Wu and Yanqing Hu",
title = "Preference for Number of Friends in Online Social
Networks",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "9",
pages = "236",
day = "16",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13090236",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Sep 28 10:43:54 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/9/236",
abstract = "Preferences or dislikes for specific numbers are
ubiquitous in human society. In traditional Chinese
culture, people show special preference for some
numbers, such as 6, 8, 10, 100, 200, etc. By analyzing
the data of 6.8 million users of Sina Weibo, one of the
largest online social media platforms in China, we
discover that users exhibit a distinct preference for
the number 200, i.e., a significant fraction of users
prefer to follow 200 friends. This number, which is
very close to the Dunbar number that predicts the
cognitive limit on the number of stable social
relationships, motivates us to investigate how the
preference for numbers in traditional Chinese culture
is reflected on social media. We systematically portray
users who prefer 200 friends and analyze their several
important social features, including activity,
popularity, attention tendency, regional distribution,
economic level, and education level. We find that the
activity and popularity of users with the preference
for the number 200 are relatively lower than others.
They are more inclined to follow popular users, and
their social portraits change relatively slowly.
Besides, users who have a stronger preference for the
number 200 are more likely to be located in regions
with underdeveloped economies and education. That
indicates users with the preference for the number 200
are likely to be vulnerable groups in society and are
easily affected by opinion leaders.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Almaaitah:2021:RTC,
author = "Abdallah Y. Alma'aitah and Mohammad A. Massad",
title = "Reader-Tag Commands via Modulation Cutoff Intervals in
{RFID} Systems",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "9",
pages = "235",
day = "16",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13090235",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Sep 28 10:43:54 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/9/235",
abstract = "Radio frequency identification (RFID) technology
facilitates a myriad of applications. In such
applications, an efficient reader-tag interrogation
process is crucial. Nevertheless, throughout reader-tag
communication, significant amounts of time and power
are consumed on inescapable simultaneous tag replies
(i.e., collisions) due to the lack of carrier sensing
at the tags. This paper proposes the modulation cutoff
intervals (MCI) process as a novel reader-tag
interaction given the lack of carrier sensing
constraints in passive RFID tags. MCI is facilitated
through a simple digital baseband modulation
termination (DBMT) circuit at the tag. DBMT detects the
continuous-wave cutoff by the reader. In addition, DBMT
provides different flags based on the duration of the
continuous-wave cutoff. Given this capability at the
tag, the reader cuts off its continuous-wave
transmission for predefined intervals to indicate
different commands to the interrogated tag(s). The MCI
process is applied to tag interrogation (or
anti-collision) and tag-counting protocols. The MCI
process effect was evaluated by the two protocols under
high and low tag populations. The performance of such
protocols was significantly enhanced with precise
synchronization within time slots with more than 50\%
and more than 55.6\% enhancement on time and power
performance of anti-collision and counting protocols,
respectively. Through the MCI process, fast and
power-efficient tag identification is achieved in
inventory systems with low and high tag mobility;
alternatively, in addition to the rapid and power
efficient interaction with tags, anonymous tag counting
is conducted by the proposed process.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alshareef:2021:SGB,
author = "Norah Alshareef and Xiaohong Yuan and Kaushik Roy and
Mustafa Atay",
title = "A Study of Gender Bias in Face Presentation Attack and
Its Mitigation",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "9",
pages = "234",
day = "14",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13090234",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Sep 28 10:43:54 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/9/234",
abstract = "In biometric systems, the process of identifying or
verifying people using facial data must be highly
accurate to ensure a high level of security and
credibility. Many researchers investigated the fairness
of face recognition systems and reported demographic
bias. However, there was not much study on face
presentation attack detection technology (PAD) in terms
of bias. This research sheds light on bias in face
spoofing detection by implementing two phases. First,
two CNN (convolutional neural network)-based
presentation attack detection models, ResNet50 and
VGG16 were used to evaluate the fairness of detecting
imposer attacks on the basis of gender. In addition,
different sizes of Spoof in the Wild (SiW) testing and
training data were used in the first phase to study the
effect of gender distribution on the models'
performance. Second, the debiasing variational
autoencoder (DB-VAE) (Amini, A., et al., Uncovering and
Mitigating Algorithmic Bias through Learned Latent
Structure) was applied in combination with VGG16 to
assess its ability to mitigate bias in presentation
attack detection. Our experiments exposed minor gender
bias in CNN-based presentation attack detection
methods. In addition, it was proven that imbalance in
training and testing data does not necessarily lead to
gender bias in the model's performance. Results proved
that the DB-VAE approach (Amini, A., et al., Uncovering
and Mitigating Algorithmic Bias through Learned Latent
Structure) succeeded in mitigating bias in detecting
spoof faces.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lim:2021:RCT,
author = "Zhou-Yi Lim and Lee-Yeng Ong and Meng-Chew Leow",
title = "A Review on Clustering Techniques: Creating Better
User Experience for Online Roadshow",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "9",
pages = "233",
day = "13",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13090233",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Sep 28 10:43:54 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/9/233",
abstract = "Online roadshow is a relatively new concept that has
higher flexibility and scalability compared to the
physical roadshow. This is because online roadshow is
accessible through digital devices anywhere and
anytime. In a physical roadshow, organizations can
measure the effectiveness of the roadshow by
interacting with the customers. However, organizations
cannot monitor the effectiveness of the online roadshow
by using the same method. A good user experience is
important to increase the advertising effects on the
online roadshow website. In web usage mining,
clustering can discover user access patterns from the
weblog. By applying a clustering technique, the online
roadshow website can be further improved to provide a
better user experience. This paper presents a review of
clustering techniques used in web usage mining, namely
the partition-based, hierarchical, density-based, and
fuzzy clustering techniques. These clustering
techniques are analyzed from three perspectives: their
similarity measures, the evaluation metrics used to
determine the optimality of the clusters, and the
functional purpose of applying the techniques to
improve the user experience of the website. By applying
clustering techniques in different stages of the user
activities in the online roadshow website, the
advertising effectiveness of the website can be
enhanced in terms of its affordance, flow, and
interactivity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jaramillo-Ramirez:2021:SDF,
author = "Daniel Jaramillo-Ramirez and Manuel Perez",
title = "Spectrum Demand Forecasting for {IoT} Services",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "9",
pages = "232",
day = "08",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13090232",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Sep 28 10:43:54 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/9/232",
abstract = "The evolution of IoT has come with the challenge of
connecting not only a massive number of devices, but
also providing an always wider variety of services. In
the next few years, a big increase in the number of
connected devices is expected, together with an
important increase in the amount of traffic generated.
Never before have wireless communications permeated so
deeply in all industries and economic sectors.
Therefore, it is crucial to correctly forecast the
spectrum needs, which bands should be used for which
services, and the economic potential of its
utilization. This paper proposes a methodology for
spectrum forecasting consisting of two phases: a market
study and a spectrum forecasting model. The market
study determines the main drivers of the IoT industry
for any country: services, technologies, frequency
bands, and the number of devices that will require IoT
connectivity. The forecasting model takes the market
study as the input and calculates the spectrum demand
in 5 steps: Defining scenarios for spectrum contention,
calculating the offered traffic load, calculating a
capacity for some QoS requirements, finding the
spectrum required, and adjusting according to key
spectral efficiency determinants. This methodology is
applied for Colombia's IoT spectrum forecast. We
provide a complete step-by-step implementation in
fourteen independent spectrum contention scenarios,
calculating offered traffic, required capacity, and
spectrum for cellular licensed bands and non-cellular
unlicensed bands in a 10-year period. Detailed results
are presented specifying coverage area requirements per
economic sector, frequency band, and service. The need
for higher teledensity and higher spectral efficiency
turns out to be a determining factor for spectrum
savings.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Begum:2021:UAB,
author = "Nasima Begum and Md Azim Hossain Akash and Sayma
Rahman and Jungpil Shin and Md Rashedul Islam and Md
Ezharul Islam",
title = "User Authentication Based on Handwriting Analysis of
Pen-Tablet Sensor Data Using Optimal Feature Selection
Model",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "9",
pages = "231",
day = "06",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13090231",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Sep 28 10:43:54 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/9/231",
abstract = "Handwriting analysis is playing an important role in
user authentication or online writer identification for
more than a decade. It has a significant role in
different applications such as e-security, signature
biometrics, e-health, gesture analysis, diagnosis
system of Parkinson's disease,
Attention-deficit/hyperactivity disorders, analysis of
vulnerable people (stressed, elderly, or drugged),
prediction of gender, handedness and so on. Classical
authentication systems are image-based, text-dependent,
and password or fingerprint-based where the former one
has the risk of information leakage. Alternatively,
image processing and pattern-analysis-based systems are
vulnerable to camera attributes, camera frames, light
effect, and the quality of the image or pattern. Thus,
in this paper, we concentrate on real-time and
context-free handwriting data analysis for robust user
authentication systems using digital pen-tablet sensor
data. Most of the state-of-the-art authentication
models show suboptimal performance for improper
features. This research proposed a robust and efficient
user identification system using an optimal feature
selection technique based on the features from the
sensor's signal of pen and tablet devices. The proposed
system includes more genuine and accurate numerical
data which are used for features extraction model based
on both the kinematic and statistical features of
individual handwritings. Sensor data of digital
pen-tablet devices generate high dimensional feature
vectors for user identification. However, all the
features do not play equal contribution to identify a
user. Hence, to find out the optimal features, we
utilized a hybrid feature selection model. Extracted
features are then fed to the popular machine learning
(ML) algorithms to generate a nonlinear classifier
through training and testing phases. The experimental
result analysis shows that the proposed model achieves
more accurate and satisfactory results which ensure the
practicality of our system for user identification with
low computational cost.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kouhoue:2021:EVV,
author = "Austin Waffo Kouhou{\'e} and Yoann Bonavero and Thomas
Bou{\'e}tou Bou{\'e}tou and Marianne Huchard",
title = "Exploring Variability of Visual Accessibility Options
in Operating Systems",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "9",
pages = "230",
day = "04",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13090230",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Sep 28 10:43:54 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/9/230",
abstract = "Digital technologies are an opportunity to overcome
disabilities, provided that accessibility is ensured.
In this paper, we focus on visual accessibility and the
way it is supported in Operating Systems (OS). The
significant variability in this support has practical
consequences, e.g., the difficulty to recommend or
select an OS, or migrate from one OS to another. This
suggests building a variability model for OS that would
classify them and would serve as a reference. We
propose a methodology to build such a variability model
with the help of the Formal Concept Analysis (FCA)
framework. In addition, as visual accessibility can be
divided into several concerns (e.g., zoom, or
contrast), we leverage an extension of FCA, namely
Relational Concept Analysis. We also build an ontology
to dispose of a standardized description of visual
accessibility options. We apply our proposal to the
analysis of the variability of a few representative
operating systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Anderson:2021:GSV,
author = "David P. Anderson",
title = "Globally Scheduling Volunteer Computing",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "9",
pages = "229",
day = "31",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13090229",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Sep 28 10:43:54 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/9/229",
abstract = "Volunteer computing uses millions of consumer
computing devices (desktop and laptop computers,
tablets, phones, appliances, and cars) to do
high-throughput scientific computing. It can provide
Exa-scale capacity, and it is a scalable and
sustainable alternative to data-center computing.
Currently, about 30 science projects use volunteer
computing in areas ranging from biomedicine to
cosmology. Each project has application programs with
particular hardware and software requirements (memory,
GPUs, VM support, and so on). Each volunteered device
has specific hardware and software capabilities, and
each device owner has preferences for which science
areas they want to support. This leads to a scheduling
problem: how to dynamically assign devices to projects
in a way that satisfies various constraints and that
balances various goals. We describe the scheduling
policy used in Science United, a global manager for
volunteer computing.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gronchi:2021:NTS,
author = "Giorgio Gronchi and Marco Raglianti and Fabio
Giovannelli",
title = "Network Theory and Switching Behaviors: a User Guide
for Analyzing Electronic Records Databases",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "9",
pages = "228",
day = "31",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13090228",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Sep 28 10:43:54 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/9/228",
abstract = "As part of studies that employ health electronic
records databases, this paper advocates the employment
of graph theory for investigating drug-switching
behaviors. Unlike the shared approach in this field
(comparing groups that have switched with control
groups), network theory can provide information about
actual switching behavior patterns. After a brief and
simple introduction to fundamental concepts of network
theory, here we present (i) a Python script to obtain
an adjacency matrix from a records database and (ii) an
illustrative example of the application of network
theory basic concepts to investigate drug-switching
behaviors. Further potentialities of network theory
(weighted matrices and the use of clustering
algorithms), along with the generalization of these
methods to other kinds of switching behaviors beyond
drug switching, are discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Scazzariello:2021:MSA,
author = "Mariano Scazzariello and Lorenzo Ariemma and Giuseppe
{Di Battista} and Maurizio Patrignani",
title = "{Megalos}: a Scalable Architecture for the
Virtualization of Large Network Scenarios",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "9",
pages = "227",
day = "30",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13090227",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Sep 28 10:43:54 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/9/227",
abstract = "We introduce an open-source, scalable, and distributed
architecture, called Megalos, that supports the
implementation of virtual network scenarios consisting
of virtual devices (VDs) where each VD may have several
Layer 2 interfaces assigned to virtual LANs. We rely on
Docker containers to realize vendor-independent VDs and
we leverage Kubernetes for the management of the nodes
of a distributed cluster. Our architecture does not
require platform-specific configurations and supports a
seamless interconnection between the virtual
environment and the physical one. Also, it guarantees
the segregation of each virtual LAN traffic from the
traffic of other LANs, from the cluster traffic, and
from Internet traffic. Further, a packet is only sent
to the cluster node containing the recipient VD. We
produce several example applications where we emulate
large network scenarios, with thousands of VDs and
LANs. Finally, we experimentally show the scalability
potential of Megalos by measuring the overhead of the
distributed environment and of its signaling
protocols.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tu:2021:IRS,
author = "Shu-Fen Tu and Ching-Sheng Hsu and Yu-Tzu Lu",
title = "Improving {RE-SWOT} Analysis with Sentiment
Classification: a Case Study of Travel Agencies",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "9",
pages = "226",
day = "30",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13090226",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Sep 28 10:43:54 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/9/226",
abstract = "Nowadays, many companies collect online user reviews
to determine how users evaluate their products. Dalpiaz
and Parente proposed the RE-SWOT method to
automatically generate a SWOT matrix based on online
user reviews. The SWOT matrix is an important basis for
a company to perform competitive analysis; therefore,
RE-SWOT is a very helpful tool for organizations.
Dalpiaz and Parente calculated feature performance
scores based on user reviews and ratings to generate
the SWOT matrix. However, the authors did not propose a
solution for situations when user ratings are not
available. Unfortunately, it is not uncommon for forums
to only have user reviews but no user ratings. In this
paper, sentiment analysis is used to deal with the
situation where user ratings are not available. We also
use KKday, a start-up online travel agency in Taiwan as
an example to demonstrate how to use the proposed
method to build a SWOT matrix.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alghamdi:2021:STP,
author = "Taghreed Alghamdi and Khalid Elgazzar and Taysseer
Sharaf",
title = "Spatiotemporal Traffic Prediction Using Hierarchical
{Bayesian} Modeling",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "9",
pages = "225",
day = "30",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13090225",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Sep 28 10:43:54 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/9/225",
abstract = "Hierarchical Bayesian models (HBM) are powerful tools
that can be used for spatiotemporal analysis. The
hierarchy feature associated with Bayesian modeling
enhances the accuracy and precision of spatiotemporal
predictions. This paper leverages the hierarchy of the
Bayesian approach using the three models; the Gaussian
process (GP), autoregressive (AR), and Gaussian
predictive processes (GPP) to predict long-term traffic
status in urban settings. These models are applied on
two different datasets with missing observation. In
terms of modeling sparse datasets, the GPP model
outperforms the other models. However, the GPP model is
not applicable for modeling data with spatial points
close to each other. The AR model outperforms the GP
models in terms of temporal forecasting. The GP model
is used with different covariance matrices:
exponential, Gaussian, spherical, and Mat{\'e}rn to
capture the spatial correlation. The exponential
covariance yields the best precision in spatial
analysis with the Gaussian process, while the Gaussian
covariance outperforms the others in temporal
forecasting.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jimenez:2021:YVV,
author = "Mar{\'\i}a Artemisa Sangerm{\'a}n Jim{\'e}nez and
Pedro Ponce and Esteban V{\'a}zquez-Cano",
title = "{YouTube} Videos in the Virtual Flipped Classroom
Model Using Brain Signals and Facial Expressions",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "9",
pages = "224",
day = "30",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13090224",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Sep 28 10:43:54 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/9/224",
abstract = "As a result of the confinement due to the COVID-19
pandemic, various educational institutions migrated
their face-to-face teaching modality to a virtual
modality. This article presents the implementation of
the Flipped Classroom model in a completely virtual
format to develop grammatical competency in Spanish.
The model used videos from YouTube, one of the leading
global social network platforms, and the
videoconferencing system Zoom, the tool selected by the
studied educational institution to continue academic
operations during the health confinement. The model was
enriched with the Index for Learning Style test to
provide more differentiated teaching. This study showed
considerable improvement in the academic performance of
high school students taking a Spanish course at the
Mexico City campus of Tecnologico de Monterrey. Of the
total sample, 98\% increased their score by between 2
and 46 points, from a total of 100, in their
grammatical competency in Spanish. Additionally, the
student satisfaction survey showed that more than 90\%
considered the course methodology beneficial for
developing their grammatical competency in Spanish.
This study demonstrates the potential of the Flipped
Classroom model in a virtual format. This teaching
structure using the Flipped Classroom model could be
replicated in various educational settings and for
different areas of knowledge.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Eden:2021:RVA,
author = "Jen Eden and Anthony J. Roberto",
title = "The Role of Verbal Aggression in Cyberbullying
Perpetration and Victimization by Middle School
Students",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "9",
pages = "223",
day = "30",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13090223",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Sep 28 10:43:54 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/9/223",
abstract = "This manuscript examined the role trait verbal
aggression plays in cyberbullying victimization and
perpetration in adolescence. More than 400 middle
school students (46.8\% males and 52.2\% females)
completed a questionnaire on trait verbal aggression
and their history of cyberbullying perpetration and
victimization. Linear regression analyses revealed that
trait verbal aggression was a statistically significant
predictor of both cyberbullying perpetration and
victimization, that cyberbullying perpetration and
cyberbullying victimization are related, and that
cyberbullying perpetration appears to increase with
age, while cyberbullying victimization does not. Ideas
and implications for future applications of verbal
aggression and cyberbullying are discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{DAmbrosio:2021:SAP,
author = "Raffaele D'Ambrosio and Giuseppe Giordano and Serena
Mottola and Beatrice Paternoster",
title = "Stiffness Analysis to Predict the Spread Out of Fake
Information",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "9",
pages = "222",
day = "28",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13090222",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Sep 28 10:43:54 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/9/222",
abstract = "This work highlights how the stiffness index, which is
often used as a measure of stiffness for differential
problems, can be employed to model the spread of fake
news. In particular, we show that the higher the
stiffness index is, the more rapid the transit of fake
news in a given population. The illustration of our
idea is presented through the stiffness analysis of the
classical SIR model, commonly used to model the spread
of epidemics in a given population. Numerical
experiments, performed on real data, support the
effectiveness of the approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wehbe:2021:BBS,
author = "Rania Wehbe and Isam Shahrour",
title = "A {BIM}-Based Smart System for Fire Evacuation",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "9",
pages = "221",
day = "25",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13090221",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Sep 28 10:43:54 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/9/221",
abstract = "Building fires constitute a significant threat that
affects property, the environment, and human health.
The management of this risk requires an efficient fire
evacuation system for buildings' occupants. Therefore,
a smart fire evacuation system that combines building
information modeling (BIM) and smart technologies is
proposed. The system provides the following capacities:
(i) early fire detection; (ii) the evaluation of
environmental data; (iii) the identification of the
best evacuation path; and (iv) information for
occupants about the best evacuation routes. The system
was implemented in a research building at Lille
University in France. The results show the system's
capacities and benefits, particularly for the
identification of the best evacuation paths.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhao:2021:TPE,
author = "Xujian Zhao and Wei Li",
title = "Trend Prediction of Event Popularity from Microblogs",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "9",
pages = "220",
day = "24",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13090220",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Sep 28 10:43:54 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/9/220",
abstract = "Owing to rapid development of the Internet and the
rise of the big data era, microblog has become the main
means for people to spread and obtain information. If
people can accurately predict the development trend of
a microblog event, it will be of great significance for
the government to carry out public relations activities
on network event supervision and guide the development
of microblog event reasonably for network crisis. This
paper presents effective solutions to deal with trend
prediction of microblog events' popularity. Firstly, by
selecting the influence factors and quantifying the
weight of each factor with an information entropy
algorithm, the microblog event popularity is modeled.
Secondly, the singular spectrum analysis is carried out
to decompose and reconstruct the time series of the
popularity of microblog event. Then, the box chart
method is used to divide the popularity of microblog
event into various trend spaces. In addition, this
paper exploits the Bi-LSTM model to deal with trend
prediction with a sequence to label model. Finally, the
comparative experimental analysis is carried out on two
real data sets crawled from Sina Weibo platform.
Compared to three comparative methods, the experimental
results show that our proposal improves F1-score by up
to 39\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Nozari:2021:ISG,
author = "Hamed Nozari and Agnieszka Szmelter-Jarosz and Javid
Ghahremani-Nahr",
title = "The Ideas of Sustainable and Green Marketing Based on
the {Internet of Everything} --- The Case of the Dairy
Industry",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "266",
day = "19",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100266",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/266",
abstract = "The use of advanced computer technologies has
dramatically changed marketing. Concepts such as smart,
sustainable, and green marketing have emerged in the
last 20 years. One of these new technologies is the
Internet of Things (IoT), which has led to the
development of the activities and performances of
industries in various dimensions. For the various
objects, such as people, processes, and data, involved
in marketing activities, the Internet of Everything
(IoE) as an evolved IoT is a possible future scenario.
Some sectors pretend to be the first to implement this,
and the more they rely on dynamic, unstable customer
needs, the better a solution the IoE is for them.
Therefore, this paper presents a clear vision of smart,
sustainable marketing based on the IoE in one of the
fast-moving consumer goods (FMCG) industries, the dairy
industry. Key factors are identified to help readers
understand this concept better. The expert interview
makes it possible to draw a picture of the factors that
have helped successfully implement the IoE in the dairy
sector.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chen:2021:UTR,
author = "Jie Chen and Bing Han and Xufeng Ma and Jian Zhang",
title = "Underwater Target Recognition Based on Multi-Decision
{LOFAR} Spectrum Enhancement: a Deep-Learning
Approach",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "265",
day = "13",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100265",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/265",
abstract = "Underwater target recognition is an important
supporting technology for the development of marine
resources, which is mainly limited by the purity of
feature extraction and the universality of recognition
schemes. The low-frequency analysis and recording
(LOFAR) spectrum is one of the key features of the
underwater target, which can be used for feature
extraction. However, the complex underwater environment
noise and the extremely low signal-to-noise ratio of
the target signal lead to breakpoints in the LOFAR
spectrum, which seriously hinders the underwater target
recognition. To overcome this issue and to further
improve the recognition performance, we adopted a
deep-learning approach for underwater target
recognition, and a novel LOFAR spectrum enhancement
(LSE)-based underwater target-recognition scheme was
proposed, which consists of preprocessing, offline
training, and online testing. In preprocessing, we
specifically design a LOFAR spectrum enhancement based
on multi-step decision algorithm to recover the
breakpoints in LOFAR spectrum. In offline training, the
enhanced LOFAR spectrum is adopted as the input of
convolutional neural network (CNN) and a LOFAR-based
CNN (LOFAR-CNN) for online recognition is developed.
Taking advantage of the powerful capability of CNN in
feature extraction, the recognition accuracy can be
further improved by the proposed LOFAR-CNN. Finally,
extensive simulation results demonstrate that the
LOFAR-CNN network can achieve a recognition accuracy of
95.22\%, which outperforms the state-of-the-art
methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lepasepp:2021:SLR,
author = "Tuuli Katarina Lepasepp and William Hurst",
title = "A Systematic Literature Review of {Industry 4.0}
Technologies within Medical Device Manufacturing",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "264",
day = "13",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100264",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/264",
abstract = "Ever since the emergence of Industry 4.0 as the
synonymous term for the fourth industrial revolution,
its applications have been widely discussed and used in
many business scenarios. This concept is derived from
the advantages of internet and technology, and it
describes the efficient synchronicity of humans and
computers in smart factories. By leveraging big data
analysis, machine learning and robotics, the end-to-end
supply chain is optimized in many ways. However, these
implementations are more challenging in heavily
regulated fields, such as medical device manufacturing,
as incorporating new technologies into factories is
restricted by the regulations in place. Moreover, the
production of medical devices requires an elaborate
quality analysis process to assure the best possible
outcome to the patient. Therefore, this article
reflects on the benefits (features) and limitations
(obstacles), in addition to the various smart
manufacturing trends that could be implemented within
the medical device manufacturing field by conducting a
systematic literature review of 104 articles sourced
from four digital libraries. Out of the 7 main themes
and 270 unique applied technologies, 317 features and
117 unique obstacles were identified. Furthermore, the
main findings include an overview of ways in which
manufacturing could be improved and optimized within a
regulated setting, such as medical device
manufacturing.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hilda:2021:CTE,
author = "Jabanjalin Hilda and Srimathi Chandrasekaran",
title = "Cost and Time Economical Planning Algorithm for
Scientific Workflows in Cloud Computing",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "263",
day = "13",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100263",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/263",
abstract = "A heterogeneous system can be portrayed as a variety
of unlike resources that can be locally or geologically
spread, which is exploited to implement data-intensive
and computationally intensive applications. The
competence of implementing the scientific workflow
applications on heterogeneous systems is determined by
the approaches utilized to allocate the tasks to the
proper resources. Cost and time necessity are evolving
as different vital concerns of cloud computing
environments such as data centers. In the area of
scientific workflows, the difficulties of increased
cost and time are highly challenging, as they elicit
rigorous computational tasks over the communication
network. For example, it was discovered that the time
to execute a task in an unsuited resource consumes more
cost and time in the cloud data centers. In this paper,
a new cost- and time-efficient planning algorithm for
scientific workflow scheduling has been proposed for
heterogeneous systems in the cloud based upon the
Predict Optimistic Time and Cost (POTC). The proposed
algorithm computes the rank based not only on the
completion time of the current task but also on the
successor node in the critical path. Under a tight
deadline, the running time of the workflow and the
transfer cost are reduced by using this technique. The
proposed approach is evaluated using true cases of
data-exhaustive workflows compared with other
algorithms from written works. The test result shows
that our proposed method can remarkably decrease the
cost and time of the experimented workflows while
ensuring a better mapping of the task to the resource.
In terms of makespan, speedup, and efficiency, the
proposed algorithm surpasses the current existing
algorithms-such as Endpoint communication
contention-aware List Scheduling Heuristic (ELSH),
Predict Earliest Finish Time (PEFT), Budget-and
Deadline-constrained heuristic-based upon HEFT
(BDHEFT), Minimal Optimistic Processing Time (MOPT) and
Predict Earlier Finish Time (PEFT)-while holding the
same time complexity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Shi:2021:RAC,
author = "Jia Shi and Xuewen Zeng and Yang Li",
title = "A Register Access Control Scheme for {SNR} System to
Counter {CPA} Attack Based on Malicious User
Blacklist",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "262",
day = "13",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100262",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/262",
abstract = "Standalone Name Resolution (SNR) is an essential
component of many Information-Centric Networking (ICN)
infrastructures that maps and stores the mappings of
IDs and locators. The delivery of data can be realized
only when the name resolution process is completed
correctly. It also makes the SNR become the key target
of network attackers. In this paper, our research
focuses on the more covert and complex Content
Pollution Attack (CPA). By continuously sending invalid
content to the network at a low speed, attackers will
consume a lot of the resources and time of the SNR
system, resulting in a serious increase in the
resolution delay of normal users and further cache
pollution in ICN. It is difficult to be quickly
detected because the characteristics of attack are
inconspicuous. To address the challenge, a register
access control scheme for an SNR system based on a
malicious user blacklist query is proposed. A neighbor
voting algorithm is designed to discover possible
attacks in the network quickly and build a blacklist of
malicious users reasonably. Users on the blacklist will
be restricted from accessing the ICN network during the
registration phase with the resolution system.
Incentives and punishments for network users are
introduced to automate responses about the potential
malicious behavior reports. Our scheme is more
efficient as users do not have to wait for an
additional system component to perform operations. In
addition, our algorithm can better solve the collusion
problem in the voting process when compared with the
others. We experimentally evaluate our protocol to
demonstrate that the probability of successful
collusion attack can be reduced to less than 0.1 when
the attacker ratio is 0.5.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2021:ITC,
author = "Yinfeng Wang and Longxiang Wang and Xiaoshe Dong",
title = "An Intelligent {TCP} Congestion Control Method Based
on Deep {Q} Network",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "261",
day = "09",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100261",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/261",
abstract = "To optimize the data migration performance between
different supercomputing centers in China, we present
TCP-DQN, which is an intelligent TCP congestion control
method based on DQN (Deep Q network). The TCP
congestion control process is abstracted as a partially
observed Markov decision process. In this process, an
agent is constructed to interact with the network
environment. The agent adjusts the size of the
congestion window by observing the characteristics of
the network state. The network environment feeds back
the reward to the agent, and the agent tries to
maximize the expected reward in an episode. We designed
a weighted reward function to balance the throughput
and delay. Compared with traditional Q-learning, DQN
uses double-layer neural networks and experience replay
to reduce the oscillation problem that may occur in
gradient descent. We implemented the TCP-DQN method and
compared it with mainstream congestion control
algorithms such as cubic, Highspeed and NewReno. The
results show that the throughput of TCP-DQN can reach
more than 2 times of the comparison method while the
latency is close to the three compared methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Qiao:2021:DSR,
author = "Wenxin Qiao and Hao Lu and Yu Lu and Lijie Meng and
Yicen Liu",
title = "A Dynamic Service Reconfiguration Method for
Satellite-Terrestrial Integrated Networks",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "260",
day = "09",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100260",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/260",
abstract = "Satellite-terrestrial integrated networks (STINs) are
regarded as a promising solution to meeting the demands
of global high-speed seamless network access in the
future. Software-defined networking and network
function virtualization (SDN/NFV) are two complementary
technologies that can be used to ensure that the
heterogeneous resources in STINs can be easily managed
and deployed. Considering the dual mobility of
satellites and ubiquitous users, along with the dynamic
requirements of user requests and network resource
states, it is challenging to maintain service
continuity and high QoE performance in STINs. Thus, we
investigate the service migration and reconfiguration
scheme, which are of great significance to the
guarantee of continuous service provisioning.
Specifically, this paper proposes a dynamic service
reconfiguration method that can support flexible
service configurations on integrated networks,
including LEO satellites and ground nodes. We first
model the migration cost as an extra delay incurred by
service migration and reconfiguration and then
formulate the selection processes of the location and
migration paths of virtual network functions (VNFs) as
an integer linear programming (ILP) optimization
problem. Then, we propose a fuzzy logic and quantum
genetic algorithm (FQGA) to obtain an approximate
optimal solution that can accelerate the solving
process efficiently with the benefits of the
high-performance computing capacity of QGA. The
simulation results validate the effectiveness and
improved performance of the scheme proposed in this
paper.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Celsi:2021:PTR,
author = "Lorenzo Ricciardi Celsi and Andrea Caliciotti and
Matteo D'Onorio and Eugenio Scocchi and Nour Alhuda
Sulieman and Massimo Villari",
title = "On Predicting Ticket Reopening for Improving Customer
Service in {5G} Fiber Optic Networks",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "259",
day = "09",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100259",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/259",
abstract = "The paper proposes a data-driven strategy for
predicting technical ticket reopening in the context of
customer service for telecommunications companies
providing 5G fiber optic networks. Namely, the main aim
is to ensure that, between end user and service
provider, the Service Level Agreement in terms of
perceived Quality of Service is satisfied. The activity
has been carried out within the framework of an
extensive joint research initiative focused on Next
Generation Networks between ELIS Innovation Hub and a
major network service provider in Italy over the years
2018-2021. The authors make a detailed comparison among
the performance of different approaches to
classification-ranging from decision trees to
Artificial Neural Networks and Support Vector
Machines-and claim that a Bayesian network classifier
is the most accurate at predicting whether a monitored
ticket will be reopened or not. Moreover, the authors
propose an approach to dimensionality reduction that
proves to be successful at increasing the computational
efficiency, namely by reducing the size of the relevant
training dataset by two orders of magnitude with
respect to the original dataset. Numerical simulations
end the paper, proving that the proposed approach can
be a very useful tool for service providers in order to
identify the customers that are most at risk of
reopening a ticket due to an unsolved technical
issue.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Foschini:2021:SEA,
author = "Luca Foschini and Valentina Mignardi and Rebecca
Montanari and Domenico Scotece",
title = "An {SDN}-Enabled Architecture for {IT\slash OT}
Converged Networks: a Proposal and Qualitative Analysis
under {DDoS} Attacks",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "258",
day = "08",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100258",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/258",
abstract = "Real-time business practices require huge amounts of
data directly from the production assets. This new
thirst for accurate and timely data has forced the
convergence of the traditionally business-focused
information technology (IT) environment with the
production-focused operational technology (OT).
Recently, software-defined network (SDN) methodologies
have benefitted OT networks with enhanced situational
awareness, centralized configuration, deny-by-default
forwarding rules, and increased performance. What makes
SDNs so innovative is the separation between the
control plane and the data plane, centralizing the
command in the controllers. However, due to their young
age, the use of SDNs in the industry context has not
yet matured comprehensive SDN-based architectures for
IT/OT networks, which are also resistant to security
attacks such as denial-of-service ones, which may occur
in SDN-based industrial IoT (IIoT) networks. One main
motivation is that the lack of comprehensive SDN-based
architectures for IT/OT networks making it difficult to
effectively simulate, analyze, and identify proper
detection and mitigation strategies for DoS attacks in
IT/OT networks. No consolidated security solutions are
available that provide DoS detection and mitigation
strategies in IT/OT networks. Along this direction,
this paper's contributions are twofold. On the one
hand, this paper proposes a convergent IT/OT SDN-based
architecture applied in a real implementation of an
IT/OT support infrastructure called SIRDAM4.0 within
the context of the SBDIOI40 project. On the other hand,
this paper proposes a qualitative analysis on how this
architecture works under DoS attacks, focusing on what
the specific problems and vulnerabilities are. In
particular, we simulated several distributed
denial-of-service (DDoS) attack scenarios within the
context of the proposed architecture to show the
minimum effort needed by the attacker to hack the
network, and our obtained experimental results show how
it is possible to compromise the network, thus
considerably worsening the performance and, in general,
the functioning of the network. Finally, we conclude
our analysis with a brief description on the importance
of employing machine learning approaches for attack
detection and for mitigation techniques.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{ElGhanam:2021:ABD,
author = "Eiman ElGhanam and Ibtihal Ahmed and Mohamed Hassan
and Ahmed Osman",
title = "Authentication and Billing for Dynamic Wireless {EV}
Charging in an {Internet of Electric Vehicles}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "257",
day = "08",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100257",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/257",
abstract = "Dynamic wireless charging (DWC) is a promising
technology to charge Electric Vehicles (EV) using
on-road charging segments (CS), also known as DWC pads.
In order to ensure effective utilization of this
on-the-road charging service, communication and
coordination need to be established between the EVs and
the different network entities, thereby forming an
Internet of Electric Vehicles (IoEV). In an IoEV, EVs
can utilize different V2X communication modes to enable
charging scheduling, load management, and reliable
authentication and billing services. Yet, designing an
authentication scheme for dynamic EV charging presents
significant challenges given the mobility of the EVs
and the short contact time between the EVs and the
charging segments. Accordingly, this work proposes a
fast, secure and lightweight authentication scheme that
allows only authentic EVs with valid credentials to
charge their batteries while ensuring secure and fair
payments. The presented scheme starts with a key
pre-distribution phase between the charging service
company (CSC) and the charging pad owner (PO), followed
by a hash chain and digital signature-based
registration and authentication phase between the EV
and the CSC, before the EV reaches the beginning of the
charging lane. These preliminary authentication phases
allow the authentication between the EVs and the
charging segments to be performed using simple hash key
verification operations prior to charging activation,
which reduces the computational cost of the EVs and the
CS. Symmetric and asymmetric key cryptography are
utilized to secure the communication between the
different network entities. Analysis of the
computational and transmission time requirements of the
proposed authentication scheme shows that, for an EV
traveling at 60 km/h to start charging at the beginning
of the charging lane, the authentication process must
be initiated at least 1.35 m ahead of the starting
point of the lane as it requires $ \approx 81 $ ms to
be completed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2021:MAS,
author = "Shaoyong Li and Liang Lv and Xiaoya Li and Zhaoyun
Ding",
title = "Mobile App Start-Up Prediction Based on Federated
Learning and Attributed Heterogeneous Network
Embedding",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "256",
day = "07",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100256",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/256",
abstract = "At present, most mobile App start-up prediction
algorithms are only trained and predicted based on
single-user data. They cannot integrate the data of all
users to mine the correlation between users, and cannot
alleviate the cold start problem of new users or newly
installed Apps. There are some existing works related
to mobile App start-up prediction using multi-user
data, which require the integration of multi-party
data. In this case, a typical solution is distributed
learning of centralized computing. However, this
solution can easily lead to the leakage of user privacy
data. In this paper, we propose a mobile App start-up
prediction method based on federated learning and
attributed heterogeneous network embedding, which
alleviates the cold start problem of new users or new
Apps while guaranteeing users' privacy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Noguez:2021:VHM,
author = "Julieta Noguez and Luis Neri and V{\'\i}ctor
Robledo-Rella and Rosa Mar{\'\i}a Guadalupe
Garc{\'\i}a-Castel{\'a}n and Andres Gonzalez-Nucamendi
and David Escobar-Castillejos and Arturo Molina",
title = "{VIS-HAPT}: a Methodology Proposal to Develop
Visuo-Haptic Environments in {Education 4.0}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "255",
day = "05",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100255",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/255",
abstract = "Education 4.0 demands a flexible combination of
digital literacy, critical thinking, and
problem-solving in educational settings linked to
real-world scenarios. Haptic technology incorporates
the sense of touch into a visual simulator to enrich
the user's sensory experience, thus supporting a
meaningful learning process. After developing several
visuo-haptic simulators, our team identified serious
difficulties and important challenges to achieve
successful learning environments within the framework
of Education 4.0. This paper presents the VIS-HAPT
methodology for developing realistic visuo-haptic
scenarios to promote the learning of science and
physics concepts for engineering students. This
methodology consists of four stages that integrate
different aspects and processes leading to meaningful
learning experiences for students. The different
processes that must be carried out through the
different stages, the difficulties to overcome and
recommendations on how to face them are all described
herein. The results are encouraging since a significant
decrease (of approximately 40\%) in the development and
implementation times was obtained as compared with
previous efforts. The quality of the visuo-haptic
environments was also enhanced. Student perceptions of
the benefits of using visuo-haptic simulators to
enhance their understanding of physics concepts also
improved after using the proposed methodology. The
incorporation of haptic technologies in higher
education settings will certainly foster better student
performance in subsequent real environments related to
Industry 4.0.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alasmari:2021:RAC,
author = "Ashwag Alasmari and Aseel Addawood and Mariam Nouh and
Wajanat Rayes and Areej Al-Wabil",
title = "A Retrospective Analysis of the {COVID-19} Infodemic
in {Saudi Arabia}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "254",
day = "30",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100254",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/254",
abstract = "COVID-19 has had broad disruptive effects on
economies, healthcare systems, governments, societies,
and individuals. Uncertainty concerning the scale of
this crisis has given rise to countless rumors, hoaxes,
and misinformation. Much of this type of conversation
and misinformation about the pandemic now occurs online
and in particular on social media platforms like
Twitter. This study analysis incorporated a data-driven
approach to map the contours of misinformation and
contextualize the COVID-19 pandemic with regards to
socio-religious-political information. This work
consists of a combined system bridging quantitative and
qualitative methodologies to assess how
information-exchanging behaviors can be used to
minimize the effects of emergent misinformation. The
study revealed that the social media platforms detected
the most significant source of rumors in transmitting
information rapidly in the community. It showed that
WhatsApp users made up about 46\% of the source of
rumors in online platforms, while, through Twitter, it
demonstrated a declining trend of rumors by 41\%.
Moreover, the results indicate the second-most common
type of misinformation was provided by pharmaceutical
companies; however, a prevalent type of misinformation
spreading in the world during this pandemic has to do
with the biological war. In this combined retrospective
analysis of the study, social media with varying
approaches in public discourse contributes to efficient
public health responses.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ming:2021:DCV,
author = "Teo Rhun Ming and Noris Mohd Norowi and Rahmita Wirza
and Azrina Kamaruddin",
title = "Designing a Collaborative Virtual Conference
Application: Challenges, Requirements and Guidelines",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "253",
day = "29",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100253",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/253",
abstract = "Due to the recent COVID-19 pandemic that has swept the
globe, more people are working from home. People use
synchronous applications to communicate remotely
because they are not able to meet face-to-face.
However, few research studies on the issues surrounding
the virtual conference application, particularly those
that include collaborative activities, have been
conducted. The usability study recruited 16
participants (in four groups of four) to communicate
synchronously while performing collaborative
activities, such as drawing together on a shared
screen. According to the findings of the usability
study, users do not often use the collaborative tools
provided by the current virtual conference application.
This is due to low exposure and unfamiliarity with the
use of collaborative tools. The findings also show that
users frequently do not turn on the web camera due to
several reasons, including privacy, connectivity
issues, the environment, and background distraction.
Turning on the web camera can also cause anxiety due to
shyness in front of the camera. However, some
participants prefer to turn on the web camera so that
they can see each other's reactions when performing
collaborative activities. The article provides several
guidelines to assist in the design of virtual
conference applications, including a simple familiar
intuitive interface to encourage the use of
collaborative tools and also introduces the use of
virtual avatars as a way to represent oneself during
online meetings to allow affective sharing while
respecting the privacy of its users.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yuloskov:2021:SCR,
author = "Artem Yuloskov and Mohammad Reza Bahrami and Manuel
Mazzara and Iouri Kotorov",
title = "Smart Cities in {Russia}: Current Situation and
Insights for Future Development",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "252",
day = "28",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100252",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/252",
abstract = "The development of smart cities is a clear growing
trend all around the world. The convergence of
different technological, social, political, economical,
and ecological trends has allowed the concepts to rise
up quickly in governmental agendas. In this paper, we
analyze the situation of Russia regarding smart cities.
Moscow, Saint Petersburg, and Kazan are considered at
the ``Smart City 3.0'' stage of development, meaning
that the citizens are participating in their
advancement. Our reasons to focus on Russia are
two-fold: (1) we know the situation well, as we live
and work in a new city, Innopolis, founded in 2015 and
meant to be a blueprint for smart cities; (2) large
Russian cities are actively developing projects in this
sphere and are highly regarded worldwide in these
endeavors. It is therefore worth analyzing the context
and the trends. By studying the scientific literature
and categorizing the features of smart cities the world
over, we found that large Russian cities are developing
most of the components necessary in order to be called
smart. Herein we also discuss areas of possible growth
for Russian cities, such as green technologies and a
smart environment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2021:FSP,
author = "Shunli Wang and Rui Li and Jie Jiang and Yao Meng",
title = "Fine-Scale Population Estimation Based on Building
Classifications: a Case Study in {Wuhan}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "251",
day = "28",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100251",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/251",
abstract = "In the context of rapid urbanization, the refined
management of cities is facing higher requirements. In
improving urban population management levels and the
scientific allocation of resources, fine-scale
population data plays an increasingly important role.
The current population estimation studies mainly focus
on low spatial resolution, such as city-scale and
county scale, without considering differences in
population distributions within cities. This paper
mines and defines the spatial correlations of
multi-source data, including urban building data, point
of interest ( POI ) data, census data, and
administrative division data. With populations mainly
distributed in residential buildings, a population
estimation model at a subdistrict scale is established
based on building classifications. Composed of spatial
information and attribute information, POI data are
spaced irregularly. Based on this characteristic, the
text classification method, frequency-inverse document
frequency ( TF-IDF ), is applied to obtain functional
classifications of buildings. Then we screen out
residential buildings, and quantify characteristic
variables in subdistricts, including perimeter, area,
and total number of floors in residential buildings. To
assess the validity of the variables, the random forest
method is selected for variable screening and
correlation analysis, because this method has clear
advantages when dealing with unbalanced data. Under the
assumption of linearity, multiple regression analysis
is conducted, to obtain a linear model of the number of
buildings, their geometric characteristics, and the
population in each administrative division. Experiments
showed that the urban fine-scale population estimation
model established in this study can estimate the
population at a subdistrict scale with high accuracy.
This method improves the precision and automation of
urban population estimation. It allows the accurate
estimation of the population at a subdistrict scale,
thereby providing important data to support the overall
planning of regional energy resource allocation,
economic development, social governance, and
environmental protection.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Corujo:2021:ERH,
author = "Luis A. Corujo and Emily Kieson and Timo Schloesser
and Peter A. Gloor",
title = "Emotion Recognition in Horses with Convolutional
Neural Networks",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "250",
day = "28",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100250",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/250",
abstract = "Creating intelligent systems capable of recognizing
emotions is a difficult task, especially when looking
at emotions in animals. This paper describes the
process of designing a ``proof of concept'' system to
recognize emotions in horses. This system is formed by
two elements, a detector and a model. The detector is a
fast region-based convolutional neural network that
detects horses in an image. The model is a
convolutional neural network that predicts the emotions
of those horses. These two elements were trained with
multiple images of horses until they achieved high
accuracy in their tasks. In total, 400 images of horses
were collected and labeled to train both the detector
and the model while 40 were used to test the system.
Once the two components were validated, they were
combined into a testable system that would detect
equine emotions based on established behavioral
ethograms indicating emotional affect through the head,
neck, ear, muzzle, and eye position. The system showed
an accuracy of 80\% on the validation set and 65\% on
the test set, demonstrating that it is possible to
predict emotions in animals using autonomous
intelligent systems. Such a system has multiple
applications including further studies in the growing
field of animal emotions as well as in the veterinary
field to determine the physical welfare of horses or
other livestock.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{daCruz:2021:ORO,
author = "Mauro A. A. da Cruz and Heitor T. L. de Paula and
Bruno P. G. Caputo and Samuel B. Mafra and Pascal
Lorenz and Joel J. P. C. Rodrigues",
title = "{OLP} --- a {RESTful} Open Low-Code Platform",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "249",
day = "25",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100249",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/249",
abstract = "Low-code is an emerging concept that transforms visual
representations into functional software, allowing
anyone to be a developer. However, building a low-code
platform from scratch can be challenging concerning the
scarce available literature about the topic. In this
sense, this paper proposes an Open Low-Code Platform
(OLP), a low-code solution that enables regular users
to create applications. Furthermore, it presents
low-code's functional and nonfunctional requirements,
as well as its similarities and its differences with
the no-code concept. The experience obtained while
developing OLP was translated into a pipeline that
details how code was transformed from the visual
representations into a fully fledged application. The
paper demonstrates the solution's viability and is
especially useful for building a low-code platform from
scratch or improving an existing one.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Xu:2021:EPE,
author = "Ronghua Xu and Deeraj Nagothu and Yu Chen",
title = "{EconLedger}: a Proof-of-{ENF} Consensus Based
Lightweight Distributed Ledger for {IoVT} Networks",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "248",
day = "24",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100248",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/248",
abstract = "The rapid advancement in artificial intelligence (AI)
and wide deployment of Internet of Video Things (IoVT)
enable situation awareness (SAW). The robustness and
security of IoVT systems are essential for a
sustainable urban environment. While blockchain
technology has shown great potential in enabling
trust-free and decentralized security mechanisms,
directly embedding cryptocurrency oriented blockchain
schemes into resource-constrained Internet of Video
Things (IoVT) networks at the edge is not feasible. By
leveraging Electrical Network Frequency (ENF) signals
extracted from multimedia recordings as
region-of-recording proofs, this paper proposes
EconLedger, an ENF-based consensus mechanism that
enables secure and lightweight distributed ledgers for
small-scale IoVT edge networks. The proposed consensus
mechanism relies on a novel Proof-of-ENF (PoENF)
algorithm where a validator is qualified to generate a
new block if and only if a proper ENF-containing
multimedia signal proof is produced within the current
round. The decentralized database (DDB) is adopted in
order to guarantee efficiency and resilience of raw ENF
proofs on the off-chain storage. A proof-of-concept
prototype is developed and tested in a physical IoVT
network environment. The experimental results validated
the feasibility of the proposed EconLedger to provide a
trust-free and partially decentralized security
infrastructure for IoVT edge networks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2021:HPP,
author = "Baocheng Wang and Zetao Li",
title = "{Healthchain}: a Privacy Protection System for Medical
Data Based on Blockchain",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "247",
day = "24",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100247",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/247",
abstract = "Recently, with the great development of e-health, more
and more countries have made certain achievements in
the field of electronic medical treatment. The
digitization of medical equipment and the
structuralization of electronic medical records are the
general trends. While bringing convenience to people,
the explosive growth of medical data will further
promote the value of mining medical data. Obviously,
finding out how to safely store such a large amount of
data is a problem that urgently needs to be solved.
Additionally, the particularity of medical data makes
it necessarily subject to great privacy protection
needs. This reinforces the importance of designing a
safe solution to ensure data privacy. Many existing
schemes are based on single-server architecture, which
have some natural defects (such as single-point
faults). Although blockchain can help solve such
problems, there are still some deficiencies in privacy
protection. To solve these problems, this paper designs
a medical data privacy protection system, which
integrates blockchain, group signature, and asymmetric
encryption to realize reliable medical data sharing
between medical institutions and protect the data
privacy of patients. This paper proves theoretically
that it meets our security and privacy requirements,
and proves its practicability through system
implementation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gonzalez-Nieto:2021:SCD,
author = "No{\'e} Abraham Gonz{\'a}lez-Nieto and Caridad
Garc{\'\i}a-Hern{\'a}ndez and Margarita
Espinosa-Meneses",
title = "School Culture and Digital Technologies: Educational
Practices at Universities within the Context of the
{COVID-19} Pandemic",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "246",
day = "24",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100246",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/246",
abstract = "The pandemic caused by COVID-19 led schools to
continue their work by relying on digital technologies.
Changes in this matter are observed within three
dimensions in the theoretical and conceptual
background: (a) the influence of ITC in education, (b)
the macrosocial changes in the educational systems and
public policy derived from the COVID-19 pandemic, and
(c) the impact of the COVID-19 pandemic in higher
education and its role for the future. The general
objective of this research was to characterize the
educational practices executed by the university
community (students, professors, and managers) during
the emerging remote classes derived from the pandemic
at the Universidad Autonoma Metropolitana, Cuajimalpa
Campus, a public educational institution in Mexico
(through an explanation for each educational actor
profile). As specific research objectives, this paper:
(a) examines whether the professors and students had
enough digital technology to continue with the classes,
(b) defines the obstacles they had in the use of said
digital technology, and (c) recognizes the existence of
innovative educational practices and determines whether
stated learning was achieved in educational programs.
For this purpose, a mixed methodology was chosen,
comprising the application of surveys to students and
professors and semi-structured interviews with
managers, professors, and students. It was found that
there was innovation in the area of resources
(material-economic dimension) and in the area of
relationships (socio-political dimension), while the
discursive dimension (cultural-discursive dimension)
was negatively impacted. Based on the above, we
conclude that the school culture of the UAM-C is solid
and that it has the necessary technological resources
to continue with the teaching-learning process. The
educational practice was transformed, which resulted in
advantages and disadvantages, but despite these
situations, most students developed their learning.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Nikulchev:2021:ISE,
author = "Evgeny Nikulchev and Dmitry Ilin and Pavel Kolyasnikov
and Shamil Magomedov and Anna Alexeenko and Alexander
N. Kosenkov and Andrey Sokolov and Artem Malykh and
Victoria Ismatullina and Sergey Malykh",
title = "Isolated Sandbox Environment Architecture for Running
Cognitive Psychological Experiments in {Web}
Platforms",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "245",
day = "24",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100245",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/245",
abstract = "Web surveys are an integral part of the feedback of
Internet services, a research tool for respondents,
including in the field of health and psychology. Web
technologies allow conducting research on large
samples. For mental health, an important metric is
reaction time in cognitive tests and in answering
questions. The use of mobile devices such as
smartphones and tablets has increased markedly in web
surveys, so the impact of device types and operating
systems needs to be investigated. This article proposes
an architectural solution aimed at reducing the effect
of device variability on the results of cognitive
psychological experiments. An experiment was carried
out to formulate the requirements for software and
hardware. Three groups of 1000 respondents were
considered, corresponding to three types of computers
and operating systems: Mobile Device, Legacy PC, and
Modern PC. The results obtained showed a slight bias in
the estimates for each group. It is noticed that the
error for a group of devices differs both upward and
downward for various tasks in a psychological
experiment. Thus, for cognitive tests, in which the
reaction time is critical, an architectural solution
was synthesized for conducting psychological research
in a web browser. The proposed architectural solution
considers the characteristics of the device used by
participants to undergo research in the web platform
and allows to restrict access from devices that do not
meet the specified criteria.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alenezi:2021:MLD,
author = "Mohammed N. Alenezi and Zainab M. Alqenaei",
title = "Machine Learning in Detecting {COVID-19}
Misinformation on {Twitter}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "244",
day = "23",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100244",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/244",
abstract = "Social media platforms such as Facebook, Instagram,
and Twitter are an inevitable part of our daily lives.
These social media platforms are effective tools for
disseminating news, photos, and other types of
information. In addition to the positives of the
convenience of these platforms, they are often used for
propagating malicious data or information. This
misinformation may misguide users and even have
dangerous impact on society's culture, economics, and
healthcare. The propagation of this enormous amount of
misinformation is difficult to counter. Hence, the
spread of misinformation related to the COVID-19
pandemic, and its treatment and vaccination may lead to
severe challenges for each country's frontline workers.
Therefore, it is essential to build an effective
machine-learning (ML) misinformation-detection model
for identifying the misinformation regarding COVID-19.
In this paper, we propose three effective
misinformation detection models. The proposed models
are long short-term memory (LSTM) networks, which is a
special type of RNN; a multichannel convolutional
neural network (MC-CNN); and k-nearest neighbors (KNN).
Simulations were conducted to evaluate the performance
of the proposed models in terms of various evaluation
metrics. The proposed models obtained superior results
to those from the literature.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Spruit:2021:ABG,
author = "Marco Spruit and Marcin Kais and Vincent Menger",
title = "Automated Business Goal Extraction from E-mail
Repositories to Bootstrap Business Understanding",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "243",
day = "23",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100243",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/243",
abstract = "The Cross-Industry Standard Process for Data Mining
(CRISP-DM), despite being the most popular data mining
process for more than two decades, is known to leave
those organizations lacking operational data mining
experience puzzled and unable to start their data
mining projects. This is especially apparent in the
first phase of Business Understanding, at the
conclusion of which, the data mining goals of the
project at hand should be specified, which arguably
requires at least a conceptual understanding of the
knowledge discovery process. We propose to bridge this
knowledge gap from a Data Science perspective by
applying Natural Language Processing techniques (NLP)
to the organizations' e-mail exchange repositories to
extract explicitly stated business goals from the
conversations, thus bootstrapping the Business
Understanding phase of CRISP-DM. Our NLP-Automated
Method for Business Understanding (NAMBU) generates a
list of business goals which can subsequently be used
for further specification of data mining goals. The
validation of the results on the basis of comparison to
the results of manual business goal extraction from the
Enron corpus demonstrates the usefulness of our NAMBU
method when applied to large datasets.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ramadan:2021:UML,
author = "Lara Ramadan and Isam Shahrour and Hussein Mroueh and
Fadi Hage Chehade",
title = "Use of Machine Learning Methods for Indoor Temperature
Forecasting",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "242",
day = "23",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100242",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/242",
abstract = "Improving the energy efficiency of the building sector
has become an increasing concern in the world, given
the alarming reports of greenhouse gas emissions. The
management of building energy systems is considered an
essential means for achieving this goal. Predicting
indoor temperature constitutes a critical task for the
management strategies of these systems. Several
approaches have been developed for predicting indoor
temperature. Determining the most effective has thus
become a necessity. This paper contributes to this
objective by comparing the ability of seven machine
learning algorithms (ML) and the thermal gray box model
to predict the indoor temperature of a closed room. The
comparison was conducted on a set of data recorded in a
room of the Laboratory of Civil Engineering and
geo-Environment (LGCgE) at Lille University. The
results showed that the best prediction was obtained
with the artificial neural network (ANN) and extra
trees regressor (ET) methods, which outperformed the
thermal gray box model.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tan:2021:ETS,
author = "Yee-Fan Tan and Lee-Yeng Ong and Meng-Chew Leow and
Yee-Xian Goh",
title = "Exploring Time-Series Forecasting Models for Dynamic
Pricing in Digital Signage Advertising",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "10",
pages = "241",
day = "22",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13100241",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Oct 22 11:19:02 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/10/241",
abstract = "Audience attention is vital in Digital Signage
Advertising (DSA), as it has a significant impact on
the pricing decision to advertise on those media.
Various environmental factors affect the audience
attention level toward advertising signage. Fixed-price
strategies, which have been applied in DSA for pricing
decisions, are generally inefficient at maximizing the
potential profit of the service provider, as the
environmental factors that could affect the audience
attention are changing fast and are generally not
considered in the current pricing solutions in a timely
manner. Therefore, the time-series forecasting method
is a suitable pricing solution for DSA, as it improves
the pricing decision by modeling the changes in the
environmental factors and audience attention level
toward signage for optimal pricing. However, it is
difficult to determine an optimal price forecasting
model for DSA with the increasing number of available
time-series forecasting models in recent years. Based
on the 84 research articles reviewed, the data
characteristics analysis in terms of linearity,
stationarity, volatility, and dataset size is helpful
in determining the optimal model for time-series price
forecasting. This paper has reviewed the widely used
time-series forecasting models and identified the
related data characteristics of each model. A framework
is proposed to demonstrate the model selection process
for dynamic pricing in DSA based on its data
characteristics analysis, paving the way for future
research of pricing solutions for DSA.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2021:FSC,
author = "Kunlin Liu and Ping Wang and Wenbo Zhou and Zhenyu
Zhang and Yanhao Ge and Honggu Liu and Weiming Zhang
and Nenghai Yu",
title = "Face Swapping Consistency Transfer with Neural
Identity Carrier",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "298",
day = "22",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110298",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/298",
abstract = "Deepfake aims to swap a face of an image with someone
else's likeness in a reasonable manner. Existing
methods usually perform deepfake frame by frame, thus
ignoring video consistency and producing incoherent
results. To address such a problem, we propose a novel
framework Neural Identity Carrier (NICe), which learns
identity transformation from an arbitrary face-swapping
proxy via a U-Net. By modeling the incoherence between
frames as noise, NICe naturally suppresses its
disturbance and preserves primary identity information.
Concretely, NICe inputs the original frame and learns
transformation supervised by swapped pseudo labels. As
the temporal incoherence has an uncertain or stochastic
pattern, NICe can filter out such outliers and well
maintain the target content by uncertainty prediction.
With the predicted temporally stable appearance, NICe
enhances its details by constraining 3D geometry
consistency, making NICe learn fine-grained facial
structure across the poses. In this way, NICe
guarantees the temporal stableness of deepfake
approaches and predicts detailed results against
over-smoothness. Extensive experiments on benchmarks
demonstrate that NICe significantly improves the
quality of existing deepfake methods on video-level.
Besides, data generated by our methods can benefit
video-level deepfake detection methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gavra:2021:DIA,
author = "Dmitrii Gavra and Ksenia Namyatova and Lidia Vitkova",
title = "Detection of Induced Activity in Social Networks:
Model and Methodology",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "297",
day = "22",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110297",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/297",
abstract = "This paper examines the problem of social media
special operations and especially induced support in
social media during political election campaigns. The
theoretical background of the paper is based on the
study fake activity in social networks during
pre-election processes and the existing models and
methods of detection of such activity. The article
proposes a methodology for identifying and diagnosing
induced support for a political project. The
methodology includes a model of induced activity, an
algorithm for segmenting the audience of a political
project, and a technique for detecting and diagnosing
induced support. The proposed methodology provides
identification of network combatants, participants of
social media special operations, influencing public
opinion in the interests of a political project. The
methodology can be used to raise awareness of the
electorate, the public, and civil society in general
about the presence of artificial activity on the page
of a political project.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bagnoli:2021:CFB,
author = "Franco Bagnoli and Guido de Bonfioli Cavalcabo' and
Banedetto Casu and Andrea Guazzini",
title = "Community Formation as a Byproduct of a Recommendation
System: a Simulation Model for Bubble Formation in
Social Media",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "296",
day = "22",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110296",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/296",
abstract = "We investigate the problem of the formation of
communities of users that selectively exchange messages
among them in a simulated environment. This closed
community can be seen as the prototype of the bubble
effect, i.e., the isolation of individuals from other
communities. We develop a computational model of a
society, where each individual is represented as a
simple neural network (a perceptron), under the
influence of a recommendation system that honestly
forward messages (posts) to other individuals that in
the past appreciated previous messages from the sender,
i.e., that showed a certain degree of affinity. This
dynamical affinity database determines the interaction
network. We start from a set of individuals with random
preferences (factors), so that at the beginning, there
is no community structure at all. We show that the
simple effect of the recommendation system is not
sufficient to induce the isolation of communities, even
when the database of user-user affinity is based on a
small sample of initial messages, subject to
small-sampling fluctuations. On the contrary, when the
simulated individuals evolve their internal factors
accordingly with the received messages, communities can
emerge. This emergence is stronger the slower the
evolution of individuals, while immediate convergence
favors to the breakdown of the system in smaller
communities. In any case, the final communities are
strongly dependent on the sequence of messages, since
one can get different final communities starting from
the same initial distribution of users' factors,
changing only the order of users emitting messages. In
other words, the main outcome of our investigation is
that the bubble formation depends on users' evolution
and is strongly dependent on early interactions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Blekanov:2021:DHC,
author = "Ivan Blekanov and Svetlana S. Bodrunova and Askar
Akhmetov",
title = "Detection of Hidden Communities in {Twitter}
Discussions of Varying Volumes",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "295",
day = "20",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110295",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/295",
abstract = "The community-based structure of communication on
social networking sites has long been a focus of
scholarly attention. However, the problem of discovery
and description of hidden communities, including
defining the proper level of user aggregation, remains
an important problem not yet resolved. Studies of
online communities have clear social implications, as
they allow for assessment of preference-based user
grouping and the detection of socially hazardous
groups. The aim of this study is to comparatively
assess the algorithms that effectively analyze large
user networks and extract hidden user communities from
them. The results we have obtained show the most
suitable algorithms for Twitter datasets of different
volumes (dozen thousands, hundred thousands, and
millions of tweets). We show that the Infomap and
Leiden algorithms provide for the best results overall,
and we advise testing a combination of these algorithms
for detecting discursive communities based on user
traits or views. We also show that the generalized K
-means algorithm does not apply to big datasets, while
a range of other algorithms tend to prioritize the
detection of just one big community instead of many
that would mirror the reality better. For isolating
overlapping communities, the GANXiS algorithm should be
used, while OSLOM is not advised.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2021:PPE,
author = "Jianhua Liu and Zibo Wu",
title = "{PECSA}: Practical Edge Computing Service Architecture
Applicable to Adaptive {IoT}-Based Applications",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "294",
day = "19",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110294",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/294",
abstract = "The cloud-based Internet of Things (IoT-Cloud)
combines the advantages of the IoT and cloud computing,
which not only expands the scope of cloud computing but
also enhances the data processing capability of the
IoT. Users always seek affordable and efficient
services, which can be completed by the cooperation of
all available network resources, such as edge computing
nodes. However, current solutions exhibit significant
security and efficiency problems that must be solved.
Insider attacks could degrade the performance of the
IoT-Cloud due to its natural environment and inherent
open construction. Unfortunately, traditional security
approaches cannot defend against these attacks
effectively. In this paper, a novel practical edge
computing service architecture (PECSA), which
integrates a trust management methodology with dynamic
cost evaluation schemes, is proposed to address these
problems. In the architecture, the edge network devices
and edge platform cooperate to achieve a shorter
response time and/or less economic costs, as well as to
enhance the effectiveness of the trust management
methodology, respectively. To achieve faster responses
for IoT-based requirements, all the edge computing
devices and cloud resources cooperate in a reasonable
way by evaluating computational cost and runtime
resource capacity in the edge networks. Moreover, when
cooperated with the edge platform, the edge networks
compute trust values of linked nodes and find the best
collaborative approach for each user to meet various
service requirements. Experimental results demonstrate
the efficiency and the security of the proposed
architecture.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vogel:2021:RCD,
author = "Elisabeth Vogel and Zoya Dyka and Dan Klann and Peter
Langend{\"o}rfer",
title = "Resilience in the Cyberworld: Definitions, Features
and Models",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "293",
day = "19",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110293",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/293",
abstract = "Resilience is a feature that is gaining more and more
attention in computer science and computer engineering.
However, the definition of resilience for the cyber
landscape, especially embedded systems, is not yet
clear. This paper discusses definitions provided by
different authors, on different years and with
different application areas the field of computer
science/computer engineering. We identify the core
statements that are more or less common to the majority
of the definitions, and based on this we give a
holistic definition using attributes for (cyber-)
resilience. In order to pave a way towards resilience
engineering, we discuss a theoretical model of the life
cycle of a (cyber-) resilient system that consists of
key actions presented in the literature. We adapt this
model for embedded (cyber-) resilient systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Matsumoto-Royo:2021:ODL,
author = "Kiomi Matsumoto-Royo and Maria Soledad
Ram{\'\i}rez-Montoya and Paulette Conget",
title = "Opportunities to Develop Lifelong Learning Tendencies
in Practice-Based Teacher Education: Getting Ready for
{Education 4.0}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "292",
day = "19",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110292",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/292",
abstract = "Education 4.0 prepares new generations to develop the
skills required to perform in a technological, dynamic,
and unpredictable world. The main barrier to
implementing Education 4.0 in schools is that teachers
have not been trained for it. Given the advances and
new resources of the technological field, teacher
preparation will be insufficient if it focuses on
technological skills but does not incorporate the
necessary dispositions for lifelong learning.
Universities have the ethical imperative to update
teacher education so teachers can become lifelong
learners. The objective of this study was to understand
whether practice-based curricula offer opportunities to
promote lifelong learning tendencies. We used a
sequential explanatory method. Quantitative and
qualitative instruments were applied to pre-service
teachers (survey: n = 231, semi-structured interviews:
n = 8), and causal and descriptive approaches were
supported by a structural equation model and constant
comparative method, respectively. Data triangulation
confirmed and added depth to the relationship found.
Practice opportunities provided by teacher educators in
learning activities and assessment tasks promote
curiosity, motivation, perseverance, and self-learning
regulation, when they are (i) systematic; (ii) relevant
to the classroom work; (iii) presented with clear
instructions and effective rubrics; (iv) accompanied
with feedback focused on the task, soliciting
reflection, and performed by peers and teacher
educators in a trustworthy environment. This research
may be of value to universities looking to renew their
Education 4.0 programs because it shows that
practice-based curricula not only transform pre-service
teachers into teaching experts but also into lifelong
learners.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Qu:2021:EFP,
author = "Qian Qu and Ronghua Xu and Yu Chen and Erik Blasch and
Alexander Aved",
title = "Enable Fair Proof-of-Work {(PoW)} Consensus for
Blockchains in {IoT} by {Miner Twins (MinT)}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "291",
day = "19",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110291",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/291",
abstract = "Blockchain technology has been recognized as a
promising solution to enhance the security and privacy
of Internet of Things (IoT) and Edge Computing
scenarios. Taking advantage of the Proof-of-Work (PoW)
consensus protocol, which solves a computation
intensive hashing puzzle, Blockchain ensures the
security of the system by establishing a digital
ledger. However, the computation intensive PoW favors
members possessing more computing power. In the IoT
paradigm, fairness in the highly heterogeneous network
edge environments must consider devices with various
constraints on computation power. Inspired by the
advanced features of Digital Twins (DT), an emerging
concept that mirrors the lifespan and operational
characteristics of physical objects, we propose a novel
Miner Twins (MinT) architecture to enable a fair PoW
consensus mechanism for blockchains in IoT
environments. MinT adopts an edge-fog-cloud hierarchy.
All physical miners of the blockchain are deployed as
microservices on distributed edge devices, while
fog/cloud servers maintain digital twins that
periodically update miners' running status. By timely
monitoring of a miner's footprint that is mirrored by
twins, a lightweight Singular Spectrum Analysis
(SSA)-based detection achieves the identification of
individual misbehaved miners that violate fair mining.
Moreover, we also design a novel Proof-of-Behavior
(PoB) consensus algorithm to detect dishonest miners
that collude to control a fair mining network. A
preliminary study is conducted on a proof-of-concept
prototype implementation, and experimental evaluation
shows the feasibility and effectiveness of the proposed
MinT scheme under a distributed byzantine network
environment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mei:2021:MMF,
author = "Jing Mei and Huahu Xu and Yang Li and Minjie Bian and
Yuzhe Huang",
title = "{MFCNet}: Mining Features Context Network for {RGB-IR}
Person Re-Identification",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "290",
day = "18",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110290",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/290",
abstract = "RGB-IR cross modality person re-identification (RGB-IR
Re-ID) is an important task for video surveillance in
poorly illuminated or dark environments. In addition to
the common challenge of Re-ID, the large cross-modality
variations between RGB and IR images must be
considered. The existing RGB-IR Re-ID methods use
different network structures to learn the global shared
features associated with multi-modalities. However,
most global shared feature learning methods are
sensitive to background clutter, and contextual feature
relationships are not considered among the mined
features. To solve these problems, this paper proposes
a dual-path attention network architecture MFCNet. SGA
(Spatial-Global Attention) module embedded in MFCNet
includes spatial attention and global attention
branches to mine discriminative features. First, the
SGA module proposed in this paper focuses on the key
parts of the input image to obtain robust features.
Next, the module mines the contextual relationships
among features to obtain discriminative features and
improve network performance. Finally, extensive
experiments demonstrate that the performance of the
network architecture proposed in this paper is better
than that of state-of-the-art methods under various
settings. In the all-search mode of the SYSU and RegDB
data sets, the rank-1 accuracy reaches 51.64\% and
69.76\%, respectively.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chen:2021:PRIb,
author = "Xingyuan Chen and Huahu Xu and Yang Li and Minjie
Bian",
title = "Person Re-Identification by Low-Dimensional Features
and Metric Learning",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "289",
day = "18",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110289",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/289",
abstract = "Person re-identification (Re-ID) has attracted
attention due to its wide range of applications. Most
recent studies have focused on the extraction of deep
features, while ignoring color features that can remain
stable, even for illumination variations and the
variation in person pose. There are also few studies
that combine the powerful learning capabilities of deep
learning with color features. Therefore, we hope to use
the advantages of both to design a model with low
computational resource consumption and excellent
performance to solve the task of person
re-identification. In this paper, we designed a color
feature containing relative spatial information, namely
the color feature with spatial information. Then,
bidirectional long short-term memory (BLSTM) networks
with an attention mechanism are used to obtain the
contextual relationship contained in the hand-crafted
color features. Finally, experiments demonstrate that
the proposed model can improve the recognition
performance compared with traditional methods. At the
same time, hand-crafted features based on human prior
knowledge not only reduce computational consumption
compared with deep learning methods but also make the
model more interpretable.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fan:2021:DIA,
author = "Li Fan and Wei Li and Xiaohui Cui",
title = "Deepfake-Image Anti-Forensics with Adversarial
Examples Attacks",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "288",
day = "17",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110288",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/288",
abstract = "Many deepfake-image forensic detectors have been
proposed and improved due to the development of
synthetic techniques. However, recent studies show that
most of these detectors are not immune to adversarial
example attacks. Therefore, understanding the impact of
adversarial examples on their performance is an
important step towards improving deepfake-image
detectors. This study developed an anti-forensics case
study of two popular general deepfake detectors based
on their accuracy and generalization. Herein, we
propose the Poisson noise DeepFool (PNDF), an improved
iterative adversarial examples generation method. This
method can simply and effectively attack forensics
detectors by adding perturbations to images in
different directions. Our attacks can reduce its AUC
from 0.9999 to 0.0331, and the detection accuracy of
deepfake images from 0.9997 to 0.0731. Compared with
state-of-the-art studies, our work provides an
important defense direction for future research on
deepfake-image detectors, by focusing on the
generalization performance of detectors and their
resistance to adversarial example attacks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hota:2021:ACM,
author = "Lopamudra Hota and Biraja Prasad Nayak and Arun Kumar
and G. G. Md. Nawaz Ali and Peter Han Joo Chong",
title = "An Analysis on Contemporary {MAC} Layer Protocols in
Vehicular Networks: State-of-the-Art and Future
Directions",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "287",
day = "17",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110287",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/287",
abstract = "Traffic density around the globe is increasing on a
day-to-day basis, resulting in more accidents,
congestion, and pollution. The dynamic vehicular
environment induces challenges in designing an
efficient and reliable protocol for communication.
Timely delivery of safety and non-safety messages is
necessary for traffic congestion control and for
avoiding road mishaps. For efficient resource sharing
and optimized channel utilization, the media access
control (MAC) protocol plays a vital role. An efficient
MAC protocol design can provide fair channel access and
can delay constraint safety message dissemination,
improving road safety. This paper reviews the
applications, characteristics, and challenges faced in
the design of MAC protocols. A classification of the
MAC protocol is presented based on contention
mechanisms and channel access. The classification based
on contention is oriented as contention-based,
contention-free, and hybrid, whereas the classification
based on channel access is categorized as distributed,
centralized, cluster-based, cooperative, token-based,
and random access. These are further sub-classified as
single-channel and multi-channel, based on the type of
channel resources they utilize. This paper gives an
analysis of the objectives, mechanisms,
advantages/disadvantages, and simulators used in
specified protocols. Finally, the paper concludes with
a discussion on the future scope and open challenges
for improving the MAC protocol design.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Guazzini:2021:WWW,
author = "Andrea Guazzini and Maria Fiorenza and Gabriele
Panerai and Mirko Duradoni",
title = "What Went Wrong? Predictors of Contact Tracing
Adoption in {Italy} during {COVID-19} Pandemic",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "286",
day = "15",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110286",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/286",
abstract = "Together with vaccines, contact tracing systems (CTS)
have proved to be one of the best strategies to deal
with the current COVID-19 pandemic. However, the
adoption of such systems has been quite limited in EU
countries, and Italy was no exception. The present
research aimed to investigate the factors drawn from
the most relevant psychological models in the
literature, most associated with the adoption of CTS.
The data analysis of the 501 surveyed answers (329 from
CTS adopters) showed that knowing important others who
have downloaded the CTS, CTS attitudes, CTS perceived
efficacy, COVID-19 risk perception, and trust in the
government and its actions influenced the adoption of
the Italian CTS (52\% of explained variance). These
factors defined a new specific model that can be used
to more effectively promote CTS adoption and thus
increase the protective potential of these
technologies, whose effectiveness is inevitably linked
to adoption.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Akbar:2021:DHD,
author = "Nur Arifin Akbar and Amgad Muneer and Narmine ElHakim
and Suliman Mohamed Fati",
title = "Distributed Hybrid Double-Spending Attack Prevention
Mechanism for Proof-of-Work and Proof-of-Stake
Blockchain Consensuses",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "285",
day = "12",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110285",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/285",
abstract = "Blockchain technology is a sustainable technology that
offers a high level of security for many industrial
applications. Blockchain has numerous benefits, such as
decentralisation, immutability and tamper-proofing.
Blockchain is composed of two processes, namely, mining
(the process of adding a new block or transaction to
the global public ledger created by the previous block)
and validation (the process of validating the new block
added). Several consensus protocols have been
introduced to validate blockchain transactions,
Proof-of-Work (PoW) and Proof-of-Stake (PoS), which are
crucial to cryptocurrencies, such as Bitcoin. However,
these consensus protocols are vulnerable to
double-spending attacks. Amongst these attacks, the
51\% attack is the most prominent because it involves
forking a blockchain to conduct double spending. Many
attempts have been made to solve this issue, and
examples include delayed proof-of-work (PoW) and
several Byzantine fault tolerance mechanisms. These
attempts, however, suffer from delay issues and
unsorted block sequences. This study proposes a hybrid
algorithm that combines PoS and PoW mechanisms to
provide a fair mining reward to the miner/validator by
conducting forking to combine PoW and PoS consensuses.
As demonstrated by the experimental results, the
proposed algorithm can reduce the possibility of
intruders performing double mining because it requires
achieving 100\% dominance in the network, which is
impossible.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhu:2021:IPR,
author = "Qigang Zhu and Yifan Liu and Ming Liu and Shuaishuai
Zhang and Guangyang Chen and Hao Meng",
title = "Intelligent Planning and Research on Urban Traffic
Congestion",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "284",
day = "08",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110284",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/284",
abstract = "For large and medium-sized cities, the planning and
development of urban road networks may not keep pace
with the growth of urban vehicles, resulting in traffic
congestion on urban roads during peak hours. Take
Jinan, a mid-sized city in China's Shandong Province,
for example. In view of the daily traffic jam of the
city's road traffic, through investigation and
analysis, the existing problems of the road traffic are
found out. Based on real-time, daily road traffic data,
combined with the existing road network and the planned
road network, the application of a road intelligent
transportation system is proposed. Combined with the
application of a road intelligent transportation
system, this paper discusses the future development of
urban road traffic and puts forward improvement
suggestions for road traffic planning. This paper has
reference value for city development, road network
construction, the application of intelligent
transportation systems, and road traffic planning.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alicea:2021:MFN,
author = "Michael Alicea and Izzat Alsmadi",
title = "Misconfiguration in Firewalls and Network Access
Controls: Literature Review",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "283",
day = "08",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110283",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/283",
abstract = "Firewalls and network access controls play important
roles in security control and protection. Those
firewalls may create an incorrect sense or state of
protection if they are improperly configured. One of
the major configuration problems in firewalls is
related to misconfiguration in the access control roles
added to the firewall that will control network
traffic. In this paper, we evaluated recent research
trends and open challenges related to firewalls and
access controls in general and misconfiguration
problems in particular. With the recent advances in
next-generation (NG) firewalls, firewall roles can be
auto-generated based on networks and threats.
Nonetheless, and due to the large number of roles in
any medium to large networks, roles' misconfiguration
may occur for several reasons and will impact the
performance of the firewall and overall network and
protection efficiency.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gonzalez-Perez:2021:IIR,
author = "Laura Icela Gonz{\'a}lez-P{\'e}rez and Mar{\'\i}a
Soledad Ram{\'\i}rez-Montoya and Francisco Jos{\'e}
Garc{\'\i}a-Pe{\~n}alvo",
title = "Improving Institutional Repositories through
User-Centered Design: Indicators from a Focus Group",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "282",
day = "02",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110282",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/282",
abstract = "User experience with intuitive and flexible digital
platforms can be enjoyable and satisfying. A strategy
to deliver such an experience is to place the users at
the center of the design process and analyze their
beliefs and perceptions to add appropriate platform
features. This study conducted with focus groups as a
qualitative method of data collection to investigate
users' preferences and develop a new landing page for
institutional repositories with attractive
functionalities based on their information-structural
rules. The research question was: What are the
motivations and experiences of users in an academic
community when publishing scientific information in an
institutional repository? The focus group technique
used in this study had three sessions. Results showed
that 50\% of the participants did not know the
functionalities of the institutional repository nor its
benefits. Users' perceptions of platforms such as
ResearchGate or Google Scholar that provide academic
production were also identified. The findings showed
that motivating an academic community to use an
institutional repository requires technological
functions, user guidelines that identify what can or
cannot be published in open access, and training
programs for open access publication practices and
institutional repository use. These measures align with
global strategies to strengthen the digital identities
of scientific communities and thus benefit open
science.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Suttle:2021:UCM,
author = "Ryan Suttle and Scott Hogan and Rachel Aumaugher and
Matthew Spradling and Zak Merrigan and Jeremy Straub",
title = "University Community Members' Perceptions of Labels
for Online Media",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "281",
day = "31",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110281",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/281",
abstract = "Fake news is prevalent in society. A variety of
methods have been used in an attempt to mitigate the
spread of misinformation and fake news ranging from
using machine learning to detect fake news to paying
fact checkers to manually fact check media to ensure
its accuracy. In this paper, three studies were
conducted at two universities with different regional
demographic characteristics to gain a better
understanding of respondents' perception of online
media labeling techniques. The first study deals with
what fields should appear on a media label. The second
study looks into what types of informative labels
respondents would use. The third focuses on blocking
type labels. Participants' perceptions, preferences,
and results are analyzed by their demographic
characteristics.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Miranda:2021:CHC,
author = "Pedro R. Miranda and Daniel Pestana and Jo{\~a}o D.
Lopes and Rui Policarpo Duarte and M{\'a}rio P.
V{\'e}stias and Hor{\'a}cio C. Neto and Jos{\'e} T. de
Sousa",
title = "Configurable Hardware Core for {IoT} Object
Detection",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "280",
day = "30",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110280",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/280",
abstract = "Object detection is an important task for many
applications, like transportation, security, and
medical applications. Many of these applications are
needed on edge devices to make local decisions.
Therefore, it is necessary to provide low-cost, fast
solutions for object detection. This work proposes a
configurable hardware core on a field-programmable gate
array (FPGA) for object detection. The configurability
of the core allows its deployment on target devices
with diverse hardware resources. The object detection
accelerator is based on YOLO, for its good accuracy at
moderate computational complexity. The solution was
applied to the design of a core to accelerate the
Tiny-YOLOv3, based on a CNN developed for constrained
environments. However, it can be applied to other YOLO
versions. The core was integrated into a full
system-on-chip solution and tested with the COCO
dataset. It achieved a performance from 7 to 14 FPS in
a low-cost ZYNQ7020 FPGA, depending on the
quantization, with an accuracy reduction from 2.1 to
1.4 points of mAP50 mAP50 mAP50.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Satar:2021:TVC,
author = "Siti Dhalila Mohd Satar and Masnida Hussin and Zurina
Mohd Hanapi and Mohamad Afendee Mohamed",
title = "Towards Virtuous Cloud Data Storage Using Access
Policy Hiding in Ciphertext Policy Attribute-Based
Encryption",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "279",
day = "30",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110279",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/279",
abstract = "Managing and controlling access to the tremendous data
in Cloud storage is very challenging. Due to various
entities engaged in the Cloud environment, there is a
high possibility of data tampering. Cloud encryption is
being employed to control data access while securing
Cloud data. The encrypted data are sent to Cloud
storage with an access policy defined by the data
owner. Only authorized users can decrypt the encrypted
data. However, the access policy of the encrypted data
is in readable form, which results in privacy leakage.
To address this issue, we proposed a reinforcement
hiding in access policy over Cloud storage by enhancing
the Ciphertext Policy Attribute-based Encryption
(CP-ABE) algorithm. Besides the encryption process, the
reinforced CP-ABE used logical connective operations to
hide the attribute value of data in the access policy.
These attributes were converted into scrambled data
along with a ciphertext form that provides a better
unreadability feature. It means that a two-level
concealed tactic is employed to secure data from any
unauthorized access during a data transaction.
Experimental results revealed that our reinforced
CP-ABE had a low computational overhead and consumed
low storage costs. Furthermore, a case study on
security analysis shows that our approach is secure
against a passive attack such as traffic analysis.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Moreno:2021:OSF,
author = "Jes{\'u}s Fernando Cevallos Moreno and Rebecca Sattler
and Ra{\'u}l P. Caulier Cisterna and Lorenzo Ricciardi
Celsi and Aminael S{\'a}nchez Rodr{\'\i}guez and
Massimo Mecella",
title = "Online Service Function Chain Deployment for
Live-Streaming in Virtualized Content Delivery
Networks: a Deep Reinforcement Learning Approach",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "278",
day = "29",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110278",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/278",
abstract = "Video delivery is exploiting 5G networks to enable
higher server consolidation and deployment flexibility.
Performance optimization is also a key target in such
network systems. We present a multi-objective
optimization framework for service function chain
deployment in the particular context of Live-Streaming
in virtualized content delivery networks using deep
reinforcement learning. We use an Enhanced Exploration,
Dense-reward mechanism over a Dueling Double Deep Q
Network (E2-D4QN). Our model assumes to use network
function virtualization at the container level. We
carefully model processing times as a function of
current resource utilization in data ingestion and
streaming processes. We assess the performance of our
algorithm under bounded network resource conditions to
build a safe exploration strategy that enables the
market entry of new bounded-budget vCDN players.
Trace-driven simulations with real-world data reveal
that our approach is the only one to adapt to the
complexity of the particular context of Live-Video
delivery concerning the state-of-art algorithms
designed for general-case service function chain
deployment. In particular, our simulation test revealed
a substantial QoS/QoE performance improvement in terms
of session acceptance ratio against the compared
algorithms while keeping operational costs within
proper bounds.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Faraj:2021:RVC,
author = "Ghazal Faraj and Andr{\'a}s Micsik",
title = "Representing and Validating Cultural Heritage
Knowledge Graphs in {CIDOC-CRM} Ontology",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "277",
day = "29",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110277",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/277",
abstract = "In order to unify access to multiple heterogeneous
sources of cultural heritage data, many datasets were
mapped to the CIDOC-CRM ontology. CIDOC-CRM provides a
formal structure and definitions for most cultural
heritage concepts and their relationships. The COURAGE
project includes historic data concerning people,
organizations, cultural heritage collections, and
collection items covering the period between 1950 and
1990. Therefore, CIDOC-CRM seemed the optimal choice
for describing COURAGE entities, improving knowledge
sharing, and facilitating the COURAGE dataset
unification with other datasets. This paper introduces
the results of translating the COURAGE dataset to
CIDOC-CRM semantically. This mapping was implemented
automatically according to predefined mapping rules.
Several SPARQL queries were applied to validate the
migration process manually. In addition, multiple SHACL
shapes were conducted to validate the data and mapping
models.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hamada:2021:SCL,
author = "Louiza Hamada and Pascal Lorenz and Marc Gilg",
title = "Security Challenges for Light Emitting Systems",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "276",
day = "28",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110276",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/276",
abstract = "Although visible light communication (VLC) channels
are more secure than radio frequency channels, the
broadcast nature of VLC links renders them open to
eavesdropping. As a result, VLC networks must provide
security in order to safeguard the user's data from
eavesdroppers. In the literature, keyless security
techniques have been developed to offer security for
VLC. Even though these techniques provide strong
security against eavesdroppers, they are difficult to
deploy. Key generation algorithms are critical for
securing wireless connections. Nonetheless, in many
situations, the typical key generation methods may be
quite complicated and costly. They consume scarce
resources, such as bandwidth. In this paper, we propose
a novel key extraction procedure that uses
error-correcting coding and one time pad (OTP) to
improve the security of VLC networks and the validity
of data. This system will not have any interference
problems with other devices. We also explain error
correction while sending a message across a network,
and suggest a change to the Berlekamp--Massey (BM)
algorithm for error identification and assessment.
Because each OOK signal frame is encrypted by a
different key, the proposed protocol provides high
physical layer security; it allows for key extraction
based on the messages sent, so an intruder can never
break the encryption system, even if the latter knows
the protocol with which we encrypted the message; our
protocol also enables for error transmission rate
correction and bit mismatch rates with on-the-fly key
fetch. The results presented in this paper were
performed using MATLAB.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Arca:2021:AAP,
author = "Sevgi Arca and Rattikorn Hewett",
title = "Analytics on Anonymity for Privacy Retention in Smart
Health Data",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "274",
day = "28",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110274",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/274",
abstract = "Advancements in smart technology, wearable and mobile
devices, and Internet of Things, have made smart health
an integral part of modern living to better individual
healthcare and well-being. By enhancing
self-monitoring, data collection and sharing among
users and service providers, smart health can increase
healthy lifestyles, timely treatments, and save lives.
However, as health data become larger and more
accessible to multiple parties, they become vulnerable
to privacy attacks. One way to safeguard privacy is to
increase users' anonymity as anonymity increases
indistinguishability making it harder for
re-identification. Still the challenge is not only to
preserve data privacy but also to ensure that the
shared data are sufficiently informative to be useful.
Our research studies health data analytics focusing on
anonymity for privacy protection. This paper presents a
multi-faceted analytical approach to (1) identifying
attributes susceptible to information leakages by using
entropy-based measure to analyze information loss, (2)
anonymizing the data by generalization using attribute
hierarchies, and (3) balancing between anonymity and
informativeness by our anonymization technique that
produces anonymized data satisfying a given anonymity
requirement while optimizing data retention. Our
anonymization technique is an automated Artificial
Intelligent search based on two simple heuristics. The
paper describes and illustrates the detailed approach
and analytics including pre and post anonymization
analytics. Experiments on published data are performed
on the anonymization technique. Results, compared with
other similar techniques, show that our anonymization
technique gives the most effective data sharing
solution, with respect to computational cost and
balancing between anonymity and data retention.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yimam:2021:IVS,
author = "Seid Muhie Yimam and Abinew Ali Ayele and
Gopalakrishnan Venkatesh and Ibrahim Gashaw and Chris
Biemann",
title = "Introducing Various Semantic Models for {Amharic}:
Experimentation and Evaluation with Multiple Tasks and
Datasets",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "275",
day = "27",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110275",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/275",
abstract = "The availability of different pre-trained semantic
models has enabled the quick development of machine
learning components for downstream applications.
However, even if texts are abundant for low-resource
languages, there are very few semantic models publicly
available. Most of the publicly available pre-trained
models are usually built as a multilingual version of
semantic models that will not fit well with the need
for low-resource languages. We introduce different
semantic models for Amharic, a morphologically complex
Ethio-Semitic language. After we investigate the
publicly available pre-trained semantic models, we
fine-tune two pre-trained models and train seven new
different models. The models include Word2Vec
embeddings, distributional thesaurus (DT), BERT-like
contextual embeddings, and DT embeddings obtained via
network embedding algorithms. Moreover, we employ these
models for different NLP tasks and study their impact.
We find that newly-trained models perform better than
pre-trained multilingual models. Furthermore, models
based on contextual embeddings from FLAIR and RoBERTa
perform better than word2Vec models for the NER and POS
tagging tasks. DT-based network embeddings are suitable
for the sentiment classification task. We publicly
release all the semantic models, machine learning
components, and several benchmark datasets such as NER,
POS tagging, sentiment classification, as well as
Amharic versions of WordSim353 and SimLex999.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Qasaimeh:2021:SDE,
author = "Malik Qasaimeh and Raad S. Al-Qassas and Mohammad
Ababneh",
title = "Software Design and Experimental Evaluation of a
Reduced {AES} for {IoT} Applications",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "273",
day = "27",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110273",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/273",
abstract = "IoT devices include RFID tags, microprocessors,
sensors, readers, and actuators. Their main
characteristics are their limited resources and
computing capabilities, which pose critical challenges
to the reliability and security of their applications.
Encryption is necessary for security when using these
limited-resource devices, but conventional
cryptographic algorithms are too heavyweight and
resource-demanding to run on IoT infrastructures. This
paper presents a lightweight version of AES (called
LAES), which provides competitive results in terms of
randomness levels and processing time, operating on
GF(2 4 ). Detailed mathematical operations and proofs
are presented concerning LAES rounds design
fundamentals. The proposed LAES algorithm is evaluated
based on its randomness, performance, and power
consumption; it is then compared to other cryptographic
algorithm variants, namely Present, Clefia, and AES.
The design of the randomness and performance analysis
is based on six measures developed with the help of the
NIST test statistical suite of cryptographic
applications. The performance and power consumption of
LAES on a low-power, 8-bit microcontroller unit were
evaluated using an Arduino Uno board. LAES was found to
have competitive randomness levels, processing times,
and power consumption compared to Present, Clefia, and
AES.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Shalaginov:2021:SRC,
author = "Andrii Shalaginov and Muhammad Ajmal Azad",
title = "Securing Resource-Constrained {IoT} Nodes: Towards
Intelligent Microcontroller-Based Attack Detection in
Distributed Smart Applications",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "272",
day = "27",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110272",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/272",
abstract = "In recent years, the Internet of Things (IoT) devices
have become an inseparable part of our lives. With the
growing demand for Smart Applications, it becomes clear
that IoT will bring regular automation and intelligent
sensing to a new level thus improving quality of life.
The core component of the IoT ecosystem is data which
exists in various forms and formats. The collected data
is then later used to create context awareness and make
meaningful decisions. Besides an undoubtedly large
number of advantages from the usage of IoT, there exist
numerous challenges attributed to the security of
objects that cannot be neglected for uninterrupted
services. The Mirai botnet attack demonstrated that the
IoT system is susceptible to different forms of
cyberattacks. While advanced data analytics and Machine
Learning have proved efficiency in various applications
of cybersecurity, those still have not been explored
enough in the literature from the applicability
perspective in the domain of resource-constrained IoT.
Several architectures and frameworks have been proposed
for defining the ways for analyzing the data, yet
mostly investigating off-chip analysis. In this
contribution, we show how an Artificial Neural Network
model can be trained and deployed on trivial IoT nodes
for detecting intelligent similarity-based network
attacks. This article proposes a concept of the
resource-constrained intelligent system as a part of
the IoT infrastructure to be able to harden the
cybersecurity on microcontrollers. This work will serve
as a stepping stone for the application of Artificial
Intelligence on devices with limited computing
capabilities such as end-point IoT nodes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Veloso:2021:HHC,
author = "Artur Felipe da Silva Veloso and Jos{\'e} Valdemir
Reis J{\'u}nior and Ricardo de Andrade Lira Rabelo and
Jocines Dela-flora Silveira",
title = "{HyDSMaaS}: a Hybrid Communication Infrastructure with
{LoRaWAN} and {LoraMesh} for the Demand Side Management
as a Service",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "271",
day = "26",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110271",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/271",
abstract = "Seeking to solve problems in the power electric system
(PES) related to exacerbated and uncontrolled energy
consumption by final consumers such as residences,
condominiums, public buildings and industries, electric
power companies (EPC) are increasingly seeking new
information and communication technologies (ICTs) to
transform traditional electric power distribution
networks into smart grids (SG). With this
implementation, PES will be able to remotely control
electric power consumption as well as monitor data
generated by smart meters (SM). However,
Internet-of-Things (IoT) technologies will enable all
this to happen quickly and at low cost, since they are
low-cost devices that can be deployed quickly and at
scale in these scenarios. With this in mind, this work
aimed to study, propose, and implement a hybrid
communication infrastructure with LoRaWAN and LoraMesh
for the demand-side management as a service (HyDSMaaS)
using IoT devices such as long range (LoRa) to provide
an advanced metering infrastructure (AMI) capable of
performing all these applications as a service offered
by EPC to end consumers. Additionally, services such as
demand-side management (DSMaaS) can be used in this
infrastructure. From the preliminary results it was
found that the LoRaWAN network achieved a range of up
to 2.35 km distance and the LoRaMESH one of 600 m;
thus, the latter is more suitable for scenarios where
there is little interference and the SMs are at long
distances, while the other is used for scenarios with
greater agglomeration of nearby SMs. Considering the
hybridized scenario between LoraWAN and LoRaMESH, it
can be seen that the implementation possibilities
increase, since its range was approximately 3 km
considering only one hop, and it can reach 1023 devices
present in a mesh network. Thus, it was possible to
propose the actual implementation of LoRaWAN and
LoRaMESH protocols as well as the hybridization of the
two protocols for HyDSMaaS. Additionally, the results
obtained are exclusively from Radioenge's LoRa
technology, which can be further improved in the case
of using more powerful equipment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Simoes:2021:DAS,
author = "Rhodney Sim{\~o}es and Kelvin Dias and Ricardo
Martins",
title = "Dynamic Allocation of {SDN} Controllers in {NFV}-Based
{MEC} for the {Internet of Vehicles}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "270",
day = "26",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110270",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/270",
abstract = "The expected huge amount of connected cars and
applications with varying Quality of Service (QoS)
demands still depend on agile/flexible networking
infrastructure to deal with dynamic service requests to
the control plane, which may become a bottleneck for 5G
and Beyond Software-Defined Network (SDN) based
Internet of Vehicles (IoV). At the heart of this issue
is the need for an architecture and optimization
mechanisms that benefit from cutting edge technologies
while granting latency bounds in order to control and
manage the dynamic nature of IoV. To this end, this
article proposes an autonomic software-defined
vehicular architecture grounded on the synergy of
Multi-access Edge Computing (MEC) and Network Functions
Virtualization (NFV) along with a heuristic approach
and an exact model based on linear programming to
efficiently optimize the dynamic resource allocation of
SDN controllers, ensuring load balancing between
controllers and employing reserve resources for
tolerance in case of demand variation. The analyses
carried out in this article consider: (a) to avoid
waste of limited MEC resources, (b) to devise load
balancing among controllers, (c) management complexity,
and (d) to support scalability in dense IoV scenarios.
The results show that the heuristic efficiently manages
the environment even in highly dynamic and dense
scenarios.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Murugappan:2021:CIP,
author = "Manickam Murugappan and John Victor Joshua Thomas and
Ugo Fiore and Yesudas Bevish Jinila and Subhashini
Radhakrishnan",
title = "{COVIDNet}: Implementing Parallel Architecture on
Sound and Image for High Efficacy",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "269",
day = "26",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110269",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/269",
abstract = "The present work relates to the implementation of core
parallel architecture in a deep learning algorithm. At
present, deep learning technology forms the main
interdisciplinary basis of healthcare, hospital
hygiene, biological and medicine. This work establishes
a baseline range by training hyperparameter space,
which could be support images, and sound with further
develop a parallel architectural model using multiple
inputs with and without the patient's involvement. The
chest X-ray images input could form the model
architecture include variables for the number of nodes
in each layer and dropout rate. Fourier transformation
Mel-spectrogram images with the correct pixel range use
to covert sound acceptance at the convolutional neural
network in embarrassingly parallel sequences. COVIDNet
the end user tool has to input a chest X-ray image and
a cough audio file which could be a natural cough or a
forced cough. Three binary classification models
(COVID-19 CXR, non-COVID-19 CXR, COVID-19 cough) were
trained. The COVID-19 CXR model classifies between
healthy lungs and the COVID-19 model meanwhile the
non-COVID-19 CXR model classifies between non-COVID-19
pneumonia and healthy lungs. The COVID-19 CXR model has
an accuracy of 95\% which was trained using 1681
COVID-19 positive images and 10,895 healthy lungs
images, meanwhile, the non-COVID-19 CXR model has an
accuracy of 91\% which was trained using 7478
non-COVID-19 pneumonia positive images and 10,895
healthy lungs. The reason why all the models are binary
classification is due to the lack of available data
since medical image datasets are usually highly
imbalanced and the cost of obtaining them are very
pricey and time-consuming. Therefore, data augmentation
was performed on the medical images datasets that were
used. Effects of parallel architecture and optimization
to improve on design were investigated.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Oikonomidis:2021:MAR,
author = "Theodoros Oikonomidis and Konstantinos Fouskas and
Maro Vlachopoulou",
title = "A Multidimensional Analysis of Released {COVID-19}
Location-Based Mobile Applications",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "268",
day = "25",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110268",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/268",
abstract = "The spread of coronavirus disease (COVID-19) has
triggered a series of responses worldwide ranging from
traveling restrictions and shelter-in-place orders to
lockdowns, contact tracing, social distancing, and
other mitigation measures. To assist with contact
tracing and ensure the safety of citizens, a
significant number of mobile applications has been
developed, utilizing geospatial information and
proximity sensing. We perform a thorough research on
seven digital databases (Appbrain, e-Health Hub,
GDPRhub, ``fs0c131y'', News Sites, Appstore, and Google
Play), identifying a total of 160 apps regarding
COVID-19 related to our research questions. The aim of
this research is to identify the main categories of
apps and analyze their functions based on a proposed
framework of by mapping aspects that affect their
functionalities regarding Services, Technology,
Societal \& Business, and Legal aspects. As the world
comes to the new normal, the utilization of these apps
might become more essential for more mobile users and
developers. The new encryption protocols that are
established are also in favor of this argument. Future
work can utilize our framework to further examine the
development, design, and adoption of such mobile
applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Peng:2021:RDB,
author = "Yun Peng and Jianmei Wang",
title = "Rumor Detection Based on Attention {CNN} and Time
Series of Context Information",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "11",
pages = "267",
day = "25",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13110267",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:13 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/11/267",
abstract = "This study aims to explore the time series context and
sentiment polarity features of rumors' life cycles, and
how to use them to optimize the CNN model parameters
and improve the classification effect. The proposed
model is a convolutional neural network embedded with
an attention mechanism of sentiment polarity and time
series information. Firstly, the whole life cycle of
rumors is divided into 20 groups by the time series
algorithm and each group of texts is trained by Doc2Vec
to obtain the text vector. Secondly, the SVM algorithm
is used to obtain the sentiment polarity features of
each group. Lastly, the CNN model with the spatial
attention mechanism is used to obtain the rumors'
classification. The experiment results show that the
proposed model introduced with features of time series
and sentiment polarity is very effective for rumor
detection, and can greatly reduce the number of
iterations for model training as well. The accuracy,
precision, recall and F1 of the attention CNN are
better than the latest benchmark model.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Baranov:2021:IEN,
author = "Dmitry Baranov and Alexandr Terekhin and Dmitry Bragin
and Anton Konev",
title = "Implementation and Evaluation of Nodal Distribution
and Movement in a {5G} Mobile Network",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "321",
day = "20",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120321",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/321",
abstract = "The determining factor in the accelerated pace of
informatization is the increase in the speed and
reliability of data transmission networks. In this
regard, new and existing standards are developed and
modernized. A lot of organizations are constantly
working on the development and implementation of new
generation communication networks. This article
provides an overview of available software solutions
that allow us to investigate and evaluate the behavior
of data networks. In particular, tools suitable for
mobile communication systems were determined, having
sufficient built-in functionality and allowing us to
add our own implementations. NS3 has been chosen as a
suitable network simulator. Apart from the review, a
solution for this tool was developed. It allows
estimating the reliability of data transmission from
the start movement of a network node at all times
during its removal from a base station.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Leiding:2021:MEM,
author = "Benjamin Leiding and Priyanka Sharma and Alexander
Norta",
title = "The Machine-to-Everything {(M2X)} Economy: Business
Enactments, Collaborations, and e-Governance",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "319",
day = "19",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120319",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/319",
abstract = "Nowadays, business enactments almost exclusively focus
on human-to-human business transactions. However, the
ubiquitousness of smart devices enables business
enactments among autonomously acting machines, thereby
providing the foundation for the machine-driven
Machine-to-Everything (M2X) Economy. Human-to-human
business is governed by enforceable contracts either in
the form of oral, or written agreements. Still, a
machine-driven ecosystem requires a digital equivalent
that is accessible to all stakeholders. Additionally,
an electronic contract platform enables fact-tracking,
non-repudiation, auditability and tamper-resistant
storage of information in a distributed
multi-stakeholder setting. A suitable approach for M2X
enactments are electronic smart contracts that allow to
govern business transactions using a computerized
transaction protocol such as a blockchain. In this
position paper, we argue in favor of an open,
decentralized and distributed smart contract-based M2X
Economy that supports the corresponding
multi-stakeholder ecosystem and facilitates M2X value
exchange, collaborations, and business enactments.
Finally, it allows for a distributed e-governance model
that fosters open platforms and interoperability. Thus,
serving as a foundation for the ubiquitous M2X Economy
and its ecosystem.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ibrahim:2021:FBC,
author = "Ahmed H. Ibrahim and Zaki T. Fayed and Hossam M.
Faheem",
title = "Fog-Based {CDN} Framework for Minimizing Latency of
{Web} Services Using Fog-Based {HTTP} Browser",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "320",
day = "17",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120320",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/320",
abstract = "Cloud computing has been a dominant computing paradigm
for many years. It provides applications with
computing, storage, and networking capabilities.
Furthermore, it enhances the scalability and quality of
service (QoS) of applications and offers the better
utilization of resources. Recently, these advantages of
cloud computing have deteriorated in quality. Cloud
services have been affected in terms of latency and QoS
due to the high streams of data produced by many
Internet of Things (IoT) devices, smart machines, and
other computing devices joining the network, which in
turn affects network capabilities. Content delivery
networks (CDNs) previously provided a partial solution
for content retrieval, availability, and resource
download time. CDNs rely on the geographic distribution
of cloud servers to provide better content
reachability. CDNs are perceived as a network layer
near cloud data centers. Recently, CDNs began to
perceive the same degradations of QoS due to the same
factors. Fog computing fills the gap between cloud
services and consumers by bringing cloud capabilities
close to end devices. Fog computing is perceived as
another network layer near end devices. The adoption of
the CDN model in fog computing is a promising approach
to providing better QoS and latency for cloud services.
Therefore, a fog-based CDN framework capable of
reducing the load time of web services was proposed in
this paper. To evaluate our proposed framework and
provide a complete set of tools for its use, a
fog-based browser was developed. We showed that our
proposed fog-based CDN framework improved the load time
of web pages compared to the results attained through
the use of the traditional CDN. Different experiments
were conducted with a simple network topology against
six websites with different content sizes along with a
different number of fog nodes at different network
distances. The results of these experiments show that
with a fog-based CDN framework offloading autonomy,
latency can be reduced by 85\% and enhance the user
experience of websites.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ahmad:2021:MVD,
author = "Rasheed Ahmad and Izzat Alsmadi and Wasim Alhamdani
and Lo'ai Tawalbeh",
title = "Models versus Datasets: Reducing Bias through Building
a Comprehensive {IDS} Benchmark",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "318",
day = "17",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120318",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/318",
abstract = "Today, deep learning approaches are widely used to
build Intrusion Detection Systems for securing IoT
environments. However, the models' hidden and complex
nature raises various concerns, such as trusting the
model output and understanding why the model made
certain decisions. Researchers generally publish their
proposed model's settings and performance results based
on a specific dataset and a classification model but do
not report the proposed model's output and findings.
Similarly, many researchers suggest an IDS solution by
focusing only on a single benchmark dataset and
classifier. Such solutions are prone to generating
inaccurate and biased results. This paper overcomes
these limitations in previous work by analyzing various
benchmark datasets and various individual and hybrid
deep learning classifiers towards finding the best IDS
solution for IoT that is efficient, lightweight, and
comprehensive in detecting network anomalies. We also
showed the model's localized predictions and analyzed
the top contributing features impacting the global
performance of deep learning models. This paper aims to
extract the aggregate knowledge from various datasets
and classifiers and analyze the commonalities to avoid
any possible bias in results and increase the trust and
transparency of deep learning models. We believe this
paper's findings will help future researchers build a
comprehensive IDS based on well-performing classifiers
and utilize the aggregated knowledge and the minimum
set of significantly contributing features.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Trihinas:2021:FTS,
author = "Demetris Trihinas and Michalis Agathocleous and Karlen
Avogian and Ioannis Katakis",
title = "{FlockAI}: a Testing Suite for {ML}-Driven Drone
Applications",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "317",
day = "16",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120317",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/317",
abstract = "Machine Learning (ML) is now becoming a key driver
empowering the next generation of drone technology and
extending its reach to applications never envisioned
before. Examples include precision agriculture, crowd
detection, and even aerial supply transportation.
Testing drone projects before actual deployment is
usually performed via robotic simulators. However,
extending testing to include the assessment of on-board
ML algorithms is a daunting task. ML practitioners are
now required to dedicate vast amounts of time for the
development and configuration of the benchmarking
infrastructure through a mixture of use-cases coded
over the simulator to evaluate various key performance
indicators. These indicators extend well beyond the
accuracy of the ML algorithm and must capture
drone-relevant data including flight performance,
resource utilization, communication overhead and energy
consumption. As most ML practitioners are not
accustomed with all these demanding requirements, the
evaluation of ML-driven drone applications can lead to
sub-optimal, costly, and error-prone deployments. In
this article we introduce FlockAI, an open and modular
by design framework supporting ML practitioners with
the rapid deployment and repeatable testing of
ML-driven drone applications over the Webots simulator.
To show the wide applicability of rapid testing with
FlockAI, we introduce a proof-of-concept use-case
encompassing different scenarios, ML algorithms and
KPIs for pinpointing crowded areas in an urban
environment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Eramo:2021:PIC,
author = "Vincenzo Eramo and Francesco Valente and Tiziana
Catena and Francesco Giacinto Lavacca",
title = "Proposal and Investigation of a Convolutional and
{LSTM} Neural Network for the Cost-Aware Resource
Prediction in Softwarized Networks",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "316",
day = "16",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120316",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/316",
abstract = "Resource prediction algorithms have been recently
proposed in Network Function Virtualization
architectures. A prediction-based resource allocation
is characterized by higher operation costs due to: (i)
Resource underestimate that leads to quality of service
degradation; (ii) used cloud resource over allocation
when a resource overestimate occurs. To reduce such a
cost, we propose a cost-aware prediction algorithm able
to minimize the sum of the two cost components. The
proposed prediction solution is based on a
convolutional and Long Short Term Memory neural network
to handle the spatial and temporal correlations of the
need processing capacities. We compare in a real
network and traffic scenario the proposed technique to
a traditional one in which the aim is to exactly
predict the needed processing capacity. We show how the
proposed solution allows for cost advantages in the
order of 20\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Shilov:2021:RHF,
author = "Lev Shilov and Semen Shanshin and Aleksandr Romanov
and Anastasia Fedotova and Anna Kurtukova and Evgeny
Kostyuchenko and Ivan Sidorov",
title = "Reconstruction of a {3D} Human Foot Shape Model Based
on a Video Stream Using Photogrammetry and Deep Neural
Networks",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "315",
day = "14",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120315",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/315",
abstract = "Reconstructed 3D foot models can be used for 3D
printing and further manufacturing of individual
orthopedic shoes, as well as in medical research and
for online shoe shopping. This study presents a
technique based on the approach and algorithms of
photogrammetry. The presented technique was used to
reconstruct a 3D model of the foot shape, including the
lower arch, using smartphone images. The technique is
based on modern computer vision and artificial
intelligence algorithms designed for image processing,
obtaining sparse and dense point clouds, depth maps,
and a final 3D model. For the segmentation of foot
images, the Mask R-CNN neural network was used, which
was trained on foot data from a set of 40 people. The
obtained accuracy was 97.88\%. The result of the study
was a high-quality reconstructed 3D model. The standard
deviation of linear indicators in length and width was
0.95 mm, with an average creation time of 1 min 35 s
recorded. Integration of this technique into the
business models of orthopedic enterprises, Internet
stores, and medical organizations will allow basic
manufacturing and shoe-fitting services to be carried
out and will help medical research to be performed via
the Internet.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Abuzrieq:2021:EPE,
author = "Yara Abuzrieq and Amro Al-Said Ahmad and Maram Bani
Younes",
title = "An Experimental Performance Evaluation of
Cloud-{API}-Based Applications",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "314",
day = "13",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120314",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/314",
abstract = "Cloud Application Programming Interfaces (APIs) have
been developed to link several cloud computing
applications together. API-based applications are
widely used to provide flexible and reliable services
over cloud platforms. Recently, a huge number of
services have been attached to cloud platforms and
widely utilized during a very short period of time.
This is due to the COVID-19 lockdowns, which forced
several businesses to switch to online services
instantly. Several cloud platforms have failed to
support adequate services, especially for extended and
real-time-based applications. Early testing of the
available platforms guarantees a level of suitability
and reliability for the uploaded services. In this
work, we first selected two different API-based
applications from education and professional
taxonomies, the two most recently used applications
that have switched to the cloud environment. Then, we
aimed to evaluate the performance of different
API-based applications under different cloud platforms,
in order to measure and validate the ability of these
platforms to support these services. The advantages and
drawbacks of each platform were experimentally
investigated for each application.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kapassa:2021:BAI,
author = "Evgenia Kapassa and Marinos Themistocleous and Klitos
Christodoulou and Elias Iosif",
title = "Blockchain Application in {Internet of Vehicles}:
Challenges, Contributions and Current Limitations",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "313",
day = "10",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120313",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/313",
abstract = "Blockchain technology is highly coupled with
cryptocurrencies; however, it provides several other
potential use cases, related to energy and
sustainability, Internet of Things (IoT), smart cities,
smart mobility and more. Blockchain can offer security
for Electric Vehicle (EV) transactions in the Internet
of Vehicles (IoV) concept, allowing electricity trading
to be performed in a decentralized, transparent and
secure way. Additionally, blockchain provides the
necessary functionalities for IoV decentralized
application development, such as data exchange,
personal digital identity, sharing economy and
optimized charging pattern. Moreover, blockchain
technology has the potential to significantly increase
energy efficiency, decrease management costs and
guarantee the effective use of the energy recourses.
Therefore, its application in the IoV concept provides
secure, autonomous and automated energy trading between
EVs. While several studies on blockchain technology in
smart grids have been conducted, insufficient attention
has been given to conducting a detailed review and
state-of-the-art analysis of blockchain application in
the IoV domain. To this end, this work provides a
systematic literature review of blockchain-based
applications in the IoV domain. The aim is to
investigate the current challenges of IoV and to
highlight how blockchain characteristics can contribute
to this emerging paradigm. In addition, limitations and
future research directions related to the integration
of blockchain technology within the IoV are discussed.
To this end, this study incorporates the theoretical
foundations of several research articles published in
scientific publications over the previous five years,
as a method of simplifying our assessment and capturing
the ever-expanding blockchain area. We present a
comprehensive taxonomy of blockchain-enabled
applications in the IoV domain, such as privacy and
security, data protection and management, vehicle
management, charging optimization and P2P energy
trading, based on a structured, systematic review and
content analysis of the discovered literature, and we
identify key trends and emerging areas for research.
The contribution of this article is two-fold: (a) we
highlight the limitations presented in the relevant
literature, particularly the barriers of blockchain
technology and how they influence its integration into
the IoV and (b) we present a number of research gaps
and suggest future exploratory areas.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gangwani:2021:SEI,
author = "Pranav Gangwani and Alexander Perez-Pons and Tushar
Bhardwaj and Himanshu Upadhyay and Santosh Joshi and
Leonel Lagos",
title = "Securing Environmental {IoT} Data Using Masked
Authentication Messaging Protocol in a {DAG}-Based
Blockchain: {IOTA} Tangle",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "312",
day = "06",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120312",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/312",
abstract = "The demand for the digital monitoring of environmental
ecosystems is high and growing rapidly as a means of
protecting the public and managing the environment.
However, before data, algorithms, and models can be
mobilized at scale, there are considerable concerns
associated with privacy and security that can
negatively affect the adoption of technology within
this domain. In this paper, we propose the advancement
of electronic environmental monitoring through the
capability provided by the blockchain. The blockchain's
use of a distributed ledger as its underlying
infrastructure is an attractive approach to counter
these privacy and security issues, although its
performance and ability to manage sensor data must be
assessed. We focus on a new distributed ledger
technology for the IoT, called IOTA, that is based on a
directed acyclic graph. IOTA overcomes the current
limitations of the blockchain and offers a data
communication protocol called masked authenticated
messaging for secure data sharing among Internet of
Things (IoT) devices. We show how the application layer
employing the data communication protocol, MAM, can
support the secure transmission, storage, and retrieval
of encrypted environmental sensor data by using an
immutable distributed ledger such as that shown in
IOTA. Finally, we evaluate, compare, and analyze the
performance of the MAM protocol against a non-protocol
approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Guazzini:2021:PEA,
author = "Andrea Guazzini and Tommaso Raimondi and Benedetta
Biagini and Franco Bagnoli and Mirko Duradoni",
title = "Phubber's Emotional Activations: The Association
between {PANAS} and Phubbing Behavior",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "311",
day = "04",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120311",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/311",
abstract = "Currently, mobile phones are widely used worldwide.
Thus, phubbing rapidly became a common phenomenon in
our social life. Phubbing is considered by the
literature as a new form of technology-related
addiction that may undermine interpersonal
relationships and mental health. Our study contributed
to exploring phubbers' emotional activation as no other
work has investigated it so far. Indeed, researchers
have only explored phubbees' but not phubbers'
emotional correlates. A sample of 419 Italian
individuals (143 males) participated in our data
collection on a voluntary basis. The results showed
that phubbing is related to negative affects, but not
to positive affects. Moreover, phubbing in both its
components (i.e., communication disturbance, phone
obsession) appeared to elicit an emotional activation
similar to that of social media addiction. These
findings may help in strengthening the discussion
around the emotional consequences of virtual
environment design, as well as the awareness about what
happens at a relational level during phubbing.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sun:2021:SSA,
author = "Haoli Sun and Bingfeng Pi and Jun Sun and Takeshi
Miyamae and Masanobu Morinaga",
title = "{SASLedger}: a Secured, Accelerated Scalable Storage
Solution for Distributed Ledger Systems",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "310",
day = "30",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120310",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/310",
abstract = "Blockchain technology provides a ``tamper-proof
distributed ledger'' for its users. Typically, to
ensure the integrity and immutability of the
transaction data, each node in a blockchain network
retains a full copy of the ledger; however, this
characteristic imposes an increasing storage burden
upon each node with the accumulation of data. In this
paper, an off-chain solution is introduced to relieve
the storage burden of blockchain nodes while ensuring
the integrity of the off-chain data. In our solution,
an off-chain remote DB server stores the fully
replicated data while the nodes only store the
commitments of the data to verify whether the off-chain
data are tampered with. To minimize the influence on
performance, the nodes will store data locally at first
and transfer it to the remote DB server when otherwise
idle. Our solution also supports accessing all
historical data for newly joined nodes through a
snapshot mechanism. The solution is implemented based
on the Hyperledger Fabric (HLF). Experiments show that
our solution reduces the block data for blockchain
nodes by 93.3\% compared to the original HLF and that
our advanced solution enhances the TPS by 9.6\%
compared to our primary solution.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Marques:2021:DFB,
author = "Claudio Marques and Silvestre Malta and Jo{\~a}o
Magalh{\~a}es",
title = "{DNS} Firewall Based on Machine Learning",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "309",
day = "30",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120309",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/309",
abstract = "Nowadays there are many DNS firewall solutions to
prevent users accessing malicious domains. These can
provide real-time protection and block illegitimate
communications, contributing to the cybersecurity
posture of the organizations. Most of these solutions
are based on known malicious domain lists that are
being constantly updated. However, in this way, it is
only possible to block malicious communications for
known malicious domains, leaving out many others that
are malicious but have not yet been updated in the
blocklists. This work provides a study to implement a
DNS firewall solution based on ML and so improve the
detection of malicious domain requests on the fly. For
this purpose, a dataset with 34 features and 90 k
records was created based on real DNS logs. The data
were enriched using OSINT sources. Exploratory analysis
and data preparation steps were carried out, and the
final dataset submitted to different Supervised ML
algorithms to accurately and quickly classify if a
domain request is malicious or not. The results show
that the ML algorithms were able to classify the benign
and malicious domains with accuracy rates between 89\%
and 96\%, and with a classification time between 0.01
and 3.37 s. The contributions of this study are
twofold. In terms of research, a dataset was made
public and the methodology can be used by other
researchers. In terms of solution, the work provides
the baseline to implement an in band DNS firewall.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dirir:2021:ADL,
author = "Ahmed Dirir and Henry Ignatious and Hesham Elsayed and
Manzoor Khan and Mohammed Adib and Anas Mahmoud and
Moatasem Al-Gunaid",
title = "An Advanced Deep Learning Approach for Multi-Object
Counting in Urban Vehicular Environments",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "306",
day = "30",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120306",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/306",
abstract = "Object counting is an active research area that gained
more attention in the past few years. In smart cities,
vehicle counting plays a crucial role in urban planning
and management of the Intelligent Transportation
Systems (ITS). Several approaches have been proposed in
the literature to address this problem. However, the
resulting detection accuracy is still not adequate.
This paper proposes an efficient approach that uses
deep learning concepts and correlation filters for
multi-object counting and tracking. The performance of
the proposed system is evaluated using a dataset
consisting of 16 videos with different features to
examine the impact of object density, image quality,
angle of view, and speed of motion towards system
accuracy. Performance evaluation exhibits promising
results in normal traffic scenarios and adverse weather
conditions. Moreover, the proposed approach outperforms
the performance of two recent approaches from the
literature.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Md:2021:TOU,
author = "Abdul Quadir Md and Divyank Agrawal and Monark Mehta
and Arun Kumar Sivaraman and Kong Fah Tee",
title = "Time Optimization of Unmanned Aerial Vehicles Using an
Augmented Path",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "308",
day = "29",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120308",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/308",
abstract = "With the pandemic gripping the entire humanity and
with uncertainty hovering like a black cloud over all
our future sustainability and growth, it became almost
apparent that though the development and advancement
are at their peak, we are still not ready for the
worst. New and better solutions need to be applied so
that we will be capable of fighting these conditions.
One such prospect is delivery, where everything has to
be changed, and each parcel, which was passed people to
people, department to department, has to be made
contactless throughout with as little error as
possible. Thus, the prospect of drone delivery and its
importance came around with optimization of the
existing system for making it useful in the prospects
of delivery of important items like medicines,
vaccines, etc. These modular AI-guided drones are
faster, efficient, less expensive, and less
power-consuming than the actual delivery.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Varadarajan:2021:EDC,
author = "Vijayakumar Varadarajan and Dweepna Garg and Ketan
Kotecha",
title = "An Efficient Deep Convolutional Neural Network
Approach for Object Detection and Recognition Using a
Multi-Scale Anchor Box in Real-Time",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "307",
day = "29",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120307",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/307",
abstract = "Deep learning is a relatively new branch of machine
learning in which computers are taught to recognize
patterns in massive volumes of data. It primarily
describes learning at various levels of representation,
which aids in understanding data that includes text,
voice, and visuals. Convolutional neural networks have
been used to solve challenges in computer vision,
including object identification, image classification,
semantic segmentation and a lot more. Object detection
in videos involves confirming the presence of the
object in the image or video and then locating it
accurately for recognition. In the video, modelling
techniques suffer from high computation and memory
costs, which may decrease performance measures such as
accuracy and efficiency to identify the object
accurately in real-time. The current object detection
technique based on a deep convolution neural network
requires executing multilevel convolution and pooling
operations on the entire image to extract deep semantic
properties from it. For large objects, detection models
can provide superior results; however, those models
fail to detect the varying size of the objects that
have low resolution and are greatly influenced by noise
because the features after the repeated convolution
operations of existing models do not fully represent
the essential characteristics of the objects in
real-time. With the help of a multi-scale anchor box,
the proposed approach reported in this paper enhances
the detection accuracy by extracting features at
multiple convolution levels of the object. The major
contribution of this paper is to design a model to
understand better the parameters and the
hyper-parameters which affect the detection and the
recognition of objects of varying sizes and shapes, and
to achieve real-time object detection and recognition
speeds by improving accuracy. The proposed model has
achieved 84.49 mAP on the test set of the Pascal
VOC-2007 dataset at 11 FPS, which is comparatively
better than other real-time object detection models.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Altulyan:2021:CIA,
author = "May Altulyan and Lina Yao and Chaoran Huang and
Xianzhi Wang and Salil S. Kanhere",
title = "Context-Induced Activity Monitoring for On-Demand
Things-of-Interest Recommendation in an Ambient
Intelligent Environment",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "305",
day = "28",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120305",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/305",
abstract = "Recommendation systems are crucial in the provision of
services to the elderly with Alzheimer's disease in
IoT-based smart home environments. In this work, a
Reminder Care System (RCS) is presented to help
Alzheimer patients live in and operate their homes
safely and independently. A contextual bandit approach
is utilized in the formulation of the proposed
recommendation system to tackle dynamicity in human
activities and to construct accurate recommendations
that meet user needs without their feedback. The system
was evaluated based on three public datasets using a
cumulative reward as a metric. Our experimental results
demonstrate the feasibility and effectiveness of the
proposed Reminder Care System for real-world IoT-based
smart home applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Abdellah:2021:MLA,
author = "Ali R. Abdellah and Omar Abdulkareem Mahmood and
Ruslan Kirichek and Alexander Paramonov and Andrey
Koucheryavy",
title = "Machine Learning Algorithm for Delay Prediction in
{IoT} and Tactile {Internet}",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "304",
day = "26",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120304",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/304",
abstract = "The next-generation cellular systems, including
fifth-generation cellular systems (5G), are empowered
with the recent advances in artificial intelligence
(AI) and other recent paradigms. The internet of things
(IoT) and the tactile internet are paradigms that can
be empowered with AI solutions and integrated with 5G
systems to deliver novel services that impact the
future. Machine learning technologies (ML) can
understand examples of nonlinearity from the
environment and are suitable for network traffic
prediction. Network traffic prediction is one of the
most active research areas that integrates AI with
information networks. Traffic prediction is an integral
approach to ensure security, reliability, and quality
of service (QoS) requirements. Nowadays, it can be used
in various applications, such as network monitoring,
resource management, congestion control, network
bandwidth allocation, network intrusion detection, etc.
This paper performs time series prediction for IoT and
tactile internet delays, using the k -step-ahead
prediction approach with nonlinear autoregressive with
external input (NARX)-enabled recurrent neural network
(RNN). The ML was trained with four different training
functions: Bayesian regularization backpropagation
(Trainbr), Levenberg--Marquardt backpropagation
(Trainlm), conjugate gradient backpropagation with
Fletcher--Reeves updates (Traincgf), and the resilient
backpropagation algorithm (Trainrp). The accuracy of
the predicted delay was measured using three functions
based on ML: mean square error (MSE), root mean square
error (RMSE), and mean absolute percentage error
(MAPE).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2021:AMG,
author = "Xiaoliang Wang and Peiquan Jin",
title = "Adaptive Multi-Grained Buffer Management for Database
Systems",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "303",
day = "26",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120303",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/303",
abstract = "The traditional page-grained buffer manager in
database systems has a low hit ratio when only a few
tuples within a page are frequently accessed. To handle
this issue, this paper proposes a new buffering scheme
called the AMG-Buffer (Adaptive Multi-Grained Buffer).
AMG-Buffer proposes to use two page buffers and a tuple
buffer to organize the whole buffer. In this way, the
AMG-Buffer can hold more hot tuples than a single
page-grained buffer. Further, we notice that the tuple
buffer may cause additional read I/Os when writing
dirty tuples into disks. Thus, we introduce a new
metric named clustering rate to quantify the hot-tuple
rate in a page. The use of the tuple buffer is
determined by the clustering rate, allowing the
AMG-Buffer to adapt to different workloads. We conduct
experiments on various workloads to compare the
AMG-Buffer with several existing schemes, including
LRU, LIRS, CFLRU, CFDC, and MG-Buffer. The results show
that AMG-Buffer can significantly improve the hit ratio
and reduce I/Os compared to its competitors. Moreover,
the AMG-Buffer achieves the best performance on a
dynamic workload as well as on a large data set,
suggesting its adaptivity and scalability to changing
workloads.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Agbaegbu:2021:OCC,
author = "JohnBosco Agbaegbu and Oluwasefunmi Tale Arogundade
and Sanjay Misra and Robertas Damasevicius",
title = "Ontologies in Cloud Computing --- Review and Future
Directions",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "302",
day = "26",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120302",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/302",
abstract = "Cloud computing as a technology has the capacity to
enhance cooperation, scalability, accessibility, and
offers discount prospects using improved and effective
computing, and this capability helps organizations to
stay focused. Ontologies are used to model knowledge.
Once knowledge is modeled, knowledge management systems
can be used to search, match, visualize knowledge, and
also infer new knowledge. Ontologies use semantic
analysis to define information within an environment
with interconnecting relationships between
heterogeneous sets. This paper aims to provide a
comprehensive review of the existing literature on
ontology in cloud computing and defines the state of
the art. We applied the systematic literature review
(SLR) approach and identified 400 articles; 58 of the
articles were selected after further selection based on
set selection criteria, and 35 articles were considered
relevant to the study. The study shows that four
predominant areas of cloud computing-cloud security,
cloud interoperability, cloud resources and service
description, and cloud services discovery and
selection-have attracted the attention of researchers
as dominant areas where cloud ontologies have made
great impact. The proposed methods in the literature
applied 30 ontologies in the cloud domain, and five of
the methods are still practiced in the legacy computing
environment. From the analysis, it was found that
several challenges exist, including those related to
the application of ontologies to enhance business
operations in the cloud and multi-cloud. Based on this
review, the study summarizes some unresolved challenges
and possible future directions for cloud ontology
researchers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cocco:2021:BSS,
author = "Luisanna Cocco and Roberto Tonelli and Michele
Marchesi",
title = "Blockchain and Self Sovereign Identity to Support
Quality in the Food Supply Chain",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "301",
day = "26",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120301",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/301",
abstract = "This work presents how a digital identity management
system can support food supply chains in guaranteeing
the quality of the products marketed and the compliance
of the several supply-chain's nodes to standards and
technical regulations. Specific goal of this work is to
present a system that provides full visibility of
process/food certifications, which nowadays are issued
by accredited and approved certification bodies
(issuers) and delivered and stored in paper version by
the several participants (holders) of the supply chain.
The system is designed and implemented by combining the
latest most innovative and disruptive technologies in
the market-Self Sovereign Identity system, Blockchain,
and Inter Planetary File System. The crucial aspects
that it aims to hit are the storage and access of
food/process certifications, and the proper eligibility
verification of these certifications exploiting the
concepts of the Self Sovereign Identity-based models.
The proposed system, realized by using standards that
are WWW Consortium-compatible and the Ethereum
Blockchain, ensures eligibility, transparency, and
traceability of the certifications along a food supply
chain, and could be an innovation model/idea that the
companies that adopt the Open Innovation paradigm might
want to pursue.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kwon:2021:IRM,
author = "Junhyung Kwon and Sangkyun Lee",
title = "Improving the Robustness of Model Compression by
On-Manifold Adversarial Training",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "300",
day = "25",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120300",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/300",
abstract = "Despite the advance in deep learning technology,
assuring the robustness of deep neural networks (DNNs)
is challenging and necessary in safety-critical
environments, including automobiles, IoT devices in
smart factories, and medical devices, to name a few.
Furthermore, recent developments allow us to compress
DNNs to reduce the size and computational requirements
of DNNs to fit them into small embedded devices.
However, how robust a compressed DNN can be has not
been well studied in addressing its relationship to
other critical factors, such as prediction performance
and model sizes. In particular, existing studies on
robust model compression have been focused on the
robustness against off-manifold adversarial
perturbation, which does not explain how a DNN will
behave against perturbations that follow the same
probability distribution as the training data. This
aspect is relevant for on-device AI models, which are
more likely to experience perturbations due to noise
from the regular data observation environment compared
with off-manifold perturbations provided by an external
attacker. Therefore, this paper investigates the
robustness of compressed deep neural networks, focusing
on the relationship between the model sizes and the
prediction performance on noisy perturbations. Our
experiment shows that on-manifold adversarial training
can be effective in building robust classifiers,
especially when the model compression rate is high.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ali:2021:SEM,
author = "Guma Ali and Mussa Ally Dida and Anael Elikana Sam",
title = "A Secure and Efficient Multi-Factor Authentication
Algorithm for Mobile Money Applications",
journal = j-FUTURE-INTERNET,
volume = "13",
number = "12",
pages = "299",
day = "25",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi13120299",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:14 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/13/12/299",
abstract = "With the expansion of smartphone and financial
technologies (FinTech), mobile money emerged to improve
financial inclusion in many developing nations. The
majority of the mobile money schemes used in these
nations implement two-factor authentication (2FA) as
the only means of verifying mobile money users. These
2FA schemes are vulnerable to numerous security attacks
because they only use a personal identification number
(PIN) and subscriber identity module (SIM). This study
aims to develop a secure and efficient multi-factor
authentication algorithm for mobile money applications.
It uses a novel approach combining PIN, a one-time
password (OTP), and a biometric fingerprint to enforce
extra security during mobile money authentication. It
also uses a biometric fingerprint and quick response
(QR) code to confirm mobile money withdrawal. The
security of the PIN and OTP is enforced by using secure
hashing algorithm-256 (SHA-256), a biometric
fingerprint by Fast IDentity Online (FIDO) that uses a
standard public key cryptography technique (RSA), and
Fernet encryption to secure a QR code and the records
in the databases. The evolutionary prototyping model
was adopted when developing the native mobile money
application prototypes to prove that the algorithm is
feasible and provides a higher degree of security. The
developed applications were tested, and a detailed
security analysis was conducted. The results show that
the proposed algorithm is secure, efficient, and highly
effective against the various threat models. It also
offers secure and efficient authentication and ensures
data confidentiality, integrity, non-repudiation, user
anonymity, and privacy. The performance analysis
indicates that it achieves better overall performance
compared with the existing mobile money systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alberro:2022:EED,
author = "Leonardo Alberro and Alberto Castro and Eduardo
Grampin",
title = "Experimentation Environments for Data Center Routing
Protocols: a Comprehensive Review",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "29",
day = "17",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010029",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/29",
abstract = "The Internet architecture has been undergoing a
significant refactoring, where the past preeminence of
transit providers has been replaced by content
providers, which have a ubiquitous presence throughout
the world, seeking to improve the user experience,
bringing content closer to its final recipients. This
restructuring is materialized in the emergence of
Massive Scale Data Centers (MSDC) worldwide, which
allows the implementation of the Cloud Computing
concept. MSDC usually deploy Fat-Tree topologies, with
constant bisection bandwidth among servers and
multi-path routing. To take full advantage of such
characteristics, specific routing protocols are needed.
Multi-path routing also calls for revision of transport
protocols and forwarding policies, also affected by
specific MSDC applications' traffic characteristics.
Experimenting over these infrastructures is
prohibitively expensive, and therefore, scalable and
realistic experimentation environments are needed to
research and test solutions for MSDC. In this paper, we
review several environments, both single-host and
distributed, which permit analyzing the pros and cons
of different solutions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Trofimova:2022:ERA,
author = "Yelena Trofimova and Pavel Tvrd{\'\i}k",
title = "Enhancing Reactive Ad Hoc Routing Protocols with
Trust",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "28",
day = "15",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010028",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/28",
abstract = "In wireless ad hoc networks, security and
communication challenges are frequently addressed by
deploying a trust mechanism. A number of approaches for
evaluating trust of ad hoc network nodes have been
proposed, including the one that uses neural networks.
We proposed to use packet delivery ratios as input to
the neural network. In this article, we present a new
method, called TARA (Trust-Aware Reactive Ad Hoc
routing), to incorporate node trusts into reactive ad
hoc routing protocols. The novelty of the TARA method
is that it does not require changes to the routing
protocol itself. Instead, it influences the routing
choice from outside by delaying the route request
messages of untrusted nodes. The performance of the
method was evaluated on the use case of sensor nodes
sending data to a sink node. The experiments showed
that the method improves the packet delivery ratio in
the network by about 70\%. Performance analysis of the
TARA method provided recommendations for its
application in a particular ad hoc network.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2022:GCD,
author = "Junda Li and Chunxu Zhang and Bo Yang",
title = "Global Contextual Dependency Network for Object
Detection",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "27",
day = "13",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010027",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/27",
abstract = "Current two-stage object detectors extract the local
visual features of Regions of Interest (RoIs) for
object recognition and bounding-box regression.
However, only using local visual features will lose
global contextual dependencies, which are helpful to
recognize objects with featureless appearances and
restrain false detections. To tackle the problem, a
simple framework, named Global Contextual Dependency
Network (GCDN), is presented to enhance the
classification ability of two-stage detectors. Our GCDN
mainly consists of two components, Context
Representation Module (CRM) and Context Dependency
Module (CDM). Specifically, a CRM is proposed to
construct multi-scale context representations. With
CRM, contextual information can be fully explored at
different scales. Moreover, the CDM is designed to
capture global contextual dependencies. Our GCDN
includes multiple CDMs. Each CDM utilizes local Region
of Interest (RoI) features and single-scale context
representation to generate single-scale contextual RoI
features via the attention mechanism. Finally, the
contextual RoI features generated by parallel CDMs
independently are combined with the original RoI
features to help classification. Experiments on MS-COCO
2017 benchmark dataset show that our approach brings
continuous improvements for two-stage detectors.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Niarchos:2022:SPF,
author = "Michail Niarchos and Marina Eirini Stamatiadou and
Charalampos Dimoulas and Andreas Veglis and Andreas
Symeonidis",
title = "A Semantic Preprocessing Framework for Breaking News
Detection to Support Future Drone Journalism Services",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "26",
day = "10",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010026",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/26",
abstract = "Nowadays, news coverage implies the existence of video
footage and sound, from which arises the need for fast
reflexes by media organizations. Social media and
mobile journalists assist in fulfilling this
requirement, but quick on-site presence is not always
feasible. In the past few years, Unmanned Aerial
Vehicles (UAVs), and specifically drones, have evolved
to accessible recreational and business tools. Drones
could help journalists and news organizations capture
and share breaking news stories. Media corporations and
individual professionals are waiting for the
appropriate flight regulation and data handling
framework to enable their usage to become widespread.
Drone journalism services upgrade the usage of drones
in day-to-day news reporting operations, offering
multiple benefits. This paper proposes a system for
operating an individual drone or a set of drones,
aiming to mediate real-time breaking news coverage.
Apart from the definition of the system requirements
and the architecture design of the whole system, the
current work focuses on data retrieval and the
semantics preprocessing framework that will be the
basis of the final implementation. The ultimate goal of
this project is to implement a whole system that will
utilize data retrieved from news media organizations,
social media, and mobile journalists to provide alerts,
geolocation inference, and flight planning.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lombardo:2022:MUW,
author = "Gianfranco Lombardo and Michele Tomaiuolo and Monica
Mordonini and Gaia Codeluppi and Agostino Poggi",
title = "Mobility in Unsupervised Word Embeddings for Knowledge
Extraction --- The Scholars' Trajectories across
Research Topics",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "25",
day = "09",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010025",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/25",
abstract = "In the knowledge discovery field of the Big Data
domain the analysis of geographic positioning and
mobility information plays a key role. At the same
time, in the Natural Language Processing (NLP) domain
pre-trained models such as BERT and word embedding
algorithms such as Word2Vec enabled a rich encoding of
words that allows mapping textual data into points of
an arbitrary multi-dimensional space, in which the
notion of proximity reflects an association among terms
or topics. The main contribution of this paper is to
show how analytical tools, traditionally adopted to
deal with geographic data to measure the mobility of an
agent in a time interval, can also be effectively
applied to extract knowledge in a semantic realm, such
as a semantic space of words and topics, looking for
latent trajectories that can benefit the properties of
neural network latent representations. As a case study,
the Scopus database was queried about works of highly
cited researchers in recent years. On this basis, we
performed a dynamic analysis, for measuring the Radius
of Gyration as an index of the mobility of researchers
across scientific topics. The semantic space is built
from the automatic analysis of the paper abstracts of
each author. In particular, we evaluated two different
methodologies to build the semantic space and we found
that Word2Vec embeddings perform better than the BERT
ones for this task. Finally, The scholars' trajectories
show some latent properties of this model, which also
represent new scientific contributions of this work.
These properties include ( i ) the correlation between
the scientific mobility and the achievement of
scientific results, measured through the H-index; ( ii
) differences in the behavior of researchers working in
different countries and subjects; and ( iii ) some
interesting similarities between mobility patterns in
this semantic realm and those typically observed in the
case of human mobility.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yan:2022:CDC,
author = "Hui Yan and Chaoyuan Cui",
title = "{CacheHawkeye}: Detecting Cache Side Channel Attacks
Based on Memory Events",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "24",
day = "08",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010024",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/24",
abstract = "Cache side channel attacks, as a type of
cryptanalysis, seriously threaten the security of the
cryptosystem. These attacks continuously monitor the
memory addresses associated with the victim's secret
information, which cause frequent memory access on
these addresses. This paper proposes CacheHawkeye,
which uses the frequent memory access characteristic of
the attacker to detect attacks. CacheHawkeye monitors
memory events by CPU hardware performance counters. We
proved the effectiveness of CacheHawkeye on
Flush+Reload and Flush+Flush attacks. In addition, we
evaluated the accuracy of CacheHawkeye under different
system loads. Experiments demonstrate that CacheHawkeye
not only has good accuracy but can also adapt to
various system loads.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rodrigues:2022:QBM,
author = "La{\'e}cio Rodrigues and Joel J. P. C. Rodrigues and
Antonio de Barros Serra and Francisco Airton Silva",
title = "A Queueing-Based Model Performance Evaluation for
{Internet} of People Supported by Fog Computing",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "23",
day = "08",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010023",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/23",
abstract = "Following the Internet of Things (IoT) and the
Internet of Space (IoS), we are now approaching IoP
(Internet of People), or the Internet of Individuals,
with the integration of chips inside people that link
to other chips and the Internet. Low latency is
required in order to achieve great service quality in
these ambient assisted living facilities. Failures, on
the other hand, are not tolerated, and assessing the
performance of such systems in a real-world setting is
difficult. Analytical models may be used to examine
these types of systems even in the early phases of
design. The performance of aged care monitoring systems
is evaluated using an M/M/c/K queuing network. The
model enables resource capacity, communication, and
service delays to be calibrated. The proposed model was
shown to be capable of predicting the system's MRT
(mean response time) and calculating the quantity of
resources required to satisfy certain user
requirements. To analyze data from IoT solutions, the
examined architecture incorporates cloud and fog
resources. Different circumstances were analyzed as
case studies, with four main characteristics taken into
consideration. These case studies look into how cloud
and fog resources differ. Simulations were also run to
test various routing algorithms with the goal of
improving performance metrics. As a result, our study
can assist in the development of more sophisticated
health monitoring systems without incurring additional
costs.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ponce:2022:SFA,
author = "Pedro Ponce and Omar Mata and Esteban Perez and Juan
Roberto Lopez and Arturo Molina and Troy McDaniel",
title = "{S4} Features and Artificial Intelligence for
Designing a Robot against {COVID}-19-Robocov",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "22",
day = "06",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010022",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/22",
abstract = "Since the COVID-19 Pandemic began, there have been
several efforts to create new technology to mitigate
the impact of the COVID-19 Pandemic around the world.
One of those efforts is to design a new task force,
robots, to deal with fundamental goals such as public
safety, clinical care, and continuity of work. However,
those characteristics need new products based on
features that create them more innovatively and
creatively. Those products could be designed using the
S4 concept (sensing, smart, sustainable, and social
features) presented as a concept able to create a new
generation of products. This paper presents a low-cost
robot, Robocov, designed as a rapid response against
the COVID-19 Pandemic at Tecnologico de Monterrey,
Mexico, with implementations of artificial intelligence
and the S4 concept for the design. Robocov can achieve
numerous tasks using the S4 concept that provides
flexibility in hardware and software. Thus, Robocov can
impact positivity public safety, clinical care,
continuity of work, quality of life, laboratory and
supply chain automation, and non-hospital care. The
mechanical structure and software development allow
Robocov to complete support tasks effectively so
Robocov can be integrated as a technological tool for
achieving the new normality's required conditions
according to government regulations. Besides, the
reconfiguration of the robot for moving from one task
(robot for disinfecting) to another one (robot for
detecting face masks) is an easy endeavor that only one
operator could do. Robocov is a teleoperated system
that transmits information by cameras and an ultrasonic
sensor to the operator. In addition, pre-recorded paths
can be executed autonomously. In terms of communication
channels, Robocov includes a speaker and microphone.
Moreover, a machine learning algorithm for detecting
face masks and social distance is incorporated using a
pre-trained model for the classification process. One
of the most important contributions of this paper is to
show how a reconfigurable robot can be designed under
the S3 concept and integrate AI methodologies. Besides,
it is important that this paper does not show specific
details about each subsystem in the robot.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhang:2022:SLP,
author = "Weiwei Zhang and Xin Ma and Yuzhao Zhang and Ming Ji
and Chenghui Zhen",
title = "{SMYOLO}: Lightweight Pedestrian Target Detection
Algorithm in Low-Altitude Scenarios",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "21",
day = "04",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010021",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/21",
abstract = "Due to the arbitrariness of the drone's shooting angle
of view and camera movement and the limited computing
power of the drone platform, pedestrian detection in
the drone scene poses a greater challenge. This paper
proposes a new convolutional neural network structure,
SMYOLO, which achieves the balance of accuracy and
speed from three aspects: (1) By combining deep
separable convolution and point convolution and
replacing the activation function, the calculation
amount and parameters of the original network are
reduced; (2) by adding a batch normalization (BN)
layer, SMYOLO accelerates the convergence and improves
the generalization ability; and (3) through scale
matching, reduces the feature loss of the original
network. Compared with the original network model,
SMYOLO reduces the accuracy of the model by only
4.36\%, the model size is reduced by 76.90\%, the
inference speed is increased by 43.29\%, and the
detection target is accelerated by 33.33\%, achieving
minimization of the network model volume while ensuring
the detection accuracy of the model.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Duong:2022:UHC,
author = "Tan Nghia Duong and Nguyen Nam Doan and Truong Giang
Do and Manh Hoang Tran and Duc Minh Nguyen and Quang
Hieu Dang",
title = "Utilizing Half Convolutional Autoencoder to Generate
User and Item Vectors for Initialization in Matrix
Factorization",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "20",
day = "04",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010020",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/20",
abstract = "Recommendation systems based on convolutional neural
network (CNN) have attracted great attention due to
their effectiveness in processing unstructured data
such as images or audio. However, a huge amount of raw
data produced by data crawling and digital
transformation is structured, which makes it difficult
to utilize the advantages of CNN. This paper introduces
a novel autoencoder, named Half Convolutional
Autoencoder, which adopts convolutional layers to
discover the high-order correlation between structured
features in the form of Tag Genome, the side
information associated with each movie in the MovieLens
20 M dataset, in order to generate a robust feature
vector. Subsequently, these new movie representations,
along with the introduction of users' characteristics
generated via Tag Genome and their past transactions,
are applied into well-known matrix factorization models
to resolve the initialization problem and enhance the
predicting results. This method not only outperforms
traditional matrix factorization techniques by at least
5.35\% in terms of accuracy but also stabilizes the
training process and guarantees faster convergence.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kouahla:2022:SBI,
author = "Zineddine Kouahla and Ala-Eddine Benrazek and Mohamed
Amine Ferrag and Brahim Farou and Hamid Seridi and
Muhammet Kurulay and Adeel Anjum and Alia Asheralieva",
title = "A Survey on Big {IoT} Data Indexing: Potential
Solutions, Recent Advancements, and Open Issues",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "19",
day = "31",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010019",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/19",
abstract = "The past decade has been characterized by the growing
volumes of data due to the widespread use of the
Internet of Things (IoT) applications, which introduced
many challenges for efficient data storage and
management. Thus, the efficient indexing and searching
of large data collections is a very topical and urgent
issue. Such solutions can provide users with valuable
information about IoT data. However, efficient
retrieval and management of such information in terms
of index size and search time require optimization of
indexing schemes which is rather difficult to
implement. The purpose of this paper is to examine and
review existing indexing techniques for large-scale
data. A taxonomy of indexing techniques is proposed to
enable researchers to understand and select the
techniques that will serve as a basis for designing a
new indexing scheme. The real-world applications of the
existing indexing techniques in different areas, such
as health, business, scientific experiments, and social
networks, are presented. Open problems and research
challenges, e.g., privacy and large-scale data mining,
are also discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dang:2022:NCS,
author = "Shoujiang Dang and Rui Han",
title = "An In-Network Cooperative Storage Schema Based on
Neighbor Offloading in a Programmable Data Plane",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "18",
day = "30",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010018",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/18",
abstract = "In scientific domains such as high-energy particle
physics and genomics, the quantity of high-speed data
traffic generated may far exceed the storage throughput
and be unable to be in time stored in the current node.
Cooperating and utilizing multiple storage nodes on the
forwarding path provides an opportunity for high-speed
data storage. This paper proposes the use of flow
entries to dynamically split traffic among selected
neighbor nodes to sequentially amortize excess traffic.
We propose a neighbor selection mechanism based on the
Local Name Mapping and Resolution System, in which the
node weights are computed by combing the link bandwidth
and node storage capability, and determining whether to
split traffic by comparing normalized weight values
with thresholds. To dynamically offload traffic among
multiple targets, the cooperative storage strategy
implemented in a programmable data plane is presented
using the relative weights and ID suffix matching.
Evaluation shows that our proposed schema is more
efficient compared with end-to-end transmission and
ECMP in terms of bandwidth usage and transfer time, and
is beneficial in big science.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2022:IRG,
author = "Shuailong Li and Wei Zhang and Yuquan Leng and Xiaohui
Wang",
title = "The Important Role of Global State for Multi-Agent
Reinforcement Learning",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "17",
day = "30",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010017",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/17",
abstract = "Environmental information plays an important role in
deep reinforcement learning (DRL). However, many
algorithms do not pay much attention to environmental
information. In multi-agent reinforcement learning
decision-making, because agents need to make decisions
combined with the information of other agents in the
environment, this makes the environmental information
more important. To prove the importance of
environmental information, we added environmental
information to the algorithm. We evaluated many
algorithms on a challenging set of StarCraft II
micromanagement tasks. Compared with the original
algorithm, the standard deviation (except for the VDN
algorithm) was smaller than that of the original
algorithm, which shows that our algorithm has better
stability. The average score of our algorithm was
higher than that of the original algorithm (except for
VDN and COMA), which shows that our work significantly
outperforms existing multi-agent RL methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jatoth:2022:ICB,
author = "Chandrashekar Jatoth and Rishabh Jain and Ugo Fiore
and Subrahmanyam Chatharasupalli",
title = "Improved Classification of Blockchain Transactions
Using Feature Engineering and Ensemble Learning",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "16",
day = "28",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010016",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/16",
abstract = "Although the blockchain technology is gaining a
widespread adoption across multiple sectors, its most
popular application is in cryptocurrency. The
decentralized and anonymous nature of transactions in a
cryptocurrency blockchain has attracted a multitude of
participants, and now significant amounts of money are
being exchanged by the day. This raises the need of
analyzing the blockchain to discover information
related to the nature of participants in transactions.
This study focuses on the identification for risky and
non-risky blocks in a blockchain. In this paper, the
proposed approach is to use ensemble learning with or
without feature selection using correlation-based
feature selection. Ensemble learning yielded good
results in the experiments, but class-wise analysis
reveals that ensemble learning with feature selection
improves even further. After training Machine Learning
classifiers on the dataset, we observe an improvement
in accuracy of 2-3\% and in F-score of 7-8\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ge:2022:KPL,
author = "Shengguo Ge and Siti Nurulain Mohd Rum",
title = "Key Points' Location in Infrared Images of the Human
Body Based on {Mscf-ResNet}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "15",
day = "27",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010015",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/15",
abstract = "The human body generates infrared radiation through
the thermal movement of molecules. Based on this
phenomenon, infrared images of the human body are often
used for monitoring and tracking. Among them, key point
location on infrared images of the human body is an
important technology in medical infrared image
processing. However, the fuzzy edges, poor detail
resolution, and uneven brightness distribution of the
infrared image of the human body cause great
difficulties in positioning. Therefore, how to improve
the positioning accuracy of key points in human
infrared images has become the main research direction.
In this study, a multi-scale convolution fusion deep
residual network (Mscf-ResNet) model is proposed for
human body infrared image positioning. This model is
based on the traditional ResNet, changing the
single-scale convolution to multi-scale and fusing the
information of different receptive fields, so that the
extracted features are more abundant and the
degradation problem, caused by the excessively deep
network, is avoided. The experiments show that our
proposed method has higher key point positioning
accuracy than other methods. At the same time, because
the network structure of this paper is too deep, there
are too many parameters and a large volume of
calculations. Therefore, a more lightweight network
model is the direction of future research.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Han:2022:CFM,
author = "Junyan Han and Huili Shi and Longfei Chen and Hao Li
and Xiaoyuan Wang",
title = "The Car-Following Model and Its Applications in the
{V2X} Environment: a Historical Review",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "14",
day = "27",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010014",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/14",
abstract = "The application of vehicle-to-everything (V2X)
technology has resulted in the traffic environment
being different from how it was in the past. In the V2X
environment, the information perception ability of the
driver-vehicle unit is greatly enhanced. With V2X
technology, the driver-vehicle unit can obtain a
massive amount of traffic information and is able to
form a connection and interaction relationship between
multiple vehicles and themselves. In the traditional
car-following models, only the dual-vehicle interaction
relationship between the object vehicle and its
preceding vehicle was considered, making these models
unable to be employed to describe the car-following
behavior in the V2X environment. As one of the core
components of traffic flow theory, research on
car-following behavior needs to be further developed.
First, the development process of the traditional
car-following models is briefly reviewed. Second,
previous research on the impacts of V2X technology,
car-following models in the V2X environment, and the
applications of these models, such as the calibration
of the model parameters, the analysis of traffic flow
characteristics, and the methods that are used to
estimate a vehicle's energy consumption and emissions,
are comprehensively reviewed. Finally, the achievements
and shortcomings of these studies along with trends
that require further exploration are discussed. The
results that were determined here can provide a
reference for the further development of traffic flow
theory, personalized advanced driving assistance
systems, and anthropopathic autonomous-driving
vehicles.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Artem:2022:DFI,
author = "Volkov Artem and Kovalenko Vadim and Ibrahim A.
Elgendy and Ammar Muthanna and Andrey Koucheryavy",
title = "{DD-FoG}: Intelligent Distributed Dynamic {FoG}
Computing Framework",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "13",
day = "27",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010013",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/13",
abstract = "Nowadays, 5G networks are emerged and designed to
integrate all the achievements of mobile and fixed
communication networks, in which it can provide
ultra-high data speeds and enable a broad range of new
services with new cloud computing structures such as
fog and edge. In spite of this, the complex nature of
the system, especially with the varying network
conditions, variety of possible mechanisms, hardware,
and protocols, makes communication between these
technologies challenging. To this end, in this paper,
we proposed a new distributed and fog (DD-fog)
framework for software development, in which fog and
mobile edge computing (MEC) technologies and
microservices approach are jointly considered. More
specifically, based on the computational and network
capabilities, this framework provides a microservices
migration between fog structures and elements, in which
user query statistics in each of the fog structures are
considered. In addition, a new modern solution was
proposed for IoT-based application development and
deployment, which provides new time constraint services
like a tactile internet, autonomous vehicles, etc.
Moreover, to maintain quality service delivery
services, two different algorithms have been developed
to pick load points in the search mechanism for
congestion of users and find the fog migration node.
Finally, simulation results proved that the proposed
framework could reduce the execution time of the
microservice function by up to 70\% by deploying the
rational allocation of resources reasonably.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alowish:2022:TLA,
author = "Mazen Alowish and Yoshiaki Shiraishi and Masami Mohri
and Masakatu Morii",
title = "Three Layered Architecture for Driver Behavior
Analysis and Personalized Assistance with Alert Message
Dissemination in {5G} Envisioned Fog-{IoCV}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "12",
day = "27",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010012",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/12",
abstract = "The Internet of connected vehicles (IoCV) has made
people more comfortable and safer while driving
vehicles. This technology has made it possible to
reduce road casualties; however, increased traffic and
uncertainties in environments seem to be limitations to
improving the safety of environments. In this paper,
driver behavior is analyzed to provide personalized
assistance and to alert surrounding vehicles in case of
emergencies. The processes involved in this research
are as follows. (i) Initially, the vehicles in an
environment are clustered to reduce the complexity in
analyzing a large number of vehicles.
Multi-criterion-based hierarchical correlation
clustering (MCB-HCC) is performed to dynamically
cluster vehicles. Vehicular motion is detected by
edge-assisted road side units (E-RSUs) by using an
attention-based residual neural network (AttResNet).
(ii) Driver behavior is analyzed based on the
physiological parameters of drivers, vehicle on-board
parameters, and environmental parameters, and driver
behavior is classified into different classes by
implementing a refined asynchronous advantage actor
critic (RA3C) algorithm for assistance generation.
(iii) If the driver's current state is found to be an
emergency state, an alert message is disseminated to
the surrounding vehicles in that area and to the
neighboring areas based on traffic flow by using jelly
fish search optimization (JSO). If a neighboring area
does not have a fog node, a virtual fog node is
deployed by executing a constraint-based quantum
entropy function to disseminate alert messages at
ultra-low latency. (iv) Personalized assistance is
provided to the driver based on behavior analysis to
assist the driver by using a multi-attribute utility
model, thereby preventing road accidents. The proposed
driver behavior analysis and personalized assistance
model are experimented on with the Network Simulator
3.26 tool, and performance was evaluated in terms of
prediction error, number of alerts, number of risk
maneuvers, accuracy, latency, energy consumption, false
alarm rate, safety score, and alert-message
dissemination efficiency.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Abdulsalam:2022:SPC,
author = "Yunusa Simpa Abdulsalam and Mustapha Hedabou",
title = "Security and Privacy in Cloud Computing: Technical
Review",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "11",
day = "27",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010011",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/11",
abstract = "Advances in the usage of information and communication
technologies (ICT) has given rise to the popularity and
success of cloud computing. Cloud computing offers
advantages and opportunities for business users to
migrate and leverage the scalability of the
pay-as-you-go price model. However, outsourcing
information and business applications to the cloud or a
third party raises security and privacy concerns, which
have become critical in adopting cloud implementation
and services. Researchers and affected organisations
have proposed different security approaches in the
literature to tackle the present security flaws. The
literature also provides an extensive review of
security and privacy issues in cloud computing.
Unfortunately, the works provided in the literature
lack the flexibility in mitigating multiple threats
without conflicting with cloud security objectives. The
literature has further focused on only highlighting
security and privacy issues without providing adequate
technical approaches to mitigate such security and
privacy threats. Conversely, studies that offer
technical solutions to security threats have failed to
explain how such security threats exist. This paper
aims to introduce security and privacy issues that
demand an adaptive solution approach without
conflicting with existing or future cloud security.
This paper reviews different works in the literature,
taking into account its adaptiveness in mitigating
against future reoccurring threats and showing how
cloud security conflicts have invalidated their
proposed models. The article further presents the
security threats surrounding cloud computing from a
user perspective using the STRIDE approach.
Additionally, it provides an analysis of different
inefficient solutions in the literature and offers
recommendations in terms of implementing a secure,
adaptive cloud environment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Malik:2022:RTN,
author = "Faheem Ahmed Malik and Laurent Dala and Krishna
Busawon",
title = "Real-Time Nanoscopic Rider Safety System for Smart and
Green Mobility Based upon Varied Infrastructure
Parameters",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "9",
day = "25",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010009",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/9",
abstract = "To create a safe bicycle infrastructure system, this
article develops an intelligent embedded learning
system using a combination of deep neural networks. The
learning system is used as a case study in the
Northumbria region in England's northeast. It is made
up of three components: (a) input data unit, (b)
knowledge processing unit, and (c) output unit. It is
demonstrated that various infrastructure
characteristics influence bikers' safe interactions,
which is used to estimate the riskiest age and gender
rider groups. Two accurate prediction models are built,
with a male accuracy of 88 per cent and a female
accuracy of 95 per cent. The findings concluded that
different infrastructures pose varying levels of risk
to users of different ages and genders. Certain aspects
of the infrastructure are hazardous to all bikers.
However, the cyclist's characteristics determine the
level of risk that any infrastructure feature presents.
Following validation, the built learning system is
interoperable under various scenarios, including
current heterogeneous and future semi-autonomous and
autonomous transportation systems. The results
contribute towards understanding the risk variation of
various infrastructure types. The study's findings will
help to improve safety and lead to the construction of
a sustainable integrated cycling transportation
system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ranaldi:2022:DCA,
author = "Leonardo Ranaldi and Francesca Fallucchi and Fabio
Massimo Zanzotto",
title = "Dis-Cover {AI} Minds to Preserve Human Knowledge",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "10",
day = "24",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010010",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/10",
abstract = "Modern AI technologies make use of statistical
learners that lead to self-empiricist logic, which,
unlike human minds, use learned non-symbolic
representations. Nevertheless, it seems that it is not
the right way to progress in AI. The structure of
symbols-the operations by which the intellectual
solution is realized-and the search for strategic
reference points evoke important issues in the analysis
of AI. Studying how knowledge can be represented
through methods of theoretical generalization and
empirical observation is only the latest step in a long
process of evolution. For many years, humans, seeing
language as innate, have carried out symbolic theories.
Everything seems to have skipped ahead with the advent
of Machine Learning. In this paper, after a long
analysis of history, the rule-based and the
learning-based vision, we would investigate the syntax
as possible meeting point between the different
learning theories. Finally, we propose a new vision of
knowledge in AI models based on a combination of rules,
learning, and human knowledge.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Volkau:2022:INS,
author = "Ihar Volkau and Abdul Mujeeb and Wenting Dai and
Marius Erdt and Alexei Sourin",
title = "The Impact of a Number of Samples on Unsupervised
Feature Extraction, Based on Deep Learning for
Detection Defects in Printed Circuit Boards",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "8",
day = "23",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010008",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/8",
abstract = "Deep learning provides new ways for defect detection
in automatic optical inspections (AOI). However, the
existing deep learning methods require thousands of
images of defects to be used for training the
algorithms. It limits the usability of these approaches
in manufacturing, due to lack of images of defects
before the actual manufacturing starts. In contrast, we
propose to train a defect detection unsupervised deep
learning model, using a much smaller number of images
without defects. We propose an unsupervised deep
learning model, based on transfer learning, that
extracts typical semantic patterns from defect-free
samples (one-class training). The model is built upon a
pre-trained VGG16 model. It is further trained on
custom datasets with different sizes of possible
defects (printed circuit boards and soldered joints)
using only small number of normal samples. We have
found that the defect detection can be performed very
well on a smooth background; however, in cases where
the defect manifests as a change of texture, the
detection can be less accurate. The proposed study uses
deep learning self-supervised approach to identify if
the sample under analysis contains any deviations (with
types not defined in advance) from normal design. The
method would improve the robustness of the AOI process
to detect defects.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2022:NPO,
author = "Jin Wang and Jun Luo",
title = "No Perfect Outdoors: Towards a Deep Profiling of
{GNSS}-Based Location Contexts",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "7",
day = "23",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010007",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/7",
abstract = "While both outdoor and indoor localization methods are
flourishing, how to properly marry them to offer
pervasive localizability in urban areas remains open.
Recently, proposals on indoor-outdoor detection have
made the first step towards such an integration, yet
complicated urban environments render such a binary
classification incompetent. Fortunately, the latest
developments in Android have granted us access to raw
GNSS measurements, which contain far more information
than commonly derived GPS location indicators. In this
paper, we explore these newly available measurements in
order to better characterize diversified urban
environments. Essentially, we tackle the challenges
introduced by the complex GNSS data and apply a deep
learning model to identify representations for
respective location contexts. We further develop two
preliminary applications of our deep profiling: one, we
offer a more fine-grained semantic classification than
binary indoor-outdoor detection; and two, we derive a
GPS error indicator that is more meaningful than that
provided by Google Maps. These results are all
corroborated by our extensive data collection and
trace-driven evaluations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Trajanovski:2022:ABB,
author = "Tolijan Trajanovski and Ning Zhang",
title = "An Automated Behaviour-Based Clustering of {IoT}
Botnets",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "6",
day = "23",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010006",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/6",
abstract = "The leaked IoT botnet source-codes have facilitated
the proliferation of different IoT botnet variants,
some of which are equipped with new capabilities and
may be difficult to detect. Despite the availability of
solutions for automated analysis of IoT botnet samples,
the identification of new variants is still very
challenging because the analysis results must be
manually interpreted by malware analysts. To overcome
this challenge, we propose an approach for automated
behaviour-based clustering of IoT botnet samples, aimed
to enable automatic identification of IoT botnet
variants equipped with new capabilities. In the
proposed approach, the behaviour of the IoT botnet
samples is captured using a sandbox and represented as
behaviour profiles describing the actions performed by
the samples. The behaviour profiles are vectorised
using TF-IDF and clustered using the DBSCAN algorithm.
The proposed approach was evaluated using a collection
of samples captured from IoT botnets propagating on the
Internet. The evaluation shows that the proposed
approach enables accurate automatic identification of
IoT botnet variants equipped with new capabilities,
which will help security researchers to investigate the
new capabilities, and to apply the investigation
findings for improving the solutions for detecting and
preventing IoT botnet infections.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gloor:2022:YFM,
author = "Peter A. Gloor and Andrea Fronzetti Colladon and Erkin
Altuntas and Cengiz Cetinkaya and Maximilian F. Kaiser
and Lukas Ripperger and Tim Schaefer",
title = "Your Face Mirrors Your Deepest Beliefs-Predicting
Personality and Morals through Facial Emotion
Recognition",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "5",
day = "22",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010005",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/5",
abstract = "Can we really ``read the mind in the eyes''? Moreover,
can AI assist us in this task? This paper answers these
two questions by introducing a machine learning system
that predicts personality characteristics of
individuals on the basis of their face. It does so by
tracking the emotional response of the individual's
face through facial emotion recognition (FER) while
watching a series of 15 short videos of different
genres. To calibrate the system, we invited 85 people
to watch the videos, while their emotional responses
were analyzed through their facial expression. At the
same time, these individuals also took four
well-validated surveys of personality characteristics
and moral values: the revised NEO FFI personality
inventory, the Haidt moral foundations test, the
Schwartz personal value system, and the domain-specific
risk-taking scale (DOSPERT). We found that personality
characteristics and moral values of an individual can
be predicted through their emotional response to the
videos as shown in their face, with an accuracy of up
to 86\% using gradient-boosted trees. We also found
that different personality characteristics are better
predicted by different videos, in other words, there is
no single video that will provide accurate predictions
for all personality characteristics, but it is the
response to the mix of different videos that allows for
accurate prediction.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fedotova:2022:AAS,
author = "Anastasia Fedotova and Aleksandr Romanov and Anna
Kurtukova and Alexander Shelupanov",
title = "Authorship Attribution of Social Media and Literary
{Russian}-Language Texts Using Machine Learning Methods
and Feature Selection",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "4",
day = "22",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010004",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/4",
abstract = "Authorship attribution is one of the important fields
of natural language processing (NLP). Its popularity is
due to the relevance of implementing solutions for
information security, as well as copyright protection,
various linguistic studies, in particular, researches
of social networks. The article is a continuation of
the series of studies aimed at the identification of
the Russian-language text's author and reducing the
required text volume. The focus of the study was aimed
at the attribution of textual data created as a product
of human online activity. The effectiveness of the
models was evaluated on the two Russian-language
datasets: literary texts and short comments from users
of social networks. Classical machine learning (ML)
algorithms, popular neural networks (NN) architectures,
and their hybrids, including convolutional neural
network (CNN), networks with long short-term memory
(LSTM), Bidirectional Encoder Representations from
Transformers (BERT), and fastText, that have not been
used in previous studies, were applied to solve the
problem. A particular experiment was devoted to the
selection of informative features using genetic
algorithms (GA) and evaluation of the classifier
trained on the optimal feature space. Using fastText or
a combination of support vector machine (SVM) with GA
reduced the time costs by half in comparison with deep
NNs with comparable accuracy. The average accuracy for
literary texts was 80.4\% using SVM combined with GA,
82.3\% using deep NNs, and 82.1\% using fastText. For
social media comments, results were 66.3\%, 73.2\%, and
68.1\%, respectively.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Salazar:2022:AML,
author = "Luiz Henrique A. Salazar and Valderi R. Q. Leithardt
and Wemerson Delcio Parreira and Anita M. da Rocha
Fernandes and Jorge Luis Vict{\'o}ria Barbosa and
S{\'e}rgio Duarte Correia",
title = "Application of Machine Learning Techniques to Predict
a {Patient}'s No-Show in the Healthcare Sector",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "3",
day = "22",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010003",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/3",
abstract = "The health sector faces a series of problems generated
by patients who miss their scheduled appointments. The
main challenge to this problem is to understand the
patient's profile and predict potential absences. The
goal of this work is to explore the main causes that
contribute to a patient's no-show and develop a
prediction model able to identify whether the patient
will attend their scheduled appointment or not. The
study was based on data from clinics that serve the
Unified Health System (SUS) at the University of Vale
do Itaja{\'\i} in southern Brazil. The model obtained
was tested on a real collected dataset with about 5000
samples. The best model result was performed by the
Random Forest classifier. It had the best Recall Rate
(0.91) and achieved an ROC curve rate of 0.969. This
research was approved and authorized by the Ethics
Committee of the University of Vale do Itaja{\'\i},
under opinion 4270,234, contemplating the General Data
Protection Law.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rodriguez-Diaz:2022:MLB,
author = "Nuria Rodriguez-Diaz and Decky Aspandi and Federico M.
Sukno and Xavier Binefa",
title = "Machine Learning-Based {Lie} Detector Applied to a
Novel Annotated Game Dataset",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "2",
day = "21",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010002",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/2",
abstract = "Lie detection is considered a concern for everyone in
their day-to-day life, given its impact on human
interactions. Thus, people normally pay attention to
both what their interlocutors are saying and to their
visual appearance, including the face, to find any
signs that indicate whether or not the person is
telling the truth. While automatic lie detection may
help us to understand these lying characteristics,
current systems are still fairly limited, partly due to
lack of adequate datasets to evaluate their performance
in realistic scenarios. In this work, we collect an
annotated dataset of facial images, comprising both 2D
and 3D information of several participants during a
card game that encourages players to lie. Using our
collected dataset, we evaluate several types of machine
learning-based lie detectors in terms of their
generalization, in person-specific and
cross-application experiments. We first extract both
handcrafted and deep learning-based features as
relevant visual inputs, then pass them into multiple
types of classifier to predict respective lie/non-lie
labels. Subsequently, we use several metrics to judge
the models' accuracy based on the models predictions
and ground truth. In our experiment, we show that
models based on deep learning achieve the highest
accuracy, reaching up to 57\% for the generalization
task and 63\% when applied to detect the lie to a
single participant. We further highlight the limitation
of the deep learning-based lie detector when dealing
with cross-application lie detection tasks. Finally,
this analysis along the proposed datasets would
potentially be useful not only from the perspective of
computational systems perspective (e.g., improving
current automatic lie prediction accuracy), but also
for other relevant application fields, such as health
practitioners in general medical counselings, education
in academic settings or finance in the banking sector,
where close inspections and understandings of the
actual intentions of individuals can be very
important.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Przytarski:2022:QPB,
author = "Dennis Przytarski and Christoph Stach and
Cl{\'e}mentine Gritti and Bernhard Mitschang",
title = "Query Processing in Blockchain Systems: Current State
and Future Challenges",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "1",
pages = "1",
day = "21",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14010001",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/1/1",
abstract = "When, in 2008, Satoshi Nakamoto envisioned the first
distributed database management system that relied on
cryptographically secured chain of blocks to store data
in an immutable and tamper-resistant manner, his
primary use case was the introduction of a digital
currency. Owing to this use case, the blockchain system
was geared towards efficient storage of data, whereas
the processing of complex queries, such as provenance
analyses of data history, is out of focus. The
increasing use of Internet of Things technologies and
the resulting digitization in many domains, however,
have led to a plethora of novel use cases for a secure
digital ledger. For instance, in the healthcare sector,
blockchain systems are used for the secure storage and
sharing of electronic health records, while the food
industry applies such systems to enable a reliable
food-chain traceability, e.g., to prove compliance with
cold chains. In these application domains, however,
querying the current state is not
sufficient-comprehensive history queries are required
instead. Due to these altered usage modes involving
more complex query types, it is questionable whether
today's blockchain systems are prepared for this type
of usage and whether such queries can be processed
efficiently by them. In our paper, we therefore
investigate novel use cases for blockchain systems and
elicit their requirements towards a data store in terms
of query capabilities. We reflect the state of the art
in terms of query support in blockchain systems and
assess whether it is capable of meeting the
requirements of such more sophisticated use cases. As a
result, we identify future research challenges with
regard to query processing in blockchain systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kianersi:2022:ERM,
author = "Darius Kianersi and Suraj Uppalapati and Anirudh
Bansal and Jeremy Straub",
title = "Evaluation of a Reputation Management Technique for
Autonomous Vehicles",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "31",
month = feb,
year = "2022",
CODEN = "????",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/31",
abstract = "Future autonomous vehicles will rely heavily on
sharing and communicating information with other
vehicles to maximize their efficiency. These
interactions, which will likely include details about
the positions of surrounding vehicles and obstacles on
the road, are essential to their decision-making and
the prevention of accidents. However, malicious
vehicles-those that intentionally communicate false
information-have the capacity to adversely influence
other vehicles in the network. This paper presents and
evaluates a reputation management system, capable of
identifying malicious actors, to mitigate their effects
on the vehicle network. The viability of multiple
report weighting schemes to calculate reputation is
evaluated through a simulation, and a blockchain-based
backend for the reputation management system to
securely maintain and communicate reputation data is
proposed. Storage and computational challenges are
considered. This paper shows that weighting schemas,
related to the number and reputation of witnesses,
positively affect the accuracy of the model and are
able to identify malicious vehicles in a network with
consistent accuracy and scalability.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tu:2022:TOB,
author = "Youpeng Tu and Haiming Chen and Linjie Yan and Xinyan
Zhou",
title = "Task Offloading Based on {LSTM} Prediction and Deep
Reinforcement Learning for Efficient Edge Computing in
{IoT}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "30",
month = feb,
year = "2022",
CODEN = "????",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Jan 19 05:45:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/30",
abstract = "In IoT (Internet of Things) edge computing, task
offloading can lead to additional transmission delays
and transmission energy consumption. To reduce the cost
of resources required for task offloading and improve
the utilization of server resources, in this paper, we
model the task offloading problem as a joint decision
making problem for cost minimization, which integrates
the processing latency, processing energy consumption,
and the task throw rate of latency-sensitive tasks. The
Online Predictive Offloading (OPO) algorithm based on
Deep Reinforcement Learning (DRL) and Long Short-Term
Memory (LSTM) networks is proposed to solve the above
task offloading decision problem. In the training phase
of the model, this algorithm predicts the load of the
edge server in real-time with the LSTM algorithm, which
effectively improves the convergence accuracy and
convergence speed of the DRL algorithm in the
offloading process. In the testing phase, the LSTM
network is used to predict the characteristics of the
next task, and then the computational resources are
allocated for the task in advance by the DRL decision
model, thus further reducing the response delay of the
task and enhancing the offloading performance of the
system. The experimental evaluation shows that this
algorithm can effectively reduce the average latency by
6.25\%, the offloading cost by 25.6\%, and the task
throw rate by 31.7\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pathmaperuma:2022:CUA,
author = "Madushi H. Pathmaperuma and Yogachandran
Rahulamathavan and Safak Dogan and Ahmet Kondoz",
title = "{CNN} for User Activity Detection Using Encrypted
In-App Mobile Data",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "67",
day = "21",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020067",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/67",
abstract = "In this study, a simple yet effective framework is
proposed to characterize fine-grained in-app user
activities performed on mobile applications using a
convolutional neural network (CNN). The proposed
framework uses a time window-based approach to split
the activity's encrypted traffic flow into segments, so
that in-app activities can be identified just by
observing only a part of the activity-related encrypted
traffic. In this study, matrices were constructed for
each encrypted traffic flow segment. These matrices
acted as input into the CNN model, allowing it to learn
to differentiate previously trained (known) and
previously untrained (unknown) in-app activities as
well as the known in-app activity type. The proposed
method extracts and selects salient features for
encrypted traffic classification. This is the
first-known approach proposing to filter unknown
traffic with an average accuracy of 88\%. Once the
unknown traffic is filtered, the classification
accuracy of our model would be 92\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Krouska:2022:PEA,
author = "Akrivi Krouska and Katerina Kabassi and Christos
Troussas and Cleo Sgouropoulou",
title = "Personalizing Environmental Awareness through
Smartphones Using {AHP} and {PROMETHEE II}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "66",
day = "21",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020066",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/66",
abstract = "Environmental awareness refers to the understanding of
the importance of protecting the natural environment.
Digital technologies can play an important role in
raising awareness of environmental issues. In view of
this compelling need, this paper presents a novel way
to promote environmental awareness with the use of
smartphones. To achieve this, it employs
personalization techniques, and specifically the
Analytic Hierarchy Process (AHP) and PROMETHEE II. In
more detail, the mobile application incorporates a user
model that holds information, such as location (city,
mountain, sea, etc.), age, interests, needs and
indicators of waste management, economy of natural
resources, general environmental protection, and
biodiversity. At the first interaction of the user with
the application, the user model is initialized; then,
the system uses AHP and PROMETHEE II to provide
personalized advice to users in order to help them
raise their environmental awareness. The criteria, used
to evaluate environmental advice, include the current
location, living environment, habits, interests, needs,
age, and seasonal suitability of the user. The novelty
of this paper is the combination of AHP and PROMETHEE
II for personalizing the environmental awareness using
mobile technologies, taking into consideration the user
profile as well as the surrounding area where the user
is at the time that the advice is provided. The
presented application has been evaluated regarding the
system usefulness and environmental awareness. The
findings indicate the high acceptance of this approach
and its positive impact on users' attitude and behavior
with regard to reducing their environmental
footprint.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fraga:2022:FSD,
author = "Martin Fraga and Mat{\'\i}as Micheletto and Andr{\'e}s
Llin{\'a}s and Rodrigo Santos and Paula Zabala",
title = "Flow Scheduling in Data Center Networks with Time and
Energy Constraints: a Software-Defined Network
Approach",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "65",
day = "21",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020065",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/65",
abstract = "Flow scheduling in Data Center Networks (DCN) is a hot
topic as cloud computing and virtualization are
becoming the dominant paradigm in the increasing demand
of digital services. Within the cost of the DCN, the
energy demands associated with the network
infrastructure represent an important portion. When
flows have temporal restrictions, the scheduling with
path selection to reduce the number of active switching
devices is a NP-hard problem as proven in the
literature. In this paper, an heuristic approach to
schedule real-time flows in data-centers is proposed,
optimizing the temporal requirements while reducing the
energy consumption in the network infrastructure via a
proper selection of the paths. The experiments show
good performance of the solutions found in relation to
exact solution approximations based on an integer
linear programming model. The possibility of
programming the network switches allows the dynamic
schedule of paths of flows under the software-defined
network management.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Qian:2022:DTC,
author = "Cheng Qian and Xing Liu and Colin Ripley and Mian Qian
and Fan Liang and Wei Yu",
title = "Digital Twin --- Cyber Replica of Physical Things:
Architecture, Applications and Future Research
Directions",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "64",
day = "21",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020064",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/64",
abstract = "The Internet of Things (IoT) connects massive smart
devices to collect big data and carry out the
monitoring and control of numerous things in
cyber-physical systems (CPS). By leveraging machine
learning (ML) and deep learning (DL) techniques to
analyze the collected data, physical systems can be
monitored and controlled effectively. Along with the
development of IoT and data analysis technologies, a
number of CPS (smart grid, smart transportation, smart
manufacturing, smart cities, etc.) adopt IoT and data
analysis technologies to improve their performance and
operations. Nonetheless, directly manipulating or
updating the real system has inherent risks. Thus,
creating a digital clone of a real physical system,
denoted as a Digital Twin (DT), is a viable strategy.
Generally speaking, a DT is a data-driven software and
hardware emulation platform, which is a cyber replica
of physical systems. Meanwhile, a DT describes a
specific physical system and tends to achieve the
functions and use cases of physical systems. Since DT
is a complex digital system, finding a way to
effectively represent a variety of things in timely and
efficient manner poses numerous challenges to the
networking, computing, and data analytics for IoT.
Furthermore, the design of a DT for IoT systems must
consider numerous exceptional requirements (e.g.,
latency, reliability, safety, scalability, security,
and privacy). To address such challenges, the
thoughtful design of DTs offers opportunities for novel
and interdisciplinary research efforts. To address the
aforementioned problems and issues, in this paper, we
first review the architectures of DTs, data
representation, and communication protocols. We then
review existing efforts on applying DT into IoT
data-driven smart systems, including the smart grid,
smart transportation, smart manufacturing, and smart
cities. Further, we summarize the existing challenges
from CPS, data science, optimization, and security and
privacy perspectives. Finally, we outline possible
future research directions from the perspectives of
performance, new DT-driven services, model and
learning, and security and privacy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Almeida:2022:EBC,
author = "Fernando Almeida and Jorge Sim{\~o}es and S{\'e}rgio
Lopes",
title = "Exploring the Benefits of Combining {DevOps} and
{Agile}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "63",
day = "19",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020063",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/63",
abstract = "The combined adoption of Agile and DevOps enables
organizations to cope with the increasing complexity of
managing customer requirements and requests. It fosters
the emergence of a more collaborative and Agile
framework to replace the waterfall models applied to
software development flow and the separation of
development teams from operations. This study aims to
explore the benefits of the combined adoption of both
models. A qualitative methodology is adopted by
including twelve case studies from international
software engineering companies. Thematic analysis is
employed in identifying the benefits of the combined
adoption of both paradigms. The findings reveal the
existence of twelve benefits, highlighting the
automation of processes, improved communication between
teams, and reduction in time to market through process
integration and shorter software delivery cycles.
Although they address different goals and challenges,
the Agile and DevOps paradigms when properly combined
and aligned can offer relevant benefits to
organizations. The novelty of this study lies in the
systematization of the benefits of the combined
adoption of Agile and DevOps considering multiple
perspectives of the software engineering business
environment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zubani:2022:PCD,
author = "Matteo Zubani and Luca Sigalini and Ivan Serina and
Luca Putelli and Alfonso E. Gerevini and Mattia
Chiari",
title = "A Performance Comparison of Different Cloud-Based
Natural Language Understanding Services for an
{Italian} e-Learning Platform",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "62",
day = "18",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020062",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/62",
abstract = "During the COVID-19 pandemic, the corporate online
training sector has increased exponentially and online
course providers had to implement innovative solutions
to be more efficient and provide a satisfactory
service. This paper considers a real case study in
implementing a chatbot, which answers frequently asked
questions from learners on an Italian e-learning
platform that provides workplace safety courses to
several business customers. Having to respond quickly
to the increase in the courses activated, the company
decided to develop a chatbot using a cloud-based
service currently available on the market. These
services are based on Natural Language Understanding
(NLU) engines, which deal with identifying information
such as entities and intentions from the sentences
provided as input. To integrate a chatbot in an
e-learning platform, we studied the performance of the
intent recognition task of the major NLU platforms
available on the market with an in-depth comparison,
using an Italian dataset provided by the owner of the
e-learning platform. We focused on intent recognition,
carried out several experiments and evaluated
performance in terms of F-score, error rate, response
time, and robustness of all the services selected. The
chatbot is currently in production, therefore we
present a description of the system implemented and its
results on the original users' requests.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Marabissi:2022:INA,
author = "Dania Marabissi and Lorenzo Mucchi and Andrea
Stomaci",
title = "{IoT} Nodes Authentication and {ID} Spoofing Detection
Based on Joint Use of Physical Layer Security and
Machine Learning",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "61",
day = "17",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020061",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/61",
abstract = "The wide variety of services and applications that
shall be supported by future wireless systems will lead
to a high amount of sensitive data exchanged via radio,
thus introducing a significant challenge for security.
Moreover, in new networking paradigms, such as the
Internet of Things, traditional methods of security may
be difficult to implement due to the radical change of
requirements and constraints. In such contexts,
physical layer security is a promising additional means
to realize communication security with low complexity.
In particular, this paper focuses on node
authentication and spoofing detection in an actual
wireless sensor network (WSN), where multiple nodes
communicate with a sink node. Nodes are in fixed
positions, but the communication channels varies due to
the scatterers' movement. In the proposed security
framework, the sink node is able to perform a
continuous authentication of nodes during communication
based on wireless fingerprinting. In particular, a
machine learning approach is used for authorized nodes
classification by means of the identification of
specific attributes of their wireless channel. Then
classification results are compared with the node ID in
order to detect if the message has been generated by a
node other than its claimed source. Finally, in order
to increase the spoofing detection performance in small
networks, the use of low-complexity sentinel nodes is
proposed here. Results show the good performance of the
proposed method that is suitable for actual
implementation in a WSN.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hu:2022:SVD,
author = "Zhixi Hu and Yi Zhu and Xiaoying Chen and Yu Zhao",
title = "Safety Verification of Driving Resource Occupancy
Rules Based on Functional Language",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "60",
day = "17",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020060",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/60",
abstract = "Autonomous driving is a safety-critical system, and
the occupancy of its environmental resources affects
the safety of autonomous driving. In view of the lack
of safety verification of environmental resource
occupation rules in autonomous driving, this paper
proposes a verification method of automatic driving
model based on functional language through CSP M.
Firstly, the modeling and verification framework of an
autopilot model based on CSP M is given. Secondly, the
process algebra definition of CSP M is given. Thirdly,
the typical single loop environment model in automatic
driving is abstracted, and the mapping method from
automatic driving model to CSP is described in detail
for the automatic driving environment and the typical
collision, overtaking, lane change and other scenes
involved. Finally, the autopilot model of the single
loop is mapped to CSP M, and the application effect of
this method is discussed by using FDR tool. Experiments
show that this method can verify the safety of
autonomous driving resources, thereby improving the
reliability of the autonomous driving model.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Adoga:2022:NFV,
author = "Haruna Umar Adoga and Dimitrios P. Pezaros",
title = "Network Function Virtualization and Service Function
Chaining Frameworks: a Comprehensive Review of
Requirements, Objectives, Implementations, and Open
Research Challenges",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "59",
day = "15",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020059",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/59",
abstract = "Network slicing has become a fundamental property for
next-generation networks, especially because an
inherent part of 5G standardisation is the ability for
service providers to migrate some or all of their
network services to a virtual network infrastructure,
thereby reducing both capital and operational costs.
With network function virtualisation (NFV), network
functions (NFs) such as firewalls, traffic load
balancers, content filters, and intrusion detection
systems (IDS) are either instantiated on virtual
machines (VMs) or lightweight containers, often chained
together to create a service function chain (SFC). In
this work, we review the state-of-the-art NFV and SFC
implementation frameworks and present a taxonomy of the
current proposals. Our taxonomy comprises three major
categories based on the primary objectives of each of
the surveyed frameworks: (1) resource allocation and
service orchestration, (2) performance tuning, and (3)
resilience and fault recovery. We also identify some
key open research challenges that require further
exploration by the research community to achieve
scalable, resilient, and high-performance NFV/SFC
deployments in next-generation networks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mahapatra:2022:FBP,
author = "Tanmaya Mahapatra and Syeeda Nilofer Banoo",
title = "Flow-Based Programming for Machine Learning",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "58",
day = "15",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020058",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/58",
abstract = "Machine Learning (ML) has gained prominence and has
tremendous applications in fields like medicine,
biology, geography and astrophysics, to name a few.
Arguably, in such areas, it is used by domain experts,
who are not necessarily skilled-programmers. Thus, it
presents a steep learning curve for such domain experts
in programming ML applications. To overcome this and
foster widespread adoption of ML techniques, we propose
to equip them with domain-specific graphical tools.
Such tools, based on the principles of flow-based
programming paradigm, would support the graphical
composition of ML applications at a higher level of
abstraction and auto-generation of target code.
Accordingly, (i) we have modelled ML algorithms as
composable components; (ii) described an approach to
parse a flow created by connecting several such
composable components and use an API-based code
generation technique to generate the ML application. To
demonstrate the feasibility of our conceptual approach,
we have modelled the APIs of Apache Spark ML as
composable components and validated it in three
use-cases. The use-cases are designed to capture the
ease of program specification at a higher abstraction
level, easy parametrisation of ML APIs, auto-generation
of the ML application and auto-validation of the
generated model for better prediction accuracy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{DOrtona:2022:OSM,
author = "Cristian D'Ortona and Daniele Tarchi and Carla
Raffaelli",
title = "Open-Source {MQTT}-Based End-to-End {IoT} System for
Smart City Scenarios",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "57",
day = "15",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020057",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/57",
abstract = "Many innovative services are emerging based on the
Internet of Things (IoT) technology, aiming at
fostering better sustainability of our cities. New
solutions integrating Information and Communications
Technologies (ICTs) with sustainable transport media
are encouraged by several public administrations in the
so-called Smart City scenario, where heterogeneous
users in city roads call for safer mobility. Among
several possible applications, recently, there has been
a lot of attention on the so-called Vulnerable Road
Users (VRUs), such as pedestrians or bikers. They can
be equipped with wearable sensors that are able to
communicate their data through a chain of devices
towards the cloud for agile and effective control of
their mobility. This work describes a complete
end-to-end IoT system implemented through the
integration of different complementary technologies,
whose main purpose is to monitor the information
related to road users generated by wearable sensors.
The system has been implemented using an ESP32
micro-controller connected to the sensors and
communicating through a Bluetooth Low Energy (BLE)
interface with an Android device, which is assumed to
always be carried by any road user. Based on this, we
use it as a gateway node, acting as a real-time
asynchronous publisher of a Message Queue Telemetry
Transport (MQTT) protocol chain. The MQTT broker is
configured on a Raspberry PI device and collects sensor
data to be sent to a web-based control panel that
performs data monitoring and processing. All the
architecture modules have been implemented through
open-source technologies. The analysis of the BLE
packet exchange has been carried out by resorting to
the Wireshark packet analyzer. In addition, a
feasibility analysis has been carried out by showing
the capability of the proposed solution to show the
values gathered through the sensors on a remote
dashboard. The developed system is publicly available
to allow the possible integration of other modules for
additional Smart City services or extension to further
ICT applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rajendran:2022:IES,
author = "Venushini Rajendran and R Kanesaraj Ramasamy and
Wan-Noorshahida Mohd-Isa",
title = "Improved Eagle Strategy Algorithm for Dynamic {Web}
Service Composition in the {IoT}: a Conceptual
Approach",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "56",
day = "15",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020056",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/56",
abstract = "The Internet of Things (IoT) is now expanding and
becoming more popular in most industries, which leads
to vast growth in cloud computing. The architecture of
IoT is integrated with cloud computing through web
services. Recently, Dynamic Web Service Composition
(DWSC) has been implemented to fulfill the IoT and
business processes. In recent years, the number of
cloud services has multiplied, resulting in cloud
services providing similar services with similar
functionality but varying in Quality of Services (QoS),
for instance, on the response time of web services;
however, existing methods are insufficient in solving
large-scale repository issues. Bio-inspired algorithm
methods have shown better performance in solving the
large-scale service composition problems, unlike
deterministic algorithms, which are restricted. Thus,
an improved eagle strategy algorithm method is proposed
to increase the performance that directly indicates an
improvement in computation time in large-scale DWSC in
a cloud-based platform and on both functional and
non-functional attributes of services. By proposing the
improved bio-inspired method, the computation time can
be improved, especially in a large-scale repository of
IoT.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Muthavhine:2022:SID,
author = "Khumbelo Muthavhine and Mbuyu Sumbwanyambe",
title = "Securing {IoT} Devices against Differential-Linear
{(DL)} Attack Used on {Serpent} Algorithm",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "55",
day = "13",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020055",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/55",
abstract = "Cryptographic algorithms installed on Internet of
Things (IoT) devices suffer many attacks. Some of these
attacks include the differential linear attack (DL).
The DL attack depends on the computation of the
probability of differential-linear characteristics,
which yields a Differential-Linear Connectivity Table (
DLCT ). The DLCT is a probability table that provides
an attacker many possibilities of guessing the
cryptographic keys of any algorithm such as Serpent. In
essence, the attacker firstly constructs a DLCT by
using building blocks such as Substitution Boxes
(S-Boxes) found in many algorithms' architectures. In
depth, this study focuses on securing IoT devices
against DL attacks used on Serpent algorithms by using
three magic numbers mapped on a newly developed
mathematical function called Blocker, which will be
added on Serpent's infrastructure before being
installed in IoT devices. The new S-Boxes with 32-bit
output were generated to replace the original Serpent's
S-Boxes with 4-bit output. The new S-Boxes were also
inserted in Serpent's architecture. This novel approach
of using magic numbers and the Blocker Function worked
successfully in this study. The results demonstrated an
algorithm for which its S-Box is composed of a
4-bit-output that is more vulnerable to being attacked
than an algorithm in which its S-Box comprises 32-bit
outputs. The novel approach of using a Blocker,
developed by three magic numbers and 32-bits output
S-Boxes, successfully blocked the construction of DLCT
and DL attacks. This approach managed to secure the
Serpent algorithm installed on IoT devices against DL
attacks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chen:2022:AVR,
author = "Ning Chen and Yu Chen",
title = "Anomalous Vehicle Recognition in Smart Urban Traffic
Monitoring as an Edge Service",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "54",
day = "10",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020054",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/54",
abstract = "The past decades witnessed an unprecedented
urbanization and the proliferation of modern
information and communication technologies (ICT), which
makes the concept of Smart City feasible. Among various
intelligent components, smart urban transportation
monitoring is an essential part of smoothly operational
smart cities. Although there is fast development of
Smart Cities and the growth of Internet of Things
(IoT), real-time anomalous behavior detection in
Intelligent Transportation Systems (ITS) is still
challenging. Because of multiple advanced features
including flexibility, safety, and ease of
manipulation, quadcopter drones have been widely
adopted in many areas, from service improvement to
urban surveillance, and data collection for scientific
research. In this paper, a Smart Urban traffic
Monitoring (SurMon) scheme is proposed employing drones
following an edge computing paradigm. A dynamic video
stream processing scheme is proposed to meet the
requirements of real-time information processing and
decision-making at the edge. Specifically, we propose
to identify anomalous vehicle behaviors in real time by
creatively applying the multidimensional Singular
Spectrum Analysis (mSSA) technique in space to detect
the different vehicle behaviors on roads. Multiple
features of vehicle behaviors are fed into channels of
the mSSA procedure. Instead of trying to create and
define a database of normal activity patterns of
vehicles on the road, the anomaly detection is
reformatted as an outlier identifying problem. Then, a
cascaded Capsules Network is designed to predict
whether the behavior is a violation. An extensive
experimental study has been conducted and the results
have validated the feasibility and effectiveness of the
SurMon scheme.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Office:2022:ARF,
author = "Future Internet Editorial Office",
title = "Acknowledgment to Reviewers of {{\booktitle{Future
Internet}}} in 2021",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "53",
day = "10",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020053",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/53",
abstract = "The past decades witnessed an unprecedented
urbanization and the proliferation of modern
information and communication technologies (ICT), which
makes the concept of Smart City feasible. Among various
intelligent components, smart urban transportation
monitoring is an essential part of smoothly operational
smart cities. Although there is fast development of
Smart Cities and the growth of Internet of Things
(IoT), real-time anomalous behavior detection in
Intelligent Transportation Systems (ITS) is still
challenging. Because of multiple advanced features
including flexibility, safety, and ease of
manipulation, quadcopter drones have been widely
adopted in many areas, from service improvement to
urban surveillance, and data collection for scientific
research. In this paper, a Smart Urban traffic
Monitoring (SurMon) scheme is proposed employing drones
following an edge computing paradigm. A dynamic video
stream processing scheme is proposed to meet the
requirements of real-time information processing and
decision-making at the edge. Specifically, we propose
to identify anomalous vehicle behaviors in real time by
creatively applying the multidimensional Singular
Spectrum Analysis (mSSA) technique in space to detect
the different vehicle behaviors on roads. Multiple
features of vehicle behaviors are fed into channels of
the mSSA procedure. Instead of trying to create and
define a database of normal activity patterns of
vehicles on the road, the anomaly detection is
reformatted as an outlier identifying problem. Then, a
cascaded Capsules Network is designed to predict
whether the behavior is a violation. An extensive
experimental study has been conducted and the results
have validated the feasibility and effectiveness of the
SurMon scheme.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Marir:2022:SBF,
author = "Souad Marir and Faiza Belala and Nabil Hameurlain",
title = "A Strategy-Based Formal Approach for Fog Systems
Analysis",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "52",
day = "09",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020052",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/52",
abstract = "Fog systems are a new emergent technology having a
wide range of architectures and pronounced needs making
their design complex. Consequently, the design of fog
systems is crucial, including service portability and
interoperability between the various elements of a
system being the most essential aspects of fog
computing. This article presents a fog system
cross-layer architecture as a first step of such a
design to provide a graphical and conceptual
description. Then, a BiAgents* (Bigraphical Agents)
formal model is defined to provide a rigorous
description of physical, virtual, and behavioural
aspects of Fog systems. Besides, this formalisation is
implemented and executed under a Maude strategy system.
The proposed approach is illustrated through a case
study: an airport terminal Luggage Inspection System
(LIS) while checking the correctness of its relevant
properties: the portability of data and their
interoperability. The integration of the Maude
strategies in the rewriting of Fog system states made
it possible to guide the execution of the model and its
analysis.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mourao:2022:ILS,
author = "Helmer Augusto de Souza Mour{\~a}o and Hor{\'a}cio
Antonio Braga Fernandes de Oliveira",
title = "Indoor Localization System Using Fingerprinting and
Novelty Detection for Evaluation of Confidence",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "51",
day = "07",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020051",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/51",
abstract = "Indoor localization systems are used to locate mobile
devices inside buildings where traditional solutions,
such as the Global Navigation Satellite Systems (GNSS),
do not work well due to the lack of direct visibility
to the satellites. Fingerprinting is one of the most
known solutions for indoor localization. It is based on
the Received Signal Strength (RSS) of packets
transmitted among mobile devices and anchor nodes.
However, RSS values are known to be unstable and noisy
due to obstacles and the dynamicity of the scenarios,
causing inaccuracies in the position estimations. This
instability and noise often cause the system to
indicate a location that it is not quite sure is
correct, although it is the most likely based on the
calculations. This property of RSS can cause algorithms
to return a localization with a low confidence level.
If we could choose more reliable results, we would have
an overall result with better quality. Thus, in our
solution, we created a checking phase of the confidence
level of the localization result. For this, we use the
prediction probability provided by KNN and the novelty
detection to discard classifications that are not very
reliable and often wrong. In this work, we propose
LocFiND (Localization using Fingerprinting and Novelty
Detection), a fingerprint-based solution that uses
prediction probability and novelty detection to
evaluate the confidence of the estimated positions and
mitigate inaccuracies caused by RSS in the localization
phase. We implemented our solution in a real-world,
large-scale school area using Bluetooth-based devices.
Our performance evaluation shows considerable
improvement in the localization accuracy and stability
while discarding only a few, low confidence
estimations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhang:2022:JCN,
author = "Yaojie Zhang and Huahu Xu and Junsheng Xiao and Minjie
Bian",
title = "{JoSDW}: Combating Noisy Labels by Dynamic Weight",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "50",
day = "02",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020050",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/50",
abstract = "The real world is full of noisy labels that lead
neural networks to perform poorly because deep neural
networks (DNNs) are prone to overfitting label noise.
Noise label training is a challenging problem relating
to weakly supervised learning. The most advanced
existing methods mainly adopt a small loss sample
selection strategy, such as selecting the small loss
part of the sample for network model training. However,
the previous literature stopped here, neglecting the
performance of the small loss sample selection strategy
while training the DNNs, as well as the performance of
different stages, and the performance of the
collaborative learning of the two networks from
disagreement to an agreement, and making a second
classification based on this. We train the network
using a comparative learning method. Specifically, a
small loss sample selection strategy with dynamic
weight is designed. This strategy increases the
proportion of agreement based on network predictions,
gradually reduces the weight of the complex sample, and
increases the weight of the pure sample at the same
time. A large number of experiments verify the
superiority of our method.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ang:2022:TCI,
author = "Kenneth Li Minn Ang and Jasmine Kah Phooi Seng and
Ericmoore Ngharamike",
title = "Towards Crowdsourcing {Internet of Things}
({Crowd-IoT}): Architectures, Security and
Applications",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "49",
day = "31",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020049",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/49",
abstract = "Crowdsourcing can play an important role in the
Internet of Things (IoT) applications for information
sensing and gathering where the participants are
equipped with geolocated devices. Mobile crowdsourcing
can be seen as a new paradigm contributing to the
development of the IoT. They can be merged to form a
new and essential platform in crowdsourcing IoT
paradigm for data collection from different sources and
communication mediums. This paper presents a
comprehensive survey for this new Crowdsourcing IoT
paradigm from four different perspectives: (1)
Architectures for Crowd-IoT; (2) Trustworthy, Privacy
and Security for Crowd-IoT; (3) Resources, Sharing,
Storage and Energy Considerations for Crowd-IoT; and
(4) Applications for Crowd-IoT. This survey paper aims
to increase awareness and encourage continuing
developments and innovations from the research
community and industry towards the Crowdsourcing IoT
paradigm.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Herouala:2022:CTB,
author = "Abdelkader Tayeb Herouala and Chaker Abdelaziz
Kerrache and Benameur Ziani and Carlos T. Calafate and
Nasreddine Lagraa and Abdou el Karim Tahari",
title = "Controlling the Trade-Off between Resource Efficiency
and User Satisfaction in {NDNs} Based on Na{\"\i}ve
{Bayes} Data Classification and {Lagrange} Method",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "48",
day = "31",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020048",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/48",
abstract = "This paper addresses the fundamental problem of the
trade-off between resource efficiency and user
satisfaction in the limited environments of Named Data
Networks (NDNs). The proposed strategy is named RADC
(Resource Allocation based Data Classification), which
aims at managing such trade-off by controlling the
system's fairness index. To this end, a machine
learning technique based on Multinomial Na{\"\i}ve
Bayes is used to classify the received contents. Then,
an adaptive resource allocation strategy based on the
Lagrange utility function is proposed. To cache the
received content, an adequate content placement and a
replacement mechanism are enforced. Simulation at the
system level shows that this strategy could be a
powerful tool for administrators to manage the
trade-off between efficiency and user satisfaction.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Xiong:2022:RPB,
author = "Huanliang Xiong and Muxi Chen and Canghai Wu and
Yingding Zhao and Wenlong Yi",
title = "Research on Progress of Blockchain Consensus
Algorithm: a Review on Recent Progress of Blockchain
Consensus Algorithms",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "47",
day = "30",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020047",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/47",
abstract = "Blockchain technology can solve the problem of trust
in the open network in a decentralized way. It has
broad application prospects and has attracted extensive
attention from academia and industry. The blockchain
consensus algorithm ensures that the nodes in the chain
reach consensus in the complex network environment, and
the node status ultimately remains the same. The
consensus algorithm is one of the core technologies of
blockchain and plays a pivotal role in the research of
blockchain technology. This article gives the basic
concepts of the blockchain, summarizes the key
technologies of the blockchain, especially focuses on
the research of the blockchain consensus algorithm,
expounds the general principles of the consensus
process, and classifies the mainstream consensus
algorithms. Then, focusing on the improvement of
consensus algorithm performance, it reviews the
research progress of consensus algorithms in detail,
analyzes and compares the characteristics, suitable
scenarios, and possible shortcomings of different
consensus algorithms, and based on this, studies the
future development trend of consensus algorithms for
reference.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Qiu:2022:FCD,
author = "Haoxuan Qiu and Yanhui Du and Tianliang Lu",
title = "The Framework of Cross-Domain and Model Adversarial
Attack against Deepfake",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "46",
day = "29",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020046",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/46",
abstract = "To protect images from the tampering of deepfake,
adversarial examples can be made to replace the
original images by distorting the output of the
deepfake model and disrupting its work. Current studies
lack generalizability in that they simply focus on the
adversarial examples generated by a model in a domain.
To improve the generalization of adversarial examples
and produce better attack effects on each domain of
multiple deepfake models, this paper proposes a
framework of Cross-Domain and Model Adversarial Attack
(CDMAA). Firstly, CDMAA uniformly weights the loss
function of each domain and calculates the cross-domain
gradient. Then, inspired by the multiple gradient
descent algorithm (MGDA), CDMAA integrates the
cross-domain gradients of each model to obtain the
cross-domain perturbation vector, which is used to
optimize the adversarial example. Finally, we propose a
penalty-based gradient regularization method to
pre-process the cross-domain gradients to improve the
success rate of attacks. CDMAA experiments on four
mainstream deepfake models showed that the adversarial
examples generated from CDMAA have the generalizability
of attacking multiple models and multiple domains
simultaneously. Ablation experiments were conducted to
compare the CDMAA components with the methods used in
existing studies and verify the superiority of CDMAA.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kakkavas:2022:TIL,
author = "Grigorios Kakkavas and Vasileios Karyotis and Symeon
Papavassiliou",
title = "Topology Inference and Link Parameter Estimation Based
on End-to-End Measurements",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "45",
day = "28",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020045",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/45",
abstract = "This paper focuses on the design, implementation,
experimental validation, and evaluation of a network
tomography approach for performing inferential
monitoring based on indirect measurements. In
particular, we address the problems of inferring the
routing tree topology (both logical and physical) and
estimating the links' loss rate and jitter based on
multicast end-to-end measurements from a source node to
a set of destination nodes using an agglomerative
clustering algorithm. The experimentally-driven
evaluation of the proposed algorithm, particularly the
impact of the employed reduction update scheme, takes
place in real topologies constructed in an open
large-scale testbed. Finally, we implement and present
a motivating practical application of the proposed
algorithm that combines monitoring with change point
analysis to realize performance anomaly detection.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Aouedi:2022:ITM,
author = "Ons Aouedi and Kandaraj Piamrat and Beno{\^\i}t
Parrein",
title = "Intelligent Traffic Management in Next-Generation
Networks",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "44",
day = "28",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020044",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/44",
abstract = "The recent development of smart devices has lead to an
explosion in data generation and heterogeneity. Hence,
current networks should evolve to become more
intelligent, efficient, and most importantly, scalable
in order to deal with the evolution of network traffic.
In recent years, network softwarization has drawn
significant attention from both industry and academia,
as it is essential for the flexible control of
networks. At the same time, machine learning (ML) and
especially deep learning (DL) methods have also been
deployed to solve complex problems without explicit
programming. These methods can model and learn network
traffic behavior using training data/environments. The
research community has advocated the application of
ML/DL in softwarized environments for network traffic
management, including traffic classification,
prediction, and anomaly detection. In this paper, we
survey the state of the art on these topics. We start
by presenting a comprehensive background beginning from
conventional ML algorithms and DL and follow this with
a focus on different dimensionality reduction
techniques. Afterward, we present the study of ML/DL
applications in softwarized environments. Finally, we
highlight the issues and challenges that should be
considered.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cai:2022:GDA,
author = "Liewu Cai and Lei Zhu and Hongyan Zhang and Xinghui
Zhu",
title = "{DA-GAN}: Dual Attention Generative Adversarial
Network for Cross-Modal Retrieval",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "43",
day = "27",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020043",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/43",
abstract = "Cross-modal retrieval aims to search samples of one
modality via queries of other modalities, which is a
hot issue in the community of multimedia. However, two
main challenges, i.e., heterogeneity gap and semantic
interaction across different modalities, have not been
solved efficaciously. Reducing the heterogeneous gap
can improve the cross-modal similarity measurement.
Meanwhile, modeling cross-modal semantic interaction
can capture the semantic correlations more accurately.
To this end, this paper presents a novel end-to-end
framework, called Dual Attention Generative Adversarial
Network (DA-GAN). This technique is an adversarial
semantic representation model with a dual attention
mechanism, i.e., intra-modal attention and inter-modal
attention. Intra-modal attention is used to focus on
the important semantic feature within a modality, while
inter-modal attention is to explore the semantic
interaction between different modalities and then
represent the high-level semantic correlation more
precisely. A dual adversarial learning strategy is
designed to generate modality-invariant
representations, which can reduce the cross-modal
heterogeneity efficiently. The experiments on three
commonly used benchmarks show the better performance of
DA-GAN than these competitors.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Munjal:2022:MAD,
author = "Rashmi Munjal and William Liu and Xuejun Li and Jairo
Gutierrez and Peter Han Joo Chong",
title = "Multi-Attribute Decision Making for Energy-Efficient
Public Transport Network Selection in Smart Cities",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "42",
day = "26",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020042",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/42",
abstract = "Smart cities use many smart devices to facilitate the
well-being of society by different means. However,
these smart devices create great challenges, such as
energy consumption and carbon emissions. The proposed
research lies in communication technologies to deal
with big data-driven applications. Aiming at multiple
sources of big data in a smart city, we propose a
public transport-assisted data-dissemination system to
utilize public transport as another communication
medium, along with other networks, with the help of
software-defined technology. Our main objective is to
minimize energy consumption with the maximum delivery
of data. A multi-attribute decision-making strategy is
adopted for the selection of the best network among
wired, wireless, and public transport networks, based
upon users' requirements and different services. Once
public transport is selected as the best network, the
Capacitated Vehicle Routing Problem (CVRP) will be
implemented to offload data onto buses as per the
maximum capacity of buses. For validation, the case of
Auckland Transport is used to offload data onto buses
for energy-efficient delay-tolerant data transmission.
Experimental results show that buses can be utilized
efficiently to deliver data as per their demands and
consume 33\% less energy in comparison to other
networks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Shi:2022:HRL,
author = "Jialin Shi and Chenyi Guo and Ji Wu",
title = "A Hybrid Robust-Learning Architecture for Medical
Image Segmentation with Noisy Labels",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "41",
day = "26",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020041",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/41",
abstract = "Deep-learning models require large amounts of
accurately labeled data. However, for medical image
segmentation, high-quality labels rely on expert
experience, and less-experienced operators provide
noisy labels. How one might mitigate the negative
effects caused by noisy labels for 3D medical image
segmentation has not been fully investigated. In this
paper, our purpose is to propose a novel hybrid
robust-learning architecture to combat noisy labels for
3D medical image segmentation. Our method consists of
three components. First, we focus on the noisy
annotations of slices and propose a slice-level
label-quality awareness method, which automatically
generates label-quality scores for slices in a set.
Second, we propose a shape-awareness regularization
loss based on distance transform maps to introduce
prior shape information and provide extra performance
gains. Third, based on a re-weighting strategy, we
propose an end-to-end hybrid robust-learning
architecture to weaken the negative effects caused by
noisy labels. Extensive experiments are performed on
two representative datasets (i.e., liver segmentation
and multi-organ segmentation). Our hybrid noise-robust
architecture has shown competitive performance,
compared to other methods. Ablation studies also
demonstrate the effectiveness of slice-level
label-quality awareness and a shape-awareness
regularization loss for combating noisy labels.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yang:2022:IBC,
author = "Cunwei Yang and Weiqing Wang and Fengying Li and
Degang Yang",
title = "An {IoT}-Based {COVID-19} Prevention and Control
System for Enclosed Spaces",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "40",
day = "26",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020040",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/40",
abstract = "To date, the protracted pandemic caused by the severe
acute respiratory syndrome coronavirus 2 (SARS-CoV-2)
has had widespread ramifications for the economy,
politics, public health, etc. Based on the current
situation, definitively stopping the spread of the
virus is infeasible in many countries. This does not
mean that populations should ignore the pandemic;
instead, normal life needs to be balanced with disease
prevention and control. This paper highlights the use
of Internet of Things (IoT) for the prevention and
control of coronavirus disease (COVID-19) in enclosed
spaces. The proposed booking algorithm is able to
control the gathering of crowds in specific regions.
K-nearest neighbors (KNN) is utilized for the
implementation of a navigation system with a congestion
control strategy and global path planning capabilities.
Furthermore, a risk assessment model is designed based
on a ``Sliding Window-Timer'' algorithm, providing an
infection risk assessment for individuals in potential
contact with patients.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wu:2022:CFE,
author = "Meng Wu and Tingting Jiang and Chenyang Bu and Bin
Zhu",
title = "Coarse-to-Fine Entity Alignment for {Chinese}
Heterogeneous Encyclopedia Knowledge Base",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "39",
day = "25",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020039",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/39",
abstract = "Entity alignment (EA) aims to automatically determine
whether an entity pair in different knowledge bases or
knowledge graphs refer to the same entity in reality.
Inspired by human cognitive mechanisms, we propose a
coarse-to-fine entity alignment model (called CFEA)
consisting of three stages: coarse-grained,
middle-grained, and fine-grained. In the coarse-grained
stage, a pruning strategy based on the restriction of
entity types is adopted to reduce the number of
candidate matching entities. The goal of this stage is
to filter out pairs of entities that are clearly not
the same entity. In the middle-grained stage, we
calculate the similarity of entity pairs through some
key attribute values and matched attribute values, the
goal of which is to identify the entity pairs that are
obviously not the same entity or are obviously the same
entity. After this step, the number of candidate entity
pairs is further reduced. In the fine-grained stage,
contextual information, such as abstract and
description text, is considered, and topic modeling is
carried out to achieve more accurate matching. The
basic idea of this stage is to use more information to
help judge entity pairs that are difficult to
distinguish using basic information from the first two
stages. The experimental results on real-world datasets
verify the effectiveness of our model compared with
baselines.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Duan:2022:SRM,
author = "Yingjie Duan and Hong Ni and Xiaoyong Zhu and Xu
Wang",
title = "A Single-Rate Multicast Congestion Control {(SRMCC)}
Mechanism in Information-Centric Networking",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "2",
pages = "38",
day = "25",
month = jan,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14020038",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Feb 25 07:09:39 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/2/38",
abstract = "Information-centric networking (ICN) is expected to be
a candidate for future internet architecture, and it
supports features such as multicast that improves
bandwidth utilization and transmission efficiency.
However, multicast itself does not provide congestion
control. When multiple multicast groups coexist,
multicast traffic may exhaust all network resources,
and cause network congestion and packet loss.
Additionally, traditional IP multicast congestion
control mechanisms cannot be directly applied to ICN
architecture. Therefore, it is necessary to consider an
effective congestion control mechanism for ICN
multicast. This paper proposes a single-rate multicast
congestion control mechanism, called SRMCC. It supports
router-assisted awareness of the network congestion
state and congestion control message aggregation.
Moreover, the fair shared rate estimation method is
innovatively proposed to achieve protocol fairness.
Most importantly, it adjusts the rate according to
different congestion states indicated by the queue
occupancy ratio. By introducing a rate selection
factor, it can achieve a balance between packet loss
rate and throughput. Experimental results show that our
proposal outperforms other mechanisms in throughput,
packet loss rate, total bandwidth utilization, and
overhead, and achieves protocol fairness and better TCP
friendliness.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lembo:2022:GGL,
author = "Domenico Lembo and Valerio Santarelli and Domenico
Fabio Savo and Giuseppe {De Giacomo}",
title = "\pkg{Graphol}: A Graphical Language for Ontology
Modeling Equivalent to \pkg{OWL 2}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "3",
pages = "78",
day = "28",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14030078",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 4 08:59:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/3/78",
abstract = "In this paper we study Graphol, a fully graphical
language inspired by standard formalisms for conceptual
modeling, similar to the UML class diagram and the ER
model, but equipped with formal semantics. We formally
prove that Graphol is equivalent to OWL 2, i.e., it can
capture every OWL 2 ontology and vice versa. We also
present some usability studies indicating that Graphol
is suitable for quick adoption by conceptual modelers
that are familiar with UML and ER. This is further
testified by the adoption of Graphol for ontology
representation in several industrial projects.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Khanal:2022:UBI,
author = "Yurika Pant Khanal and Abeer Alsadoon and Khurram
Shahzad and Ahmad B. Al-Khalil and Penatiyana W. C.
Prasad and Sabih Ur Rehman and Rafiqul Islam",
title = "Utilizing Blockchain for {IoT} Privacy through
Enhanced {ECIES} with Secure Hash Function",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "3",
pages = "77",
day = "28",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14030077",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 4 08:59:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/hash.bib",
URL = "https://www.mdpi.com/1999-5903/14/3/77",
abstract = "Blockchain technology has been widely advocated for
security and privacy in IoT systems. However, a major
impediment to its successful implementation is the lack
of privacy protection regarding user access policy
while accessing personal data in the IoT system. This
work aims to preserve the privacy of user access policy
by protecting the confidentiality and authenticity of
the transmitted message while obtaining the necessary
consents for data access. We consider a Modified
Elliptic Curve Integrated Encryption Scheme (ECIES) to
improve the security strength of the transmitted
message. A secure hash function is used in conjunction
with a key derivation function to modify the encryption
procedure, which enhances the efficiency of the
encryption and decryption by generating multiple secure
keys through one master key. The proposed solution
eliminates user-dependent variables by including
transaction generation and verification in the
calculation of computation time, resulting in increased
system reliability. In comparison to previously
established work, the security of the transmitted
message is improved through a reduction of more than
12\% in the correlation coefficient between the
constructed request transaction and encrypted
transaction, coupled with a decrease of up to 7\% in
computation time.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{daSilva:2022:FSD,
author = "Diogo E. Moreira da Silva and Eduardo J. Solteiro
Pires and Ars{\'e}nio Reis and Paulo B. de Moura
Oliveira and Jo{\~a}o Barroso",
title = "Forecasting Students Dropout: A {UTAD} University
Study",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "3",
pages = "76",
day = "28",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14030076",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 4 08:59:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/3/76",
abstract = "In Portugal, the dropout rate of university courses is
around 29\%. Understanding the reasons behind such a
high desertion rate can drastically improve the success
of students and universities. This work applies
existing data mining techniques to predict the academic
dropout mainly using the academic grades. Four
different machine learning techniques are presented and
analyzed. The dataset consists of 331 students who were
previously enrolled in the Computer Engineering degree
at the Universidade de Tr{\'a}s-os-Montes e Alto Douro
(UTAD). The study aims to detect students who may
prematurely drop out using existing methods. The most
relevant data features were identified using the
Permutation Feature Importance technique. In the second
phase, several methods to predict the dropouts were
applied. Then, each machine learning technique's
results were displayed and compared to select the best
approach to predict academic dropout. The methods used
achieved good results, reaching an F1-Score of 81\% in
the final test set, concluding that students' marks
somehow incorporate their living conditions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vryzas:2022:PWA,
author = "Nikolaos Vryzas and Anastasia Katsaounidou and Lazaros
Vrysis and Rigas Kotsakis and Charalampos Dimoulas",
title = "A Prototype {Web} Application to Support
Human-Centered Audiovisual Content Authentication and
Crowdsourcing",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "3",
pages = "75",
day = "27",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14030075",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 4 08:59:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/3/75",
abstract = "Media authentication relies on the detection of
inconsistencies that may indicate malicious editing in
audio and video files. Traditionally, authentication
processes are performed by forensics professionals
using dedicated tools. There is rich research on the
automation of this procedure, but the results do not
yet guarantee the feasibility of providing automated
tools. In the current approach, a computer-supported
toolbox is presented, providing online functionality
for assisting technically inexperienced users
(journalists or the public) to investigate visually the
consistency of audio streams. Several algorithms based
on previous research have been incorporated on the
backend of the proposed system, including a novel CNN
model that performs a Signal-to-Reverberation-Ratio
(SRR) estimation with a mean square error of 2.9\%. The
user can access the web application online through a
web browser. After providing an audio/video file or a
YouTube link, the application returns as output a set
of interactive visualizations that can allow the user
to investigate the authenticity of the file. The
visualizations are generated based on the outcomes of
Digital Signal Processing and Machine Learning models.
The files are stored in a database, along with their
analysis results and annotation. Following a
crowdsourcing methodology, users are allowed to
contribute by annotating files from the dataset
concerning their authenticity. The evaluation version
of the web application is publicly available online.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Reis:2022:BMI,
author = "Jacqueline Zonichenn Reis and Rodrigo Franco
Gon{\c{c}}alves and Marcia Terra da Silva and Nikolai
Kazantsev",
title = "Business Models for the {Internet of Services}: State
of the Art and Research Agenda",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "3",
pages = "74",
day = "25",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14030074",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 4 08:59:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/3/74",
abstract = "The relevance of the Internet of Services (IoS) comes
from the global reach of the Internet into everyone's
home and daily activities and from the move from a
manufacturing-based economy to a service-based economy.
The IoS is seen as a new ecosystem where service
providers and consumers explore their business networks
for service provision and consumption. The scientific
literature refers to IoS as an important cornerstone
for Industry 4.0 and Future Internet; thus, it becomes
relevant to study how IoS interacts with business
models. Nevertheless, there is a lack of clarity on
such an intersection. Moreover, a systematic review of
IoS-based business models is still missing. This paper
aims to make a systematic review of IoS-based business
models and their application fields. We included
studies from Scopus and Web of Science databases, we
excluded duplicated papers and short conference
versions of the later full paper journal publications.
Twenty-three different studies are presented,
categorized in the sub-areas of IoS, and then by the
fields of applications. The main finding highlights the
opportunities of IoS applications in different fields,
offering directions for future research on this new
arena.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Adnan:2022:QKD,
author = "Mohd Hirzi Adnan and Zuriati Ahmad Zukarnain and Nur
Ziadah Harun",
title = "Quantum Key Distribution for {5G} Networks: A Review,
State of Art and Future Directions",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "3",
pages = "73",
day = "25",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14030073",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 4 08:59:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/3/73",
abstract = "In recent years, 5G networks and services become
progressively popular among telecommunication
providers. Simultaneously, the growth in the usage and
deployment of smartphone platforms and mobile
applications have been seen as phenomenal. Therefore,
this paper discusses the current state of the art of 5G
technology in the merger of unconditional security
requirements referred to as Quantum Cryptography. The
various domain of Quantum Cryptography is illustrated
including the protocols available, their functionality
and previous implementation in real networks. This
paper further identifies research gaps covering
critical aspects of how Quantum Cryptography can be
realized and effectively utilized in 5G networks. These
include improving the current technique in Quantum
Cryptography through efficient key distribution and
message sharing between users in 5G networks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Teixeira:2022:VBA,
author = "Diogo Teixeira and Silvestre Malta and Pedro Pinto",
title = "A Vote-Based Architecture to Generate Classified
Datasets and Improve Performance of Intrusion Detection
Systems Based on Supervised Learning",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "3",
pages = "72",
day = "25",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14030072",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 4 08:59:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/3/72",
abstract = "An intrusion detection system (IDS) is an important
tool to prevent potential threats to systems and data.
Anomaly-based IDSs may deploy machine learning
algorithms to classify events either as normal or
anomalous and trigger the adequate response. When using
supervised learning, these algorithms require
classified, rich, and recent datasets. Thus, to foster
the performance of these machine learning models,
datasets can be generated from different sources in a
collaborative approach, and trained with multiple
algorithms. This paper proposes a vote-based
architecture to generate classified datasets and
improve the performance of supervised learning-based
IDSs. On a regular basis, multiple IDSs in different
locations send their logs to a central system that
combines and classifies them using different machine
learning models and a majority vote system. Then, it
generates a new and classified dataset, which is
trained to obtain the best updated model to be
integrated into the IDS of the companies involved. The
proposed architecture trains multiple times with
several algorithms. To shorten the overall runtimes,
the proposed architecture was deployed in Fed4FIRE+
with Ray to distribute the tasks by the available
resources. A set of machine learning algorithms and the
proposed architecture were assessed. When compared with
a baseline scenario, the proposed architecture enabled
to increase the accuracy by 11.5\% and the precision by
11.2\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tran:2022:DRS,
author = "Thanh-Nam Tran and Van-Cuu Ho and Thoai Phu Vo and
Khanh Ngo Nhu Tran and Miroslav Voznak",
title = "Design of Relay Switching to Combat an Eavesdropper in
{IoT-NOMA} Wireless Networks",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "3",
pages = "71",
day = "24",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14030071",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 4 08:59:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/3/71",
abstract = "The requirements of low latency, low cost, less energy
consumption, high flexibility, high network capacity,
and high data safety are crucial challenges for future
Internet of Things (IoT) wireless networks. Motivated
by these challenges, this study deals with a novel
design of green-cooperative IoT network, which employed
coupled relays consisting of one IoT relay selected for
forwarding signals to multiple IoT devices while
another IoT relay transmitted jamming signals to an
eavesdropper. For flexibility, all IoT nodes were
powered by solar energy enough to sustain themselves,
in order to consume less energy. To reach low latency,
the study adopted the emerging non-orthogonal multiple
access technique to serve multiple IoT devices
simultaneously. Furthermore, the study adopted the
simultaneous wireless information and power transfer
technique which transmits wireless data for information
processing and energy for energy harvesting. The study
sketched a novel transmission block time period
framework which plotted how a signal could travel via
an individual IoT model. Maximizing the achievable
bit-rate of IoT devices was considered to improve
network capacity and data safety as well. Aiming at
enhancing secrecy performance, a rest IoT relay played
a role as a friendly jammer to transmit a jamming
signal to an eavesdropper using energy harvested from
the power splitting protocol. The results achieved in
this study showed that the proposed model satisfied the
requirements of future green IoT wireless networks.
Derivatives leading to closed-form expressions are
presented and verified by simulation results. The
investigated results demonstrated that a friendly
jammer based on radio frequency and energy harvesting
strongly forces the intercept probability performance
of the eavesdropper towards one, while outage
probability performance of IoT devices towards zero
showed that the signal to noise ratio tends to
infinity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Varlamis:2022:SUG,
author = "Iraklis Varlamis and Dimitrios Michail and Foteini
Glykou and Panagiotis Tsantilas",
title = "A Survey on the Use of Graph Convolutional Networks
for Combating Fake News",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "3",
pages = "70",
day = "24",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14030070",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 4 08:59:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/3/70",
abstract = "The combat against fake news and disinformation is an
ongoing, multi-faceted task for researchers in social
media and social networks domains, which comprises not
only the detection of false facts in published content
but also the detection of accountability mechanisms
that keep a record of the trustfulness of sources that
generate news and, lately, of the networks that
deliberately distribute fake information. In the
direction of detecting and handling organized
disinformation networks, major social media and social
networking sites are currently developing strategies
and mechanisms to block such attempts. The role of
machine learning techniques, especially neural
networks, is crucial in this task. The current work
focuses on the popular and promising graph
representation techniques and performs a survey of the
works that employ Graph Convolutional Networks (GCNs)
to the task of detecting fake news, fake accounts and
rumors that spread in social networks. It also
highlights the available benchmark datasets employed in
current research for validating the performance of the
proposed methods. This work is a comprehensive survey
of the use of GCNs in the combat against fake news and
aims to be an ideal starting point for future
researchers in the field.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Blekanov:2022:TBA,
author = "Ivan S. Blekanov and Nikita Tarasov and Svetlana S.
Bodrunova",
title = "Transformer-Based Abstractive Summarization for
{Reddit} and {Twitter}: Single Posts vs. Comment Pools
in Three Languages",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "3",
pages = "69",
day = "23",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14030069",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 4 08:59:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/3/69",
abstract = "Abstractive summarization is a technique that allows
for extracting condensed meanings from long texts, with
a variety of potential practical applications.
Nonetheless, today's abstractive summarization research
is limited to testing the models on various types of
data, which brings only marginal improvements and does
not lead to massive practical employment of the method.
In particular, abstractive summarization is not used
for social media research, where it would be very
useful for opinion and topic mining due to the
complications that social media data create for other
methods of textual analysis. Of all social media,
Reddit is most frequently used for testing new neural
models of text summarization on large-scale datasets in
English, without further testing on real-world
smaller-size data in various languages or from various
other platforms. Moreover, for social media,
summarizing pools of texts (one-author posts, comment
threads, discussion cascades, etc.) may bring crucial
results relevant for social studies, which have not yet
been tested. However, the existing methods of
abstractive summarization are not fine-tuned for social
media data and have next-to-never been applied to data
from platforms beyond Reddit, nor for comments or
non-English user texts. We address these research gaps
by fine-tuning the newest Transformer-based neural
network models LongFormer and T5 and testing them
against BART, and on real-world data from Reddit, with
improvements of up to 2\%. Then, we apply the best
model (fine-tuned T5) to pools of comments from Reddit
and assess the similarity of post and comment
summarizations. Further, to overcome the 500-token
limitation of T5 for analyzing social media pools that
are usually bigger, we apply LongFormer Large and T5
Large to pools of tweets from a large-scale discussion
on the Charlie Hebdo massacre in three languages and
prove that pool summarizations may be used for
detecting micro-shifts in agendas of networked
discussions. Our results show, however, that additional
learning is definitely needed for German and French, as
the results for these languages are non-satisfactory,
and more fine-tuning is needed even in English for
Twitter data. Thus, we show that a `one-for-all'
neural-network summarization model is still impossible
to reach, while fine-tuning for platform affordances
works well. We also show that fine-tuned T5 works best
for small-scale social media data, but LongFormer is
helpful for larger-scale pool summarizations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2022:AIE,
author = "Jiaqi Li and Jiali You and Haojiang Deng",
title = "Adjacency-Information-Entropy-Based Cooperative Name
Resolution Approach in {ICN}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "3",
pages = "68--??",
day = "23",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14030068",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Mar 4 08:59:15 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/3/68",
abstract = "Information-centric networking (ICN) is an emerging
network architecture that has the potential to address
low-transmission latency and high-reliability
requirements in the fifth generation and beyond
communication networks (5G/B5G). In the ICN
architectures that use the identifier--locator
separation mode, a name resolution system (NRS) is an
important infrastructure for managing and maintaining
the mappings between identifiers and locators. To meet
the demands of time-sensitive applications, researchers
have developed a distributed local NRS that can provide
name resolution service within deterministic latency,
which means it can respond to a name resolution request
within a latency upper bound. However, processing name
resolution requests only locally cannot take full
advantage of the potential of the distributed local
NRS. In this paper, we propose a name resolution
approach, called adjacency-information-entropy-based
cooperative name resolution (ACNR). In ACNR, when a
name resolution node receives a name resolution request
from a user, it can use neighboring name resolution
nodes to respond to this request in a parallel
processing manner. For this purpose, ACNR uses the
information entropy that takes into account the
adjacency and latency between name resolution nodes to
describe the local structure of nodes efficiently. The
proposed approach is extensively validated on simulated
networks. Compared with several other approaches, the
experiment results show that ACNR can discover more
cooperative neighbors in a reasonable communication
overhead, and achieve a higher name resolution success
rate.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Scanlan:2022:CHP,
author = "Joel Scanlan and Paul A. Watters and Jeremy Prichard
and Charlotte Hunn and Caroline Spiranovic and Richard
Wortley",
title = "Creating Honeypots to Prevent Online Child
Exploitation",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "121--??",
day = "14",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040121",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/121",
abstract = "Honeypots have been a key tool in controlling and
understanding digital crime for several decades. The
tool has traditionally been deployed against actors who
are attempting to hack into systems or as a discovery
mechanism for new forms of malware. This paper presents
a novel approach to using a honeypot architecture in
conjunction with social networks to respond to
non-technical digital crimes. The tool is presented
within the context of Child Exploitation Material
(CEM), and to support the goal of taking an educative
approach to Internet users who are developing an
interest in this material. The architecture that is
presented in the paper includes multiple layers,
including recruitment, obfuscation, and education. The
approach does not aim to collect data to support
punitive action, but to educate users, increasing their
knowledge and awareness of the negative impacts of such
material.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sharma:2022:FWN,
author = "Sachin Sharma and Saish Urumkar and Gianluca Fontanesi
and Byrav Ramamurthy and Avishek Nag",
title = "Future Wireless Networking Experiments Escaping
Simulations",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "120--??",
day = "14",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040120",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/120",
abstract = "In computer networking, simulations are widely used to
test and analyse new protocols and ideas. Currently,
there are a number of open real testbeds available to
test the new protocols. In the EU, for example, there
are Fed4Fire testbeds, while in the US, there are
POWDER and COSMOS testbeds. Several other countries,
including Japan, Brazil, India, and China, have also
developed next-generation testbeds. Compared to
simulations, these testbeds offer a more realistic way
to test protocols and prototypes. In this paper, we
examine some available wireless testbeds from the EU
and the US, which are part of an open-call EU project
under the NGIAtlantic H2020 initiative to conduct
Software-Defined Networking (SDN) experiments on
intelligent Internet of Things (IoT) networks.
Furthermore, the paper presents benchmarking results
and failure recovery results from each of the
considered testbeds using a variety of wireless network
topologies. The paper compares the testbeds based on
throughput, latency, jitter, resources available, and
failure recovery time, by sending different types of
traffic. The results demonstrate the feasibility of
performing wireless experiments on different testbeds
in the US and the EU. Further, issues faced during
experimentation on EU and US testbeds are also
reported.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2022:LCG,
author = "Zhihao Wang and Ru Huo and Shuo Wang",
title = "A Lightweight Certificateless Group Key Agreement
Method without Pairing Based on Blockchain for Smart
Grid",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "119--??",
day = "14",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040119",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/119",
abstract = "In smart grids, the access verification of a large
number of intelligent gateways and terminal devices has
become one of the main concerns to ensure system
security. This means that smart grids need a new key
management method that is safe and efficient and has a
low computational cost. Although a large number of
scholars have conducted relevant research, most of
these schemes cannot balance the computational overhead
and security. Therefore, we propose a lightweight and
secure key management method, having a low
computational overhead, based on blockchain for smart
grids. Firstly, we redesigned the architecture of the
smart grid based on blockchain and completed the
division of various entities. Furthermore, we designed
a pairing-free certification authenticated group key
agreement method based on blockchain under the
architecture. Finally, we achieved higher security
attributes, and lower authentication delay and
computational overhead, compared to the traditional
schemes, as shown in performance analysis and
comparison.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alaoui:2022:DLV,
author = "Rokia Lamrani Alaoui and El Habib Nfaoui",
title = "Deep Learning for Vulnerability and Attack Detection
on {Web} Applications: a Systematic Literature Review",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "118--??",
day = "13",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040118",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/118",
abstract = "Web applications are the best Internet-based solution
to provide online web services, but they also bring
serious security challenges. Thus, enhancing web
applications security against hacking attempts is of
paramount importance. Traditional Web Application
Firewalls based on manual rules and traditional Machine
Learning need a lot of domain expertise and human
intervention and have limited detection results faced
with the increasing number of unknown web attacks. To
this end, more research work has recently been devoted
to employing Deep Learning (DL) approaches for web
attacks detection. We performed a Systematic Literature
Review (SLR) and quality analysis of 63 Primary Studies
(PS) on DL-based web applications security published
between 2010 and September 2021. We investigated the PS
from different perspectives and synthesized the results
of the analyses. To the best of our knowledge, this
study is the first of its kind on SLR in this field.
The key findings of our study include the following.
(i) It is fundamental to generate standard real-world
web attacks datasets to encourage effective
contribution in this field and to reduce the gap
between research and industry. (ii) It is interesting
to explore some advanced DL models, such as Generative
Adversarial Networks and variants of
Encoders--Decoders, in the context of web attacks
detection as they have been successful in similar
domains such as networks intrusion detection. (iii) It
is fundamental to bridge expertise in web applications
security and expertise in Machine Learning to build
theoretical Machine Learning models tailored for web
attacks detection. (iv) It is important to create a
corpus for web attacks detection in order to take full
advantage of text mining in DL-based web attacks
detection models construction. (v) It is essential to
define a common framework for developing and comparing
DL-based web attacks detection models. This SLR is
intended to improve research work in the domain of
DL-based web attacks detection, as it covers a
significant number of research papers and identifies
the key points that need to be addressed in this
research field. Such a contribution is helpful as it
allows researchers to compare existing approaches and
to exploit the proposed future work opportunities.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Salameh:2022:CTA,
author = "Ahmed I. Salameh and Mohamed El Tarhuni",
title = "From {5G} to {6G}---Challenges, Technologies, and
Applications",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "117--??",
day = "12",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040117",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/117",
abstract = "As the deployment of 5G mobile radio networks gains
momentum across the globe, the wireless research
community is already planning the successor of 5G. In
this paper, we highlight the shortcomings of 5G in
meeting the needs of more data-intensive, low-latency,
and ultra-high-reliability applications. We then
discuss the salient characteristics of the 6G network
following a hierarchical approach including the social,
economic, and technological aspects. We also discuss
some of the key technologies expected to support the
move towards 6G. Finally, we quantify and summarize the
research work related to beyond 5G and 6G networks
through an extensive search of publications and
research groups and present a possible timeline for 6G
activities.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dangi:2022:MBN,
author = "Ramraj Dangi and Akshay Jadhav and Gaurav Choudhary
and Nicola Dragoni and Manas Kumar Mishra and Praveen
Lalwani",
title = "{ML}-Based {5G} Network Slicing Security: a
Comprehensive Survey",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "116--??",
day = "08",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040116",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/116",
abstract = "Fifth-generation networks efficiently support and
fulfill the demands of mobile broadband and
communication services. There has been a continuing
advancement from 4G to 5G networks, with 5G mainly
providing the three services of enhanced mobile
broadband (eMBB), massive machine type communication
(eMTC), and ultra-reliable low-latency services
(URLLC). Since it is difficult to provide all of these
services on a physical network, the 5G network is
partitioned into multiple virtual networks called
``slices''. These slices customize these unique
services and enable the network to be reliable and
fulfill the needs of its users. This phenomenon is
called network slicing. Security is a critical concern
in network slicing as adversaries have evolved to
become more competent and often employ new attack
strategies. This study focused on the security issues
that arise during the network slice lifecycle. Machine
learning and deep learning algorithm solutions were
applied in the planning and design, construction and
deployment, monitoring, fault detection, and security
phases of the slices. This paper outlines the 5G
network slicing concept, its layers and architectural
framework, and the prevention of attacks, threats, and
issues that represent how network slicing influences
the 5G network. This paper also provides a comparison
of existing surveys and maps out taxonomies to
illustrate various machine learning solutions for
different application parameters and network functions,
along with significant contributions to the field.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Al-Dwairi:2022:RRS,
author = "Mahmoud Al-Dwairi and Ahmed S. Shatnawi and Osama
Al-Khaleel and Basheer Al-Duwairi",
title = "Ransomware-Resilient Self-Healing {XML} Documents",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "115--??",
day = "07",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040115",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/115",
abstract = "In recent years, various platforms have witnessed an
unprecedented increase in the number of ransomware
attacks targeting hospitals, governments, enterprises,
and end-users. The purpose of this is to maliciously
encrypt documents and files on infected machines,
depriving victims of access to their data, whereupon
attackers would seek some sort of a ransom in return
for restoring access to the legitimate owners; hence
the name. This cybersecurity threat would inherently
cause substantial financial losses and time wastage for
affected organizations and users. A great deal of
research has taken place across academia and around the
industry to combat this threat and mitigate its danger.
These ongoing endeavors have resulted in several
detection and prevention schemas. Nonetheless, these
approaches do not cover all possible risks of losing
data. In this paper, we address this facet and provide
an efficient solution that would ensure an efficient
recovery of XML documents from ransomware attacks. This
paper proposes a self-healing version-aware ransomware
recovery (SH-VARR) framework for XML documents. The
proposed framework is based on the novel idea of using
the link concept to maintain file versions in a
distributed manner while applying access-control
mechanisms to protect these versions from being
encrypted or deleted. The proposed SH-VARR framework is
experimentally evaluated in terms of storage overhead,
time requirement, CPU utilization, and memory usage.
Results show that the snapshot size increases
proportionately with the original size; the time
required is less than 120 ms for files that are less
than 1 MB in size; and the highest CPU utilization
occurs when using the bzip2. Moreover, when the zip and
gzip are used, the memory usage is almost fixed (around
6.8 KBs). In contrast, it increases to around 28 KBs
when the bzip2 is used.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Marosi:2022:IDA,
author = "Attila Csaba Marosi and M{\'a}rk Emodi and {\'A}kos
Hajnal and R{\'o}bert Lovas and Tam{\'a}s Kiss and
Valerie Poser and Jibinraj Antony and Simon Bergweiler
and Hamed Hamzeh and James Deslauriers and J{\'o}zsef
Kov{\'a}cs",
title = "Interoperable Data Analytics Reference Architectures
Empowering Digital-Twin-Aided Manufacturing",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "114--??",
day = "06",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040114",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/114",
abstract = "The use of mature, reliable, and validated solutions
can save significant time and cost when introducing new
technologies to companies. Reference Architectures
represent such best-practice techniques and have the
potential to increase the speed and reliability of the
development process in many application domains. One
area where Reference Architectures are increasingly
utilized is cloud-based systems. Exploiting the
high-performance computing capability offered by
clouds, while keeping sovereignty and governance of
proprietary information assets can be challenging. This
paper explores how Reference Architectures can be
applied to overcome this challenge when developing
cloud-based applications. The presented approach was
developed within the DIGITbrain European project, which
aims at supporting small and medium-sized enterprises
(SMEs) and mid-caps in realizing smart business models
called Manufacturing as a Service, via the efficient
utilization of Digital Twins. In this paper, an
overview of Reference Architecture concepts, as well as
their classification, specialization, and particular
application possibilities are presented. Various data
management and potentially spatially detached data
processing configurations are discussed, with special
attention to machine learning techniques, which are of
high interest within various sectors, including
manufacturing. A framework that enables the deployment
and orchestration of such overall data analytics
Reference Architectures in clouds resources is also
presented, followed by a demonstrative application
example where the applicability of the introduced
techniques and solutions are showcased in practice.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2022:MLF,
author = "Zhao Wang and Qingguo Xu and Weimin Li",
title = "Multi-Layer Feature Fusion-Based Community Evolution
Prediction",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "113--??",
day = "06",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040113",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/113",
abstract = "Analyzing and predicting community evolution has many
important applications in criminology, sociology, and
other fields. In community evolution prediction, most
of the existing research is simply calculating the
features of the community, and then predicting the
evolution event through the classifier. However, these
methods do not consider the complex characteristics of
community evolution, and only predict the community's
evolution from a single level. To solve these problems,
this paper proposes an algorithm called multi-layer
feature fusion-based community evolution prediction,
which obtains features from the community layer and
node layer. The final community feature is the fusion
of the two layer features. At the node layer, this
paper proposes a global and local-based role-extraction
algorithm. This algorithm can effectively discover
different roles in the community. In this way, we can
distinguish the influence of nodes with different
characteristics on the community evolution. At the
community layer, this paper proposes to use the
community hypergraph to obtain the inter-community
interaction relationship. After all the features are
obtained, this paper trains a classifier through these
features and uses them in community evolution
prediction. The experimental results show that the
algorithm proposed in this paper is better than other
algorithms in terms of prediction effect.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Symvoulidis:2022:HIB,
author = "Chrysostomos Symvoulidis and George Marinos and
Athanasios Kiourtis and Argyro Mavrogiorgou and
Dimosthenis Kyriazis",
title = "{HealthFetch}: an Influence-Based, Context-Aware
Prefetch Scheme in Citizen-Centered Health Storage
Clouds",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "112--??",
day = "01",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040112",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/112",
abstract = "Over the past few years, increasing attention has been
given to the health sector and the integration of new
technologies into it. Cloud computing and storage
clouds have become essentially state of the art
solutions for other major areas and have started to
rapidly make their presence powerful in the health
sector as well. More and more companies are working
toward a future that will allow healthcare
professionals to engage more with such infrastructures,
enabling them a vast number of possibilities. While
this is a very important step, less attention has been
given to the citizens. For this reason, in this paper,
a citizen-centered storage cloud solution is proposed
that will allow citizens to hold their health data in
their own hands while also enabling the exchange of
these data with healthcare professionals during
emergency situations. Not only that, in order to reduce
the health data transmission delay, a novel
context-aware prefetch engine enriched with deep
learning capabilities is proposed. The proposed
prefetch scheme, along with the proposed storage cloud,
is put under a two-fold evaluation in several
deployment and usage scenarios in order to examine its
performance with respect to the data transmission
times, while also evaluating its outcomes compared to
other state of the art solutions. The results show that
the proposed solution shows significant improvement of
the download speed when compared with the storage
cloud, especially when large data are exchanged. In
addition, the results of the proposed scheme evaluation
depict that the proposed scheme improves the overall
predictions, considering the coefficient of
determination ( R2 {$>$} 0.94) and the mean of errors
(RMSE {$<$} 1), while also reducing the training data
by 12\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Khalil:2022:LTC,
author = "Haytham Khalil and Khalid Elgazzar",
title = "Location Transparency Call {(LTC)} System: an
Intelligent Phone Dialing System Based on the {Phone of
Things (PoT)} Architecture",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "111--??",
day = "31",
month = mar,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040111",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/111",
abstract = "Phone of Things (PoT) extends the connectivity options
for IoT systems by leveraging the ubiquitous phone
network infrastructure, making it part of the IoT
architecture. PoT enriches the connectivity options of
IoT while promoting its affordability, accessibility,
security, and scalability. PoT enables incentive IoT
applications that can result in more innovative homes,
office environments, and telephony solutions. This
paper presents the Location Transparency Call (LTC)
system, an intelligent phone dialing system for
businesses based on the PoT architecture. The LTC
system intelligently mitigates the impact of missed
calls on companies and provides high availability and
dynamic reachability to employees within the premises.
LTC automatically forwards calls to the intended
employees to the closest phone extensions at their
current locations. Location transparency is achieved by
actively maintaining and dynamically updating a
real-time database that maps the persons' locations
using the RFID tags they carry. We demonstrate the
system's feasibility and usability and evaluate its
performance through a fully-fledged prototype
representing its hardware and software components that
can be applied in real situations at large scale.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Patil:2022:DBD,
author = "Pranita Patil and Kevin Purcell",
title = "Decorrelation-Based Deep Learning for Bias
Mitigation",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "110--??",
day = "29",
month = mar,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040110",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/110",
abstract = "Although deep learning has proven to be tremendously
successful, the main issue is the dependency of its
performance on the quality and quantity of training
datasets. Since the quality of data can be affected by
biases, a novel deep learning method based on
decorrelation is presented in this study. The
decorrelation specifically learns bias invariant
features by reducing the non-linear statistical
dependency between features and bias itself. This makes
the deep learning models less prone to biased decisions
by addressing data bias issues. We introduce
Decorrelated Deep Neural Networks (DcDNN) or
Decorrelated Convolutional Neural Networks (DcCNN) and
Decorrelated Artificial Neural Networks (DcANN) by
applying decorrelation-based optimization to Deep
Neural Networks (DNN) and Artificial Neural Networks
(ANN), respectively. Previous bias mitigation methods
result in a drastic loss in accuracy at the cost of
bias reduction. Our study aims to resolve this by
controlling how strongly the decorrelation function for
bias reduction and loss function for accuracy affect
the network objective function. The detailed analysis
of the hyperparameter shows that for the optimal value
of hyperparameter, our model is capable of maintaining
accuracy while being bias invariant. The proposed
method is evaluated on several benchmark datasets with
different types of biases such as age, gender, and
color. Additionally, we test our approach along with
traditional approaches to analyze the bias mitigation
in deep learning. Using simulated datasets, the results
of t-distributed stochastic neighbor embedding (t-SNE)
of the proposed model validated the effective removal
of bias. An analysis of fairness metrics and accuracy
comparisons shows that using our proposed models
reduces the biases without compromising accuracy
significantly. Furthermore, the comparison of our
method with existing methods shows the superior
performance of our model in terms of bias mitigation,
as well as simplicity of training.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ayaida:2022:TMR,
author = "Marwane Ayaida and Nadhir Messai and Frederic Valentin
and Dimitri Marcheras",
title = "{TalkRoBots}: a Middleware for Robotic Systems in
{Industry 4.0}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "109--??",
day = "29",
month = mar,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040109",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/109",
abstract = "This paper proposes a middleware called TalkRoBots
that handles interoperability issues, which could be
encountered in Industry 4.0. The latter proposes a
unified communication approach facilitating the
collaboration between heterogeneous equipment without
needing to change neither the already used software nor
the existing hardware. It allows heterogeneous robots,
using both open and proprietary robotic frameworks
(i.e., ROS, ABB, Universal Robots, etc.), to
communicate and to share information in a transparent
manner. It allows robots and Industrial Internet of
Things (IIoT) devices to communicate together.
Furthermore, a resilience mechanism based on an
Artificial Intelligence (AI) approach was designed in
order to allow automatically replacing a defective
robot with an optimal alternatively available robot.
Finally, a remote interface, which could be run through
the Cloud, allows users to manipulate fleets of robots
from anywhere and to obtain access to sensors' data. A
practical scenario using five different robots has been
realized to demonstrate the different possibilities.
This demonstrates the cost effectiveness of our
middleware in terms of its impacts on the communication
network. Finally, a simulation study that evaluates the
scalability of our middleware clearly shows that
TalkRoBots can be used efficiently in industrial
scenarios involving a huge number of heterogeneous
robots and IIoT devices.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vitorino:2022:APP,
author = "Jo{\~a}o Vitorino and Nuno Oliveira and Isabel
Pra{\c{c}}a",
title = "Adaptative Perturbation Patterns: Realistic
Adversarial Learning for Robust Intrusion Detection",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "108--??",
day = "29",
month = mar,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040108",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/108",
abstract = "Adversarial attacks pose a major threat to machine
learning and to the systems that rely on it. In the
cybersecurity domain, adversarial cyber-attack examples
capable of evading detection are especially concerning.
Nonetheless, an example generated for a domain with
tabular data must be realistic within that domain. This
work establishes the fundamental constraint levels
required to achieve realism and introduces the
adaptative perturbation pattern method (A2PM) to
fulfill these constraints in a gray-box setting. A2PM
relies on pattern sequences that are independently
adapted to the characteristics of each class to create
valid and coherent data perturbations. The proposed
method was evaluated in a cybersecurity case study with
two scenarios: Enterprise and Internet of Things (IoT)
networks. Multilayer perceptron (MLP) and random forest
(RF) classifiers were created with regular and
adversarial training, using the CIC-IDS2017 and IoT-23
datasets. In each scenario, targeted and untargeted
attacks were performed against the classifiers, and the
generated examples were compared with the original
network traffic flows to assess their realism. The
obtained results demonstrate that A2PM provides a
scalable generation of realistic adversarial examples,
which can be advantageous for both adversarial training
and attacks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Afrin:2022:MSA,
author = "Nusrat Afrin and Jason Brown and Jamil Y. Khan",
title = "A Multi-Service Adaptive Semi-Persistent {LTE} Uplink
Scheduler for Low Power {M2M} Devices",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "107--??",
day = "27",
month = mar,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040107",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/107",
abstract = "The prominence of Machine-to-Machine (M2M)
communications in the future wide area communication
networks place various challenges to the cellular
technologies such as the Long Term Evolution (LTE)
standard, owing to the large number of M2M devices
generating small bursts of infrequent data packets with
a wide range of delay requirements. The channel
structure and Quality of Service (QoS) framework of LTE
networks fail to support M2M traffic with multiple
burst sizes and QoS requirements while a bottleneck
often arises from the limited control resources to
communicate future uplink resource allocations to the
M2M devices. Moreover, many of the M2M devices are
battery-powered and require a low-power consuming wide
area technology for wide-spread deployments. To
alleviate these issues, in this article we propose an
adaptive semi-persistent scheduling (SPS) scheme for
the LTE uplink which caters for multi-service M2M
traffic classes with variable burst sizes and delay
tolerances. Instead of adhering to the rigid LTE QoS
framework, the proposed algorithm supports variation of
uplink allocation sizes based on queued data length yet
does not require control signaling to inform those
allocations to the respective devices. Both the eNodeB
and the M2M devices can determine the precise uplink
resource allocation related parameters based on their
mutual knowledge, thus omitting the burden of regular
control signaling exchanges. Based on a control
parameter, the algorithm can offer different capacities
and levels of QoS satisfaction to different traffic
classes. We also introduce a pre-emptive feature by
which the algorithm can prioritize new traffic with low
delay tolerance over ongoing delay-tolerant traffic. We
also build a model for incorporating the Discontinuous
Reception (DRX) mechanism in synchronization with the
adaptive SPS transmissions so that the UE power
consumption can be significantly lowered, thereby
extending their battery lives. The simulation and
performance analysis of the proposed scheme shows
significant improvement over the traditional LTE
scheduler in terms of QoS satisfaction, channel
utilization and low power requirements of multi-service
M2M traffic.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Esposito:2022:SIN,
author = "Massimo Esposito and Giovanni Luca Masala and Aniello
Minutolo and Marco Pota",
title = "Special Issue {``Natural Language Engineering:
Methods, Tasks and Applications''}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "106--??",
day = "26",
month = mar,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040106",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/106",
abstract = "The prominence of Machine-to-Machine (M2M)
communications in the future wide area communication
networks place various challenges to the cellular
technologies such as the Long Term Evolution (LTE)
standard, owing to the large number of M2M devices
generating small bursts of infrequent data packets with
a wide range of delay requirements. The channel
structure and Quality of Service (QoS) framework of LTE
networks fail to support M2M traffic with multiple
burst sizes and QoS requirements while a bottleneck
often arises from the limited control resources to
communicate future uplink resource allocations to the
M2M devices. Moreover, many of the M2M devices are
battery-powered and require a low-power consuming wide
area technology for wide-spread deployments. To
alleviate these issues, in this article we propose an
adaptive semi-persistent scheduling (SPS) scheme for
the LTE uplink which caters for multi-service M2M
traffic classes with variable burst sizes and delay
tolerances. Instead of adhering to the rigid LTE QoS
framework, the proposed algorithm supports variation of
uplink allocation sizes based on queued data length yet
does not require control signaling to inform those
allocations to the respective devices. Both the eNodeB
and the M2M devices can determine the precise uplink
resource allocation related parameters based on their
mutual knowledge, thus omitting the burden of regular
control signaling exchanges. Based on a control
parameter, the algorithm can offer different capacities
and levels of QoS satisfaction to different traffic
classes. We also introduce a pre-emptive feature by
which the algorithm can prioritize new traffic with low
delay tolerance over ongoing delay-tolerant traffic. We
also build a model for incorporating the Discontinuous
Reception (DRX) mechanism in synchronization with the
adaptive SPS transmissions so that the UE power
consumption can be significantly lowered, thereby
extending their battery lives. The simulation and
performance analysis of the proposed scheme shows
significant improvement over the traditional LTE
scheduler in terms of QoS satisfaction, channel
utilization and low power requirements of multi-service
M2M traffic.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Duan:2022:DCA,
author = "Yingjie Duan and Hong Ni and Xiaoyong Zhu",
title = "A Dynamic Cache Allocation Mechanism {(DCAM)} for
Reliable Multicast in Information-Centric Networking",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "105--??",
day = "25",
month = mar,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040105",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/105",
abstract = "As a new network architecture, information-centric
networking (ICN) decouples the identifiers and locators
of network entities and makes full use of in-network
cache technology to improve the content distribution
efficiency. For reliable multicast, ICN in-network
cache can help reduce the loss recovery delay. However,
with the development of applications and services, a
multicast tree node often serves multiple reliable
multicast groups. How to reasonably allocate cache
resources for each multicast group will greatly affect
the performance of reliable multicast. In order to
improve the overall loss recovery performance of
reliable multicast, this paper designs a dynamic cache
allocation mechanism (DCAM). DCAM considers the packet
loss probability, the node depth of the multicast tree,
and the multicast transmission rate of multicast group,
and then allocates cache space for multicast group
based on the normalized cache quota weight. We also
explore the performance of three cache allocation
mechanisms (DCAM, AARM, and Equal) combined with four
cache strategies (LCE, CAPC, Prob, and ProbCache),
respectively. Experimental results show that DCAM can
adjust cache allocation results in time according to
network changes, and its combinations with various
cache strategies outperform other combinations.
Moreover, the combination of DCAM and CAPC can achieve
optimal performance in loss recovery delay, cache hit
ratio, transmission completion time, and overhead.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kavrestad:2022:ECG,
author = "Joakim K{\"a}vrestad and Allex Hagberg and Marcus
Nohlberg and Jana Rambusch and Robert Roos and Steven
Furnell",
title = "Evaluation of Contextual and Game-Based Training for
Phishing Detection",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "104--??",
day = "25",
month = mar,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040104",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/104",
abstract = "Cybersecurity is a pressing matter, and a lot of the
responsibility for cybersecurity is put on the
individual user. The individual user is expected to
engage in secure behavior by selecting good passwords,
identifying malicious emails, and more. Typical support
for users comes from Information Security Awareness
Training (ISAT), which makes the effectiveness of ISAT
a key cybersecurity issue. This paper presents an
evaluation of how two promising methods for ISAT
support users in acheiving secure behavior using a
simulated experiment with 41 participants. The methods
were game-based training, where users learn by playing
a game, and Context-Based Micro-Training (CBMT), where
users are presented with short information in a
situation where the information is of direct relevance.
Participants were asked to identify phishing emails
while their behavior was monitored using eye-tracking
technique. The research shows that both training
methods can support users towards secure behavior and
that CBMT does so to a higher degree than game-based
training. The research further shows that most
participants were susceptible to phishing, even after
training, which suggests that training alone is
insufficient to make users behave securely.
Consequently, future research ideas, where training is
combined with other support systems, are proposed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chen:2022:CDT,
author = "Xiaolin Chen and Qixing Qu and Chengxi Wei and Shudong
Chen",
title = "Cross-Domain Transfer Learning Prediction of
{COVID-19} Popular Topics Based on Knowledge Graph",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "103--??",
day = "24",
month = mar,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040103",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/103",
abstract = "The significance of research on public opinion
monitoring of social network emergencies is becoming
increasingly important. As a platform for users to
communicate and share information online, social
networks are often the source of public opinion about
emergencies. Considering the relevance and
transmissibility of the same event in different social
networks, this paper takes the COVID-19 outbreak as the
background and selects the platforms Weibo and TikTok
as the research objects. In this paper, first, we use
the transfer learning model to apply the knowledge
obtained in the source domain of Weibo to the target
domain of TikTok. From the perspective of text
information, we propose an improved TC-LDA model to
measure the similarity between the two domains,
including temporal similarity and conceptual
similarity, which effectively improves the learning
effect of instance transfer and makes up for the
problem of insufficient sample data in the target
domain. Then, based on the results of transfer
learning, we use the improved single-pass incremental
clustering algorithm to discover and filter popular
topics in streaming data of social networks. Finally,
we build a topic knowledge graph using the Neo4j graph
database and conduct experiments to predict the
evolution of popular topics in new emergencies. Our
research results can provide a reference for public
opinion monitoring and early warning of emergencies in
government departments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tomer:2022:DIA,
author = "Vikas Tomer and Sachin Sharma",
title = "Detecting {IoT} Attacks Using an Ensemble Machine
Learning Model",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "102--??",
day = "24",
month = mar,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040102",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/102",
abstract = "Malicious attacks are becoming more prevalent due to
the growing use of Internet of Things (IoT) devices in
homes, offices, transportation, healthcare, and other
locations. By incorporating fog computing into IoT,
attacks can be detected in a short amount of time, as
the distance between IoT devices and fog devices is
smaller than the distance between IoT devices and the
cloud. Machine learning is frequently used for the
detection of attacks due to the huge amount of data
available from IoT devices. However, the problem is
that fog devices may not have enough resources, such as
processing power and memory, to detect attacks in a
timely manner. This paper proposes an approach to
offload the machine learning model selection task to
the cloud and the real-time prediction task to the fog
nodes. Using the proposed method, based on historical
data, an ensemble machine learning model is built in
the cloud, followed by the real-time detection of
attacks on fog nodes. The proposed approach is tested
using the NSL-KDD dataset. The results show the
effectiveness of the proposed approach in terms of
several performance measures, such as execution time,
precision, recall, accuracy, and ROC (receiver
operating characteristic) curve.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sarma:2022:PAD,
author = "Subhra Sankha Sarma and Ranjay Hazra and Peter Han Joo
Chong",
title = "Performance Analysis of {DF} Relay-Assisted {D2D}
Communication in a {5G} {mmWave} Network",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "101--??",
day = "24",
month = mar,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040101",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/101",
abstract = "Enabling D2D communication in the mmWave band has many
obstacles that must be mitigated. The primary concern
is the introduction of interference from various
sources. Thus, we focused our work on the performance
of decode-and-forward (DF) relay-assisted D2D
communication in the mmWave band to increase the
coverage probability and energy efficiency (EE). Three
modes are proposed for D2D communication to prevail.
The bitwise binary XOR operation was executed at the
relay node, which increased the security feature. The
radius of coverage was derived, which indicated the
switching of the modes. The diffused incoherent
scattering power was also considered as part of the
power consumption. Furthermore, a unique relay
selection scheme, the dynamic relay selection (DRS)
method, is proposed to select the optimal relay for
information exchange. A comparison of the proposed DF
relay scheme with the amplify-and-forward (AF) scheme
was also made. Finally, the simulation results proved
the efficacy of the proposed work.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Krammer:2022:USI,
author = "Peter Krammer and Marcel Kvassay and J{\'a}n Mojzis
and Martin Kenyeres and Milos Ockay and Ladislav
Hluch{\'y} and Lubos Pavlov and Lubos Skurc{\'a}k",
title = "Using Satellite Imagery to Improve Local Pollution
Models for High-Voltage Transmission Lines and
Insulators",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "99--??",
day = "23",
month = mar,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040099",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/99",
abstract = "This paper addresses the regression modeling of local
environmental pollution levels for electric power
industry needs, which is fundamental for the proper
design and maintenance of high-voltage transmission
lines and insulators in order to prevent various
hazards, such as accidental flashovers due to pollution
and the resultant power outages. The primary goal of
our study was to increase the precision of regression
models for this application area by exploiting
additional input attributes extracted from satellite
imagery and adjusting the modeling methodology. Given
that thousands of different attributes can be extracted
from satellite images, of which only a few are likely
to contain useful information, we also explored
suitable feature selection procedures. We show that a
suitable combination of attribute selection methods
(relief, FSRF-Test, and forward selection), regression
models (random forest models and M5P regression trees),
and modeling methodology (estimating field-measured
values of target variables rather than their upper
bounds) can significantly increase the total modeling
accuracy, measured by the correlation between the
estimated and the true values of target variables.
Specifically, the accuracies of our regression models
dramatically rose from 0.12--0.23 to 0.40--0.64, while
their relative absolute errors were conversely reduced
(e.g., from 1.04 to 0.764 for the best model).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Milicevic:2022:DRN,
author = "Mario Milicevic and Vedran Batos and Adriana Lipovac
and Zeljka Car",
title = "Deep Regression Neural Networks for Proportion
Judgment",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "100--??",
day = "23",
month = mar,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040100",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/100",
abstract = "Deep regression models are widely employed to solve
computer vision tasks, such as human age or pose
estimation, crowd counting, object detection, etc.
Another possible area of application, which to our
knowledge has not been systematically explored so far,
is proportion judgment. As a prerequisite for
successful decision making, individuals often have to
use proportion judgment strategies, with which they
estimate the magnitude of one stimulus relative to
another (larger) stimulus. This makes this estimation
problem interesting for the application of machine
learning techniques. In regard to this, we proposed
various deep regression architectures, which we tested
on three original datasets of very different origin and
composition. This is a novel approach, as the
assumption is that the model can learn the concept of
proportion without explicitly counting individual
objects. With comprehensive experiments, we have
demonstrated the effectiveness of the proposed models
which can predict proportions on real-life datasets
more reliably than human experts, considering the
coefficient of determination ({$>$0}.95) and the amount
of errors ( MAE {$<$} 2, RMSE {$<$} 3). If there is no
significant number of errors in determining the ground
truth, with an appropriate size of the learning
dataset, an additional reduction of MAE to 0.14 can be
achieved. The used datasets will be publicly available
to serve as reference data sources in similar
projects.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cocco:2022:BSH,
author = "Luisanna Cocco and Roberto Tonelli and Michele
Marchesi",
title = "Bitcoin as a Safe Haven during {COVID-19} Disease",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "98--??",
day = "22",
month = mar,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040098",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/98",
abstract = "In this paper, we investigate the role of Bitcoin as a
safe haven against the stock market losses during the
spread of COVID-19. The performed analysis was based on
a regression model with dummy variables defined around
some crucial dates of the pandemic and on the dynamic
conditional correlations. To try to model the real
dynamics of the markets, we studied the safe-haven
properties of Bitcoin against thirteen of the major
stock market indexes losses using daily data spanning
from 1 July 2019 until 20 February 2021. A similar
analysis was also performed for Ether. Results show
that this pandemic impacts on the Bitcoin status as
safe haven, but we are still far from being able to
define Bitcoin as a safe haven.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ferres:2022:PDE,
author = "Kim Ferres and Timo Schloesser and Peter A. Gloor",
title = "Predicting Dog Emotions Based on Posture Analysis
Using {DeepLabCut}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "4",
pages = "97--??",
day = "22",
month = mar,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14040097",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 22 09:50:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/4/97",
abstract = "This paper describes an emotion recognition system for
dogs automatically identifying the emotions anger,
fear, happiness, and relaxation. It is based on a
previously trained machine learning model, which uses
automatic pose estimation to differentiate emotional
states of canines. Towards that goal, we have compiled
a picture library with full body dog pictures featuring
400 images with 100 samples each for the states
``Anger'', ``Fear'', ``Happiness'' and ``Relaxation''.
A new dog keypoint detection model was built using the
framework DeepLabCut for animal keypoint detector
training. The newly trained detector learned from a
total of 13,809 annotated dog images and possesses the
capability to estimate the coordinates of 24 different
dog body part keypoints. Our application is able to
determine a dog's emotional state visually with an
accuracy between 60\% and 70\%, exceeding human
capability to recognize dog emotions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhang:2022:LCG,
author = "Xinhe Zhang and Wenbo Lv and Haoran Tan",
title = "Low-Complexity {GSM} Detection Based on Maximum Ratio
Combining",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "159",
day = "23",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050159",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/159",
abstract = "Generalized spatial modulation (GSM) technology is an
extension of spatial modulation (SM) technology, and
one of its main advantages is to further improve band
efficiency. However, the multiple active antennas for
transmission also brings the demodulation difficulties
at the receiver. To solve the problem of high
computational complexity of the optimal maximum
likelihood (ML) detection, two sub-optimal detection
algorithms are proposed through reducing the number of
transmit antenna combinations (TACs) detected at the
receiver. One is the maximum ratio combining detection
algorithm based on repetitive sorting strategy, termed
as (MRC-RS), which uses MRC repetitive sorting strategy
to select the most likely TACs in detection. The other
is the maximum ratio combining detection algorithm,
which is based on the iterative idea of the orthogonal
matching pursuit, termed the MRC-MP algorithm. The
MRC-MP algorithm reduces the number of TACs through
finite iterations to reduce the computational
complexity. For M-QAM constellation, a hard-limited
maximum likelihood (HLML) detection algorithm is
introduced to calculate the modulation symbol. For the
M-PSK constellation, a low-complexity maximum
likelihood (LCML) algorithm is introduced to calculate
the modulation symbol. The computational complexity of
these two algorithms for calculating the modulation
symbol are independent of modulation order. The
simulation results show that for GSM systems with a
large number of TACs, the proposed two algorithms not
only achieve almost the same bit error rate (BER)
performance as the ML algorithm, but also can greatly
reduce the computational complexity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bilami:2022:LBB,
author = "Karam Eddine Bilami and Pascal Lorenz",
title = "Lightweight Blockchain-Based Scheme to Secure Wireless
{M2M} Area Networks",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "158",
day = "23",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050158",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/158",
abstract = "Security is a challenging issue for M2M/IoT
applications due to the deployment, decentralization
and heterogeneity of M2M and IoT devices. Typical
security solutions may not be suitable for M2M/IoT
systems regarding the difficulties encountered for
their implementation on resource-constrained devices.
In this paper, we discuss the architectures deployed
for M2M communications and the security challenges, as
well as the vulnerabilities and solutions to counter
possible attacks. We present a lightweight design based
on a private blockchain to secure wireless M2M
communications at the device domain level. Blockchain
integration provides secure storage of data while
preserving integrity traceability and availability.
Besides, the evaluation and experimentations under NS3
simulator of the proposed scheme show that the
authentication mechanism is lightweight, and presents
better performances comparatively to other protocols in
terms of key parameters as communication and
computational overheads, average delay and energy
consumption.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{S:2022:QSL,
author = "Shrisha H. S. and Uma Boregowda",
title = "Quality-of-Service-Linked Privileged Content-Caching
Mechanism for Named Data Networks",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "157",
day = "20",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050157",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/157",
abstract = "The domain of information-centric networking (ICN) is
expanding as more devices are becoming a part of
connected technologies. New methods for serving content
from a producer to a consumer are being explored, and
Named Data Networking (NDN) is one of them. The NDN
protocol routes the content from a producer to a
consumer in a network using content names, instead of
IP addresses. This facility, combined with content
caching, efficiently serves content for very large
networks consisting of a hybrid and ad hoc topology
with both wired and wireless media. This paper
addresses the issue of the quality-of-service (QoS)
dimension for content delivery in NDN-based networks.
The Internet Engineering Task Force (IETF) classifies
QoS traffic as (prompt, reliable), prompt, reliable,
and regular, and assigns corresponding priorities for
managing the content. QoS-linked privileged content
caching (QLPCC) proposes strategies for Pending
Interest Table (PIT) and content store (CS) management
in dedicated QoS nodes for handling priority content.
QoS nodes are intermediately resourceful NDN nodes
between content producers and consumers which
specifically manage QoS traffic. The results of this
study are compared with EQPR, PRR probability cache,
and Least Frequently Used (LFU) and Least Fresh First
(LFF) schemes, and QLPCC outperformed the
latter-mentioned schemes in terms of QoS-node CS size
vs. hit rate (6\% to 47\%), response time vs, QoS-node
CS size (65\% to 90\%), and hop count vs. QoS-node CS
size (60\% to 84\%) from the perspectives of priority
traffic and overall traffic. QLPCC performed
predictably when the NDN node count was increased from
500 to 1000, showing that the strategy is scalable.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cox:2022:PEN,
author = "Bert Cox and Chesney Buyle and Daan Delabie and Lieven
{De Strycker} and Liesbet {Van der Perre}",
title = "Positioning Energy-Neutral Devices: Technological
Status and Hybrid {RF}-Acoustic Experiments",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "156",
day = "20",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050156",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/156",
abstract = "The digital transformation is exciting the uptake of
Internet-of-Things technologies, and raises the
questions surrounding our knowledge of the positions of
many of these things. A review of indoor localization
technologies summarized in this paper shows that with
conventional RF-based techniques, a significant
challenge exists in terms of achieving good accuracy
with a low power consumption at the device side. We
present hybrid RF-acoustic approaches as an interesting
alternative: the slow propagation speed of sound allows
for accurate distance measurements, while RF can easily
provide synchronization, data, and power to the
devices. We explain how the combination of adequate
signaling realizing a late wake-up of the devices with
backscattering could position energy-neutral devices.
Experiments in a real-life testbed confirmed the
potential 10 cm-accuracy based on RF-harvested energy.
Nonetheless, these also expose open challenges to be
resolved in order to achieve accurate 3D positioning.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{ZareRavasan:2022:ESI,
author = "Ahad ZareRavasan and Taha Mansouri and Michal
Krc{\'a}l and Saeed Rouhani",
title = "Editorial for the Special Issue on Blockchain:
Applications, Challenges, and Solutions",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "155",
day = "19",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050155",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/155",
abstract = "The digital transformation is exciting the uptake of
Internet-of-Things technologies, and raises the
questions surrounding our knowledge of the positions of
many of these things. A review of indoor localization
technologies summarized in this paper shows that with
conventional RF-based techniques, a significant
challenge exists in terms of achieving good accuracy
with a low power consumption at the device side. We
present hybrid RF-acoustic approaches as an interesting
alternative: the slow propagation speed of sound allows
for accurate distance measurements, while RF can easily
provide synchronization, data, and power to the
devices. We explain how the combination of adequate
signaling realizing a late wake-up of the devices with
backscattering could position energy-neutral devices.
Experiments in a real-life testbed confirmed the
potential 10 cm-accuracy based on RF-harvested energy.
Nonetheless, these also expose open challenges to be
resolved in order to achieve accurate 3D positioning.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Manolopoulos:2022:VME,
author = "Ioannis Manolopoulos and Dimitrios Loukatos and Kimon
Kontovasilis",
title = "A Versatile {MANET} Experimentation Platform and Its
Evaluation through Experiments on the Performance of
Routing Protocols under Diverse Conditions",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "154",
day = "19",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050154",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/154",
abstract = "Mobile Ad hoc Networks (MANETs) are characterized by
highly dynamic phenomena and volatility. These features
have a significant impact on network performance and
should be present in the scenarios of experiments for
the assessment of MANET-related technologies. However,
the currently available experimentation approaches
suffer from limitations, either employing overly
abstract simulation-based models that cannot capture
real-world imperfections or drawing upon ``monolithic''
testbeds suited only to a narrow set of predetermined
technologies, operational scenarios, or environmental
conditions. Toward addressing these limitations, this
work proposes a versatile platform that can accommodate
many of the complexities present in real-world
scenarios while still remaining highly flexible and
customizable to enable a wide variety of MANET-related
experiments. The platform is characterized by a modular
architecture with clearly defined modules for the
signaling between peer mobile nodes, the tracking of
each node's location and motion, the routing protocol
functionality, and the management of communication
messages at each node. The relevant software runs on
inexpensive Raspberry Pi-based commodity hardware,
which can be readily attached to robotic devices for
moving the network nodes in accordance with controlled
mobility patterns. Moreover, through an appropriate
tuning of certain modules, a number of important
operational conditions can be precisely controlled
through software, e.g., restricting the communications
range (thus reducing the network density) or for
emulating the mobility patterns of nodes. The
effectiveness and versatility of the proposed platform
are demonstrated through the realization of a series of
experiments on the performance comparison of selected
routing protocols under diverse network density
conditions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ogundokun:2022:MIT,
author = "Roseline Oluwaseun Ogundokun and Sanjay Misra and
Mychal Douglas and Robertas Damasevicius and Rytis
Maskeliunas",
title = "{Medical Internet-of-Things} Based Breast Cancer
Diagnosis Using Hyperparameter-Optimized Neural
Networks",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "153",
day = "18",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050153",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/153",
abstract = "In today's healthcare setting, the accurate and timely
diagnosis of breast cancer is critical for recovery and
treatment in the early stages. In recent years, the
Internet of Things (IoT) has experienced a
transformation that allows the analysis of real-time
and historical data using artificial intelligence (AI)
and machine learning (ML) approaches. Medical IoT
combines medical devices and AI applications with
healthcare infrastructure to support medical
diagnostics. The current state-of-the-art approach
fails to diagnose breast cancer in its initial period,
resulting in the death of most women. As a result,
medical professionals and researchers are faced with a
tremendous problem in early breast cancer detection. We
propose a medical IoT-based diagnostic system that
competently identifies malignant and benign people in
an IoT environment to resolve the difficulty of
identifying early-stage breast cancer. The artificial
neural network (ANN) and convolutional neural network
(CNN) with hyperparameter optimization are used for
malignant vs. benign classification, while the Support
Vector Machine (SVM) and Multilayer Perceptron (MLP)
were utilized as baseline classifiers for comparison.
Hyperparameters are important for machine learning
algorithms since they directly control the behaviors of
training algorithms and have a significant effect on
the performance of machine learning models. We employ a
particle swarm optimization (PSO) feature selection
approach to select more satisfactory features from the
breast cancer dataset to enhance the classification
performance using MLP and SVM, while grid-based search
was used to find the best combination of the
hyperparameters of the CNN and ANN models. The
Wisconsin Diagnostic Breast Cancer (WDBC) dataset was
used to test the proposed approach. The proposed model
got a classification accuracy of 98.5\% using CNN, and
99.2\% using ANN.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2022:DBA,
author = "Yazhi Liu and Dongyu Wei and Chunyang Zhang and Wei
Li",
title = "Distributed Bandwidth Allocation Strategy for {QoE}
Fairness of Multiple Video Streams in Bottleneck
Links",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "152",
day = "18",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050152",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/152",
abstract = "In QoE fairness optimization of multiple video
streams, a distributed video stream fairness scheduling
strategy based on federated deep reinforcement learning
is designed to address the problem of low bandwidth
utilization due to unfair bandwidth allocation and the
problematic convergence of distributed algorithms in
cooperative control of multiple video streams. The
proposed strategy predicts a reasonable bandwidth
allocation weight for the current video stream
according to its player state and the global
characteristics provided by the server. Then the
congestion control protocol allocates the proportion of
available bandwidth, matching its bandwidth allocation
weight to each video stream in the bottleneck link. The
strategy trains a local predictive model on each client
and periodically performs federated aggregation to
generate the optimal global scheme. In addition, the
proposed strategy constructs global parameters
containing information about the overall state of the
video system to improve the performance of the
distributed scheduling algorithm. The experimental
results show that the introduction of global parameters
can improve the algorithm's QoE fairness and overall
QoE efficiency by 10\% and 8\%, respectively. The QoE
fairness and overall QoE efficiency are improved by 8\%
and 7\%, respectively, compared with the latest
scheme.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Nguyen:2022:QMA,
author = "Duc Nguyen and Nam Pham Ngoc and Truong Cong Thang",
title = "{QoE} Models for Adaptive Streaming: a Comprehensive
Evaluation",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "151",
day = "13",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050151",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/151",
abstract = "Adaptive streaming has become a key technology for
various multimedia services, such as online learning,
mobile streaming, Internet TV, etc. However, because of
throughput fluctuations, video quality may be
dramatically varying during a streaming session. In
addition, stalling events may occur when segments do
not reach the user device before their playback
deadlines. It is well-known that quality variations and
stalling events cause negative impacts on Quality of
Experience (QoE). Therefore, a main challenge in
adaptive streaming is how to evaluate the QoE of
streaming sessions taking into account the influences
of these factors. Thus far, many models have been
proposed to tackle this issue. In addition, a lot of
QoE databases have been publicly available. However,
there have been no extensive evaluations of existing
models using various databases. To fill this gap, in
this study, we conduct an extensive evaluation of
thirteen models on twelve databases with different
characteristics of viewing devices, codecs, and session
durations. Through experiment results, important
findings are provided with regard to QoE prediction of
streaming sessions. In addition, some suggestions on
the effective employment of QoE models are presented.
The findings and suggestions are expected to be useful
for researchers and service providers to make QoE
assessments and improvements of streaming solutions in
adaptive streaming.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Florea:2022:RBT,
author = "Alexandru-Ioan Florea and Ionut Anghel and Tudor
Cioara",
title = "A Review of Blockchain Technology Applications in
Ambient Assisted Living",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "150",
day = "12",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050150",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/150",
abstract = "The adoption of remote assisted care was accelerated
by the COVID-19 pandemic. This type of system acquires
data from various sensors, runs analytics to understand
people's activities, behavior, and living problems, and
disseminates information with healthcare stakeholders
to support timely follow-up and intervention.
Blockchain technology may offer good technical
solutions for tackling Internet of Things monitoring,
data management, interventions, and privacy concerns in
ambient assisted living applications. Even though the
integration of blockchain technology with assisted care
is still at the beginning, it has the potential to
change the health and care processes through a secure
transfer of patient data, better integration of care
services, or by increasing coordination and awareness
across the continuum of care. The motivation of this
paper is to systematically review and organize these
elements according to the main problems addressed. To
the best of our knowledge, there are no studies
conducted that address the solutions for integrating
blockchain technology with ambient assisted living
systems. To conduct the review, we have followed the
Preferred Reporting Items for Systematic Reviews and
Meta-Analyses (PRISMA) methodology with clear criteria
for including and excluding papers, allowing the reader
to effortlessly gain insights into the current
state-of-the-art research in the field. The results
highlight the advantages and open issues that would
require increased attention from the research community
in the coming years. As for directions for further
research, we have identified data sharing and
integration of care paths with blockchain, storage, and
transactional costs, personalization of data disclosure
paths, interoperability with legacy care systems, legal
issues, and digital rights management.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Leech:2022:FMB,
author = "Sonya Leech and Jonathan Dunne and David Malone",
title = "A Framework to Model Bursty Electronic Data
Interchange Messages for Queueing Systems",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "149",
day = "12",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050149",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/149",
abstract = "Within a supply chain organisation, where millions of
messages are processed, reliability and performance of
message throughput are important. Problems can occur
with the ingestion of messages; if they arrive more
quickly than they can be processed, they can cause
queue congestion. This paper models data interchange
(EDI) messages. We sought to understand how best DevOps
should model these messages for performance testing and
how best to apply smart EDI content awareness that
enhance the realms of Ambient Intelligence (Aml) with a
Business-to business (B2B) supply chain organisation.
We considered key performance indicators (KPI) for
over- or under-utilisation of these queueing systems.
We modelled message service and inter-arrival times,
partitioned data along various axes to facilitate
statistical modelling and used continuous parametric
and non-parametric techniques. Our results include the
best fit for parametric and non-parametric techniques.
We noted that a one-size-fits-all model is
inappropriate for this heavy-tailed enterprise dataset.
Our results showed that parametric distribution models
were suitable for modelling the distribution's tail,
whilst non-parametric kernel density estimation models
were better suited for modelling the head of a
distribution. Depending on how we partitioned our data
along the axes, our data suffer from quantisation
noise.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Razak:2022:MUA,
author = "Siti Fatimah Abdul Razak and Sumendra Yogarayan and
Mohd Fikri Azli Abdullah and Afizan Azman",
title = "Modeling User Acceptance of In-Vehicle Applications
for Safer Road Environment",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "148",
day = "11",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050148",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/148",
abstract = "Driver acceptance studies are vital from the
manufacturer's perspective as well as the driver's
perspective. Most empirical investigations are limited
to populations in the United States and Europe. Asian
communities, particularly in Southeast Asia, which make
for a large proportion of global car users, are
underrepresented. To better understand the user
acceptance toward in-vehicle applications, additional
factors need to be included in order to complement the
existing constructs in the Technology Acceptance Model
(TAM). Hypotheses were developed and survey items were
designed to validate the constructs in the research
model. A total of 308 responses were received among
Malaysians via convenience sampling and analyzed using
linear and non-linear regression analyses. Apart from
that, a mediating effect analysis was also performed to
assess the indirect effect a variable has on another
associated variable. We extended the TAM by including
personal characteristics, system characteristics,
social influence and trust, which could influence
users' intention to use the in-vehicle applications. We
found that users from Malaysia are more likely to
accept in-vehicle applications when they have the
information about the system and believe that the
applications are reliable and give an advantage in
their driving experience. Without addressing the user
acceptance, the adoption of the applications may
progress more slowly, with the additional unfortunate
result that potentially avoidable crashes will continue
to occur.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Papadopoulou:2022:MNN,
author = "Olga Papadopoulou and Themistoklis Makedas and Lazaros
Apostolidis and Francesco Poldi and Symeon Papadopoulos
and Ioannis Kompatsiaris",
title = "{MeVer NetworkX}: Network Analysis and Visualization
for Tracing Disinformation",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "147",
day = "10",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050147",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/147",
abstract = "The proliferation of online news, especially during
the ``infodemic'' that emerged along with the COVID-19
pandemic, has rapidly increased the risk of and, more
importantly, the volume of online misinformation.
Online Social Networks (OSNs), such as Facebook,
Twitter, and YouTube, serve as fertile ground for
disseminating misinformation, making the need for tools
for analyzing the social web and gaining insights into
communities that drive misinformation online vital. We
introduce the MeVer NetworkX analysis and visualization
tool, which helps users delve into social media
conversations, helps users gain insights about how
information propagates, and provides intuition about
communities formed via interactions. The contributions
of our tool lie in easy navigation through a multitude
of features that provide helpful insights about the
account behaviors and information propagation, provide
the support of Twitter, Facebook, and Telegram graphs,
and provide the modularity to integrate more platforms.
The tool also provides features that highlight
suspicious accounts in a graph that a user should
investigate further. We collected four Twitter datasets
related to COVID-19 disinformation to present the
tool's functionalities and evaluate its
effectiveness.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Asad:2022:SMS,
author = "Arghavan Asad and Rupinder Kaur and Farah Mohammadi",
title = "A Survey on Memory Subsystems for Deep Neural Network
Accelerators",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "146",
day = "10",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050146",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/146",
abstract = "From self-driving cars to detecting cancer, the
applications of modern artificial intelligence (AI)
rely primarily on deep neural networks (DNNs). Given
raw sensory data, DNNs are able to extract high-level
features after the network has been trained using
statistical learning. However, due to the massive
amounts of parallel processing in computations, the
memory wall largely affects the performance. Thus, a
review of the different memory architectures applied in
DNN accelerators would prove beneficial. While the
existing surveys only address DNN accelerators in
general, this paper investigates novel advancements in
efficient memory organizations and design methodologies
in the DNN accelerator. First, an overview of the
various memory architectures used in DNN accelerators
will be provided, followed by a discussion of memory
organizations on non-ASIC DNN accelerators.
Furthermore, flexible memory systems incorporating an
adaptable DNN computation will be explored. Lastly, an
analysis of emerging memory technologies will be
conducted. The reader, through this article, will:
1---gain the ability to analyze various proposed memory
architectures; 2---discern various DNN accelerators
with different memory designs; 3---become familiar with
the trade-offs associated with memory organizations;
and 4---become familiar with proposed new memory
systems for modern DNN accelerators to solve the memory
wall and other mentioned current issues.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tropea:2022:SWS,
author = "Mauro Tropea and Mattia Giovanni Spina and Floriano
{De Rango} and Antonio Francesco Gentile",
title = "Security in Wireless Sensor Networks: a Cryptography
Performance Analysis at {MAC} Layer",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "145",
day = "10",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050145",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/145",
abstract = "Wireless Sensor Networks (WSNs) are networks of small
devices with limited resources which are able to
collect different information for a variety of
purposes. Energy and security play a key role in these
networks and MAC aspects are fundamental in their
management. The classical security approaches are not
suitable in WSNs given the limited resources of the
nodes, which subsequently require lightweight
cryptography mechanisms in order to achieve high
security levels. In this paper, a security analysis is
provided comparing BMAC and LMAC protocols, in order to
determine, using AES, RSA, and elliptic curve
techniques, the protocol with the best trade-off in
terms of received packets and energy consumption.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gatziolis:2022:AUP,
author = "Kleanthis G. Gatziolis and Nikolaos D. Tselikas and
Ioannis D. Moscholios",
title = "Adaptive User Profiling in E-Commerce and
Administration of Public Services",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "144",
day = "09",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050144",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/144",
abstract = "The World Wide Web is evolving rapidly, and the
Internet is now accessible to millions of users,
providing them with the means to access a wealth of
information, entertainment and e-commerce
opportunities. Web browsing is largely impersonal and
anonymous, and because of the large population that
uses it, it is difficult to separate and categorize
users according to their preferences. One solution to
this problem is to create a web-platform that acts as a
middleware between end users and the web, in order to
analyze the data that is available to them. The method
by which user information is collected and sorted
according to preference is called `user profiling`.
These profiles could be enriched using neural networks.
In this article, we present our implementation of an
online profiling mechanism in a virtual e-shop and how
neural networks could be used to predict the
characteristics of new users. The major contribution of
this article is to outline the way our online profiles
could be beneficial both to customers and stores. When
shopping at a traditional physical store, real time
targeted `` personalized '' advertisements can be
delivered directly to the mobile devices of consumers
while they are walking around the stores next to
specific products, which match their buying habits.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Agbo:2022:MDI,
author = "Benjamin Agbo and Hussain Al-Aqrabi and Richard Hill
and Tariq Alsboui",
title = "Missing Data Imputation in the {Internet of Things}
Sensor Networks",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "143",
day = "06",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050143",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/143",
abstract = "The Internet of Things (IoT) has had a tremendous
impact on the evolution and adoption of information and
communication technology. In the modern world, data are
generated by individuals and collected automatically by
physical objects that are fitted with electronics,
sensors, and network connectivity. IoT sensor networks
have become integral aspects of environmental
monitoring systems. However, data collected from IoT
sensor devices are usually incomplete due to various
reasons such as sensor failures, drifts, network faults
and various other operational issues. The presence of
incomplete or missing values can substantially affect
the calibration of on-field environmental sensors. The
aim of this study is to identify efficient missing data
imputation techniques that will ensure accurate
calibration of sensors. To achieve this, we propose an
efficient and robust imputation technique based on k
-means clustering that is capable of selecting the best
imputation technique for missing data imputation. We
then evaluate the accuracy of our proposed technique
against other techniques and test their effect on
various calibration processes for data collected from
on-field low-cost environmental sensors in urban air
pollution monitoring stations. To test the efficiency
of the imputation techniques, we simulated missing data
rates at 10--40\% and also considered missing values
occurring over consecutive periods of time (1 day, 1
week and 1 month). Overall, our proposed BFMVI model
recorded the best imputation accuracy (0.011758 RMSE
for 10\% missing data and 0.169418 RMSE at 40\% missing
data) compared to the other techniques ( k
Nearest-Neighbour ( k NN), Regression Imputation (RI),
Expectation Maximization (EM) and MissForest
techniques) when evaluated using different performance
indicators. Moreover, the results show a trade-off
between imputation accuracy and computational
complexity with benchmark techniques showing a low
computational complexity at the expense of accuracy
when compared with our proposed technique.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Atif:2022:TMM,
author = "Muhammad Atif and Valentina Franzoni",
title = "Tell Me More: Automating Emojis Classification for
Better Accessibility and Emotional Context
Recognition",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "142",
day = "05",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050142",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/142",
abstract = "Users of web or chat social networks typically use
emojis (e.g., smilies, memes, hearts) to convey in
their textual interactions the emotions underlying the
context of the communication, aiming for better
interpretability, especially for short polysemous
phrases. Semantic-based context recognition tools,
employed in any chat or social network, can directly
comprehend text-based emoticons (i.e., emojis created
from a combination of symbols and characters) and
translate them into audio information (e.g.,
text-to-speech readers for individuals with vision
impairment). On the other hand, for a comprehensive
understanding of the semantic context, image-based
emojis require image-recognition algorithms. This study
aims to explore and compare different classification
methods for pictograms, applied to emojis collected
from Internet sources. Each emoji is labeled according
to the basic Ekman model of six emotional states. The
first step involves extraction of emoji features
through convolutional neural networks, which are then
used to train conventional supervised machine learning
classifiers for purposes of comparison. The second
experimental step broadens the comparison to deep
learning networks. The results reveal that both the
conventional and deep learning classification
approaches accomplish the goal effectively, with deep
transfer learning exhibiting a highly satisfactory
performance, as expected.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhao:2022:EST,
author = "Jie Zhao and Fangwei Xiong and Peiquan Jin",
title = "Enhancing Short-Term Sales Prediction with Microblogs:
a Case Study of the Movie Box Office",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "141",
day = "04",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050141",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/141",
abstract = "Microblogs are one of the major social networks in
people's daily life. The increasing amount of timely
microblog data brings new opportunities for enterprises
to predict short-term product sales based on microblogs
because the daily microblogs posted by various users
can express people's sentiments on specific products,
such as movies and books. Additionally, the social
influence of microblogging platforms enables the rapid
spread of product information, implemented by users'
forwarding and commenting behavior. To verify the
usefulness of microblogs in enhancing the prediction of
short-term product sales, in this paper, we first
present a new framework that adopts the sentiment and
influence features of microblogs. Then, we describe the
detailed feature computation methods for sentiment
polarity detection and influence measurement. We also
implement the Linear Regression (LR) model and the
Support Vector Regression (SVR) model, selected as the
representatives of linear and nonlinear regression
models, to predict short-term product sales. Finally,
we take movie box office predictions as an example and
conduct experiments to evaluate the performance of the
proposed features and models. The results show that the
proposed sentiment feature and influence feature of
microblogs play a positive role in improving the
prediction precision. In addition, both the LR model
and the SVR model can lower the MAPE metric of the
prediction effectively.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cocco:2022:SPI,
author = "Luisanna Cocco and Roberto Tonelli and Michele
Marchesi",
title = "A System Proposal for Information Management in
Building Sector Based on {BIM}, {SSI}, {IoT} and
Blockchain",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "140",
day = "30",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050140",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/140",
abstract = "This work presents a Self Sovereign Identity based
system proposal to show how Blockchain, Building
Information Modeling, Internet of Thing devices, and
Self Sovereign Identity concepts can support the
process of building digitalization, guaranteeing the
compliance standards and technical regulations. The
proposal ensures eligibility, transparency and
traceability of all information produced by
stakeholders, or generated by IoT devices appropriately
placed, during the entire life cycle of a building
artifact. By exploiting the concepts of the Self
Sovereign Identity, our proposal allows the
identification of all involved stakeholders, the
storage off-chain of all information, and that on-chain
of the sole data necessary for the information
notarization and certification, adopting
multi-signature approval mechanisms where appropriate.
In addition it allows the eligibility verification of
the certificated information, providing also useful
information for facility management. It is proposed as
an innovative system and companies that adopt the Open
Innovation paradigm might want to pursue it. The model
proposal is designed exploiting the Veramo platform,
hence the Ethereum Blockchain, and all the
recommendations about Self Sovereign Identity systems
given by the European Blockchain Partnership, and by
the World Wide Web Consortium.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{DelPuerto-Flores:2022:CCS,
author = "Jose Alberto {Del Puerto-Flores} and Jos{\'e} Luis
Naredo and Fernando Pe{\~n}a-Campos and Carolina
Del-Valle-Soto and Leonardo J. Valdivia and Ram{\'o}n
Parra-Michel",
title = "Channel Characterization and {SC-FDM} Modulation for
{PLC} in High-Voltage Power Lines",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "139",
day = "30",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050139",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/139",
abstract = "Digital communication over power lines is an active
field of research and most studies in this field focus
on low-voltage (LV) and medium-voltage (MV) power
systems. Nevertheless, as power companies are starting
to provide communication services and as smart-grid
technologies are being incorporated into power
networks, high-voltage (HV) power-line communication
has become attractive. The main constraint of
conventional HV power-line carrier (PLC) systems is
their unfeasibility for being migrated to wideband
channels, even with a high signal-to-noise ratio (SNR).
In this scenario, none of the current linear/non-linear
equalizers used in single carrier schemes achieve the
complete compensation of the highly dispersive
conditions, which limits their operation to 4 kHz
channels. In this paper, a new PLC-channel model is
introduced for transmission lines incorporating the
effects of the coupling equipment. In addition, the use
of the single-carrier frequency-division modulation
(SC-FDM) is proposed as a solution to operate PLC
systems in a wide bandwidth, achieving transmission
speeds above those of the conventional PLC system. The
results presented in this paper demonstrate the
superior performance of the SC-FDM-PLC over
conventional PLC systems, obtaining a higher
transmission capacity in 10 to 30 times.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chen:2022:FAP,
author = "Zheyi Chen and Weixian Liao and Pu Tian and Qianlong
Wang and Wei Yu",
title = "A Fairness-Aware Peer-to-Peer Decentralized Learning
Framework with Heterogeneous Devices",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "138",
day = "30",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050138",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/138",
abstract = "Distributed machine learning paradigms have benefited
from the concurrent advancement of deep learning and
the Internet of Things (IoT), among which federated
learning is one of the most promising frameworks, where
a central server collaborates with local learners to
train a global model. The inherent heterogeneity of IoT
devices, i.e., non-independent and identically
distributed (non-i.i.d.) data, and the inconsistent
communication network environment results in the
bottleneck of a degraded learning performance and slow
convergence. Moreover, most weight averaging-based
model aggregation schemes raise learning fairness
concerns. In this paper, we propose a peer-to-peer
decentralized learning framework to tackle the above
issues. Particularly, each local client iteratively
finds a learning pair to exchange the local learning
model. By doing this, multiple learning objectives are
optimized to advocate for learning fairness while
avoiding small-group domination. The proposed
fairness-aware approach allows local clients to
adaptively aggregate the received model based on the
local learning performance. The experimental results
demonstrate that the proposed approach is capable of
significantly improving the efficacy of federated
learning and outperforms the state-of-the-art schemes
under real-world scenarios, including balanced-i.i.d.,
unbalanced-i.i.d., balanced-non.i.i.d., and
unbalanced-non.i.i.d. environments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Guia:2022:CSM,
author = "Sana Sahar Guia and Abdelkader Laouid and Mohammad
Hammoudeh and Ahc{\`e}ne Bounceur and Mai Alfawair and
Amna Eleyan",
title = "Co-Simulation of Multiple Vehicle Routing Problem
Models",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "137",
day = "29",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050137",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/137",
abstract = "Complex systems are often designed in a decentralized
and open way so that they can operate on heterogeneous
entities that communicate with each other. Numerous
studies consider the process of components simulation
in a complex system as a proven approach to
realistically predict the behavior of a complex system
or to effectively manage its complexity. The simulation
of different complex system components can be coupled
via co-simulation to reproduce the behavior emerging
from their interaction. On the other hand, multi-agent
simulations have been largely implemented in complex
system modeling and simulation. Each multi-agent
simulator's role is to solve one of the VRP objectives.
These simulators interact within a co-simulation
platform called MECSYCO, to ensure the integration of
the various proposed VRP models. This paper presents
the Vehicle Routing Problem (VRP) simulation results in
several aspects, where the main goal is to satisfy
several client demands. The experiments show the
performance of the proposed VRP multi-model and carry
out its improvement in terms of computational
complexity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kapassa:2022:BTA,
author = "Evgenia Kapassa and Marinos Themistocleous",
title = "Blockchain Technology Applied in {IoV} Demand Response
Management: a Systematic Literature Review",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "136",
day = "29",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050136",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/136",
abstract = "Energy management in the Internet of Vehicles (IoV) is
becoming more prevalent as the usage of distributed
Electric Vehicles (EV) grows. As a result, Demand
Response (DR) management has been introduced to achieve
efficient energy management in IoV. Through DR
management, EV drivers are allowed to adjust their
energy consumption and generation based on a variety of
parameters, such as cost, driving patterns and driving
routes. Nonetheless, research in IoV DR management is
still in its early stages, and the implementation of DR
schemes faces a number of significant hurdles.
Blockchain is used to solve some of them (e.g.,
incentivization, privacy and security issues, lack of
interoperability and high mobility). For instance,
blockchain enables the introduction of safe, reliable
and decentralized Peer-to-Peer (P2P) energy trading.
The combination of blockchain and IoV is a new
promising approach to further improve/overcome the
aforementioned limitations. However, there is limited
literature in Demand Response Management (DRM) schemes
designed for IoV. Therefore, there is a need for a
systematic literature review (SLR) to collect and
critically analyze the existing relevant literature, in
an attempt to highlight open issues. Thus, in this
article, we conduct a SLR, investigating how blockchain
technology assists the area of DRM in IoV. We
contribute to the body of knowledge by offering a set
of observations and research challenges on
blockchain-based DRM in IoV. In doing so, we allow
other researchers to focus their work on them, and
further contribute to this area.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wei:2022:BTM,
author = "Lijun Wei and Yuhan Yang and Jing Wu and Chengnian
Long and Yi-Bing Lin",
title = "A Bidirectional Trust Model for Service Delegation in
{Social Internet of Things}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "135",
day = "29",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050135",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/135",
abstract = "As an emerging paradigm of service infrastructure,
social internet of things (SIoT) applies the social
networking aspects to the internet of things (IoT).
Each object in SIoT can establish the social
relationship without human intervention, which will
enhance the efficiency of interaction among objects,
thus boosting the service efficiency. The issue of
trust is regarded as an important issue in the
development of SIoT. It will influence the object to
make decisions about the service delegation. In the
current literature, the solutions for the trust issue
are always unidirectional, that is, only consider the
needs of the service requester to evaluate the trust of
service providers. Moreover, the relationship between
the service delegation and trust model is still
ambiguous. In this paper, we present a bidirectional
trust model and construct an explicit approach to
address the issue of service delegation based on the
trust model. We comprehensively consider the context of
the SIoT services or tasks for enhancing the
feasibility of our model. The subjective logic is used
for trust quantification and we design two optimized
operators for opinion convergence. Finally, the
proposed trust model and trust-based service delegation
method are validated through a series of numerical
tests.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rozanec:2022:EAI,
author = "Joze Rozanec and Elena Trajkova and Inna Novalija and
Patrik Zajec and Klemen Kenda and Blaz Fortuna and
Dunja Mladeni{\'c}",
title = "Enriching Artificial Intelligence Explanations with
Knowledge Fragments",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "134",
day = "29",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050134",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/134",
abstract = "Artificial intelligence models are increasingly used
in manufacturing to inform decision making. Responsible
decision making requires accurate forecasts and an
understanding of the models' behavior. Furthermore, the
insights into the models' rationale can be enriched
with domain knowledge. This research builds
explanations considering feature rankings for a
particular forecast, enriching them with media news
entries, datasets' metadata, and entries from the
Google knowledge graph. We compare two approaches
(embeddings-based and semantic-based) on a real-world
use case regarding demand forecasting. The
embeddings-based approach measures the similarity
between relevant concepts and retrieved media news
entries and datasets' metadata based on the word
movers' distance between embeddings. The semantic-based
approach recourses to wikification and measures the
Jaccard distance instead. The semantic-based approach
leads to more diverse entries when displaying media
events and more precise and diverse results regarding
recommended datasets. We conclude that the explanations
provided can be further improved with information
regarding the purpose of potential actions that can be
taken to influence demand and to provide ``what-if''
analysis capabilities.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Altuntas:2022:MEV,
author = "Erkin Altuntas and Peter A. Gloor and Pascal Budner",
title = "Measuring Ethical Values with {AI} for Better
Teamwork",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "133",
day = "27",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050133",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/133",
abstract = "Do employees with high ethical and moral values
perform better? Comparing personality characteristics,
moral values, and risk-taking behavior with individual
and team performance has long been researched. Until
now, these determinants of individual personality have
been measured through surveys. However, individuals are
notoriously bad at self-assessment. Combining machine
learning (ML) with social network analysis (SNA) and
natural language processing (NLP), this research draws
on email conversations to predict the personal values
of individuals. These values are then compared with the
individual and team performance of employees. This
prediction builds on a two-layered ML model. Building
on features of social network structure, network
dynamics, and network content derived from email
conversations, we predict personality characteristics,
moral values, and the risk-taking behavior of
employees. In turn, we use these values to predict
individual and team performance. Our results indicate
that more conscientious and less extroverted team
members increase the performance of their teams.
Willingness to take social risks decreases the
performance of innovation teams in a healthcare
environment. Similarly, a focus on values such as power
and self-enhancement increases the team performance of
a global services provider. In sum, the contributions
of this paper are twofold: it first introduces a novel
approach to measuring personal values based on ``honest
signals'' in emails. Second, these values are then used
to build better teams by identifying ideal personality
characteristics for a chosen task.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zargayouna:2022:UMA,
author = "Mahdi Zargayouna",
title = "On the Use of the Multi-Agent Environment for Mobility
Applications",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "132",
day = "27",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050132",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/132",
abstract = "The multi-agent environment is now widely recognised
as a key design abstraction for constructing
multi-agent systems, equally important as the agents.
An explicitly designed environment may have several
roles, such as the inter-mediation between agents, the
support for interaction, the embodiment of rules and
constraints, etc. Mobility applications fit perfectly
with a design in the form of a multi-agent system with
an explicit environment model. Indeed, in these
applications, the components of the system are
autonomous and intelligent (drivers, travellers,
vehicles, etc.), and the transportation network is a
natural environment that they perceive and on which
they act. However, the concept of the multi-agent
environment may be profitably used beyond this specific
geographical context. This paper discusses the
relevance of the multi-agent environment in mobility
applications and describes different use cases in
simulation and optimisation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Khan:2022:RSR,
author = "Hassan Mahmood Khan and Fang-Fang Chua and Timothy
Tzen Vun Yap",
title = "{ReSQoV}: a Scalable Resource Allocation Model for
{QoS}-Satisfied Cloud Services",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "131",
day = "26",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050131",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/131",
abstract = "Dynamic resource provisioning is made more accessible
with cloud computing. Monitoring a running service is
critical, and modifications are performed when specific
criteria are exceeded. It is a standard practice to add
or delete resources in such situations. We investigate
the method to ensure the Quality of Service (QoS),
estimate the required resources, and modify allotted
resources depending on workload, serialization, and
parallelism due to resources. This article focuses on
cloud QoS violation remediation using resource planning
and scaling. A Resource Quantified Scaling for QoS
Violation (ReSQoV) model is proposed based on the
Universal Scalability Law (USL), which provides cloud
service capacity for specific workloads and generates a
capacity model. ReSQoV considers the system overheads
while allocating resources to maintain the agreed QoS.
As the QoS violation detection decision is Probably
Violation and Definitely Violation, the remedial action
is triggered, and required resources are added to the
virtual machine as vertical scaling. The scenarios
emulate QoS parameters and their respective resource
utilization for ReSQoV compared to policy-based
resource allocation. The results show that after
USLbased Quantified resource allocation, QoS is
regained, and validation of the ReSQoV is performed
through the statistical test ANOVA that shows the
significant difference before and after
implementation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yang:2022:CTC,
author = "Hua Yang and Teresa Gon{\c{c}}alves and Paulo Quaresma
and Renata Vieira and Rute Veladas and C{\'a}tia Sousa
Pinto and Jo{\~a}o Oliveira and Maria Cortes Ferreira
and J{\'e}ssica Morais and Ana Raquel Pereira and Nuno
Fernandes and Carolina Gon{\c{c}}alves",
title = "Clinical Trial Classification of {SNS24} Calls with
Neural Networks",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "5",
pages = "130",
day = "26",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14050130",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri May 27 12:03:38 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/5/130",
abstract = "SNS24, the Portuguese National Health Contact Center,
is a telephone and digital public service that provides
clinical services. SNS24 plays an important role in the
identification of users' clinical situations according
to their symptoms. Currently, there are a number of
possible clinical algorithms defined, and selecting the
appropriate clinical algorithm is very important in
each telephone triage episode. Decreasing the duration
of the phone calls and allowing a faster interaction
between citizens and SNS24 service can further improve
the performance of the telephone triage service. In
this paper, we present a study using deep learning
approaches to build classification models, aiming to
support the nurses with the clinical algorithm's
choice. Three different deep learning architectures,
namely convolutional neural network (CNN), recurrent
neural network (RNN), and transformers-based approaches
are applied across a total number of 269,654 call
records belonging to 51 classes. The CNN, RNN, and
transformers-based model each achieve an accuracy of
76.56\%, 75.88\%, and 78.15\% over the test set in the
preliminary experiments. Models using the
transformers-based architecture are further fine-tuned,
achieving an accuracy of 79.67\% with Adam and 79.72\%
with SGD after learning rate fine-tuning; an accuracy
of 79.96\% with Adam and 79.76\% with SGD after epochs
fine-tuning; an accuracy of 80.57\% with Adam after the
batch size fine-tuning. Analysis of similar clinical
symptoms is carried out using the fine-tuned neural
network model. Comparisons are done over the labels
predicted by the neural network model, the support
vector machines model, and the original labels from
SNS24. These results suggest that using deep learning
is an effective and promising approach to aid the
clinical triage of the SNS24 phone call services.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Suraci:2022:TDD,
author = "Chiara Suraci and Sara Pizzi and Federico Montori and
Marco {Di Felice} and Giuseppe Araniti",
title = "{6G} to Take the Digital Divide by Storm: Key
Technologies and Trends to Bridge the Gap",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "189",
day = "19",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060189",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/189",
abstract = "The pandemic caused by COVID-19 has shed light on the
urgency of bridging the digital divide to guarantee
equity in the fruition of different services by all
citizens. The inability to access the digital world may
be due to a lack of network infrastructure, which we
refer to as service-delivery divide, or to the physical
conditions, handicaps, age, or digital illiteracy of
the citizens, that is mentioned as service-fruition
divide. In this paper, we discuss the way how future
sixth-generation (6G) systems can remedy actual
limitations in the realization of a truly digital
world. Hence, we introduce the key technologies for
bridging the digital gap and show how they can work in
two use cases of particular importance, namely eHealth
and education, where digital inequalities have been
dramatically augmented by the pandemic. Finally,
considerations about the socio-economical impacts of
future 6G solutions are drawn.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Paligu:2022:BFI,
author = "Furkan Paligu and Cihan Varol",
title = "Browser Forensic Investigations of {Instagram}
Utilizing {IndexedDB} Persistent Storage",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "188",
day = "17",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060188",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/188",
abstract = "Social media usage is increasing at a rapid rate.
Everyday users are leaving a substantial amount of data
as artifacts in these applications. As the size and
velocity of data increase, innovative technologies such
as Web Storage and IndexedDB are emerging.
Consequently, forensic investigators are facing
challenges to adapt to the emerging technologies to
establish reliable techniques for extracting and
analyzing suspect information. This paper investigates
the convenience and efficacy of performing forensic
investigations with a time frame and social network
connection analysis on IndexedDB technology. It focuses
on artifacts from prevalently used social networking
site Instagram on the Mozilla Firefox browser. A single
case pretest-posttest quasi-experiment is designed and
executed over Instagram web application to produce
artifacts that are later extracted, processed,
characterized, and presented in forms of information
suited to forensic investigation. The artifacts
obtained from Mozilla Firefox are crossed-checked with
artifacts of Google Chrome for verification. In the
end, the efficacy of using these artifacts in forensic
investigations is shown with a demonstration through a
proof-of-concept tool. The results indicate that
Instagram artifacts stored in IndexedDB technology can
be utilized efficiently for forensic investigations,
with a large variety of information ranging from fully
constructed user data to time and location
indicators.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Carchiolo:2022:CAN,
author = "Vincenza Carchiolo and Marco Grassia and Michele
Malgeri and Giuseppe Mangioni",
title = "Co-Authorship Networks Analysis to Discover
Collaboration Patterns among {Italian} Researchers",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "187",
day = "16",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060187",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/187",
abstract = "The study of the behaviors of large community of
researchers and what correlations exist between their
environment, such as grouping rules by law or specific
institution policies, and their performance is an
important topic since it affects the metrics used to
evaluate the quality of the research. Moreover, in
several countries, such as Italy, these metrics are
also used to define the recruitment and funding
policies. To effectively study these topics, we created
a procedure that allow us to craft a large dataset of
Italian Academic researchers, having the most important
performance indices together with co-authorships
information, mixing data extracted from the official
list of academic researchers provided by Italian
Ministry of University and Research and the Elsevier's
Scopus database. In this paper, we discuss our approach
to automate the process of correct association of
profiles and the mapping of publications reducing the
use of computational resources. We also present the
characteristics of four datasets related to specific
research fields defined by the Italian Ministry of
University and Research used to group the Italian
researchers. Then, we present several examples of how
the information extracted from these datasets can help
to achieve a better understanding of the dynamics
influencing scientist performances.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fragkou:2022:MBI,
author = "Evangelia Fragkou and Dimitrios Papakostas and
Theodoros Kasidakis and Dimitrios Katsaros",
title = "Multilayer Backbones for {Internet of Battlefield
Things}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "186",
day = "15",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060186",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/186",
abstract = "The Internet of Battlefield Things is a newly born
cyberphysical system and, even though it shares a lot
with the Internet of Things and with ad hoc networking,
substantial research is required to cope with its scale
and peculiarities. This article examines a fundamental
problem pertaining to the routing of information, i.e.,
the calculation of a backbone network. We model an IoBT
network as a network with multiple layers and employ
the concept of domination for multilayer networks. This
is a significant departure from earlier works, and in
spite of the huge literature on the topic during the
past twenty years, the problem in IoBT networks is
different since these networks are multilayer networks,
thus making inappropriate all the past, related
literature because it deals with single layer (flat)
networks. We establish the computational complexity of
our problem, and design a distributed algorithm for
computing connected dominating sets with small
cardinality. We analyze the performance of the proposed
algorithm on generated topologies, and compare it
against two-the only existing-competitors. The proposed
algorithm establishes itself as the clear winner in all
experiments concerning the dominating set from a
size-wise and an energy-wise perspective achieving a
performance gain of about 15\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Stranieri:2022:ISP,
author = "Silvia Stranieri",
title = "An Indoor Smart Parking Algorithm Based on
Fingerprinting",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "185",
day = "14",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060185",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/185",
abstract = "In the last few years, researchers from many research
fields are investigating the problem affecting all the
drivers in big and populated cities: the parking
problem. In outdoor environments, the problem can be
solved by relying on vehicular ad hoc networks, which
guarantee communication among vehicles populating the
network. When it comes to indoor settings, the problem
gets harder, since drivers cannot count on classic GPS
localization. In this work, a smart parking solution
for a specific indoor setting is provided, exploiting
the fingerprint approach for indoor localization. The
considered scenario is a multi-level car park inside an
airport building. The algorithm provides a vehicle
allocation inside the car park in quadratic time over
the number of parking slots, by also considering the
driver's preferences on the terminal to be reached.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Balmuri:2022:LST,
author = "Kavitha Rani Balmuri and Srinivas Konda and Wen-Cheng
Lai and Parameshachari Bidare Divakarachari and Kavitha
Malali Vishveshwarappa Gowda and Hemalatha
Kivudujogappa Lingappa",
title = "A Long Short-Term Memory Network-Based Radio Resource
Management for {5G} Network",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "184",
day = "14",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060184",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/184",
abstract = "Nowadays, the Long-Term Evolution-Advanced system is
widely used to provide 5G communication due to its
improved network capacity and less delay during
communication. The main issues in the 5G network are
insufficient user resources and burst errors, because
it creates losses in data transmission. In order to
overcome this, an effective Radio Resource Management
(RRM) is required to be developed in the 5G network. In
this paper, the Long Short-Term Memory (LSTM) network
is proposed to develop the radio resource management in
the 5G network. The proposed LSTM-RRM is used for
assigning an adequate power and bandwidth to the
desired user equipment of the network. Moreover, the
Grid Search Optimization (GSO) is used for identifying
the optimal hyperparameter values for LSTM. In radio
resource management, a request queue is used to avoid
the unwanted resource allocation in the network.
Moreover, the losses during transmission are minimized
by using frequency interleaving and guard level
insertion. The performance of the LSTM-RRM method has
been analyzed in terms of throughput, outage
percentage, dual connectivity, User Sum Rate (USR),
Threshold Sum Rate (TSR), Outdoor Sum Rate (OSR),
threshold guaranteed rate, indoor guaranteed rate, and
outdoor guaranteed rate. The indoor guaranteed rate of
LSTM-RRM for 1400 m of building distance improved up to
75.38\% compared to the existing QOC-RRM.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{DeFazio:2022:BCP,
author = "Roberto {De Fazio} and Massimo {De Vittorio} and Paolo
Visconti",
title = "A {BLE}-Connected Piezoresistive and Inertial Chest
Band for Remote Monitoring of the Respiratory Activity
by an {Android} Application: Hardware Design and
Software Optimization",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "183",
day = "11",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060183",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/183",
abstract = "Breathing is essential for human life. Issues related
to respiration can be an indicator of problems related
to the cardiorespiratory system; thus, accurate
breathing monitoring is fundamental for establishing
the patient's condition. This paper presents a
ready-to-use and discreet chest band for monitoring the
respiratory parameters based on the piezoresistive
transduction mechanism. In detail, it relies on a
strain sensor realized with a pressure-sensitive fabric
(EeonTex LTT-SLPA-20K) for monitoring the chest
movements induced by respiration. In addition, the band
includes an Inertial Measurement Unit (IMU), which is
used to remove the motion artefacts from the acquired
signal, thereby improving the measurement reliability.
Moreover, the band comprises a low-power conditioning
and acquisition section that processes the signal from
sensors, providing a reliable measurement of the
respiration rate (RR), in addition to other breathing
parameters, such as inhalation (TI) and exhalation (TE)
times, inhalation-to-exhalation ratio (IER), and flow
rate (V). The device wirelessly transmits the extracted
parameters to a host device, where a custom mobile
application displays them. Different test campaigns
were carried out to evaluate the performance of the
designed chest band in measuring the RR, by comparing
the measurements provided by the chest band with those
obtained by breath count. In detail, six users, of
different genders, ages, and physical constitutions,
were involved in the tests. The obtained results
demonstrated the effectiveness of the proposed approach
in detecting the RR. The achieved performance was in
line with that of other RR monitoring systems based on
piezoresistive textiles, but which use more powerful
acquisition systems or have low wearability. In
particular, the inertia-assisted piezoresistive chest
band obtained a Pearson correlation coefficient with
respect to the measurements based on breath count of
0.96 when the user was seated. Finally, Bland-Altman
analysis demonstrated that the developed system
obtained 0.68 Breaths Per Minute (BrPM) mean difference
(MD), and Limits of Agreement (LoAs) of +3.20 and -1.75
BrPM when the user was seated.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zheng:2022:DRB,
author = "Jason Zheng and Chidinma Dike and Stefan Pancari and
Yi Wang and George C. Giakos and Wafa Elmannai and
Bingyang Wei",
title = "An In-Depth Review on Blockchain Simulators for {IoT}
Environments",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "182",
day = "10",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060182",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/182",
abstract = "Simulating blockchain technology within the IoT has
never been as important. Along with this comes the need
to find suitable blockchain simulators capable of
simulating blockchain networks within an IoT
environment. Despite there being a wide variety of
blockchain simulators, not all are capable of
simulating within an IoT environment and not all are
suitable for every IoT environment. This article will
review previously published works and present a list of
suitable blockchain simulators as well as a few
untested simulators that have the potential to simulate
blockchain networks within an IoT environment. A total
of 18 blockchain simulators are presented and discussed
in this paper. In addition, a comprehensive list of the
advantages and limitations of each simulator is
presented to demonstrate the best situation in which
simulators should be used. Finally, recommendations are
made on when each simulator should be used and in what
situation it should be avoided.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chen:2022:MVF,
author = "Qifan Chen and Yang Lu and Charmaine S. Tam and Simon
K. Poon",
title = "A Multi-View Framework to Detect Redundant Activity
Labels for More Representative Event Logs in Process
Mining",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "181",
day = "09",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060181",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/181",
abstract = "Process mining aims to gain knowledge of business
processes via the discovery of process models from
event logs generated by information systems. The
insights revealed from process mining heavily rely on
the quality of the event logs. Activities extracted
from different data sources or the free-text nature
within the same system may lead to inconsistent labels.
Such inconsistency would then lead to redundancy in
activity labels, which refer to labels that have
different syntax but share the same behaviours.
Redundant activity labels can introduce unnecessary
complexities to the event logs. The identification of
these labels from data-driven process discovery are
difficult and rely heavily on human intervention.
Neither existing process discovery algorithms nor event
data preprocessing techniques can solve such redundancy
efficiently. In this paper, we propose a multi-view
approach to automatically detect redundant activity
labels by using not only context-aware features such as
control-flow relations and attribute values but also
semantic features from the event logs. Our evaluation
of several publicly available datasets and a real-life
case study demonstrate that our approach can
efficiently detect redundant activity labels even with
low-occurrence frequencies. The proposed approach can
add value to the preprocessing step to generate more
representative event logs.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Deng:2022:HFD,
author = "Shangkun Deng and Yingke Zhu and Xiaoru Huang and
Shuangyang Duan and Zhe Fu",
title = "High-Frequency Direction Forecasting of the Futures
Market Using a Machine-Learning-Based Method",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "180",
day = "09",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060180",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/180",
abstract = "Futures price-movement-direction forecasting has
always been a significant and challenging subject in
the financial market. In this paper, we propose a
combination approach that integrates the XGBoost
(eXtreme Gradient Boosting), SMOTE (Synthetic Minority
Oversampling Technique), and NSGA-II (Non-dominated
Sorting Genetic Algorithm-II) methods. We applied the
proposed approach on the direction prediction and
simulation trading of rebar futures, which are traded
on the Shanghai Futures Exchange. Firstly, the minority
classes of the high-frequency rebar futures price
change magnitudes are oversampled using the SMOTE
algorithm to overcome the imbalance problem of the
class data. Then, XGBoost is adopted to construct a
multiclassification model for the
price-movement-direction prediction. Next, the proposed
approach employs NSGA-II to optimize the parameters of
the pre-designed trading rule for trading simulation.
Finally, the price-movement direction is predicted, and
we conducted the high-frequency trading based on the
optimized XGBoost model and the trading rule, with the
classification and trading performances empirically
evaluated by four metrics over four testing periods.
Meanwhile, the LIME (Local Interpretable Model-agnostic
Explanations) is applied as a model explanation
approach to quantify the prediction contributions of
features to the forecasting samples. From the
experimental results, we found that the proposed
approach performed best in terms of direction
prediction accuracy, profitability, and return-risk
ratio. The proposed approach could be beneficial for
decision-making of the rebar traders and related
companies engaged in rebar futures trading.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kankanamge:2022:GCE,
author = "Nayomi Kankanamge and Tan Yigitcanlar and Ashantha
Goonetilleke",
title = "Gamifying Community Education for Enhanced Disaster
Resilience: an Effectiveness Testing Study from
{Australia}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "179",
day = "09",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060179",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/179",
abstract = "Providing convenient and effective online education is
important for the public to be better prepared for
disaster events. Nonetheless, the effectiveness of such
education is questionable due to the limited use of
online tools and platforms, which also results in
narrow community outreach. Correspondingly,
understanding public perceptions of disaster education
methods and experiences for the adoption of novel
methods is critical, but this is an understudied area
of research. The aim of this study is to understand
public perceptions towards online disaster education
practices for disaster preparedness and evaluate the
effectiveness of the gamification method in increasing
public awareness. This study utilizes social media
analytics and conducts a gamification exercise. The
analysis involved Twitter posts ( n = 13,683) related
to the 2019-2020 Australian bushfires, and surveyed
participants ( n = 52) before and after experiencing a
gamified application-i.e., STOP Disasters! The results
revealed that: (a) The public satisfaction level is
relatively low for traditional bushfire disaster
education methods; (b) The study participants'
satisfaction level is relatively high for an online
gamified application used for disaster education; and
(c) The use of virtual and augmented reality was found
to be promising for increasing the appeal of gamified
applications, along with using a blended traditional
and gamified approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Feng:2022:EEB,
author = "Jinghui Feng and Haopeng Kuang and Lihua Zhang",
title = "{EBBA}: an Enhanced Binary Bat Algorithm Integrated
with Chaos Theory and {L{\'e}vy} Flight for Feature
Selection",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "178",
day = "09",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060178",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/178",
abstract = "Feature selection can efficiently improve
classification accuracy and reduce the dimension of
datasets. However, feature selection is a challenging
and complex task that requires a high-performance
optimization algorithm. In this paper, we propose an
enhanced binary bat algorithm (EBBA) which is
originated from the conventional binary bat algorithm
(BBA) as the learning algorithm in a wrapper-based
feature selection model. First, we model the feature
selection problem and then transfer it as a fitness
function. Then, we propose an EBBA for solving the
feature selection problem. In EBBA, we introduce the
L{\'e}vy flight-based global search method, population
diversity boosting method and chaos-based loudness
method to improve the BA and make it more applicable to
feature selection problems. Finally, the simulations
are conducted to evaluate the proposed EBBA and the
simulation results demonstrate that the proposed EBBA
outmatches other comparison benchmarks. Moreover, we
also illustrate the effectiveness of the proposed
improved factors by tests.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hou:2022:EOT,
author = "Changbo Hou and Jiajun Ai and Yun Lin and Chenyang
Guan and Jiawen Li and Wenyu Zhu",
title = "Evaluation of Online Teaching Quality Based on Facial
Expression Recognition",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "177",
day = "08",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060177",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/177",
abstract = "In 21st-century society, with the rapid development of
information technology, the scientific and
technological strength of all walks of life is
increasing, and the field of education has also begun
to introduce high and new technologies gradually.
Affected by the epidemic, online teaching has been
implemented all over the country, forming an education
model of ``dual integration'' of online and offline
teaching. However, the disadvantages of online teaching
are also very obvious; that is, teachers cannot
understand the students' listening status in real-time.
Therefore, our study adopts automatic face detection
and expression recognition based on a deep learning
framework and other related technologies to solve this
problem, and it designs an analysis system of students'
class concentration based on expression recognition.
The students' class concentration analysis system can
help teachers detect students' class concentration and
improve the efficiency of class evaluation. In this
system, OpenCV is used to call the camera to collect
the students' listening status in real-time, and the
MTCNN algorithm is used to detect the face of the video
to frame the location of the student's face image.
Finally, the obtained face image is used for real-time
expression recognition by using the VGG16 network added
with ECANet, and the students' emotions in class are
obtained. The experimental results show that the method
in our study can more accurately identify students'
emotions in class and carry out a teaching effect
evaluation, which has certain application value in
intelligent education fields, such as the smart
classroom and distance learning. For example, a
teaching evaluation module can be added to the teaching
software, and teachers can know the listening emotions
of each student in class while lecturing.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kallempudi:2022:TSS,
author = "Goutham Kallempudi and Khurram Azeem Hashmi and Alain
Pagani and Marcus Liwicki and Didier Stricker and
Muhammad Zeshan Afzal",
title = "Toward Semi-Supervised Graphical Object Detection in
Document Images",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "176",
day = "08",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060176",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/176",
abstract = "The graphical page object detection classifies and
localizes objects such as Tables and Figures in a
document. As deep learning techniques for object
detection become increasingly successful, many
supervised deep neural network-based methods have been
introduced to recognize graphical objects in documents.
However, these models necessitate a substantial amount
of labeled data for the training process. This paper
presents an end-to-end semi-supervised framework for
graphical object detection in scanned document images
to address this limitation. Our method is based on a
recently proposed Soft Teacher mechanism that examines
the effects of small percentage-labeled data on the
classification and localization of graphical objects.
On both the PubLayNet and the IIIT-AR-13K datasets, the
proposed approach outperforms the supervised models by
a significant margin in all labeling ratios (1\%, 5\%
(1\%, 5\% (1\%, 5\%, and 10\%) 10\%) 10\%).
Furthermore, the 10\% 10\% 10\% PubLayNet Soft Teacher
model improves the average precision of Table, Figure,
and List by +5.4, +1.2 +5.4, +1.2 +5.4, +1.2, and +3.2
+3.2 +3.2 points, respectively, with a similar total
mAP as the Faster-RCNN baseline. Moreover, our model
trained on 10\% 10\% 10\% of IIIT-AR-13K labeled data
beats the previous fully supervised method +4.5 +4.5
+4.5 points.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Caldarelli:2022:OBO,
author = "Giulio Caldarelli",
title = "Overview of Blockchain Oracle Research",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "175",
day = "08",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060175",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/175",
abstract = "Whereas the use of distributed ledger technologies has
previously been limited to cryptocurrencies, other
sectors-such as healthcare, supply chain, and
finance-can now benefit from them because of bitcoin
scripts and smart contracts. However, these
applications rely on oracles to fetch data from the
real world, which cannot reproduce the trustless
environment provided by blockchain networks. Despite
their crucial role, academic research on blockchain
oracles is still in its infancy, with few contributions
and a heterogeneous approach. This study undertakes a
bibliometric analysis by highlighting institutions and
authors that are actively contributing to the oracle
literature. Investigating blockchain oracle research
state of the art, research themes, research directions,
and converging studies will also be highlighted to
discuss, on the one hand, current advancements in the
field and, on the other hand, areas that require more
investigation. The results also show that although
worldwide collaboration is still lacking, various
authors and institutions have been working in similar
directions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Giannakoulopoulos:2022:ICO,
author = "Andreas Giannakoulopoulos and Minas Pergantis and
Laida Limniati and Alexandros Kouretsis",
title = "Investigating the Country of Origin and the Role of
the {\tt .eu} {TLD} in External Trade of {European
Union} Member States",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "174",
day = "04",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060174",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/174",
abstract = "The Internet, and specifically the World Wide Web, has
always been a useful tool in the effort to achieve more
outward-looking economies. The launch of the .eu TLD
(top-level domain) in December of 2005 introduced the
concept of a pan-European Internet identity that aimed
to enhance the status of European citizens and
businesses on the global Web. In this study, the
countries of origin of websites that choose to use the
.eu TLD are investigated and the reasoning behind that
choice, as well as its relation to each country's
economy and external trade are discussed. Using the Web
as a tool, information regarding a vast number of
existing .eu websites was collected, through means of
Web data extraction, and this information was analyzed
and processed by a detailed algorithm that produced
results concerning each website's most probable country
of origin based on a multitude of factors. This
acquired knowledge was then used to investigate
relations with each member-state's presence in its
local ccTLD, its GDP and its external trade revenue.
The study establishes a correlation between presence in
the .eu TLD and external trade that is both independent
of a country's GDP and stronger than the relation
between its local ccTLD presence and external trade.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fotiou:2022:IGM,
author = "Nikos Fotiou and Vasilios A. Siris and George
Xylomenos and George C. Polyzos",
title = "{IoT} Group Membership Management Using Decentralized
Identifiers and Verifiable Credentials",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "173",
day = "01",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060173",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/173",
abstract = "Many IoT use cases can benefit from group
communication, where a user requests an IoT resource
and this request can be handled by multiple IoT
devices, each of which may respond back to the user.
IoT group communication involves one-to-many requests
and many-to-one responses, and this creates security
challenges. In this paper, we focus on the provenance
that has been received by an authorized device. We
provide an effective and flexible solution for securing
IoT group communication using CoAP, where a CoAP client
sends a request to a CoAP group and receives multiple
responses by many IoT devices, acting as CoAP servers.
We design a solution that allows CoAP servers to
digitally sign their responses in a way that clients
can verify that a response has been generated by an
authorized member of the CoAP group. In order to
achieve our goal, we leverage Decentralized Identifiers
(DIDs) and Verifiable Credentials (VCs). In particular,
we consider that each group is identified by a DID, and
each group member has received a VC that allows it to
participate in that group. The only information a
client needs to know is the DID of the group, which is
learned using DNSSEC. Our solution allows group members
to rotate their signing keys, it achieves group member
revocation, and it has minimal communication and
computational overhead.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{S:2022:AEV,
author = "Sofana Reka S and Prakash Venugopal and Ravi V and
Hassan Haes Alhelou and Amer Al-Hinai and Pierluigi
Siano",
title = "Analysis of Electric Vehicles with an Economic
Perspective for the Future Electric Market",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "172",
day = "31",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060172",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/172",
abstract = "The automotive industry is marching towards cleaner
energy in the impending future. The need for cleaner
energy is promoted by the government to a large degree
in the global market in order to reduce pollution.
Automobiles contribute to an upper scale in regard to
the level of pollution in the environment. For cleaner
energy in automobiles, the industry needs to be
revolutionized in all needed ways to a massive extent.
The industry has to move from the traditional internal
combustion engine, for which the main sources of energy
are nonrenewable sources, to alternative methods and
sources of energy. The automotive industry is now
focusing on electric vehicles, and more research is
being highlighted from vehicle manufacturers to find
solutions for the problems faced in the field of
electrification. Therefore, to accomplish full
electrification, there is a long way to go, and this
also requires a change in the existing infrastructure
in addition to many innovations in the fields of
infrastructure and grid connectively as well as the
economic impacts of electric vehicles in society. In
this work, an analysis of the electric vehicle market
with the economic impacts of electric vehicles is
studied. This therefore requires the transformation of
the automotive industry.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2022:TSP,
author = "Tingting Wang and Zhuolin Li and Xiulin Geng and
Baogang Jin and Lingyu Xu",
title = "Time Series Prediction of Sea Surface Temperature
Based on an Adaptive Graph Learning Neural Model",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "171",
day = "31",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060171",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/171",
abstract = "The accurate prediction of sea surface temperature
(SST) is the basis for our understanding of local and
global climate characteristics. At present, the
existing sea temperature prediction methods fail to
take full advantage of the potential spatial dependence
between variables. Among them, graph neural networks
(GNNs) modeled on the relationships between variables
can better deal with space-time dependency issues.
However, most of the current graph neural networks are
applied to data that already have a good graph
structure, while in SST data, the dependency
relationship between spatial points needs to be
excavated rather than existing as prior knowledge. In
order to predict SST more accurately and break through
the bottleneck of existing SST prediction methods, we
urgently need to develop an adaptive SST prediction
method that is independent of predefined graph
structures and can take full advantage of the real
temporal and spatial correlations hidden indata sets.
Therefore, this paper presents a graph neural network
model designed specifically for space-time sequence
prediction that can automatically learn the
relationships between variables and model them. The
model automatically extracts the dependencies between
sea temperature multi-variates by embedding the nodes
of the adaptive graph learning module, so that the
fine-grained spatial correlations hidden in the
sequence data can be accurately captured. Figure
learning modules, graph convolution modules, and time
convolution modules are integrated into a unified
end-to-end framework for learning. Experiments were
carried out on the Bohai Sea surface temperature data
set and the South China Sea surface temperature data
set, and the results show that the model presented in
this paper is significantly better than other sea
temperature model predictions in two remote-sensing sea
temperature data sets and the surface temperature of
the South China Sea is easier to predict than the
surface temperature of the Bohai Sea.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alhazmi:2022:DSP,
author = "Huda Alhazmi",
title = "Detection of Students' Problems in Distance Education
Using Topic Modeling and Machine Learning",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "170",
day = "31",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060170",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/170",
abstract = "Following the rapid spread of COVID-19 to all the
world, most countries decided to temporarily close
their educational institutions. Consequently, distance
education opportunities have been created for education
continuity. The abrupt change presented educational
challenges and issues. The aim of this study is to
investigate the content of Twitter posts to detect the
arising topics regarding the challenges of distance
education. We focus on students in Saudi Arabia to
identify the problems they faced in their distance
education experience. We developed a workflow that
integrates unsupervised and supervised machine learning
techniques in two phases. An unsupervised topic
modeling algorithm was applied on a subset of tweets to
detect underlying latent themes related to distance
education issues. Then, a multi-class supervised
machine learning classification technique was carried
out in two levels to classify the tweets under
discussion to categories and further to sub-categories.
We found that 76,737 tweets revealed five underlying
themes: educational issues, social issues,
technological issues, health issues, and attitude and
ethical issues. This study presents an automated
methodology that identifies underlying themes in
Twitter content with a minimum human involvement. The
results of this work suggest that the proposed model
could be utilized for collecting and analyzing social
media data to provide insights into students'
educational experience.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fan:2022:IOM,
author = "Guangwei Fan and Chuanzhen Sheng and Baoguo Yu and Lu
Huang and Qiang Rong",
title = "An Indoor and Outdoor Multi-Source Elastic Fusion
Navigation and Positioning Algorithm Based on Particle
Filters",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "169",
day = "31",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060169",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/169",
abstract = "In terms of indoor and outdoor positioning, in recent
years, researchers at home and abroad have proposed
some multisource integrated navigation and positioning
methods, but these methods are navigation and
positioning methods for a single scene. When it comes
to the switching of indoor and outdoor complex scenes,
these methods will cause the results of position with a
marked jump and affect the accuracy of navigation and
positioning. Aiming at the navigation and positioning
problem in the case of indoor and outdoor complex scene
switching, this paper proposes a multisource elastic
navigation and positioning method based on particle
filters, which makes full use of the redundant
information of multisource sensors, constructs an
elastic multisource fusion navigation and positioning
model after eliminating abnormal data, elastically
gives different particle weights to multisource sensors
according to environmental changes and realizes the
elastic fusion and positioning of multisource sensors
through filtering. The test results show that this
method has high navigation and positioning accuracy,
the dynamic positioning accuracy is better than 0.7 m
and there will be no jumping of positioning results in
the process of scene switching, which improves the
navigation and positioning accuracy and stability in
complex and changeable indoor and outdoor
environments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Murorunkwere:2022:FDU,
author = "Belle Fille Murorunkwere and Origene Tuyishimire and
Dominique Haughton and Joseph Nzabanita",
title = "Fraud Detection Using Neural Networks: a Case Study of
Income Tax",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "168",
day = "31",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060168",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/168",
abstract = "Detecting tax fraud is a top objective for practically
all tax agencies in order to maximize revenues and
maintain a high level of compliance. Data mining,
machine learning, and other approaches such as
traditional random auditing have been used in many
studies to deal with tax fraud. The goal of this study
is to use Artificial Neural Networks to identify
factors of tax fraud in income tax data. The results
show that Artificial Neural Networks perform well in
identifying tax fraud with an accuracy of 92\%, a
precision of 85\%, a recall score of 99\%, and an
AUC-ROC of 95\%. All businesses, either cross-border or
domestic, the period of the business, small businesses,
and corporate businesses, are among the factors
identified by the model to be more relevant to income
tax fraud detection. This study is consistent with the
previous closely related work in terms of features
related to tax fraud where it covered all tax types
together using different machine learning models. To
the best of our knowledge, this study is the first to
use Artificial Neural Networks to detect income tax
fraud in Rwanda by comparing different parameters such
as layers, batch size, and epochs and choosing the
optimal ones that give better accuracy than others. For
this study, a simple model with no hidden layers,
softsign activation function performs better. The
evidence from this study will help auditors in
understanding the factors that contribute to income tax
fraud which will reduce the audit time and cost, as
well as recover money foregone in income tax fraud.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tomas:2022:DAE,
author = "Joana Tom{\'a}s and Deolinda Rasteiro and Jorge
Bernardino",
title = "Data Anonymization: an Experimental Evaluation Using
Open-Source Tools",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "167",
day = "30",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060167",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/gnu.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/167",
abstract = "In recent years, the use of personal data in
marketing, scientific and medical investigation, and
forecasting future trends has really increased. This
information is used by the government, companies, and
individuals, and should not contain any sensitive
information that allows the identification of an
individual. Therefore, data anonymization is essential
nowadays. Data anonymization changes the original data
to make it difficult to identify an individual. ARX
Data Anonymization and Amnesia are two popular
open-source tools that simplify this process. In this
paper, we evaluate these tools in two ways: with the
OSSpal methodology, and using a public dataset with the
most recent tweets about the Pfizer and BioNTech
vaccine. The assessment with the OSSpal methodology
determines that ARX Data Anonymization has better
results than Amnesia. In the experimental evaluation
using the public dataset, it is possible to verify that
Amnesia has some errors and limitations, but the
anonymization process is simpler. Using ARX Data
Anonymization, it is possible to upload big datasets
and the tool does not show any error in the
anonymization process. We concluded that ARX Data
Anonymization is the one recommended to use in data
anonymization.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Huang:2022:OPC,
author = "Zhaohui Huang and Vasilis Friderikos",
title = "Optimal Proactive Caching for Multi-View Streaming
Mobile Augmented Reality",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "166",
day = "30",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060166",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/166",
abstract = "Mobile Augmented Reality (MAR) applications demand
significant communication, computing and caching
resources to support an efficient amalgamation of
augmented reality objects (AROs) with the physical
world in multiple video view streams. In this paper,
the MAR service is decomposed and anchored at different
edge cloud locations to optimally explore the scarce
edge cloud resources, especially during congestion
episodes. In that way, the proposed scheme enables an
efficient processing of popular view streams embedded
with AROs. More specifically, in this paper, we
explicitly utilize the notion of content popularity not
only to synthetic objects but also to the video view
streams. In this case, popular view streams are cached
in a proactive manner, together with preferred/popular
AROs, in selected edge caching locations to improve the
overall user experience during different mobility
events. To achieve that, a joint optimization problem
considering mobility, service decomposition, and the
balance between service delay and the preference of
view streams and embedded AROs is proposed. To tackle
the curse of dimensionality of the optimization
problem, a nominal long short-term memory (LSTM) neural
network is proposed, which is trained offline with
optimal solutions and provides high-quality real-time
decision making within a gap between 5.6\% and 9.8\%
during inference. Evidence from a wide set of numerical
investigations shows that the proposed set of schemes
owns around 15\% to 38\% gains in delay and hence
substantially outperforms nominal schemes, which are
oblivious to user mobility and the inherent
multi-modality and potential decomposition of the MAR
services.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Moubayed:2022:EEI,
author = "Abdallah Moubayed and Abdallah Shami and Anwer
Al-Dulaimi",
title = "On End-to-End Intelligent Automation of {6G}
Networks",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "165",
day = "29",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060165",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/165",
abstract = "The digital transformation of businesses and services
is currently in full force, opening the world to a new
set of unique challenges and opportunities. In this
context, 6G promises to be the set of technologies,
architectures, and paradigms that will promote the
digital transformation and enable growth and
sustainability by offering the means to interact and
control the digital and virtual worlds that are
decoupled from their physical location. One of the main
challenges facing 6G networks is ``end-to-end network
automation''. This is because such networks have to
deal with more complex infrastructure and a diverse set
of heterogeneous services and fragmented use cases.
Accordingly, this paper aims at envisioning the role of
different enabling technologies towards end-to-end
intelligent automated 6G networks. To this end, this
paper first reviews the literature focusing on the
orchestration and automation of next-generation
networks by discussing in detail the challenges facing
efficient and fully automated 6G networks. This
includes automating both the operational and functional
elements for 6G networks. Additionally, this paper
defines some of the key technologies that will play a
vital role in addressing the research gaps and tackling
the aforementioned challenges. More specifically, it
outlines how advanced data-driven paradigms such as
reinforcement learning and federated learning can be
incorporated into 6G networks for more dynamic,
efficient, effective, and intelligent network
automation and orchestration.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Khamaiseh:2022:RDK,
author = "Samer Khamaiseh and Abdullah Al-Alaj and Mohammad
Adnan and Hakam W. Alomari",
title = "The Robustness of Detecting Known and Unknown {DDoS}
Saturation Attacks in {SDN} via the Integration of
Supervised and Semi-Supervised Classifiers",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "164",
day = "27",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060164",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/164",
abstract = "The design of existing machine-learning-based DoS
detection systems in software-defined networking (SDN)
suffers from two major problems. First, the proper time
window for conducting network traffic analysis is
unknown and has proven challenging to determine.
Second, it is unable to detect unknown types of DoS
saturation attacks. An unknown saturation attack is an
attack that is not represented in the training data. In
this paper, we evaluate three supervised classifiers
for detecting a family of DDoS flooding attacks (UDP,
TCP-SYN, IP-Spoofing, TCP-SARFU, and ICMP) and their
combinations using different time windows. This work
represents an extension of the runner-up best-paper
award entitled `Detecting Saturation Attacks in SDN via
Machine Learning' published in the 2019 4th
International Conference on Computing, Communications
and Security (ICCCS). The results in this paper show
that the trained supervised models fail in detecting
unknown saturation attacks, and their overall detection
performance decreases when the time window of the
network traffic increases. Moreover, we investigate the
performance of four semi-supervised classifiers in
detecting unknown flooding attacks. The results
indicate that semi-supervised classifiers outperform
the supervised classifiers in the detection of unknown
flooding attacks. Furthermore, to further increase the
possibility of detecting the known and unknown flooding
attacks, we propose an enhanced hybrid approach that
combines two supervised and semi-supervised
classifiers. The results demonstrate that the hybrid
approach has outperformed individually supervised or
semi-supervised classifiers in detecting the known and
unknown flooding DoS attacks in SDN.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Araujo:2022:OSA,
author = "Andreia Ara{\'u}jo and Filipe Portela and Filipe
Alvelos and Saulo Ruiz",
title = "Optimization of the System of Allocation of Overdue
Loans in a {Sub-Saharan Africa} Microfinance
Institution",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "163",
day = "27",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060163",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/163",
abstract = "In microfinance, with more loans, there is a high risk
of increasing overdue loans by overloading the
resources available to take actions on the repayment.
So, three experiments were conducted to search for a
distribution of the loans through the officers
available to maximize the probability of recovery.
Firstly, the relation between the loan and some
characteristics of the officers was analyzed. The
results were not that strong with F1 scores between 0
and 0.74, with a lot of variation in the scores of the
good predictions. Secondly, the loan is classified as
paid/unpaid based on what prediction could result of
the analysis of the characteristics of the loan. The
Support Vector Machine had potential to be a solution
with a F1 score average of 0.625; however, when
predicting the unpaid loans, it showed to be random
with a score of 0.55. Finally, the experiment focused
on segmentation of the overdue loans in different
groups, from where it would be possible to know their
prioritization. The visualization of three clusters in
the data was clear through Principal Component
Analysis. To reinforce this good visualization, the
final silhouette score was 0.194, which reflects that
is a model that can be trusted. This way, an
implementation of clustering loans into three groups,
and a respective prioritization scale would be the best
strategy to organize and assign the loans to maximize
recovery.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Treiblmaier:2022:WCA,
author = "Horst Treiblmaier",
title = "What Is Coming across the Horizon and How Can We
Handle It? {Bitcoin} Scenarios as a Starting Point for
Rigorous and Relevant Research",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "162",
day = "26",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060162",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/162",
abstract = "The disruptive impact of blockchain technologies can
be felt across numerous industries as it threatens to
disrupt existing business models and economic
structures. To better understand this impact, academic
researchers regularly apply well-established theories
and methods. The vast majority of these approaches are
based on multivariate methods that rely on average
behavior and treat extreme cases as outliers. However,
as recent history has shown, current developments in
blockchain and cryptocurrencies are frequently
characterized by aberrant behavior and unexpected
events that shape individuals' perceptions, market
behavior, and public policymaking. In this paper, I
apply various scenario tools to identify such extreme
scenarios and illustrate their underlying structure as
bundles of interdependent factors. Using the case of
Bitcoin, I illustrate that the identification of
extreme positive and negative scenarios is complex and
heavily depends on underlying economic assumptions. I
present three scenarios in which Bitcoin is
characterized as a financial savior, as a severe threat
to economic stability, or as a substitute to overcome
several shortcomings of the existing financial system.
The research questions that can be derived from these
scenarios bridge behavioral and design science research
and provide a fertile ground for impactful future
research.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rejeb:2022:CPP,
author = "Abderahman Rejeb and John G. Keogh and Wayne
Martindale and Damion Dooley and Edward Smart and
Steven Simske and Samuel Fosso Wamba and John G.
Breslin and Kosala Yapa Bandara and Subhasis Thakur and
Kelly Liu and Bridgette Crowley and Sowmya Desaraju and
Angela Ospina and Horia Bradau",
title = "Charting Past, Present, and Future Research in the
{Semantic Web} and Interoperability",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "161",
day = "25",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060161",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/161",
abstract = "Huge advances in peer-to-peer systems and attempts to
develop the semantic web have revealed a critical issue
in information systems across multiple domains: the
absence of semantic interoperability. Today, businesses
operating in a digital environment require increased
supply-chain automation, interoperability, and data
governance. While research on the semantic web and
interoperability has recently received much attention,
a dearth of studies investigates the relationship
between these two concepts in depth. To address this
knowledge gap, the objective of this study is to
conduct a review and bibliometric analysis of 3511
Scopus-registered papers on the semantic web and
interoperability published over the past two decades.
In addition, the publications were analyzed using a
variety of bibliometric indicators, such as publication
year, journal, authors, countries, and institutions.
Keyword co-occurrence and co-citation networks were
utilized to identify the primary research hotspots and
group the relevant literature. The findings of the
review and bibliometric analysis indicate the dominance
of conference papers as a means of disseminating
knowledge and the substantial contribution of developed
nations to the semantic web field. In addition, the
keyword co-occurrence network analysis reveals a
significant emphasis on semantic web languages, sensors
and computing, graphs and models, and linking and
integration techniques. Based on the co-citation
clustering, the Internet of Things, semantic web
services, ontology mapping, building information
modeling, bioinformatics, education and e-learning, and
semantic web languages were identified as the primary
themes contributing to the flow of knowledge and the
growth of the semantic web and interoperability field.
Overall, this review substantially contributes to the
literature and increases scholars' and practitioners'
awareness of the current knowledge composition and
future research directions of the semantic web field.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pedone:2022:QKD,
author = "Ignazio Pedone and Antonio Lioy",
title = "Quantum Key Distribution in {Kubernetes} Clusters",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "6",
pages = "160",
day = "25",
month = may,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14060160",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Jun 24 09:41:47 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/6/160",
abstract = "Quantum Key Distribution (QKD) represents a reasonable
countermeasure to the advent of Quantum Computing and
its impact on current public-key cryptography. So far,
considerable efforts have been devoted to investigate
possible application scenarios for QKD in several
domains such as Cloud Computing and NFV. This paper
extends a previous work whose main objective was to
propose a new software stack, the Quantum Software
Stack (QSS), to integrate QKD into software-defined
infrastructures. The contribution of this paper is
twofold: enhancing the previous work adding
functionalities to the first version of the QSS, and
presenting a practical integration of the QSS in
Kubernetes, which is the de-facto standard for
container orchestration.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alzoubi:2022:ITB,
author = "Yehia Ibrahim Alzoubi and Ahmad Al-Ahmad and Hasan
Kahtan and Ashraf Jaradat",
title = "{Internet of Things} and Blockchain Integration:
Security, Privacy, Technical, and Design Challenges",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "216",
day = "21",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070216",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/216",
abstract = "The Internet of things model enables a world in which
all of our everyday devices can be integrated and
communicate with each other and their surroundings to
gather and share data and simplify task implementation.
Such an Internet of things environment would require
seamless authentication, data protection, stability,
attack resistance, ease of deployment, and
self-maintenance, among other things. Blockchain, a
technology that was born with the cryptocurrency
Bitcoin, may fulfill Internet of things requirements.
However, due to the characteristics of both Internet of
things devices and Blockchain technology, integrating
Blockchain and the Internet of things can cause several
challenges. Despite a large number of papers that have
been published in the field of Blockchain and the
Internet of things, the problems of this combination
remain unclear and scattered. Accordingly, this paper
aims to provide a comprehensive survey of the
challenges related to Blockchain-Internet of things
integration by evaluating the related peer-reviewed
literature. The paper also discusses some of the
recommendations for reducing the effects of these
challenges. Moreover, the paper discusses some of the
unsolved concerns that must be addressed before the
next generation of integrated Blockchain-Internet of
things applications can be deployed. Lastly, future
trends in the context of Blockchain-Internet of things
integration are discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Watorek:2022:MCC,
author = "Marcin Watorek and Jaros{\l}aw Kwapie{\'n} and
Stanis{\l}aw Drozdz",
title = "Multifractal Cross-Correlations of Bitcoin and Ether
Trading Characteristics in the Post-{COVID-19} Time",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "215",
day = "21",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070215",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/215",
abstract = "Unlike price fluctuations, the temporal structure of
cryptocurrency trading has seldom been a subject of
systematic study. In order to fill this gap, we analyse
detrended correlations of the price returns, the
average number of trades in time unit, and the traded
volume based on high-frequency data representing two
major cryptocurrencies: bitcoin and ether. We apply the
multifractal detrended cross-correlation analysis,
which is considered the most reliable method for
identifying nonlinear correlations in time series. We
find that all the quantities considered in our study
show an unambiguous multifractal structure from both
the univariate (auto-correlation) and bivariate
(cross-correlation) perspectives. We looked at the
bitcoin-ether cross-correlations in simultaneously
recorded signals, as well as in time-lagged signals, in
which a time series for one of the cryptocurrencies is
shifted with respect to the other. Such a shift
suppresses the cross-correlations partially for short
time scales, but does not remove them completely. We
did not observe any qualitative asymmetry in the
results for the two choices of a leading asset. The
cross-correlations for the simultaneous and lagged time
series became the same in magnitude for the
sufficiently long scales.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mir:2022:EGR,
author = "Mohd-Yaseen Mir and Hengbing Zhu and Chih-Lin Hu",
title = "Enhanced Geographic Routing with One- and Two-Hop
Movement Information in Opportunistic Ad Hoc Networks",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "214",
day = "20",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070214",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/214",
abstract = "Opportunistic ad hoc networks are characterized by
intermittent and infrastructure-less connectivity among
mobile nodes. Because of the lack of up-to-date network
topology information and frequent link failures,
geographic routing utilizes location information and
adopts the store-carry-forward data delivery model to
relay messages in a delay-tolerant manner. This paper
proposes a message-forwarding policy based on movement
patterns (MPMF). First, one- and two-hop location
information in a geographic neighborhood is exploited
to select relay nodes moving closer to a destination
node. Message-forwarding decisions are made by
referring to selected relay nodes' weight values
obtained by calculating the contact frequency of each
node with the destination node. Second, when relays in
the vicinity of a message-carrying node are not
qualified due to the sparse node density and nodal
motion status, the destination's movement and the
location information of a one-hop relay are jointly
utilized to improve the message-forwarding decision. If
the one-hop relay is not closer to the destination node
or moving away from it, its centrality value in the
network is used instead. Based on both synthetic and
real mobility scenarios, the simulation results show
that the proposed policy performs incomparable efforts
to some typical routing policies, such as Epidemic,
PRoPHETv2, temporal closeness and centrality-based
(TCCB), transient community-based (TC), and
geographic-based spray-and-relay (GSaR) routing
policies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jesus:2022:SMQ,
author = "Thiago C. Jesus and Daniel G. Costa and Paulo Portugal
and Francisco Vasques",
title = "A Survey on Monitoring Quality Assessment for Wireless
Visual Sensor Networks",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "213",
day = "19",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070213",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/213",
abstract = "Wireless visual sensor networks have been adopted in
different contexts to provide visual information in a
more flexible and distributed way, supporting the
development of different innovative applications.
Although visual data may be central for a considerable
set of applications in areas such as Smart Cities,
Industry 4.0, and Vehicular Networks, the actual visual
data quality may be not easily determined since it may
be associated with many factors that depend on the
characteristics of the considered application scenario.
This entails several aspects from the quality of
captured images (sharpness, definition, resolution) to
the characteristics of the networks such as employed
hardware, power consumption, and networking efficiency.
In order to better support quality analysis and
performance comparisons among different wireless visual
sensor networks, which could be valuable in many
monitoring scenarios, this article surveys this area
with special concern on assessment mechanisms and
quality metrics. In this context, a novel
classification approach is proposed to better
categorize the diverse applicable metrics for quality
assessment of visual monitoring procedures. Hence, this
article yields a practical guide for analyzing
different visual sensor network implementations,
allowing fairer evaluations and comparisons among a
variety of research works. Critical analysis are also
performed regarding the relevance and usage of the
proposed categories and identified quality metrics.
Finally, promising open issues and research directions
are discussed in order to guide new developments in
this research field.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2022:ISR,
author = "Kangying Li and Jiayun Wang and Biligsaikhan Batjargal
and Akira Maeda",
title = "Intuitively Searching for the Rare Colors from Digital
Artwork Collections by Text Description: A Case
Demonstration of {Japanese} Ukiyo-e Print Retrieval",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "212",
day = "18",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070212",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/212",
abstract = "In recent years, artworks have been increasingly
digitized and built into databases, and such databases
have become convenient tools for researchers.
Researchers who retrieve artwork are not only
researchers of humanities, but also researchers of
materials science, physics, art, and so on. It may be
difficult for researchers of various fields whose
studies focus on the colors of artwork to find the
required records in existing databases, that are
color-based and only queried by the metadata. Besides,
although some image retrieval engines can be used to
retrieve artwork by text description, the existing
image retrieval systems mainly retrieve the main colors
of the images, and rare cases of color use are
difficult to find. This makes it difficult for many
researchers who focus on toning, colors, or pigments to
use search engines for their own needs. To solve the
two problems, we propose a cross-modal multi-task
fine-tuning method based on CLIP (Contrastive
Language-Image Pre-Training), which uses the human
sensory characteristics of colors contained in the
language space and the geometric characteristics of the
sketches of a given artwork in order to gain better
representations of that artwork piece. The experimental
results show that the proposed retrieval framework is
efficient for intuitively searching for rare colors,
and that a small amount of data can improve the
correspondence between text descriptions and color
information.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Uhm:2022:ZIP,
author = "Daiho Uhm and Sunghae Jun",
title = "Zero-Inflated Patent Data Analysis Using Generating
Synthetic Samples",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "211",
day = "16",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070211",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/211",
abstract = "Due to the expansion of the internet, we encounter
various types of big data such as web documents or
sensing data. Compared to traditional small data such
as experimental samples, big data provide more chances
to find hidden and novel patterns with big data
analysis using statistics and machine learning
algorithms. However, as the use of big data increases,
problems also occur. One of them is a zero-inflated
problem in structured data preprocessed from big data.
Most count values are zeros because a specific word is
found in only some documents. In particular, since most
of the patent data are in the form of a text document,
they are more affected by the zero-inflated problem. To
solve this problem, we propose a generation of
synthetic samples using statistical inference and tree
structure. Using patent document and simulation data,
we verify the performance and validity of our proposed
method. In this paper, we focus on patent keyword
analysis as text big data analysis, and we encounter
the zero-inflated problem just like other text data.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pinto:2022:BDC,
author = "Flavio Pinto and Yogachandran Rahulamathavan and James
Skinner",
title = "Blockchain for Doping Control Applications in Sports:
A Conceptual Approach",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "210",
day = "14",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070210",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/210",
abstract = "Doping is a well-known problem in competitive sports.
Along the years, several cases have come to public,
evidencing corrupt practices from within the sports
environment. To guarantee fair play and prevent public
health issues, anti-doping organizations and sports
authorities are expected to cooperate in the fight
against doping. To achieve this mission, doping-related
data must be produced, stored, accessed, and shared in
a secure, tamperproof, and privacy-preserving manner.
This paper investigates the processes and tools
established by the World Anti-Doping Agency for the
global harmonization of doping control activities. From
this investigation, it is possible to conclude that
there is an inherent trust problem, in part due to a
centralized data management paradigm and to the lack of
fully digitalized processes. Therefore, this paper
presents two main contributions: the concept of a
multiorganizational decentralized data governance model
and a blockchain-based design for one of the most
sensitive data-sharing processes within the anti-doping
ecosystem. Throughout this article, it is shown that
the adoption of a permissioned blockchain can benefit
the whole anti-doping community, creating more reliable
processes for handling data, where privacy and security
are enhanced.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yang:2022:TPD,
author = "Cheng Yang and Tianliang Lu and Shangyi Yan and
Jianling Zhang and Xingzhan Yu",
title = "N-Trans: Parallel Detection Algorithm for {DGA} Domain
Names",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "209",
day = "13",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070209",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/209",
abstract = "Domain name generation algorithms are widely used in
malware, such as botnet binaries, to generate large
sequences of domain names of which some are registered
by cybercriminals. Accurate detection of malicious
domains can effectively defend against cyber attacks.
The detection of such malicious domain names by the use
of traditional machine learning algorithms has been
explored by many researchers, but still is not perfect.
To further improve on this, we propose a novel parallel
detection model named N-Trans that is based on the
N-gram algorithm with the Transformer model. First, we
add flag bits to the first and last positions of the
domain name for the parallel combination of the N-gram
algorithm and Transformer framework to detect a domain
name. The model can effectively extract the letter
combination features and capture the position features
of letters in the domain name. It can capture features
such as the first and last letters in the domain name
and the position relationship between letters. In
addition, it can accurately distinguish between
legitimate and malicious domain names. In the
experiment, the dataset is the legal domain name of
Alexa and the malicious domain name collected by the
360 Security Lab. The experimental results show that
the parallel detection model based on N-gram and
Transformer achieves 96.97\% accuracy for DGA malicious
domain name detection. It can effectively and
accurately identify malicious domain names and
outperforms the mainstream malicious domain name
detection algorithms.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ertek:2022:AME,
author = "Gurdal Ertek and Aysha Al-Kaabi and Aktham Issa
Maghyereh",
title = "Analytical Modeling and Empirical Analysis of Binary
Options Strategies",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "208",
day = "06",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070208",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/208",
abstract = "This study analyzes binary option investment
strategies by developing mathematical formalism and
formulating analytical models. The binary outcome of
binary options represents either an increase or a
decrease in a parameter, typically an asset or
derivative. The investor receives only partial returns
if the prediction is correct but loses all the
investment otherwise. Mainstream research on binary
options aims to develop the best dynamic trading
strategies. This study focuses on static tactical
easy-to-implement strategies and investigates the
performance of such strategies in relation to
prediction accuracy, payout percentage, and investment
strategy decisions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cheng:2022:RRE,
author = "Hengfei Cheng and Zhaobin Xu and Xiaoxu Guo and Jia
Yang and Kedi Xu and Shuqin Liu and Zhonghe Jin and
Xiaojun Jin",
title = "Research on Routing Equalization Algorithm of
Inter-Satellite Partition for Low-Orbit
Micro-Satellites",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "207",
day = "04",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070207",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/207",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kouretsis:2022:MAK,
author = "Alexandros Kouretsis and Iraklis Varlamis and Laida
Limniati and Minas Pergantis and Andreas
Giannakoulopoulos",
title = "Mapping Art to a Knowledge Graph: Using Data for
Exploring the Relations among Visual Objects in
{Renaissance} Art",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "206",
day = "03",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070206",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/206",
abstract = "Graph-like structures, which are increasingly popular
in data representation, stand out since they enable the
integration of information from multiple sources. At
the same time, clustering algorithms applied on graphs
allow for group entities based on similar
characteristics, and discover statistically important
information. This paper aims to explore the
associations between the visual objects of the
Renaissance in the Europeana database, based on the
results of topic modeling and analysis. For this
purpose, we employ Europeana's Search and Report API to
investigate the relations between the visual objects
from this era, spanning from the 14th to the 17th
century, and to create clusters of similar art objects.
This approach will lead in transforming a cultural
heritage database with semantic technologies into a
dynamic digital knowledge representation graph that
will relate art objects and their attributes. Based on
associations between metadata, we will conduct a
statistic analysis utilizing the knowledge graph of
Europeana and topic modeling analysis.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Baig:2022:SSC,
author = "Zubair Baig and Naeem Syed and Nazeeruddin Mohammad",
title = "Securing the Smart City Airspace: Drone Cyber Attack
Detection through Machine Learning",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "205",
day = "30",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070205",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/205",
abstract = "Drones are increasingly adopted to serve a smart city
through their ability to render quick and adaptive
services. They are also known as unmanned aerial
vehicles (UAVs) and are deployed to conduct area
surveillance, monitor road networks for traffic,
deliver goods and observe environmental phenomena.
Cyber threats posed through compromised drones
contribute to sabotage in a smart city's airspace, can
prove to be catastrophic to its operations, and can
also cause fatalities. In this contribution, we propose
a machine learning-based approach for detecting
hijacking, GPS signal jamming and denial of service
(DoS) attacks that can be carried out against a drone.
A detailed machine learning-based classification of
drone datasets for the DJI Phantom 4 model,
compromising both normal and malicious signatures, is
conducted, and results obtained yield advisory to
foster futuristic opportunities to safeguard a drone
system against such cyber threats.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lamprogeorgos:2022:ATS,
author = "Aristeidis Lamprogeorgos and Minas Pergantis and
Michail Panagopoulos and Andreas Giannakoulopoulos",
title = "Aesthetic Trends and Semantic {Web} Adoption of Media
Outlets Identified through Automated Archival Data
Extraction",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "204",
day = "30",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070204",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/204",
abstract = "The last decade has been a time of great progress in
the World Wide Web and this progress has manifested in
multiple ways, including both the diffusion and
expansion of Semantic Web technologies and the
advancement of the aesthetics and usability of Web user
interfaces. Online media outlets have often been
popular Web destinations and so they are expected to be
at the forefront of innovation, both in terms of the
integration of new technologies and in terms of the
evolution of their interfaces. In this study, various
Web data extraction techniques were employed to collect
current and archival data from news websites that are
popular in Greece, in order to monitor and record their
progress through time. This collected information,
which took the form of a website's source code and an
impression of their homepage in different time
instances of the last decade, has been used to identify
trends concerning Semantic Web integration, DOM
structure complexity, number of graphics, color usage,
and more. The identified trends were analyzed and
discussed with the purpose of gaining a better
understanding of the ever-changing presence of the
media industry on the Web. The study concluded that the
introduction of Semantic Web technologies in online
media outlets was rapid and extensive and that website
structural and visual complexity presented a steady and
significant positive trend, accompanied by increased
adherence to color harmony.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Park:2022:CBH,
author = "Minwoo Park and Euichul Lee",
title = "Correlation between Human Emotion and
Temporal--spatial Contexts by Analyzing Environmental
Factors",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "203",
day = "30",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070203",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/203",
abstract = "In this paper, we propose a method for extracting
emotional factors through audiovisual quantitative
feature analysis from images of the surrounding
environment. Nine features were extracted such as time
complexity, spatial complexity (horizontal and
vertical), color components (hue and saturation),
intensity, contrast, sound amplitude, and sound
frequency. These nine features were used to infer
``pleasant-unpleasant'' and ``arousal-relaxation''
scores through two support vector regressions. First,
the inference accuracy for each of the nine features
was calculated as a hit ratio to check the
distinguishing power of the features. Next, the
difference between the position in the two-dimensional
emotional plane inferred through SVR and the ground
truth determined subjectively by the subject was
examined. As a result of the experiment, it was
confirmed that the time-complexity feature had the best
classification performance, and it was confirmed that
the emotion inferred through SVR can be valid when the
two-dimensional emotional plane is divided into 3 $
\times $ 3.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2022:TSR,
author = "Yingxun Wang and Hushairi Zen and Mohamad Faizrizwan
Mohd Sabri and Xiang Wang and Lee Chin Kho",
title = "Towards Strengthening the Resilience of {IoV} Networks
--- a Trust Management Perspective",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "202",
day = "30",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070202",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/202",
abstract = "Over the past decade or so, considerable and rapid
advancements in the state of the art within the
promising paradigms of the Internet of Things (IoT) and
Artificial Intelligence (AI) have accelerated the
development of conventional Vehicular Ad Hoc Networks
(VANETS) into the Internet of Vehicles (IoV), thereby
bringing both connected and autonomous driving much
closer to realization. IoV is a new concept in the
Intelligent Traffic System (ITS) and an extended
application of IoV in intelligent transportation. It
enhances the existing capabilities of mobile ad hoc
networks by integrating them with IoT so as to build an
integrated and unified vehicle-to-vehicle network. It
is worth mentioning that academic and industrial
researchers are paying increasing attention to the
concept of trust. Reliable trust models and accurate
trust assessments are anticipated to improve the
security of the IoV. This paper, therefore, focuses on
the existing trustworthiness management models along
with their corresponding trust parameters, as well as
the corresponding trust evaluation parameters and
simulation, which provide the basis for intelligent and
efficient model suggestions and optimal parameter
integration. In addition, this paper also puts forward
some open research directions that need to be seriously
solved before trust can play its due role in enhancing
IoV network elasticity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alnaim:2022:MPT,
author = "Abdulrahman K. Alnaim",
title = "Misuse Patterns from the Threat of Modification of
Non-Control Data in Network Function Virtualization",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "201",
day = "30",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070201",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/201",
abstract = "Network Function Virtualization (NFV) is a virtual
network model, the goal of which is a cost-efficient
transition of the hardware infrastructure into a
flexible and reliable software platform. However, this
transition comes at the cost of more security threats.
A key part of this virtualization environment is the
hypervisor, which emulates the hardware resources to
provide a runtime environment for virtual machines
(VMs). The hypervisor is considered a major attack
vector and must be secured to ensure network service
continuity. The virtualization environment contains
critical non-control data where compromise could lead
to several misuses, including information leakage and
privilege and resource modification. In this paper, we
present a misuse pattern for an attack that exploits
the security vulnerabilities of the hypervisor to
compromise the integrity of non-control data in the NFV
environment. Misuse patterns are used to describe how
attacks are carried out from the attackers'
perspective. The threat of modification of non-control
data can lead to several misuses, and in this paper, we
discuss three of them. The defenses to this attack can
be incorporated into the Security Reference
Architecture (SRA) of the NFV system to prevent these
misuses.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Carnley:2022:PIT,
author = "Renee Carnley and Sikha Bagui",
title = "A Public Infrastructure for a Trusted Wireless World",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "200",
day = "30",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070200",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/200",
abstract = "The novelty of this work lies in examining how 5G,
blockchain-based public key infrastructure (PKI), near
field communication (NFC), and zero trust architecture
securely provide not only a trusted digital identity
for telework but also a trusted digital identity for
secure online voting. The paper goes on to discuss how
blockchain-based PKI, NFC, and the cloud provide a
roadmap for how industry and governments can update
existing frameworks to obtain a trusted digital
identity in cyberspace that would provide secure
telework and online voting capabilities.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alibabaei:2022:RTD,
author = "Khadijeh Alibabaei and Eduardo Assun{\c{c}}{\~a}o and
Pedro D. Gaspar and Vasco N. G. J. Soares and Jo{\~a}o
M. L. P. Caldeira",
title = "Real-Time Detection of Vine Trunk for Robot
Localization Using Deep Learning Models Developed for
Edge {TPU} Devices",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "199",
day = "29",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070199",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/199",
abstract = "The concept of the Internet of Things (IoT) in
agriculture is associated with the use of high-tech
devices such as robots and sensors that are
interconnected to assess or monitor conditions on a
particular plot of land and then deploy the various
factors of production such as seeds, fertilizer, water,
etc., accordingly. Vine trunk detection can help create
an accurate map of the vineyard that the agricultural
robot can rely on to safely navigate and perform a
variety of agricultural tasks such as harvesting,
pruning, etc. In this work, the state-of-the-art
single-shot multibox detector (SSD) with MobileDet Edge
TPU and MobileNet Edge TPU models as the backbone was
used to detect the tree trunks in the vineyard.
Compared to the SSD with MobileNet-V1, MobileNet-V2,
and MobileDet as backbone, the SSD with MobileNet Edge
TPU was more accurate in inference on the Raspberrypi,
with almost the same inference time on the TPU. The SSD
with MobileDet Edge TPU achieved the second-best
accurate model. Additionally, this work examines the
effects of some features, including the size of the
input model, the quantity of training data, and the
diversity of the training dataset. Increasing the size
of the input model and the training dataset increased
the performance of the model.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhu:2022:DIC,
author = "Yancong Zhu and Juan Zhang and Zhaoxi Zhang and Gina
Clepper and Jingpeng Jia and Wei Liu",
title = "Designing an Interactive Communication Assistance
System for Hearing-Impaired {College} Students Based on
Gesture Recognition and Representation",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "198",
day = "29",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070198",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/198",
abstract = "Developing a smart classroom can make the modern
classroom more efficient and intelligent. Much research
has been conducted pertaining to smart classrooms for
hearing-impaired college students. However, there have
been few significant breakthroughs in mobilizing
students' learning efficiency as measured by
information transmission, communication, and
interaction in class. This research collects data
through nonparticipatory observation and in-depth
interviews and analyzes available data on classroom
interaction needs of these students. We found that
diversified explanations, recordable interactive
contents, and interaction between teachers and students
could improve the learning effects in the classroom. We
also propose a tracking-processing method based on
gesture recognition and representation and present a
design for a processing system based on AT89C52
microcontroller and Kinect. In this way, sign language
can be translated into text and all students can
receive the information and participate in the
interaction, which greatly improves students' autonomy
and enthusiasm of learning. This design enables deaf
students to fully use classroom learning resources,
reduces learning time costs, and improves learning
efficiency. It can assist teachers in teaching and
tutoring students to enhance their experience.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pappalardo:2022:EOC,
author = "Martina Pappalardo and Antonio Virdis and Enzo
Mingozzi",
title = "Energy-Optimized Content Refreshing of
Age-of-Information-Aware Edge Caches in {IoT} Systems",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "197",
day = "28",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070197",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/197",
abstract = "The Internet of Things (IoT) brings internet
connectivity to everyday devices. These devices
generate a large volume of information that needs to be
transmitted to the nodes running the IoT applications,
where they are processed and used to make some output
decisions. On the one hand, the quality of these
decisions is typically affected by the freshness of the
received information, thus requesting frequent updates
from the IoT devices. On the other hand, the severe
energy, memory, processing, and communication
constraints of IoT devices and networks pose
limitations in the frequency of sensing and reporting.
So, it is crucial to minimize the energy consumed by
the device for sensing the environment and for
transmitting the update messages, while taking into
account the requirements for information freshness.
Edge-caching can be effective in reducing the sensing
and the transmission frequency; however, it requires a
proper refreshing scheme to avoid staleness of
information, as IoT applications need timeliness of
status updates. Recently, the Age of Information (AoI)
metric has been introduced: it is the time elapsed
since the generation of the last received update, hence
it can describe the timeliness of the IoT application's
knowledge of the process sampled by the IoT device. In
this work, we propose a model-driven and AoI-aware
optimization scheme for information caching at the
network edge. To configure the cache parameters, we
formulate an optimization problem that minimizes the
energy consumption, considering both the sampling
frequency and the average frequency of the requests
sent to the device for refreshing the cache, while
satisfying an AoI requirement expressed by the IoT
application. We apply our caching scheme in an emulated
IoT network, and we show that it minimizes the energy
cost while satisfying the AoI requirement. We also
compare the case in which the proposed caching scheme
is implemented at the network edge against the case in
which there is not a cache at the network edge. We show
that the optimized cache can significantly lower the
energy cost of devices that have a high transmission
cost because it can reduce the number of transmissions.
Moreover, the cache makes the system less sensitive to
higher application-request rates, as the number of
messages forwarded to the devices depends on the cache
parameters.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gameiro:2022:IEN,
author = "Lu{\'\i}s Gameiro and Carlos Senna and Miguel
Lu{\'\i}s",
title = "Insights from the Experimentation of Named Data
Networks in Mobile Wireless Environments",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "196",
day = "27",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070196",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/196",
abstract = "The Information-Centric Network (ICN) paradigm has
been touted as one of the candidates for the Internet
of the future, where the Named Data Network (NDN)
architecture is the one leading the way. Despite the
large amount of works published in the literature
targeting new implementations of such architecture,
covering different network topologies and use cases,
there are few NDN implementations in real networks.
Moreover, most of these real-world NDN implementations,
especially those addressing wireless and wired
communication channels, are at a small scale, in
laboratory environments. In this work, we evaluate the
performance of an NDN-based implementation in a mobile
wireless network, as part of a smart city
infrastructure, making use of multiple wireless
interfaces. We start by showing how we have implemented
the NDN stack in current network nodes of the smart
city infrastructure, following a hybrid solution where
both TCP/IP and NDN paradigms can coexist. The
implementation is evaluated in three scenarios,
targeting different situations: mobility, the
simultaneous use of different wireless interfaces and
the network characteristics. The results show that our
implementation works properly and insights about the
correct NDN parameterization are derived.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mpimis:2022:CDG,
author = "Thanassis Mpimis and Theodore T. Kapsis and Athanasios
D. Panagopoulos and Vassilis Gikas",
title = "Cooperative {D-GNSS} Aided with Multi Attribute
Decision Making Module: a Rigorous Comparative
Analysis",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "195",
day = "27",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070195",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/195",
abstract = "Satellite positioning lies within the very core of
numerous Intelligent Transportation Systems (ITS) and
Future Internet applications. With the emergence of
connected vehicles, the performance requirements of
Global Navigation Satellite Systems (GNSS) are
constantly pushed to their limits. To this end,
Cooperative Positioning (CP) solutions have attracted
attention in order to enhance the accuracy and
reliability of low-cost GNSS receivers, especially in
complex propagation environments. In this paper, the
problem of efficient and robust CP employing low-cost
GNSS receivers is investigated over critical ITS
scenarios. By adopting a Cooperative-Differential GNSS
(C-DGNSS) framework, the target's vehicle receiver can
obtain Position-Velocity-Time (PVT) corrections from a
neighboring vehicle and update its own position in
real-time. A ranking module based on multi-attribute
decision-making (MADM) algorithms is proposed for the
neighboring vehicle rating and optimal selection. The
considered MADM techniques are simulated with various
weightings, normalization techniques, and criteria
associated with positioning accuracy and reliability.
The obtained criteria values are experimental GNSS
measurements from several low-cost receivers. A
comparative and sensitivity analysis are provided by
evaluating the MADM algorithms in terms of ranking
performance and robustness. The positioning data time
series and the numerical results are then presented,
and comments are made. Scoring-based and distance-based
MADM methods perform better, while L1 RMS, HDOP, and Hz
std are the most critical criteria. The multi-purpose
applicability of the proposed scheme, not only for land
vehicles, is also discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alhaj:2022:NTC,
author = "Yousif A. Alhaj and Abdelghani Dahou and Mohammed A.
A. Al-qaness and Laith Abualigah and Aaqif Afzaal
Abbasi and Nasser Ahmed Obad Almaweri and Mohamed Abd
Elaziz and Robertas Damasevicius",
title = "A Novel Text Classification Technique Using Improved
Particle Swarm Optimization: a Case Study of {Arabic}
Language",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "194",
day = "27",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070194",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/194",
abstract = "We propose a novel text classification model, which
aims to improve the performance of Arabic text
classification using machine learning techniques. One
of the effective solutions in Arabic text
classification is to find the suitable feature
selection method with an optimal number of features
alongside the classifier. Although several text
classification methods have been proposed for the
Arabic language using different techniques, such as
feature selection methods, an ensemble of classifiers,
and discriminative features, choosing the optimal
method becomes an NP-hard problem considering the huge
search space. Therefore, we propose a method, called
Optimal Configuration Determination for Arabic text
Classification (OCATC), which utilized the Particle
Swarm Optimization (PSO) algorithm to find the optimal
solution (configuration) from this space. The proposed
OCATC method extracts and converts the features from
the textual documents into a numerical vector using the
Term Frequency-Inverse Document Frequency (TF-IDF)
approach. Finally, the PSO selects the best
architecture from a set of classifiers to feature
selection methods with an optimal number of features.
Extensive experiments were carried out to evaluate the
performance of the OCATC method using six datasets,
including five publicly available datasets and our
proposed dataset. The results obtained demonstrate the
superiority of OCATC over individual classifiers and
other state-of-the-art methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kondratyeva:2022:CDB,
author = "Anastasia Kondratyeva and Daria Ivanova and Vyacheslav
Begishev and Ekaterina Markova and Evgeni Mokrov and
Yuliya Gaidamaka and Konstantin Samouylov",
title = "Characterization of Dynamic Blockage Probability in
Industrial Millimeter Wave {5G} Deployments",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "193",
day = "27",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070193",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/193",
abstract = "5G New Radio (NR) systems promise to expand offered
services to enable industrial automation scenarios. To
enable ultra-low latency at the air interface and to
exploit spatial redundancy for applications such as
synchronization and motion control, user equipment (UE)
will naturally require device-to-device (D2D) and base
station (BS) to UE communications and directional
transmissions provided by millimeter wave (mmWave)
frequencies. However, the performance of such systems
is affected by the blockage phenomenon. In this paper,
we propose a simple line-of-sight (LoS) blockage model
for Industrial mmWave-based industrial Internet of
Things (IIoT) deployments. The model is based on two
sub-models, where each part can be changed/replaced to
fit the scenario of interest. The first part is based
on photogrammetry and provides the transparency
probability for a single element on the factory floor.
The second one utilizes these models of industrial
elements to form the deployment and then applies
stochastic geometry to derive the blockage probability.
The proposed model can be utilized for any type of
industrial machine, accounts for their inherent regular
deployments on the factory floor, and provides the
final results in an easy-to-compute form. Our results
indicate that direct UE-UE communications are feasible
in sparse deployments (less than 0.1 machine/m 2 ) or
at small communications distances (less than 5-10 m) or
in deployments with highly transparent machines
(machine transparency less than 0.5). Otherwise, BS-UE
communications need to be utilized. In this case, BS
height becomes a critical parameter affecting the LoS
probability. Specifically, using a BS height of 10 m
allows blockage probability to be improved by 20-30\%
as compared to a BS of height 4 m. Finally, as UE
height produces more impact on the blockage probability
as compared to a machine height, in real deployments,
one needs to ensure that the height of communications
modules at UEs are maximized.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Musa:2022:CIC,
author = "Salahadin Seid Musa and Marco Zennaro and Mulugeta
Libsie and Ermanno Pietrosemoli",
title = "Convergence of Information-Centric Networks and Edge
Intelligence for {IoV}: Challenges and Future
Directions",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "192",
day = "25",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070192",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/192",
abstract = "Recently the Internet of Vehicles (IoV) has become a
promising research area in the field of the Internet of
Things (IoT), which enables vehicles to communicate and
exchange real-time information with each other, as well
as with infrastructure, people, and other sensors and
actuators through various communication interfaces. The
realization of IoV networks faces various communication
and networking challenges to meet stringent
requirements of low latency, dynamic topology, high
data-rate connectivity, resource allocation, multiple
access, and QoS. Advances in information-centric
networks (ICN), edge computing (EC), and artificial
intelligence (AI) will transform and help to realize
the Intelligent Internet of Vehicles (IIoV).
Information-centric networks have emerged as a paradigm
promising to cope with the limitations of the current
host-based network architecture (TCP/IP-based networks)
by providing mobility support, efficient content
distribution, scalability and security based on content
names, regardless of their location. Edge computing
(EC), on the other hand, is a key paradigm to provide
computation, storage and other cloud services in close
proximity to where they are requested, thus enabling
the support of real-time services. It is promising for
computation-intensive applications, such as autonomous
and cooperative driving, and to alleviate storage
burdens (by caching). AI has recently emerged as a
powerful tool to break through obstacles in various
research areas including that of intelligent transport
systems (ITS). ITS are smart enough to make decisions
based on the status of a great variety of inputs. The
convergence of ICN and EC with AI empowerment will
bring new opportunities while also raising
not-yet-explored obstacles to realize Intelligent IoV.
In this paper, we discuss the applicability of AI
techniques in solving challenging vehicular problems
and enhancing the learning capacity of edge devices and
ICN networks. A comprehensive review is provided of
utilizing intelligence in EC and ICN to address current
challenges in their application to IIoV. In particular,
we focus on intelligent edge computing and networking,
offloading, intelligent mobility-aware caching and
forwarding and overall network performance.
Furthermore, we discuss potential solutions to the
presented issues. Finally, we highlight potential
research directions which may illuminate efforts to
develop new intelligent IoV applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Satapathy:2022:PSD,
author = "Ranjan Satapathy and Shweta Rajesh Pardeshi and Erik
Cambria",
title = "Polarity and Subjectivity Detection with Multitask
Learning and {BERT} Embedding",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "191",
day = "22",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070191",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/191",
abstract = "In recent years, deep learning-based sentiment
analysis has received attention mainly because of the
rise of social media and e-commerce. In this paper, we
showcase the fact that the polarity detection and
subjectivity detection subtasks of sentiment analysis
are inter-related. To this end, we propose a
knowledge-sharing-based multitask learning framework.
To ensure high-quality knowledge sharing between the
tasks, we use the Neural Tensor Network, which consists
of a bilinear tensor layer that links the two entity
vectors. We show that BERT-based embedding with our MTL
framework outperforms the baselines and achieves a new
state-of-the-art status in multitask learning. Our
framework shows that the information across datasets
for related tasks can be helpful for understanding
task-specific features.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ajami:2022:FSA,
author = "Hicham Ajami and Hamid Mcheick and Catherine Laprise",
title = "First Steps of Asthma Management with a Personalized
Ontology Model",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "7",
pages = "190",
day = "22",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14070190",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 26 06:44:01 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/7/190",
abstract = "Asthma is a chronic respiratory disease characterized
by severe inflammation of the bronchial mucosa.
Allergic asthma is the most common form of this health
issue. Asthma is classified into allergic and
non-allergic asthma, and it can be triggered by several
factors such as indoor and outdoor allergens, air
pollution, weather conditions, tobacco smoke, and food
allergens, as well as other factors. Asthma symptoms
differ in their frequency and severity since each
patient reacts differently to these triggers. Formal
knowledge is selected as one of the most promising
solutions to deal with these challenges. This paper
presents a new personalized approach to manage asthma.
An ontology-driven model supported by Semantic Web Rule
Language (SWRL) medical rules is proposed to provide
personalized care for an asthma patient by identifying
the risk factors and the development of possible
exacerbations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lombardo:2022:MLB,
author = "Gianfranco Lombardo and Mattia Pellegrino and George
Adosoglou and Stefano Cagnoni and Panos M. Pardalos and
Agostino Poggi",
title = "Machine Learning for Bankruptcy Prediction in the
{American} Stock Market: Dataset and Benchmarks",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "244",
day = "22",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080244",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/244",
abstract = "Predicting corporate bankruptcy is one of the
fundamental tasks in credit risk assessment. In
particular, since the 2007/2008 financial crisis, it
has become a priority for most financial institutions,
practitioners, and academics. The recent advancements
in machine learning (ML) enabled the development of
several models for bankruptcy prediction. The most
challenging aspect of this task is dealing with the
class imbalance due to the rarity of bankruptcy events
in the real economy. Furthermore, a fair comparison in
the literature is difficult to make because bankruptcy
datasets are not publicly available and because studies
often restrict their datasets to specific economic
sectors and markets and/or time periods. In this work,
we investigated the design and the application of
different ML models to two different tasks related to
default events: (a) estimating survival probabilities
over time; (b) default prediction using time-series
accounting data with different lengths. The entire
dataset used for the experiments has been made
available to the scientific community for further
research and benchmarking purposes. The dataset
pertains to 8262 different public companies listed on
the American stock market between 1999 and 2018.
Finally, in light of the results obtained, we
critically discuss the most interesting metrics as
proposed benchmarks for future studies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Buccafurri:2022:BBF,
author = "Francesco Buccafurri and Vincenzo {De Angelis} and
Sara Lazzaro",
title = "A Blockchain-Based Framework to Enhance Anonymous
Services with Accountability Guarantees",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "243",
day = "21",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080243",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/243",
abstract = "Anonymous service delivery has attracted the interest
of research and the industry for many decades. To
obtain effective solutions, anonymity should be
guaranteed against the service provider itself.
However, if the full anonymity of users is implemented,
no accountability mechanism can be provided. This
represents a problem, especially when referring to
scenarios in which a user, protected by anonymity, may
perform illegally when leveraging the anonymous
service. In this paper, we propose a blockchain-based
solution to the trade-off between anonymity and
accountability. In particular, our solution relies on
three independent parties (one of which is the service
provider itself) such that only the collaboration of
all three actors allows for the disclosure of the real
identity of the user. In all other cases, anonymity is
guaranteed. To show the feasibility of the proposal, we
developed a prototype with user-friendly interfaces
that minimize the client-side operations. Our solution
is then also effective from the point of view of
usability.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kallitsis:2022:PED,
author = "Georgios Kallitsis and Vasileios Karyotis and Symeon
Papavassiliou",
title = "On the Potential of Enhancing Delay-Tolerant Routing
Protocols via Age of Information",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "242",
day = "17",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080242",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/242",
abstract = "In this paper, we study the potential of using the
metric of Age of Information (AoI) for enhancing
delay-tolerant routing protocols. The latter have been
proposed for alleviating the impact of long roundtrip
time in networks operating in harsh environments, e.g.,
in distributed applications deployed in a
desert/sparsely populated area without infrastructure,
a space network, etc. Delay-tolerant routing protocols
can prevent excessive packet timer expiration, but do
not provide any packet delivery time guarantee. Thus,
they are unsuitable for time-sensitive applications
that are more intensely desired nowadays in the next
generation networking applications. By incorporating
AoI into the operation of delay-tolerant routing
protocols, we aim at devising routing protocols that
can cope with both long propagation times and
challenges related to time-sensitivity in packet
delivery. More specifically, in this work, we modify
the operation of a well-known delay-tolerant routing
protocol, namely FRESH, to make AoI-based packet
forwarding decisions, aiming at achieving specific
delay guarantees regarding the end-to-end delivery
time. We investigate the advantages and disadvantages
of such an approach compared to the traditional FRESH
protocol. This work serves as a cornerstone for
successfully demonstrating the potential of exploiting
AoI in delay-tolerant routing and its applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Panda:2022:NLI,
author = "Padmalochan Panda and Alekha Kumar Mishra and Deepak
Puthal",
title = "A Novel Logo Identification Technique for Logo-Based
Phishing Detection in Cyber-Physical Systems",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "241",
day = "15",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080241",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/241",
abstract = "The first and foremost task of a phishing-detection
mechanism is to confirm the appearance of a suspicious
page that is similar to a genuine site. Once this is
found, a suitable URL analysis mechanism may lead to
conclusions about the genuineness of the suspicious
page. To confirm appearance similarity, most of the
approaches inspect the image elements of the genuine
site, such as the logo, theme, font color and style. In
this paper, we propose a novel logo-based
phishing-detection mechanism that characterizes the
existence and unique distribution of hue values in a
logo image as the foundation to unambiguously represent
a brand logo. Using the proposed novel feature, the
detection mechanism optimally classifies a suspicious
logo to the best matching brand logo. The experiment is
performed over our customized dataset based on the
popular phishing brands in the South-Asia region. A set
of five machine-learning algorithms is used to train
and test the prepared dataset. We inferred from the
experimental results that the ensemble random forest
algorithm achieved the high accuracy of 87\% with our
prepared dataset.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yaser:2022:IDD,
author = "Ahmed Latif Yaser and Hamdy M. Mousa and Mahmoud
Hussein",
title = "Improved {DDoS} Detection Utilizing Deep Neural
Networks and Feedforward Neural Networks as
Autoencoder",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "240",
day = "12",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080240",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/240",
abstract = "Software-defined networking (SDN) is an innovative
network paradigm, offering substantial control of
network operation through a network's architecture. SDN
is an ideal platform for implementing projects
involving distributed applications, security solutions,
and decentralized network administration in a
multitenant data center environment due to its
programmability. As its usage rapidly expands, network
security threats are becoming more frequent, leading
SDN security to be of significant concern.
Machine-learning (ML) techniques for intrusion
detection of DDoS attacks in SDN networks utilize
standard datasets and fail to cover all classification
aspects, resulting in under-coverage of attack
diversity. This paper proposes a hybrid technique to
recognize denial-of-service (DDoS) attacks that combine
deep learning and feedforward neural networks as
autoencoders. Two datasets were analyzed for the
training and testing model, first statically and then
iteratively. The auto-encoding model is constructed by
stacking the input layer and hidden layer of
self-encoding models' layer by layer, with each
self-encoding model using a hidden layer. To evaluate
our model, we use a three-part data split (train, test,
and validate) rather than the common two-part split
(train and test). The resulting proposed model achieved
a higher accuracy for the static dataset, where for
ISCX-IDS-2012 dataset, accuracy reached a high of
99.35\% in training, 99.3\% in validation and 99.99\%
in precision, recall, and F1-score. for the UNSW2018
dataset, the accuracy reached a high of 99.95\% in
training, 0.99.94\% in validation, and 99.99\% in
precision, recall, and F1-score. In addition, the model
achieved great results with a dynamic dataset (using an
emulator), reaching a high of 97.68\% in accuracy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ali:2022:DDA,
author = "Usman Ali and Giuseppe Caso and Luca {De Nardis} and
Konstantinos Kousias and Mohammad Rajiullah and
{\"O}zg{\"u} Alay and Marco Neri and Anna Brunstrom and
Maria-Gabriella {Di Benedetto}",
title = "Data-Driven Analysis of Outdoor-to-Indoor Propagation
for {5G} Mid-Band Operational Networks",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "239",
day = "11",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080239",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/239",
abstract = "The successful rollout of fifth-generation (5G)
networks requires a full understanding of the behavior
of the propagation channel, taking into account the
signal formats and the frequencies standardized by the
Third Generation Partnership Project (3GPP). In the
past, channel characterization for 5G has been
addressed mainly based on the measurements performed on
dedicated links in experimental setups. This paper
presents a state-of-the-art contribution to the
characterization of the outdoor-to-indoor radio channel
in the 3.5 GHz band, based on experimental data for
commercial, deployed 5G networks, collected during a
large scale measurement campaign carried out in the
city of Rome, Italy. The analysis presented in this
work focuses on downlink, outdoor-to-indoor propagation
for two operators adopting two different beamforming
strategies, single wide-beam and multiple
synchronization signal blocks (SSB) based beamforming;
it is indeed the first contribution studying the impact
of beamforming strategy in real 5G networks. The time
and power-related channel characteristics, i.e., mean
excess delay and Root Mean Square (RMS) delay spread,
path loss, and K-factor are studied for the two
operators in multiple measurement locations. The
analysis of time and power-related parameters is
supported and extended by a correlation analysis
between each pair of parameters. The results show that
beamforming strategy has a marked impact on
propagation. A single wide-beam transmission leads, in
fact, to lower RMS delay spread and lower mean excess
delay compared to a multiple SSB-based transmission
strategy. In addition, the single wide-beam
transmission system is characterized by a smaller path
loss and a higher K-factor, suggesting that the
adoption of a multiple SSB-based transmission strategy
may have a negative impact on downlink performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Raheman:2022:WZV,
author = "Fazal Raheman and Tejas Bhagat and Brecht Vermeulen
and Peter {Van Daele}",
title = "Will Zero Vulnerability Computing {(ZVC)} Ever Be
Possible? {Testing} the Hypothesis",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "238",
day = "30",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080238",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/238",
abstract = "Life without computers is unimaginable. However,
computers remain vulnerable to cybercrimes, a USD 6
trillion industry that the world has come to accept as
a ``necessary evil''. Third-party permissions resulting
in an attack surface (AS) and in-computer storage that
computers mandate are key design elements that hackers
exploit, formerly by remote malware installation and
later by stealing personal data using authentication
faking techniques. In legacy computers, the AS cannot
be completely eliminated, nor can a connected device
retain data offline, rendering fool-proof cybersecurity
impossible. Although the architects of legacy computers
made perfectly reasonable engineering trade-offs for
their world, our world is very different. Zero
vulnerability computing (ZVC) challenges the impossible
with in-computer offline storage (ICOS) and Supra OS
(SOS), to deliver comprehensive protection against
vulnerabilities. The feasibility of ZVC is demonstrated
in a tiny permanently computer-mounted hardware wallet,
providing the first evidence of the complete
obliteration of the AS. Malware cannot infect the ZVC
device on account of lacking an AS, nor can personal
data be hacked as they mostly remain offline, except
for sporadic processing. Further research should
explore whether ZVC can fully secure computers in more
complex real-world scenarios and open a new epoch in
the evolution of computers and the Internet.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fallucchi:2022:DQQ,
author = "Francesca Fallucchi and Bouchra Ghattas and Riem
Spielhaus and Ernesto William {De Luca}",
title = "Digital Qualitative and Quantitative Analysis of
{Arabic} Textbooks",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "237",
day = "29",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080237",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/237",
abstract = "Digital Humanities (DH) provide a broad spectrum of
functionalities and tools that enable the enrichment of
both quantitative and qualitative research methods in
the humanities. It has been widely recognized that DH
can help in curating and analysing large amounts of
data. However, digital tools can also support research
processes in the humanities that are interested in
detailed analyses of how empirical sources are
patterned. Following a methodological differentiation
between close and distant reading with regard to
textual analysis, this article describes the Edumeres
Toolbox, a digital tool for textbook analysis. The
Edumeres Toolbox is an outcome of the continuous
interdisciplinary exchange between computer scientists
and humanist researchers, whose expertise is crucial to
convert information into knowledge by means of
(critical) interpretation and contextualization. This
paper presents a use case in order to describe the
various functionalities of the Edumeres Toolbox and
their use for the analysis of a collection of Arabic
textbooks. Hereby, it shows how the interaction between
humanist researchers and computer scientists in this
digital process produces innovative research solutions
and how the tool enables users to discover structural
and linguistic patterns and develop innovative research
questions. Finally, the paper describes challenges
recognized by humanist researchers in using digital
tools in their work, which still require in-depth
research and practical efforts from both parties to
improve the tool performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jian:2022:STW,
author = "Bijian Jian and Chunbo Ma and Dejian Zhu and Yixiao
Sun and Jun Ao",
title = "Seeing through Wavy Water--Air Interface: a
Restoration Model for Instantaneous Images Distorted by
Surface Waves",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "236",
day = "29",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080236",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/236",
abstract = "Imaging through a wavy water--air interface is
challenging since light rays are bent by unknown
amounts, leading to complex geometric distortions.
Considering the restoration of instantaneous distorted
images, this paper proposes an image recovery model via
structured light projection. The algorithm is composed
of two separate parts. In the first part, an algorithm
for the determination of the instantaneous shape of the
water surface via structured light projection is
developed. Then, we synchronously recover the distorted
airborne scene image through reverse ray tracing in the
second part. The experimental results show that,
compared with the state-of-the-art methods, the
proposed method not only can overcome the influence of
changes in natural illumination conditions for WAI
reconstruction, but also can significantly reduce the
distortion and achieve better performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2022:CFM,
author = "Yaning Li and Hongsheng Li and Baoguo Yu and Jun Li",
title = "A {CSI} Fingerprint Method for Indoor Pseudolite
Positioning Based on {RT-ANN}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "235",
day = "29",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080235",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/235",
abstract = "At present, the interaction mechanism between the
complex indoor environment and pseudolite signals has
not been fundamentally resolved, and the stability,
continuity, and accuracy of indoor positioning are
still technical bottlenecks. In view of the
shortcomings of the existing indoor fingerprint
positioning methods, this paper proposes a hybrid CSI
fingerprint method for indoor pseudolite positioning
based on Ray Tracing and artificial neural network
(RT-ANN), which combines the advantages of actual
acquisition, deterministic simulation, and artificial
neural network, and adds the simulation CSI feature
parameters generated by modeling and simulation to the
input of the neural network, extending the sample
features of the neural network input dataset. Taking an
airport environment as an example, it is proved that
the hybrid method can improve the positioning accuracy
in the area where the fingerprints have been collected,
the positioning error is reduced by 54.7\% compared
with the traditional fingerprint positioning method. It
is also proved that preliminary positioning can be
completed in the area without fingerprint collection.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yan:2022:MSA,
author = "Shangyi Yan and Jingya Wang and Zhiqiang Song",
title = "Microblog Sentiment Analysis Based on Dynamic
Character-Level and Word-Level Features and Multi-Head
Self-Attention Pooling",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "234",
day = "29",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080234",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/234",
abstract = "To address the shortcomings of existing deep learning
models and the characteristics of microblog speech, we
propose the DCCMM model to improve the effectiveness of
microblog sentiment analysis. The model employs WOBERT
Plus and ALBERT to dynamically encode character-level
text and word-level text, respectively. Then, a
convolution operation is used to extract local key
features, while cross-channel feature fusion and
multi-head self-attention pooling operations are used
to extract global semantic information and filter out
key data, before using the multi-granularity feature
interaction fusion operation to effectively fuse
character-level and word-level semantic information.
Finally, the Softmax function is used to output the
results. On the weibo\_senti\_100k dataset, the
accuracy and F1 values of the DCCMM model improve by
0.84\% and 1.01\%, respectively, compared to the
best-performing comparison model. On the SMP2020-EWECT
dataset, the accuracy and F1 values of the DCCMM model
improve by 1.22\% and 1.80\%, respectively, compared
with the experimental results of the best-performing
comparison model. The results showed that DCCMM
outperforms existing advanced sentiment analysis
models.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bagha:2022:HSP,
author = "Hamid Bagha and Ali Yavari and Dimitrios
Georgakopoulos",
title = "Hybrid Sensing Platform for {IoT}-Based Precision
Agriculture",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "233",
day = "28",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080233",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/233",
abstract = "Precision agriculture (PA) is the field that deals
with the fine-tuned management of crops to increase
crop yield, augment profitability, and conserve the
environment. Existing Internet of Things (IoT)
solutions for PA are typically divided in terms of
their use of either aerial sensing using unmanned
aerial vehicles (UAVs) or ground-based sensing
approaches. Ground-based sensing provides high data
accuracy, but it involves large grids of ground-based
sensors with high operational costs and complexity. On
the other hand, while the cost of aerial sensing is
much lower than ground-based sensing alternatives, the
data collected via aerial sensing are less accurate and
cover a smaller period than ground-based sensing data.
Despite the contrasting virtues and limitations of
these two sensing approaches, there are currently no
hybrid sensing IoT solutions that combine aerial and
ground-based sensing to ensure high data accuracy at a
low cost. In this paper, we propose a Hybrid Sensing
Platform (HSP) for PA---an IoT platform that combines a
small number of ground-based sensors with aerial
sensors to improve aerial data accuracy and at the same
time reduce ground-based sensing costs.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chochtoula:2022:IEC,
author = "Despoina Chochtoula and Aristidis Ilias and Yannis C.
Stamatiou and Christos Makris",
title = "Integrating Elliptic Curve Cryptography with the
{Modbus TCP SCADA Communication Protocol}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "232",
day = "28",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080232",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/232",
abstract = "SCADA systems monitor critical industrial, energy and
other physical infrastructures in order to detect
malfunctions, issue alerts and, in many cases, propose
or even take remedial actions. However, due to their
attachment to the Internet, SCADA systems are, today,
vulnerable to attacks such as, among several others,
interception of data traffic, malicious modifications
of settings and control operations data, malicious
modification of measurements and infrastructure data
and Denial-of-Service attacks. Our research focuses on
strengthening SCADA systems with cryptographic methods
and protection mechanisms with emphasis on data and
messaging encryption and device identification and
authentication. The limited availability of computing
power and memory in sensors and embedded devices
deployed in SCADA systems make render cryptographic
methods with higher resource requirements, such as the
use of conventional public key cryptography such as
RSA, unsuitable. We, thus, propose Elliptic Curve
Cryptography as an alternative cryptographic mechanism,
where smaller key sizes are required, with lower
resource requirements for cryptographic operations.
Accordingly, our approach integrates Modbus, a commonly
used SCADA communication protocol, with Elliptic Curve
Cryptography. We have, also, developed an experimental
set-up in order to demonstrate the performance of our
approach and draw conclusions regarding its
effectiveness in real SCADA installations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zali:2022:PPS,
author = "Siti-Aisyah Zali and Shahbe Mat-Desa and Zarina
Che-Embi and Wan-Noorshahida Mohd-Isa",
title = "Post-Processing for Shadow Detection in Drone-Acquired
Images Using {U-NET}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "231",
day = "28",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080231",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/231",
abstract = "Shadows in drone images commonly appear in various
shapes, sizes, and brightness levels, as the images
capture a wide view of scenery under many conditions,
such as varied flying height and weather. This property
of drone images leads to a major problem when it comes
to detecting shadow and causes the presence of noise in
the predicted shadow mask. The purpose of this study is
to improve shadow detection results by implementing
post-processing methods related to automatic
thresholding and binary mask refinement. The aim is to
discuss how the selected automatic thresholding and two
methods of binary mask refinement perform to increase
the efficiency and accuracy of shadow detection. The
selected automatic thresholding method is Otsu's
thresholding, and methods for binary mask refinement
are morphological operation and dense CRF. The study
shows that the proposed methods achieve an acceptable
accuracy of 96.43\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Arzo:2022:MAB,
author = "Sisay Tadesse Arzo and Zeinab Akhavan and Mona
Esmaeili and Michael Devetsikiotis and Fabrizio
Granelli",
title = "Multi-Agent-Based Traffic Prediction and Traffic
Classification for Autonomic Network Management Systems
for Future Networks",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "230",
day = "28",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080230",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/230",
abstract = "Recently, a multi-agent based network automation
architecture has been proposed. The architecture is
named multi-agent based network automation of the
network management system (MANA-NMS). The architectural
framework introduced atomized network functions (ANFs).
ANFs should be autonomous, atomic, and intelligent
agents. Such agents should be implemented as an
independent decision element, using machine/deep
learning (ML/DL) as an internal cognitive and reasoning
part. Using these atomic and intelligent agents as a
building block, a MANA-NMS can be composed using the
appropriate functions. As a continuation toward
implementation of the architecture MANA-NMS, this paper
presents a network traffic prediction agent (NTPA) and
a network traffic classification agent (NTCA) for a
network traffic management system. First, an NTPA is
designed and implemented using DL algorithms, i.e.,
long short-term memory (LSTM), gated recurrent unit
(GRU), multilayer perceptrons (MLPs), and convolutional
neural network (CNN) algorithms as a reasoning and
cognitive part of the agent. Similarly, an NTCA is
designed using decision tree (DT), K-nearest neighbors
(K-NN), support vector machine (SVM), and naive Bayes
(NB) as a cognitive component in the agent design. We
then measure the NTPA prediction accuracy, training
latency, prediction latency, and computational resource
consumption. The results indicate that the LSTM-based
NTPA outperforms compared to GRU, MLP, and CNN-based
NTPA in terms of prediction accuracy, and prediction
latency. We also evaluate the accuracy of the
classifier, training latency, classification latency,
and computational resource consumption of NTCA using
the ML models. The performance evaluation shows that
the DT-based NTCA performs the best.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Moedjahedy:2022:CCC,
author = "Jimmy Moedjahedy and Arief Setyanto and Fawaz Khaled
Alarfaj and Mohammed Alreshoodi",
title = "{CCrFS}: Combine Correlation Features Selection for
Detecting Phishing {Websites} Using Machine Learning",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "229",
day = "27",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080229",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/229",
abstract = "Internet users are continually exposed to phishing as
cybercrime in the 21st century. The objective of
phishing is to obtain sensitive information by
deceiving a target and using the information for
financial gain. The information may include a login
detail, password, date of birth, credit card number,
bank account number, and family-related information. To
acquire these details, users will be directed to fill
out the information on false websites based on
information from emails, adverts, text messages, or
website pop-ups. Examining the website's URL address is
one method for avoiding this type of deception.
Identifying the features of a phishing website URL
takes specialized knowledge and investigation. Machine
learning is one method that uses existing data to teach
machines to distinguish between legal and phishing
website URLs. In this work, we proposed a method that
combines correlation and recursive feature elimination
to determine which URL characteristics are useful for
identifying phishing websites by gradually decreasing
the number of features while maintaining accuracy
value. In this paper, we use two datasets that contain
48 and 87 features. The first scenario combines power
predictive score correlation and recursive feature
elimination; the second scenario is the maximal
information coefficient correlation and recursive
feature elimination. The third scenario combines
Spearman correlation and recursive feature elimination.
All three scenarios from the combined findings of the
proposed methodologies achieve a high level of accuracy
even with the smallest feature subset. For dataset 1,
the accuracy value for the 10 features result is
97.06\%, and for dataset 2 the accuracy value is
95.88\% for 10 features.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Petrolini:2022:ADS,
author = "Michael Petrolini and Stefano Cagnoni and Monica
Mordonini",
title = "Automatic Detection of Sensitive Data Using
Transformer-Based Classifiers",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "228",
day = "27",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080228",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/228",
abstract = "The General Data Protection Regulation (GDPR) has
allowed EU citizens and residents to have more control
over their personal data, simplifying the regulatory
environment affecting international business and
unifying and homogenising privacy legislation within
the EU. This regulation affects all companies that
process data of European residents regardless of the
place in which they are processed and their registered
office, providing for a strict discipline of data
protection. These companies must comply with the GDPR
and be aware of the content of the data they manage;
this is especially important if they are holding
sensitive data, that is, any information regarding
racial or ethnic origin, political opinions, religious
or philosophical beliefs, trade union membership, data
relating to the sexual life or sexual orientation of
the person, as well as data on physical and mental
health. These classes of data are hardly structured,
and most frequently they appear within a document such
as an email message, a review or a post. It is
extremely difficult to know if a company is in
possession of sensitive data at the risk of not
protecting them properly. The goal of the study
described in this paper is to use Machine Learning, in
particular the Transformer deep-learning model, to
develop classifiers capable of detecting documents that
are likely to include sensitive data. Additionally, we
want the classifiers to recognize the particular type
of sensitive topic with which they deal, in order for a
company to have a better knowledge of the data they
own. We expect to make the model described in this
paper available as a web service, customized to private
data of possible customers, or even in a free-to-use
version based on the freely available data set we have
built to train the classifiers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Xia:2022:RUT,
author = "Zhuofei Xia and Jiayuan Gong and Hailong Yu and Wenbo
Ren and Jingnan Wang",
title = "Research on Urban Traffic Incident Detection Based on
Vehicle Cameras",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "227",
day = "26",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080227",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/227",
abstract = "Situational detection in the traffic system is of
great significance to traffic management and even urban
management. Traditional detection methods are generally
based on roadside equipment monitoring roads, and it is
difficult to support large-scale and fine-grained
traffic incident detection. In this study, we propose a
detection method applied to the mobile edge, which
detects traffic incidents based on the video captured
by vehicle cameras, so as to overcome the limitations
of roadside terminal perception. For swarm intelligence
detection, we propose an improved YOLOv5s object
detection network, adding an atrous pyramid pooling
layer to the network and introducing a fusion attention
mechanism to improve the model accuracy. Compared with
the raw YOLOv5s, the mAP metrics of our improved model
are increased by 3.3\% to 84.2\%, enabling it to detect
vehicles, pedestrians, traffic accidents, and fire
traffic incidents on the road with high precision in
real time. This provides information for city managers
to help them grasp the abnormal operation status of
roads and cities in a timely and effective manner.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dai:2022:ESS,
author = "Zhiqiang Dai and Gaochao Xu and Ziqi Liu and Jiaqi Ge
and Wei Wang",
title = "Energy Saving Strategy of {UAV} in {MEC} Based on Deep
Reinforcement Learning",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "226",
day = "26",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080226",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/226",
abstract = "Unmanned aerial vehicles (UAVs) have the
characteristics of portability, safety, and strong
adaptability. In the case of a maritime disaster, they
can be used for personnel search and rescue, real-time
monitoring, and disaster assessment. However, the
power, computing power, and other resources of UAVs are
often limited. Therefore, this paper combines a UAV and
mobile edge computing (MEC), and designs a deep
reinforcement learning-based online task offloading
(DOTO) algorithm. The algorithm can obtain an online
offloading strategy that maximizes the residual energy
of the UAV by jointly optimizing the UAV's time and
communication resources. The DOTO algorithm adopts time
division multiple access (TDMA) to offload and schedule
the UAV computing task, integrates wireless power
transfer (WPT) to supply power to the UAV, calculates
the residual energy corresponding to the offloading
action through the convex optimization method, and uses
an adaptive K method to reduce the computational
complexity of the algorithm. The simulation results
show that the DOTO algorithm proposed in this paper for
the energy-saving goal of maximizing the residual
energy of UAVs in MEC can provide the UAV with an
online task offloading strategy that is superior to
other traditional benchmark schemes. In particular,
when an individual UAV exits the system due to
insufficient power or failure, or a new UAV is
connected to the system, it can perform timely and
automatic adjustment without manual participation, and
has good stability and adaptability.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ren:2022:AVN,
author = "Wenbo Ren and Xinran Bian and Jiayuan Gong and Anqing
Chen and Ming Li and Zhuofei Xia and Jingnan Wang",
title = "Analysis and Visualization of New Energy Vehicle
Battery Data",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "225",
day = "26",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080225",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/225",
abstract = "In order to safely and efficiently use their power as
well as to extend the life of Li-ion batteries, it is
important to accurately analyze original battery data
and quickly predict SOC. However, today, most of them
are analyzed directly for SOC, and the analysis of the
original battery data and how to obtain the factors
affecting SOC are still lacking. Based on this, this
paper uses the visualization method to preprocess,
clean, and parse collected original battery data
(hexadecimal), followed by visualization and analysis
of the parsed data, and finally the K-Nearest Neighbor
(KNN) algorithm is used to predict the SOC. Through
experiments, the method can completely analyze the
hexadecimal battery data based on the GB/T32960
standard, including three different types of messages:
vehicle login, real-time information reporting, and
vehicle logout. At the same time, the visualization
method is used to intuitively and concisely analyze the
factors affecting SOC. Additionally, the KNN algorithm
is utilized to identify the K value and P value using
dynamic parameters, and the resulting mean square error
(MSE) and test score are 0.625 and 0.998, respectively.
Through the overall experimental process, this method
can well analyze the battery data from the source,
visually analyze various factors and predict SOC.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rubart:2022:AIC,
author = "Jessica Rubart and Valentin Grimm and Jonas Potthast",
title = "Augmenting Industrial Control Rooms with Multimodal
Collaborative Interaction Techniques",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "224",
day = "26",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080224",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/224",
abstract = "The German manufacturing industry has been carrying
out new developments towards the next industrial
revolution, focusing on smart manufacturing
environments. Our work emphasizes human-centered
control rooms in the context of production plants.
Increased automation does not have to come with less
human control. Therefore, we report on multimodal
collaborative interaction techniques to augment
industrial control rooms. In particular, we include
mobile workers who use the control room while being in
the production hall using tablets or specifically mixed
reality glasses. Collaborative annotation dashboards
support discussions and a shared understanding among
analysts. Manufacturing-related data can be integrated
into business analytics environments so that holistic
analyses can be performed. Multimodal interaction
techniques can support effective interaction with the
control room based on the users' preferences. Immersive
experience through mixed reality-based
three-dimensional visualizations and interaction
possibilities support users in obtaining a clear
understanding of the underlying data.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alkhalidy:2022:NSD,
author = "Muhsen Alkhalidy and Atalla Fahed Al-Serhan and Ayoub
Alsarhan and Bashar Igried",
title = "A New Scheme for Detecting Malicious Nodes in
Vehicular Ad Hoc Networks Based on Monitoring Node
Behavior",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "223",
day = "26",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080223",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/223",
abstract = "Vehicular ad hoc networks have played a key role in
intelligent transportation systems that considerably
improve road safety and management. This new technology
allows vehicles to communicate and share road
information. However, malicious users may inject false
emergency alerts into vehicular ad hoc networks,
preventing nodes from accessing accurate road
information. In order to assure the reliability and
trustworthiness of information through the networks,
assessing the credibility of nodes has become a
critical task in vehicular ad hoc networks. A new
scheme for malicious node detection is proposed in this
work. Multiple factors are fed into a fuzzy logic model
for evaluating the trust for each node. Vehicles are
divided into clusters in our approach, and a road side
unit manages each cluster. The road side unit assesses
the credibility of nodes before accessing vehicular ad
hoc networks. The road side unit evicts a malicious
node based on trust value. Simulations are used to
validate our technique. We demonstrate that our scheme
can detect and evict all malicious nodes in the
vehicular ad hoc network over time, lowering the ratio
of malicious nodes. Furthermore, it has a positive
impact on selfish node participation. The scheme
increases the success rate of delivered data to the
same level as the ideal cases when no selfish node is
present.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ahamed:2022:IMB,
author = "Farhad Ahamed and Farnaz Farid and Basem Suleiman and
Zohaib Jan and Luay A. Wahsheh and Seyed Shahrestani",
title = "An Intelligent Multimodal Biometric Authentication
Model for Personalised Healthcare Services",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "222",
day = "26",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080222",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/222",
abstract = "With the advent of modern technologies, the healthcare
industry is moving towards a more personalised smart
care model. The enablers of such care models are the
Internet of Things (IoT) and Artificial Intelligence
(AI). These technologies collect and analyse data from
persons in care to alert relevant parties if any
anomaly is detected in a patient's regular pattern.
However, such reliance on IoT devices to capture
continuous data extends the attack surfaces and demands
high-security measures. Both patients and devices need
to be authenticated to mitigate a large number of
attack vectors. The biometric authentication method has
been seen as a promising technique in these scenarios.
To this end, this paper proposes an AI-based multimodal
biometric authentication model for single and
group-based users' device-level authentication that
increases protection against the traditional single
modal approach. To test the efficacy of the proposed
model, a series of AI models are trained and tested
using physiological biometric features such as ECG
(Electrocardiogram) and PPG (Photoplethysmography)
signals from five public datasets available in
Physionet and Mendeley data repositories. The
multimodal fusion authentication model shows promising
results with 99.8\% accuracy and an Equal Error Rate
(EER) of 0.16.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ferretti:2022:DLF,
author = "Marco Ferretti and Ugo Fiore and Francesca Perla and
Marcello Risitano and Salvatore Scognamiglio",
title = "Deep Learning Forecasting for Supporting Terminal
Operators in Port Business Development",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "221",
day = "25",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080221",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/221",
abstract = "Accurate forecasts of containerised freight volumes
are unquestionably important for port terminal
operators to organise port operations and develop
business plans. They are also relevant for port
authorities, regulators, and governmental agencies
dealing with transportation. In a time when deep
learning is in the limelight, owing to a consistent
strip of success stories, it is natural to apply it to
the tasks of forecasting container throughput. Given
the number of options, practitioners can benefit from
the lessons learned in applying deep learning models to
the problem. Coherently, in this work, we devise a
number of multivariate predictive models based on deep
learning, analysing and assessing their performance to
identify the architecture and set of hyperparameters
that prove to be better suited to the task, also
comparing the quality of the forecasts with seasonal
autoregressive integrated moving average models.
Furthermore, an innovative representation of
seasonality is given by means of an embedding layer
that produces a mapping in a latent space, with the
parameters of such mapping being tuned using the
quality of the predictions. Finally, we present some
managerial implications, also putting into evidence the
research limitations and future opportunities.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{James:2022:EDD,
author = "Nicholas James and Lee-Yeng Ong and Meng-Chew Leow",
title = "Exploring Distributed Deep Learning Inference Using
{Raspberry Pi Spark} Cluster",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "220",
day = "25",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080220",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/220",
abstract = "Raspberry Pi (Pi) is a versatile general-purpose
embedded computing device that can be used for both
machine learning (ML) and deep learning (DL) inference
applications such as face detection. This study trials
the use of a Pi Spark cluster for distributed inference
in TensorFlow. Specifically, it investigates the
performance difference between a 2-node Pi 4B Spark
cluster and other systems, including a single Pi 4B and
a mid-end desktop computer. Enhancements for the Pi 4B
were studied and compared against the Spark cluster to
identify the more effective method in increasing the Pi
4B's DL performance. Three experiments involving DL
inference, which in turn involve image classification
and face detection tasks, were carried out. Results
showed that enhancing the Pi 4B was faster than using a
cluster as there was no significant performance
difference between using the cluster and a single Pi
4B. The difference between the mid-end computer and a
single Pi 4B was between 6 and 15 times in the
experiments. In the meantime, enhancing the Pi 4B is
the more effective approach for increasing the DL
performance, and more work needs to be done for
scalable distributed DL inference to eventuate.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kadusic:2022:SPS,
author = "Esad Kadusic and Natasa Zivic and Christoph Ruland and
Narcisa Hadzajlic",
title = "A Smart Parking Solution by Integrating {NB-IoT} Radio
Communication Technology into the Core {IoT} Platform",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "219",
day = "25",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080219",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/219",
abstract = "With the emerging Internet of Things (IoT)
technologies, the smart city paradigm has become a
reality. Wireless low-power communication technologies
(LPWAN) are widely used for device connection in smart
homes, smart lighting, mitering, and so on. This work
suggests a new approach to a smart parking solution
using the benefits of narrowband Internet of Things
(NB-IoT) technology. NB-IoT is an LPWAN technology
dedicated to sensor communication within 5G mobile
networks. This paper proposes the integration of NB-IoT
into the core IoT platform, enabling direct sensor data
navigation to the IoT radio stations for processing,
after which they are forwarded to the user application
programming interface (API). Showcasing the results of
our research and experiments, this work suggests the
ability of NB-IoT technology to support geolocation and
navigation services, as well as payment and reservation
services for vehicle parking to make the smart parking
solutions smarter.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chen:2022:ULP,
author = "Xieling Chen and Fu Lee Wang and Gary Cheng and
Man-Kong Chow and Haoran Xie",
title = "Understanding Learners' Perception of {MOOCs} Based on
Review Data Analysis Using Deep Learning and Sentiment
Analysis",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "218",
day = "25",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080218",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/218",
abstract = "Massive open online courses (MOOCs) have exploded in
popularity; course reviews are important sources for
exploring learners' perceptions about different factors
associated with course design and implementation. This
study aims to investigate the possibility of automatic
classification for the semantic content of MOOC course
reviews to understand factors that can predict
learners' satisfaction and their perceptions of these
factors. To do this, this study employs a quantitative
research methodology based on sentiment analysis and
deep learning. Learners' review data from Class Central
are analyzed to automatically identify the key factors
related to course design and implementation and the
learners' perceptions of these factors. A total of
186,738 review sentences associated with 13 subject
areas are analyzed, and consequently, seven course
factors that learners frequently mentioned are found.
These factors include: ``Platforms and tools'',
``Course quality'', ``Learning resources'',
``Instructor'', ``Relationship'', ``Process'', and
``Assessment''. Subsequently, each factor is assigned a
sentimental value using lexicon-driven methodologies,
and the topics that can influence learners' learning
experiences the most are decided. In addition,
learners' perceptions across different topics and
subjects are explored and discussed. The findings of
this study contribute to helping MOOC instructors in
tailoring course design and implementation to bring
more satisfactory learning experiences for learners.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alazab:2022:DOM,
author = "Ammar Alazab and Ansam Khraisat and Moutaz Alazab and
Sarabjot Singh",
title = "Detection of Obfuscated Malicious {JavaScript} Code",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "8",
pages = "217",
day = "22",
month = jul,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14080217",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 2 12:13:30 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/java2020.bib",
URL = "https://www.mdpi.com/1999-5903/14/8/217",
abstract = "Websites on the Internet are becoming increasingly
vulnerable to malicious JavaScript code because of its
strong impact and dramatic effect. Numerous recent
cyberattacks use JavaScript vulnerabilities, and in
some cases employ obfuscation to conceal their malice
and elude detection. To secure Internet users, an
adequate intrusion-detection system (IDS) for malicious
JavaScript must be developed. This paper proposes an
automatic IDS of obfuscated JavaScript that employs
several features and machine-learning techniques that
effectively distinguish malicious and benign JavaScript
codes. We also present a new set of features, which can
detect obfuscation in JavaScript. The features are
selected based on identifying obfuscation, a popular
method to bypass conventional malware detection
systems. The performance of the suggested approach has
been tested on JavaScript obfuscation attacks. The
studies have shown that IDS based on selected features
has a detection rate of 94\% for malicious samples and
81\% for benign samples within the dimension of the
feature vector of 60.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chaabane:2022:LPB,
author = "Faten Chaabane and Jalel Ktari and Tarek Frikha and
Habib Hamam",
title = "Low Power Blockchained {E}-Vote Platform for
University Environment",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "269",
day = "19",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090269",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/269",
abstract = "With the onset of the COVID-19 pandemic and the
succession of its waves, the transmission of this
disease and the number of deaths caused by it have been
increasing. Despite the various vaccines, the COVID-19
virus is still contagious and dangerous for affected
people. One of the remedies to this is precaution, and
particularly social distancing. In the same vein, this
paper proposes a remote voting system, which has to be
secure, anonymous, irreversible, accessible, and simple
to use. It therefore allows voters to have the
possibility to vote for their candidate without having
to perform the operation on site. This system will be
used for university elections and particularly for
student elections. We propose a platform based on a
decentralized system. This system will use two
blockchains communicating with each other: the public
Ethereum blockchain and the private Quorum blockchain.
The private blockchain will be institution-specific.
All these blockchains send the necessary data to the
public blockchain which manages different data related
to the universities and the ministry. This system
enables using encrypted data with the SHA-256 algorithm
to have both security and information security.
Motivated by the high energy consumption of blockchain
and by the performance improvements in low-power, a
test is performed on a low-power embedded platform
Raspberry PI4 showing the possibility to use the
Blockchain with limited resources.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Nafeh:2022:JSV,
author = "Majd Nafeh and Arash Bozorgchenani and Daniele
Tarchi",
title = "Joint Scalable Video Coding and Transcoding Solutions
for Fog-Computing-Assisted {DASH} Video Applications",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "268",
day = "17",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090268",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/268",
abstract = "Video streaming solutions have increased their
importance in the last decade, enabling video on demand
(VoD) services. Among several innovative services, 5G
and Beyond 5G (B5G) systems consider the possibility of
providing VoD-based solutions for surveillance
applications, citizen information and e-tourism
applications, to name a few. Although the majority of
the implemented solutions resort to a centralized
cloud-based approach, the interest in edge/fog-based
approaches is increasing. Fog-based VoD services result
in fulfilling the stringent low-latency requirement of
5G and B5G networks. In the following, by resorting to
the Dynamic Adaptive Streaming over HTTP (DASH)
technique, we design a video-segment deployment
algorithm for streaming services in a fog computing
environment. In particular, by exploiting the inherent
adaptation of the DASH approach, we embed in the system
a joint transcoding and scalable video coding (SVC)
approach able to deploy at run-time the video segments
upon the user's request. With this in mind, two
algorithms have been developed aiming at maximizing the
marginal gain with respect to a pre-defined delay
threshold and enabling video quality downgrade for
faster video deployment. Numerical results demonstrate
that by effectively mapping the video segments, it is
possible to minimize the streaming latency while
maximising the users' target video quality.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Feng:2022:EBT,
author = "Hangwei Feng and Jinlin Wang and Yang Li",
title = "An Efficient Blockchain Transaction Retrieval System",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "267",
day = "15",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090267",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/267",
abstract = "In the era of the digital economy, blockchain has
developed well in various fields, such as finance and
digital copyright, due to its unique decentralization
and traceability characteristics. However, blockchain
gradually exposes the storage problem, and the current
blockchain stores the block data in third-party storage
systems to reduce the node storage pressure. The new
blockchain storage method brings the blockchain
transaction retrieval problem. The problem is that when
unable to locate the block containing this transaction,
the user must fetch the entire blockchain ledger data
from the third-party storage system, resulting in huge
communication overhead. For this problem, we exploit
the semi-structured data in the blockchain and extract
the universal blockchain transaction characteristics,
such as account address and time. Then we establish a
blockchain transaction retrieval system. Responding to
the lacking efficient retrieval data structure, we
propose a scalable secondary search data structure BB+
tree for account address and introduce the I2B+ tree
for time. Finally, we analyze the proposed scheme's
performance through experiments. The experiment results
prove that our system is superior to the existing
methods in single-feature retrieval, concurrent
retrieval, and multi-feature hybrid retrieval. The
retrieval time under single feature retrieval is
reduced by 40.54\%, and the retrieval time is decreased
by 43.16\% under the multi-feature hybrid retrieval. It
has better stability in different block sizes and
concurrent retrieval scales.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Villegas-Ch:2022:AST,
author = "William Villegas-Ch. and Angel Jaramillo-Alc{\'a}zar
and Aracely Mera-Navarrete",
title = "Assistance System for the Teaching of Natural Numbers
to Preschool Children with the Use of Artificial
Intelligence Algorithms",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "266",
day = "15",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090266",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/266",
abstract = "This research was aimed at designing an image
recognition system that can help increase children's
interest in learning natural numbers between 0 and 9.
The research method used was qualitative descriptive,
observing early childhood learning in a face-to-face
education model, especially in the learning of numbers,
with additional data from literature studies. For the
development of the system, the cascade method was used,
consisting of three stages: identification of the
population, design of the artificial intelligence
architecture, and implementation of the recognition
system. The method of the system sought to replicate a
mechanic that simulates a game, whereby the child
trains the artificial intelligence algorithm such that
it recognizes the numbers that the child draws on a
blackboard. The system is expected to help increase the
ability of children in their interest to learn numbers
and identify the meaning of quantities to help improve
teaching success with a fun and engaging teaching
method for children. The implementation of learning in
this system is expected to make it easier for children
to learn to write, read, and conceive the quantities of
numbers, in addition to exploring their potential,
creativity, and interest in learning, with the use of
technologies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sayeed:2022:ACI,
author = "Aqsa Sayeed and Chaman Verma and Neerendra Kumar and
Neha Koul and Zolt{\'a}n Ill{\'e}s",
title = "Approaches and Challenges in {Internet of Robotic
Things}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "265",
day = "14",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090265",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/265",
abstract = "The Internet of robotic things (IoRT) is the
combination of different technologies including cloud
computing, robots, Internet of things (IoT), artificial
intelligence (AI), and machine learning (ML). IoRT
plays a major role in manufacturing, healthcare,
security, and transport. IoRT can speed up human
development by a very significant percentage. IoRT
allows robots to transmit and receive data to and from
other devices and users. In this paper, IoRT is
reviewed in terms of the related techniques,
architectures, and abilities. Consequently, the related
research challenges are presented. IoRT architectures
are vital in the design of robotic systems and robotic
things. The existing 3--7-tier IoRT architectures are
studied. Subsequently, a detailed IoRT architecture is
proposed. Robotic technologies provide the means to
increase the performance and capabilities of the user,
product, or process. However, robotic technologies are
vulnerable to attacks on data security. Trust-based and
encryption-based mechanisms can be used for secure
communication among robotic things. A security method
is recommended to provide a secure and trustworthy
data-sharing mechanism in IoRT. Significant security
challenges are also discussed. Several known attacks on
ad hoc networks are illustrated. Threat models ensure
integrity confidentiality and availability of the data.
In a network, trust models are used to boost a system's
security. Trust models and IoRT networks play a key
role in obtaining a steady and nonvulnerable
configuration in the network. In IoRT, remote server
access results in remote software updates of robotic
things. To study navigation strategies, navigation
using fuzzy logic, probabilistic roadmap algorithms,
laser scan matching algorithms, heuristic functions,
bumper events, and vision-based navigation techniques
are considered. Using the given research challenges,
future researchers can get contemporary ideas of IoRT
implementation in the real world.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gentile:2022:VPA,
author = "Antonio Francesco Gentile and Davide Macr{\`\i} and
Floriano {De Rango} and Mauro Tropea and Emilio Greco",
title = "A {VPN} Performances Analysis of Constrained Hardware
Open Source Infrastructure Deploy in {IoT}
Environment",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "264",
day = "13",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090264",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/264",
abstract = "Virtual private network (VPN) represents an HW/SW
infrastructure that implements private and confidential
communication channels that usually travel through the
Internet. VPN is currently one of the most reliable
technologies to achieve this goal, also because being a
consolidated technology, it is possible to apply
appropriate patches to remedy any security holes. In
this paper we analyze the performances of open source
firmware OpenWrt 21.x compared with a server-side
operating system (Debian 11 x64) and Mikrotik 7.x, also
virtualized, and different types of clients (Windows
10/11, iOS 15, Android 11, OpenWrt 21.x, Debian 11 x64
and Mikrotik 7.x), observing the performance of the
network according to the current implementation of the
various protocols and algorithms of VPN tunnel examined
on what are the most recent HW and SW for deployment in
outdoor locations with poor network connectivity.
Specifically, operating systems provide different
performance metric values for various combinations of
configuration variables. The first pursued goal is to
find the algorithms to guarantee a data
transmission/encryption ratio as efficiently as
possible. The second goal is to research the algorithms
capable of guaranteeing the widest spectrum of
compatibility with the current infrastructures that
support VPN technology, to obtain a connection system
secure for geographically scattered IoT networks spread
over difficult-to-manage areas such as suburban or
rural environments. The third goal is to be able to use
open firmware on constrained routers that provide
compatibility with different VPN protocols.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Astaneh:2022:TOB,
author = "Saeed A. Astaneh and Shahram Shah Heydari and Sara
Taghavi Motlagh and Alireza Izaddoost",
title = "Trade-offs between Risk and Operational Cost in {SDN}
Failure Recovery Plan",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "263",
day = "13",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090263",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/263",
abstract = "We consider the problem of SDN flow optimization in
the presence of a dynamic probabilistic link failures
model. We introduce a metric for path risk, which can
change dynamically as network conditions and failure
probabilities change. As these probabilities change,
the end-to-end path survivability probability may drop,
i.e., its risk may rise. The main objective is to
reroute at-risk end-to-end flows with the minimum
number of flow operation so that a fast flow recovery
is guaranteed. We provide various formulations for
optimizing network risk versus operational costs and
examine the trade-offs in flow recovery and the
connections between operational cost, path risk, and
path survival probability. We present our suboptimal
dynamic flow restoration methods and evaluate their
effectiveness against the Lagrangian relaxation
approach. Our results show a significant improvement in
operational cost against a shortest-path approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fabre:2022:RAC,
author = "Renaud Fabre and Otmane Azeroual and Patrice Bellot
and Joachim Sch{\"o}pfel and Daniel Egret",
title = "Retrieving Adversarial Cliques in Cognitive
Communities: a New Conceptual Framework for Scientific
Knowledge Graphs",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "262",
day = "07",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090262",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/262",
abstract = "The variety and diversity of published content are
currently expanding in all fields of scholarly
communication. Yet, scientific knowledge graphs (SKG)
provide only poor images of the varied directions of
alternative scientific choices, and in particular
scientific controversies, which are not currently
identified and interpreted. We propose to use the rich
variety of knowledge present in search histories to
represent cliques modeling the main interpretable
practices of information retrieval issued from the same
``cognitive community'', identified by their use of
keywords and by the search experience of the users
sharing the same research question. Modeling typical
cliques belonging to the same cognitive community is
achieved through a new conceptual framework, based on
user profiles, namely a bipartite geometric scientific
knowledge graph, SKG GRAPHYP. Further studies of
interpretation will test differences of documentary
profiles and their meaning in various possible contexts
which studies on ``disagreements in scientific
literature'' have outlined. This final adjusted version
of GRAPHYP optimizes the modeling of ``Manifold
Subnetworks of Cliques in Cognitive Communities''
(MSCCC), captured from previous user experience in the
same search domain. Cliques are built from graph grids
of three parameters outlining the manifold of search
experiences: mass of users; intensity of uses of items;
and attention, identified as a ratio of ``feature
augmentation'' by literature on information retrieval,
its mean value allows calculation of an observed
``steady'' value of the user/item ratio or, conversely,
a documentary behavior ``deviating'' from this mean
value. An illustration of our approach is supplied in a
positive first test, which stimulates further work on
modeling subnetworks of users in search experience,
that could help identify the varied alternative
documentary sources of information retrieval, and in
particular the scientific controversies and scholarly
disputes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yang:2022:FIB,
author = "Jie Yang and Jiajia Zhu and Ziyu Pan",
title = "A Fairness Index Based on Rate Variance for Downlink
Non-Orthogonal Multiple Access System",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "261",
day = "31",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090261",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/261",
abstract = "Aiming at the resource allocation problem of a
non-orthogonal multiple access (NOMA) system, a
fairness index based on sample variance of users'
transmission rates is proposed, which has a fixed range
and high sensitivity. Based on the proposed fairness
index, the fairness-constrained power allocation
problem in NOMA system is studied; the problem is
decoupled into the intra cluster power allocation
problem and the inter cluster power allocation problem.
The nonconvex optimization problem is solved by the
continuous convex approximation (SCA) method, and an
intra and inter cluster power iterative allocation
algorithm with fairness constrained is proposed to
maximize the total throughput. Simulation results show
that the proposed algorithm can take into account intra
cluster, inter cluster, and system fairness, and
maximize the system throughput on the premise of
fairness.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Maslej-Kresnakova:2022:UDA,
author = "Viera Maslej-Kresn{\'a}kov{\'a} and Martin
Sarnovsk{\'y} and J{\'u}lia Jackov{\'a}",
title = "Use of Data Augmentation Techniques in Detection of
Antisocial Behavior Using Deep Learning Methods",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "260",
day = "31",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090260",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/260",
abstract = "The work presented in this paper focuses on the use of
data augmentation techniques applied in the domain of
the detection of antisocial behavior. Data augmentation
is a frequently used approach to overcome issues
related to the lack of data or problems related to
imbalanced classes. Such techniques are used to
generate artificial data samples used to improve the
volume of the training set or to balance the target
distribution. In the antisocial behavior detection
domain, we frequently face both issues, the lack of
quality labeled data as well as class imbalance. As the
majority of the data in this domain is textual, we must
consider augmentation methods suitable for NLP tasks.
Easy data augmentation (EDA) represents a group of such
methods utilizing simple text transformations to create
the new, artificial samples. Our main motivation is to
explore EDA techniques' usability on the selected tasks
from the antisocial behavior detection domain. We focus
on the class imbalance problem and apply EDA techniques
to two problems: fake news and toxic comments
classification. In both cases, we train the
convolutional neural networks classifier and compare
its performance on the original and EDA-extended
datasets. EDA techniques prove to be very
task-dependent, with certain limitations resulting from
the data they are applied on. The model's performance
on the extended toxic comments dataset did improve only
marginally, gaining only 0.01 improvement in the F1
metric when applying only a subset of EDA methods. EDA
techniques in this case were not suitable enough to
handle texts written in more informal language. On the
other hand, on the fake news dataset, the performance
was improved more significantly, boosting the F1 score
by 0.1. Improvement was most significant in the
prediction of the minor class, where F1 improved from
0.67 to 0.86.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Afrifa:2022:MML,
author = "Stephen Afrifa and Tao Zhang and Peter Appiahene and
Vijayakumar Varadarajan",
title = "Mathematical and Machine Learning Models for
Groundwater Level Changes: a Systematic Review and
Bibliographic Analysis",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "259",
day = "30",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090259",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/259",
abstract = "With the effects of climate change such as increasing
heat, higher rainfall, and more recurrent extreme
weather events including storms and floods, a unique
approach to studying the effects of climatic elements
on groundwater level variations is required. These
unique approaches will help people make better
decisions. Researchers and stakeholders can attain
these goals if they become familiar with current
machine learning and mathematical model approaches to
predicting groundwater level changes. However,
descriptions of machine learning and mathematical model
approaches for forecasting groundwater level changes
are lacking. This study picked 117 papers from the
Scopus scholarly database to address this knowledge
gap. In a systematic review, the publications were
examined using quantitative and qualitative approaches,
and the Preferred Reporting Items for Systematic
Reviews and Meta-Analyses (PRISMA) was chosen as the
reporting format. Machine learning and mathematical
model techniques have made significant contributions to
predicting groundwater level changes, according to the
study. However, the domain is skewed because machine
learning has been more popular in recent years, with
random forest (RF) methods dominating, followed by the
methods of support vector machine (SVM) and artificial
neural network (ANN). Machine learning ensembles have
also been found to help with aspects of computational
complexity, such as performance and training times.
Furthermore, compared to mathematical model techniques,
machine learning approaches achieve higher accuracies,
according to our research. As a result, it is advised
that academics employ new machine learning techniques
while also considering mathematical model approaches to
predicting groundwater level changes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhu:2022:FER,
author = "Hongtao Zhu and Huahu Xu and Xiaojin Ma and Minjie
Bian",
title = "Facial Expression Recognition Using Dual Path Feature
Fusion and Stacked Attention",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "258",
day = "30",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090258",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/258",
abstract = "Facial Expression Recognition (FER) can achieve an
understanding of the emotional changes of a specific
target group. The relatively small dataset related to
facial expression recognition and the lack of a high
accuracy of expression recognition are both a challenge
for researchers. In recent years, with the rapid
development of computer technology, especially the
great progress of deep learning, more and more
convolutional neural networks have been developed for
FER research. Most of the convolutional neural
performances are not good enough when dealing with the
problems of overfitting from too-small datasets and
noise, due to expression-independent intra-class
differences. In this paper, we propose a Dual Path
Stacked Attention Network (DPSAN) to better cope with
the above challenges. Firstly, the features of key
regions in faces are extracted using segmentation, and
irrelevant regions are ignored, which effectively
suppresses intra-class differences. Secondly, by
providing the global image and segmented local image
regions as training data for the integrated dual path
model, the overfitting problem of the deep network due
to a lack of data can be effectively mitigated.
Finally, this paper also designs a stacked attention
module to weight the fused feature maps according to
the importance of each part for expression recognition.
For the cropping scheme, this paper chooses to adopt a
cropping method based on the fixed four regions of the
face image, to segment out the key image regions and to
ignore the irrelevant regions, so as to improve the
efficiency of the algorithm computation. The
experimental results on the public datasets, CK+ and
FERPLUS, demonstrate the effectiveness of DPSAN, and
its accuracy reaches the level of current
state-of-the-art methods on both CK+ and FERPLUS, with
93.2\% and 87.63\% accuracy on the CK+ dataset and
FERPLUS dataset, respectively.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pokhrel:2022:GTR,
author = "Shiva Raj Pokhrel and Carey Williamson",
title = "A Game-Theoretic Rent-Seeking Framework for Improving
Multipath {TCP} Performance",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "257",
day = "29",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090257",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/257",
abstract = "There is no well-defined utility function for existing
multipath TCP algorithms. Therefore, network utility
maximization (NUM) for MPTCP is a complex undertaking.
To resolve this, we develop a novel condition under
which Kelly's NUM mechanism may be used to explicitly
compute the equilibrium. We accomplish this by defining
a new utility function for MPTCP by employing Tullock's
rent-seeking paradigm from game theory. We investigate
the convergence of no-regret learning in the underlying
network games with continuous actions. Based on our
understanding of the design space, we propose an
original MPTCP algorithm that generalizes existing
algorithms and strikes a good balance among the
important properties. We implemented this algorithm in
the Linux kernel, and we evaluated its performance
experimentally.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sultana:2022:IRS,
author = "Ajmery Sultana and Xavier Fernando",
title = "Intelligent Reflecting Surface-Aided Device-to-Device
Communication: a Deep Reinforcement Learning Approach",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "256",
day = "29",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090256",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/256",
abstract = "Recently, the growing demand of various emerging
applications in the realms of sixth-generation (6G)
wireless networks has made the term internet of Things
(IoT) very popular. Device-to-device (D2D)
communication has emerged as one of the significant
enablers for the 6G-based IoT network. Recently, the
intelligent reflecting surface (IRS) has been
considered as a hardware-efficient innovative scheme
for future wireless networks due to its ability to
mitigate propagation-induced impairments and to realize
a smart radio environment. Such an IRS-assisted D2D
underlay cellular network is investigated in this
paper. Our aim is to maximize the network's spectrum
efficiency (SE) by jointly optimizing the transmit
power of both the cellular users (CUs) and the D2D
pairs, the resource reuse indicators, and the IRS
reflection coefficients. Instead of using traditional
optimization solution schemes to solve this mixed
integer nonlinear optimization problem, a reinforcement
learning (RL) approach is used in this paper. The
IRS-assisted D2D communication network is structured by
the Markov Decision Process (MDP) in the RL framework.
First, a Q-learning-based solution is studied. Then, to
make a scalable solution with large dimension state and
action spaces, a deep Q-learning-based solution scheme
using experience replay is proposed. Lastly, an
actor-critic framework based on the deep deterministic
policy gradient (DDPG) scheme is proposed to learn the
optimal policy of the constructed optimization problem
considering continuous-valued state and action spaces.
Simulation outcomes reveal that the proposed RL-based
solution schemes can provide significant SE
enhancements compared to the existing optimization
schemes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Venkatraman:2022:SCT,
author = "Sitalakshmi Venkatraman and Fahri Benli and Ye Wei and
Fiona Wahr",
title = "Smart Classroom Teaching Strategy to Enhance Higher
Order Thinking Skills ({HOTS}) --- an Agile Approach
for {Education 4.0}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "255",
day = "28",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090255",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/255",
abstract = "The development of Industry 4.0 revolutionising the
concept of automation and digitisation in an
organisation poses a huge challenge in employee
knowledge and skills to cope with the huge leap from
Industry 3.0. The high-level digitisation of an
organisation requires the workforce to possess higher
order thinking skills (HOTS) for the changing job roles
matching the rapid technological advancements. The
Education 4.0 framework is aimed at supporting the
Industry 4.0 skills requirement not only in digital
technologies but more towards soft skill development
such as collaboration and lifelong learning. However,
the education sector is also facing challenges in its
transition from Education 3.0 to Education 4.0. The
main purpose of the paper is to propose an Agile
approach for developing smart classroom teaching
strategies that foster employee adaptability with the
new learning paradigm of upskilling in line with
Industry 4.0. By adopting an exploratory research
methodology, the pilot study investigates the
implementation of the proposed Agile approach in a
higher education setting for graduates to achieve HOTS
using smart classroom teaching strategies. This study
uses learning theories such as experiential learning in
smart classroom environments to enhance students' HOTS
individually as well as collaboratively in an Agile
iterative manner. This is the first empirical study
carried out for graduates specialising in the Business
Analytics skillset required for Industry 4.0. The
findings of the pilot study show promising results that
pave the way for further exploration and pedagogical
insights in this research direction.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pilania:2022:FVS,
author = "Urmila Pilania and Rohit Tanwar and Mazdak Zamani and
Azizah Abdul Manaf",
title = "Framework for Video Steganography Using Integer
Wavelet Transform and {JPEG} Compression",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "254",
day = "25",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090254",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/254",
abstract = "In today's world of computers everyone is
communicating their personal information through the
web. So, the security of personal information is the
main concern from the research point of view.
Steganography can be used for the security purpose of
personal information. Storing and forwarding of
embedded personal information specifically in public
places is gaining more attention day by day. In this
research work, the Integer Wavelet Transform technique
along with JPEG (Joint Photograph Expert Group)
compression is proposed to overcome some of the issues
associated with steganography techniques. Video cover
files and JPEG compression improve concealing capacity
because of their intrinsic properties. Integer Wavelet
Transform is used to improve the imperceptibility and
robustness of the proposed technique. The
Imperceptibility of the proposed work is analyzed
through evaluation parameters such as PSNR (Peak Signal
to Noise Ratio), MSE (Mean Square Error), SSIM
(Structure Similarity Metric), and CC (Correlation
Coefficient). Robustness is validated through some
image processing attacks. Complexity is calculated in
terms of concealing and retrieval time along with the
amount of secret information hidden.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sharma:2022:TSI,
author = "Purushottam Sharma and Devesh Tulsian and Chaman Verma
and Pratibha Sharma and Nancy Nancy",
title = "Translating Speech to {Indian} Sign Language Using
Natural Language Processing",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "253",
day = "25",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090253",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/253",
abstract = "Language plays a vital role in the communication of
ideas, thoughts, and information to others.
Hearing-impaired people also understand our thoughts
using a language known as sign language. Every country
has a different sign language which is based on their
native language. In our research paper, our major focus
is on Indian Sign Language, which is mostly used by
hearing- and speaking-impaired communities in India.
While communicating our thoughts and views with others,
one of the most essential factors is listening. What if
the other party is not able to hear or grasp what you
are talking about? This situation is faced by nearly
every hearing-impaired person in our society. This led
to the idea of introducing an audio to Indian Sign
Language translation system which can erase this gap in
communication between hearing-impaired people and
society. The system accepts audio and text as input and
matches it with the videos present in the database
created by the authors. If matched, it shows
corresponding sign movements based on the grammar rules
of Indian Sign Language as output; if not, it then goes
through the processes of tokenization and
lemmatization. The heart of the system is natural
language processing which equips the system with
tokenization, parsing, lemmatization, and
part-of-speech tagging.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Akter:2022:FRF,
author = "Mst. Shapna Akter and Hossain Shahriar and Reaz
Chowdhury and M. R. C. Mahdy",
title = "Forecasting the Risk Factor of Frontier Markets: a
Novel Stacking Ensemble of Neural Network Approach",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "252",
day = "25",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090252",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/252",
abstract = "Forecasting the risk factor of the financial frontier
markets has always been a very challenging task. Unlike
an emerging market, a frontier market has a missing
parameter named ``volatility'', which indicates the
market's risk and as a result of the absence of this
missing parameter and the lack of proper prediction, it
has almost become difficult for direct customers to
invest money in frontier markets. However, the noises,
seasonality, random spikes and trends of the
time-series datasets make it even more complicated to
predict stock prices with high accuracy. In this work,
we have developed a novel stacking ensemble of the
neural network model that performs best on multiple
data patterns. We have compared our model's performance
with the performance results obtained by using some
traditional machine learning ensemble models such as
Random Forest, AdaBoost, Gradient Boosting Machine and
Stacking Ensemble, along with some traditional deep
learning models such as Convolutional Neural Network
(CNN), Long Short-Term Memory (LSTM) and Bidirectional
Long Short-Term (BiLSTM). We have calculated the
missing parameter named ``volatility'' using stock
price (Close price) for 20 different companies of the
frontier market and then made predictions using the
aforementioned machine learning ensemble models, deep
learning models and our proposed stacking ensemble of
the neural network model. The statistical evaluation
metrics RMSE and MAE have been used to evaluate the
performance of the models. It has been found that our
proposed stacking ensemble neural network model
outperforms all other traditional machine learning and
deep learning models which have been used for
comparison in this paper. The lowest RMSE and MAE
values we have received using our proposed model are
0.3626 and 0.3682 percent, respectively, and the
highest RMSE and MAE values are 2.5696 and 2.444
percent, respectively. The traditional ensemble
learning models give the highest RMSE and MAE error
rate of 20.4852 and 20.4260 percent, while the deep
learning models give 15.2332 and 15.1668 percent,
respectively, which clearly states that our proposed
model provides a very low error value compared with the
traditional models.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fior:2022:LEA,
author = "Jacopo Fior and Luca Cagliero and Paolo Garza",
title = "Leveraging Explainable {AI} to Support Cryptocurrency
Investors",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "251",
day = "24",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090251",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/251",
abstract = "In the last decade, cryptocurrency trading has
attracted the attention of private and professional
traders and investors. To forecast the financial
markets, algorithmic trading systems based on
Artificial Intelligence (AI) models are becoming more
and more established. However, they suffer from the
lack of transparency, thus hindering domain experts
from directly monitoring the fundamentals behind market
movements. This is particularly critical for
cryptocurrency investors, because the study of the main
factors influencing cryptocurrency prices, including
the characteristics of the blockchain infrastructure,
is crucial for driving experts' decisions. This paper
proposes a new visual analytics tool to support domain
experts in the explanation of AI-based cryptocurrency
trading systems. To describe the rationale behind AI
models, it exploits an established method, namely
SHapley Additive exPlanations, which allows experts to
identify the most discriminating features and provides
them with an interactive and easy-to-use graphical
interface. The simulations carried out on 21
cryptocurrencies over a 8-year period demonstrate the
usability of the proposed tool.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chaganti:2022:BBC,
author = "Rajasekhar Chaganti and Vijayakumar Varadarajan and
Venkata Subbarao Gorantla and Thippa Reddy Gadekallu
and Vinayakumar Ravi",
title = "Blockchain-Based Cloud-Enabled Security Monitoring
Using {Internet} of Things in Smart Agriculture",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "250",
day = "24",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090250",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/250",
abstract = "The Internet of Things (IoT) has rapidly progressed in
recent years and immensely influenced many industries
in how they operate. Consequently, IoT technology has
improved productivity in many sectors, and smart
farming has also hugely benefited from the IoT. Smart
farming enables precision agriculture, high crop yield,
and the efficient utilization of natural resources to
sustain for a longer time. Smart farming includes
sensing capabilities, communication technologies to
transmit the collected data from the sensors, and data
analytics to extract meaningful information from the
collected data. These modules will enable farmers to
make intelligent decisions and gain profits. However,
incorporating new technologies includes inheriting
security and privacy consequences if they are not
implemented in a secure manner, and smart farming is
not an exception. Therefore, security monitoring is an
essential component to be implemented for smart
farming. In this paper, we propose a cloud-enabled
smart-farm security monitoring framework to monitor
device status and sensor anomalies effectively and
mitigate security attacks using behavioral patterns.
Additionally, a blockchain-based smart-contract
application was implemented to securely store
security-anomaly information and proactively mitigate
similar attacks targeting other farms in the community.
We implemented the security-monitoring-framework
prototype for smart farms using Arduino Sensor Kit,
ESP32, AWS cloud, and the smart contract on the
Ethereum Rinkeby Test Network and evaluated network
latency to monitor and respond to security events. The
performance evaluation of the proposed framework showed
that our solution could detect security anomalies
within real-time processing time and update the other
farm nodes to be aware of the situation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vgena:2022:DRS,
author = "Katerina Vgena and Angeliki Kitsiou and Christos
Kalloniatis and Stefanos Gritzalis",
title = "Determining the Role of Social Identity Attributes to
the Protection of Users' Privacy in Social Media",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "249",
day = "24",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090249",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/249",
abstract = "Drawing on digital identity theories, social software
engineering theory (SSE), and the Privacy Safeguard
(PriS) methodology, we examined the way that personal
information uploaded on social media (SM) imposes
privacy issues. Throughout a review on users'
self-representation on SM, we examined the impact of
self-determination and self-disclosure on users'
privacy, and we identified the social attributes (SA)
that cause privacy implications. This paper specifies
18 SA that users employ to achieve their optimal level
of representation while summarizing possible ways that
these attributes provoke users' identification. In
particular, our research has shown that SM users
represent their personas by unveiling SA to construct
popular, representative, and conversational profiles.
As disclosing SA increases privacy implications, we
intend to help users build profiles that respect their
privacy. Examining users' SA deepens our understanding
of disclosing personal information on SM while leading
to a better quantification of identity attributes;
furthermore, users' top five most revealing attributes
were summarized. Considering that SSE addresses users'
privacy implications from an early stage of systems
designing, our research, identifying the SA, will be
helpful in addressing privacy from a socio-technical
aspect, aiming at bridging the socio-technical gap by
drawing designers' attention to users' social
aspects.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Orlova:2022:DTA,
author = "Ekaterina V. Orlova",
title = "Design Technology and {AI}-Based Decision Making Model
for Digital Twin Engineering",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "248",
day = "24",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090248",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/248",
abstract = "This research considers the problem of digital twin
engineering in organizational and technical systems.
The theoretical and methodological basis is a
fundamental scientific work in the field of digital
twins engineering and applied models. We use methods of
a system approach, statistical analysis, operational
research and artificial intelligence. The study
proposes a comprehensive technology (methodological
approach) for digital twin design in order to
accelerate its engineering. This technology consists of
design steps, methods and models, and provides systems
synthesis of digital twins for a complex system (object
or process) operating under uncertainty and that is
able to reconfigure in response to internal faults or
environment changes and perform preventive maintenance.
In the technology structure, we develop a simulation
model using situational ``what-if'' analysis and based
on fuzzy logic methods. We apply this technology to
develop the digital twin prototype for a device at the
creation life cycle stage in order to reduce the
consequences of unpredicted and undesirable states. We
study possible unforeseen problems and device faults
during its further operation. The model identifies a
situation as a combination of failure factors of the
internal and external environment and provides an
appropriate decision about actions with the device. The
practical significance of the research is the developed
decision support model, which is the basis for control
systems to solve problems related to monitoring the
current state of technical devices (instruments,
equipment) and to support adequate decisions to
eliminate their dysfunctions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Islam:2022:NML,
author = "Mohammad S. Islam and Shahid Husain and Jawed Mustafa
and Yuantong Gu",
title = "A Novel Machine Learning Prediction Model for Aerosol
Transport in Upper 17-Generations of the Human
Respiratory Tract",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "247",
day = "24",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090247",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/247",
abstract = "The main challenge of the health risk assessment of
the aerosol transport and deposition to the lower
airways is the high computational cost. A standard
large-scale airway model needs a week to a month of
computational time in a high-performance computing
system. Therefore, developing an innovative tool that
accurately predicts transport behaviour and reduces
computational time is essential. This study aims to
develop a novel and innovative machine learning (ML)
model to predict particle deposition to the lower
airways. The first-ever study uses ML techniques to
explore the pulmonary aerosol TD in a digital
17-generation airway model. The ML model uses the
computational data for a 17-generation airway model and
four standard ML regression models are used to save the
computational cost. Random forest (RF), k -nearest
neighbour ( k -NN), multi-layer perceptron (MLP) and
Gaussian process regression (GPR) techniques are used
to develop the ML models. The MLP regression model
displays more accurate estimates than other ML models.
Finally, a prediction model is developed, and the
results are significantly closer to the measured
values. The prediction model predicts the deposition
efficiency (DE) for different particle sizes and flow
rates. A comprehensive lobe-specific DE is also
predicted for various flow rates. This first-ever
aerosol transport prediction model can accurately
predict the DE in different regions of the airways in a
couple of minutes. This innovative approach and
accurate prediction will improve the literature and
knowledge of the field.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alam:2022:FLR,
author = "Tanweer Alam and Ruchi Gupta",
title = "Federated Learning and Its Role in the Privacy
Preservation of {IoT} Devices",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "246",
day = "23",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090246",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/246",
abstract = "Federated learning (FL) is a cutting-edge artificial
intelligence approach. It is a decentralized
problem-solving technique that allows users to train
using massive data. Unprocessed information is stored
in advanced technology by a secret confidentiality
service, which incorporates machine learning (ML)
training while removing data connections. As
researchers in the field promote ML configurations
containing a large amount of private data, systems and
infrastructure must be developed to improve the
effectiveness of advanced learning systems. This study
examines FL in-depth, focusing on application and
system platforms, mechanisms, real-world applications,
and process contexts. FL creates robust classifiers
without requiring information disclosure, resulting in
highly secure privacy policies and access control
privileges. The article begins with an overview of FL.
Then, we examine technical data in FL, enabling
innovation, contracts, and software. Compared with
other review articles, our goal is to provide a more
comprehensive explanation of the best procedure systems
and authentic FL software to enable scientists to
create the best privacy preservation solutions for IoT
devices. We also provide an overview of similar
scientific papers and a detailed analysis of the
significant difficulties encountered in recent
publications. Furthermore, we investigate the benefits
and drawbacks of FL and highlight comprehensive
distribution scenarios to demonstrate how specific FL
models could be implemented to achieve the desired
results.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dong:2022:AIA,
author = "Jingwen Dong and Siti Nurulain Mohd Rum and Khairul
Azhar Kasmiran and Teh Noranis Mohd Aris and Raihani
Mohamed",
title = "Artificial Intelligence in Adaptive and Intelligent
Educational System: a Review",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "9",
pages = "245",
day = "23",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14090245",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Sep 23 06:03:23 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/9/245",
abstract = "There has been much discussion among academics on how
pupils may be taught online while yet maintaining a
high degree of learning efficiency, in part because of
the worldwide COVID-19 pandemic in the previous two
years. Students may have trouble focusing due to a lack
of teacher--student interaction, yet online learning
has some advantages that are unavailable in traditional
classrooms. The architecture of online courses for
students is integrated into a system called the
Adaptive and Intelligent Education System (AIES). In
AIESs, reinforcement learning is often used in
conjunction with the development of teaching
strategies, and this reinforcement-learning-based
system is known as RLATES. As a prerequisite to
conducting research in this field, this paper
undertakes the consolidation and analysis of existing
research, design approaches, and model categories for
adaptive and intelligent educational systems, with the
hope of serving as a reference for scholars in the same
field to help them gain access to the relevant
information quickly and easily.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sagu:2022:HDL,
author = "Amit Sagu and Nasib Singh Gill and Preeti Gulia and
Jyotir Moy Chatterjee and Ishaani Priyadarshini",
title = "A Hybrid Deep Learning Model with Self-Improved
Optimization Algorithm for Detection of Security
Attacks in {IoT} Environment",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "301",
day = "19",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100301",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/301",
abstract = "With the growth of the Internet of Things (IoT),
security attacks are also rising gradually. Numerous
centralized mechanisms have been introduced in the
recent past for the detection of attacks in IoT, in
which an attack recognition scheme is employed at the
network's vital point, which gathers data from the
network and categorizes it as ``Attack'' or ``Normal''.
Nevertheless, these schemes were unsuccessful in
achieving noteworthy results due to the diverse
necessities of IoT devices such as distribution,
scalability, lower latency, and resource limits. The
present paper proposes a hybrid model for the detection
of attacks in an IoT environment that involves three
stages. Initially, the higher-order statistical
features (kurtosis, variance, moments), mutual
information (MI), symmetric uncertainty, information
gain ratio (IGR), and relief-based features are
extracted. Then, detection takes place using Gated
Recurrent Unit (GRU) and Bidirectional Long Short-Term
Memory (Bi-LSTM) to recognize the existence of network
attacks. For improving the classification accuracy, the
weights of Bi-LSTM are optimally tuned via a
self-upgraded Cat and Mouse Optimizer (SU-CMO). The
improvement of the employed scheme is established
concerning a variety of metrics using two distinct
datasets which comprise classification accuracy, and
index, f-measure and MCC. In terms of all performance
measures, the proposed model outperforms both
traditional and state-of-the-art techniques.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mojzis:2022:TRB,
author = "J{\'a}n Mojzis and Peter Krammer and Marcel Kvassay
and Lenka Skovajsov{\'a} and Ladislav Hluch{\'y}",
title = "Towards Reliable Baselines for Document-Level
Sentiment Analysis in the {Czech} and {Slovak}
Languages",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "300",
day = "19",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100300",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/300",
abstract = "This article helps establish reliable baselines for
document-level sentiment analysis in highly inflected
languages like Czech and Slovak. We revisit an earlier
study representing the first comprehensive formulation
of such baselines in Czech and show that some of its
reported results need to be significantly revised. More
specifically, we show that its online product review
dataset contained more than 18\% of non-trivial
duplicates, which incorrectly inflated its macro
F1-measure results by more than 19 percentage points.
We also establish that part-of-speech-related features
have no damaging effect on machine learning algorithms
(contrary to the claim made in the study) and
rehabilitate the Chi-squared metric for feature
selection as being on par with the best performing
metrics such as Information Gain. We demonstrate that
in feature selection experiments with Information Gain
and Chi-squared metrics, the top 10\% of ranked unigram
and bigram features suffice for the best results
regarding online product and movie reviews, while the
top 5\% of ranked unigram and bigram features are
optimal for the Facebook dataset. Finally, we reiterate
an important but often ignored warning by George Forman
and Martin Scholz that different possible ways of
averaging the F1-measure in cross-validation studies of
highly unbalanced datasets can lead to results
differing by more than 10 percentage points. This can
invalidate the comparisons of F1-measure results across
different studies if incompatible ways of averaging F1
are used.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Adou:2022:MAP,
author = "Yves Adou and Ekaterina Markova and Yuliya Gaidamaka",
title = "Modeling and Analyzing Preemption-Based Service
Prioritization in {5G} Networks Slicing Framework",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "299",
day = "18",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100299",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/299",
abstract = "The Network Slicing (NS) technology, recognized as one
of the key enabling features of Fifth Generation (5G)
wireless systems, provides very flexible ways to
efficiently accommodate common physical
infrastructures, e.g., Base Station (BS), multiple
logical networks referred to as Network Slice Instances
(NSIs). To ensure the required Quality of Service (QoS)
levels, the NS-technology relies on classical Resource
Reservation(RR) or Service Prioritization schemes.
Thus, the current paper aims to propose a
Preemption-based Prioritization (PP) scheme ``merging''
the classical RR and Service Prioritization schemes.
The proposed PP-scheme efficiency is evaluated or
estimated given a Queueing system (QS) model analyzing
the operation of multiple NSIs with various
requirements at common 5G BSs. As a key result, the
proposed PP-scheme can provide up to 100\% gain in
terms of blocking probabilities of arriving requests
with respect to some baseline.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Serrano:2022:UPC,
author = "Ronaldo Serrano and Ckristian Duran and Marco
Sarmiento and Tuan-Kiet Dang and Trong-Thuc Hoang and
Cong-Kha Pham",
title = "A Unified {PUF} and Crypto Core Exploiting the
Metastability in Latches",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "298",
day = "17",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100298",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/298",
abstract = "Hardware acceleration of cryptography algorithms
represents an emerging approach to obtain benefits in
terms of speed and side-channel resistance compared to
software implementations. In addition, a hardware
implementation can provide the possibility of unifying
the functionality with some secure primitive, for
example, a true random number generator (TRNG) or a
physical unclonable function (PUF). This paper presents
a unified PUF-ChaCha20 in a field-programmable
gate-array (FPGA) implementation. The problems and
solutions of the PUF implementation are described,
exploiting the metastability in latches. The Xilinx
Artix-7 XC7A100TCSG324-1 FPGA implementation occupies
2416 look-up tables (LUTs) and 1026 flips-flops (FFs),
reporting a 3.11\% area overhead. The PUF exhibits
values of 49.15\%, 47.52\%, and 99.25\% for the average
uniformity, uniqueness, and reliability, respectively.
Finally, ChaCha20 reports a speed of 0.343 cycles per
bit with the unified implementation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Meqdad:2022:IDO,
author = "Maytham N. Meqdad and Seifedine Kadry and Hafiz Tayyab
Rauf",
title = "Improved Dragonfly Optimization Algorithm for
Detecting {IoT} Outlier Sensors",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "297",
day = "17",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100297",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/297",
abstract = "Things receive digital intelligence by being connected
to the Internet and by adding sensors. With the use of
real-time data and this intelligence, things may
communicate with one another autonomously. The
environment surrounding us will become more intelligent
and reactive, merging the digital and physical worlds
thanks to the Internet of things (IoT). In this paper,
an optimal methodology has been proposed for
distinguishing outlier sensors of the Internet of
things based on a developed design of a dragonfly
optimization technique. Here, a modified structure of
the dragonfly optimization algorithm is utilized for
optimal area coverage and energy consumption reduction.
This paper uses four parameters to evaluate its
efficiency: the minimum number of nodes in the coverage
area, the lifetime of the network, including the time
interval from the start of the first node to the
shutdown time of the first node, and the network power.
The results of the suggested method are compared with
those of some other published methods. The results show
that by increasing the number of steps, the energy of
the live nodes will eventually run out and turn off. In
the LEACH method, after 350 steps, the RED-LEACH
method, after 750 steps, and the GSA-based method,
after 915 steps, the nodes start shutting down, which
occurs after 1227 steps for the proposed method. This
means that the nodes are turned off later. Simulations
indicate that the suggested method achieves better
results than the other examined techniques according to
the provided performance parameters.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chemrov:2022:SPC,
author = "Kirill Chemrov and Dmitry Bankov and Evgeny Khorov and
Andrey Lyakhov",
title = "Smart Preliminary Channel Access to Support Real-Time
Traffic in {Wi-Fi} Networks",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "296",
day = "16",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100296",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/296",
abstract = "Real-time applications (RTA) are an important use case
for IEEE 802.11be, a new amendment to the Wi-Fi
standard. This amendment introduces new complicated
mechanisms to provide low delay and high reliability
for RTA, but many of them are not supported by legacy
devices that may be present in future Wi-Fi networks.
In contrast, the preliminary channel access (PCA)
method is designed to satisfy strict RTA requirements
even in the presence of legacy devices and does not
require significant changes to the Wi-Fi protocol.
However, it significantly reduces the capacity for
non-RTA traffic. This paper introduces a Smart PCA
method, which improves the performance of all the
stations in scenarios with multiple RTA stations.
Extensive simulation shows that the Smart PCA method
guarantees low delays for intensive RTA traffic in
these scenarios. Moreover, it doubles the network
capacity for the stations with non-RTA traffic.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Matviichuk:2022:SOI,
author = "Liudmyla Matviichuk and Stefano Ferilli and Nataliia
Hnedko",
title = "Study of the Organization and Implementation of
E-Learning in Wartime Inside {Ukraine}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "295",
day = "15",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100295",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/295",
abstract = "The article provides a factual foundation for the
possibility of organizing and implementing e-learning
in Ukrainian higher educational institutions during the
war. The current research topicality is supported by
the urgent need for training experience, organization
and implementation during wartime because of the fact
that both the educational process and the opportunity
to obtain an education should not be halted. The
study's goal is to assess the current state of the
e-learning organization and implementation, as well as
to examine students' attitude towards the educational
process during wartime. Methods such as scientific
source analysis, generalization and systematization of
the e-learning experience and its practical application
were used to achieve the goal. Furthermore, empirical
methods such as interviewing and observation were used.
Questionnaires have been proposed as important research
tools for this purpose. Four structured groups for the
use of e-learning have been formed and identified based
on the findings. We created an e-learning organization
and support model based on them. Furthermore, we
identified ten poignant factors as the sources of
difficulties for teachers when implementing
innovations, with limited resources and a lack of time
being among the most significant.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alghamdi:2022:CST,
author = "Taghreed Alghamdi and Sifatul Mostafi and Ghadeer
Abdelkader and Khalid Elgazzar",
title = "A Comparative Study on Traffic Modeling Techniques for
Predicting and Simulating Traffic Behavior",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "294",
day = "15",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100294",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/294",
abstract = "The significant advancements in intelligent
transportation systems (ITS) have contributed to the
increased development in traffic modeling. These
advancements include prediction and simulation models
that are used to simulate and predict traffic behaviors
on highway roads and urban networks. These models are
capable of precise modeling of the current traffic
status and accurate predictions of the future status
based on varying traffic conditions. However, selecting
the appropriate traffic model for a specific
environmental setting is challenging and expensive due
to the different requirements that need to be
considered, such as accuracy, performance, and
efficiency. In this research, we present a
comprehensive literature review of the research related
to traffic prediction and simulation models. We start
by highlighting the challenges in the long-term and
short-term prediction of traffic modeling. Then, we
review the most common nonparametric prediction models.
Lastly, we look into the existing literature on traffic
simulation tools and traffic simulation algorithms. We
summarize the available traffic models, define the
required parameters, and discuss the limitations of
each model. We hope that this survey serves as a useful
resource for traffic management engineers, researchers,
and practitioners in this domain.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mozaffariahrar:2022:SWF,
author = "Erfan Mozaffariahrar and Fabrice Theoleyre and Michael
Menth",
title = "A Survey of {Wi-Fi} 6: Technologies, Advances, and
Challenges",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "293",
day = "14",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100293",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/293",
abstract = "Wi-Fi is a popular wireless technology and is
continuously extended to keep pace with requirements
such as high throughput, real-time communication, dense
networks, or resource and energy efficiency. The IEEE
802.11ax standard, also known as Wi-Fi 6, promises to
provide data rates of up to almost 10 Gb/s, lower
energy consumption, and higher reliability. Its
capabilities go far beyond Wi-Fi 5 (802.11ac) and novel
technical concepts have been introduced for this
purpose. As such, the Wi-Fi 6 standard includes
Multi-User Orthogonal Frequency Division Multiple
Access (MU OFDMA), Multi-User Multiple-Input
Multiple-Output (MU MIMO), new mechanisms for Spatial
Reuse (SR), new mechanisms for power saving,
higher-order modulation, and additional minor
improvements. In this paper, we provide a survey of
Wi-Fi 6. Initially, we provide a compact technological
summary of Wi-Fi 5 and its predecessors. Then, we
discuss the potential application domains of Wi-Fi 6,
which are enabled through its novel features.
Subsequently, we explain these features and review the
related works in these areas. Finally, performance
evaluation tools for Wi-Fi 6 and future roadmaps are
discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alberro:2022:ERP,
author = "Leonardo Alberro and Felipe Vel{\'a}zquez and Sara
Azpiroz and Eduardo Grampin and Mat{\'\i}as Richart",
title = "Experimenting with Routing Protocols in the Data
Center: an ns-3 Simulation Approach",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "292",
day = "14",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100292",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/292",
abstract = "Massive scale data centers (MSDC) have become a key
component of current content-centric Internet
architecture. With scales of up to hundreds of
thousands servers, conveying traffic inside these
infrastructures requires much greater connectivity
resources than traditional broadband Internet transit
networks. MSDCs use Fat-Tree type topologies, which
ensure multipath connectivity and constant bisection
bandwidth between servers. To properly use the
potential advantages of these topologies, specific
routing protocols are needed, with multipath support
and low control messaging load. These infrastructures
are enormously expensive, and therefore it is not
possible to use them to experiment with new protocols;
that is why scalable and realistic emulation/simulation
environments are needed. Based on previous experiences,
in this paper we present extensions to the ns-3 network
simulator that allow executing the Free Range Routing
(FRR) protocol suite, which support some of the
specific MSDC routing protocols. Focused on the Border
Gateway Protocol (BGP), we run a comprehensive set of
control plane experiments over Fat-Tree topologies,
achieving competitive scalability running on a
single-host environment, which demonstrates that the
modified ns-3 simulator can be effectively used for
experimenting in the MSDC. Moreover, the validation was
complemented with a theoretical analysis of BGP
behavior over selected scenarios. The whole project is
available to the community and fully reproducible.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Claus:2022:NLP,
author = "Stefan Claus and Massimo Stella",
title = "Natural Language Processing and Cognitive Networks
Identify {UK} Insurers' Trends in Investor Day
Transcripts",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "291",
day = "12",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100291",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/291",
abstract = "The ability to spot key ideas, trends, and
relationships between them in documents is key to
financial services, such as banks and insurers.
Identifying patterns across vast amounts of
domain-specific reports is crucial for devising
efficient and targeted supervisory plans, subsequently
allocating limited resources where most needed. Today,
insurance supervisory planning primarily relies on
quantitative metrics based on numerical data (e.g.,
solvency financial returns). The purpose of this work
is to assess whether Natural Language Processing (NLP)
and cognitive networks can highlight events and
relationships of relevance for regulators that
supervise the insurance market, replacing human coding
of information with automatic text analysis. To this
aim, this work introduces a dataset of NIDT=829
investor transcripts from Bloomberg and explores/tunes
3 NLP techniques: (1) keyword extraction enhanced by
cognitive network analysis; (2) valence/sentiment
analysis; and (3) topic modelling. Results highlight
that keyword analysis, enriched by term
frequency-inverse document frequency scores and
semantic framing through cognitive networks, could
detect events of relevance for the insurance system
like cyber-attacks or the COVID-19 pandemic. Cognitive
networks were found to highlight events that related to
specific financial transitions: The semantic frame of
``climate'' grew in size by +538\% between 2018 and
2020 and outlined an increased awareness that agents
and insurers expressed towards climate change. A
lexicon-based sentiment analysis achieved a Pearson's
correlation of {\rho}=0.16 ( {p$<$0}.001,N=829 )
between sentiment levels and daily share prices.
Although relatively weak, this finding indicates that
insurance jargon is insightful to support risk
supervision. Topic modelling is considered less
amenable to support supervision, because of a lack of
results' stability and an intrinsic difficulty to
interpret risk patterns. We discuss how these automatic
methods could complement existing supervisory tools in
supporting effective oversight of the insurance
market.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2022:UPC,
author = "Gengxian Li and Chundong Wang and Huaibin Wang",
title = "Unreachable Peers Communication Scheme in
Decentralized Networks Based on Peer-to-Peer Overlay
Approaches",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "290",
day = "12",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100290",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/290",
abstract = "Decentralized networks bring us many benefits, but as
networks evolve, many nodes either actively or
passively become unreachable behind an NAT or a
firewall. This has become a hindrance to the
development of decentralized networks, where
peer-to-peer communication data transfer between
unreachable nodes cannot be accomplished, whether in
decentralized file systems, decentralized social, or
decentralized IoT. The existing scheme requires a
series of centralized servers or requires network-wide
flooding for consensus data, which can lead to the loss
of decentralized nature of the network and cause
flooding bottlenecks, contrary to the design concept of
decentralization. In this paper, our proposed scheme
uses a structured P2P overlay network to store the
indexes of unreachable nodes in the whole network, so
that the characteristics of a decentralized network are
still maintained while ensuring the efficiency of
lookup. When nodes communicate, the transmission
channel is established so that both nodes continuously
transmit data streams peer-to-peer without relying on
the central server. Moreover, the scheme guarantees the
security and privacy of nodes' data transmission and
the P2P overlay network without relying on centralized
trusted institutions. Finally, we deploy a real cluster
environment to verify the effectiveness of each module
at different network sizes and prove the overall
feasibility of the scheme. The scheme has certain
advantages over existing solutions in terms of
security, privacy, communication efficiency, device
democracy, etc.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wei:2022:SSL,
author = "Dawei Wei and Feifei Shi and Sahraoui Dhelim",
title = "A Self-Supervised Learning Model for Unknown
{Internet} Traffic Identification Based on Surge
Period",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "289",
day = "10",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100289",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/289",
abstract = "The identification of Internet protocols provides a
significant basis for keeping Internet security and
improving Internet Quality of Service (QoS). However,
the overwhelming developments and updating of Internet
technologies and protocols have led to large volumes of
unknown Internet traffic, which threaten the safety of
the network environment a lot. Since most of the
unknown Internet traffic does not have any labels, it
is difficult to adopt deep learning directly.
Additionally, the feature accuracy and identification
model also impact the identification accuracy a lot. In
this paper, we propose a surge period-based feature
extraction method that helps remove the negative
influence of background traffic in network sessions and
acquire as many traffic flow features as possible. In
addition, we also establish an identification model of
unknown Internet traffic based on JigClu, the
self-supervised learning approach to training unlabeled
datasets. It finally combines with the clustering
method and realizes the further identification of
unknown Internet traffic. The model has been
demonstrated with an accuracy of no less than 74\% in
identifying unknown Internet traffic with the public
dataset ISCXVPN2016 under different scenarios. The work
provides a novel solution for unknown Internet traffic
identification, which is the most difficult task in
identifying Internet traffic. We believe it is a great
leap in Internet traffic identification and is of great
significance to maintaining the security of the network
environment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Carroll:2022:PMM,
author = "John M. Carroll and Fanlu Gui and Srishti Gupta and
Tiffany Knearem",
title = "Playful Meaning-Making as Prosocial Fun",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "288",
day = "30",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100288",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/288",
abstract = "Smart city infrastructures enable the routine
interleaving and integration of diverse activities,
including new ways to play, to be playful, and to
participate. We discuss three examples: (1)
citizen-based water quality monitoring, which combines
outdoor exercise and social interaction with
safeguarding public water supplies, (2) a digital
scavenger hunt, which combines the experiences of a
community arts festival with shared reflections about
significant community places and events, and (3) public
thanking, which encourages people to acknowledge
neighbors and local groups that serve and strengthen
the community. Each of these interaction possibilities
in itself alters lived experience modestly. We argue
that lightweight and playful meaning making activities
can be prosocial fun, that is to say, they can
simultaneously be playful and fun, but also substantive
contributions to the coherence and richness of a
community.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kurtukova:2022:CCS,
author = "Anna Kurtukova and Aleksandr Romanov and Alexander
Shelupanov and Anastasia Fedotova",
title = "Complex Cases of Source Code Authorship Identification
Using a Hybrid Deep Neural Network",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "287",
day = "30",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100287",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/287",
abstract = "This paper is a continuation of our previous work on
solving source code authorship identification problems.
The analysis of heterogeneous source code is a relevant
issue for copyright protection in commercial software
development. This is related to the specificity of
development processes and the usage of collaborative
development tools (version control systems). As a
result, there are source codes written according to
different programming standards by a team of
programmers with different skill levels. Another
application field is information security---in
particular, identifying the author of computer viruses.
We apply our technique based on a hybrid of
Inception-v1 and Bidirectional Gated Recurrent Units
architectures on heterogeneous source codes and
consider the most common commercial development complex
cases that negatively affect the authorship
identification process. The paper is devoted to the
possibilities and limitations of the author's technique
in various complex cases. For situations where a
programmer was proficient in two programming languages,
the average accuracy was 87\%; for proficiency in three
or more---76\%. For the artificially generated source
code case, the average accuracy was 81.5\%. Finally,
the average accuracy for source codes generated from
commits was 84\%. The comparison with state-of-the-art
approaches showed that the proposed method has no
full-functionality analogs covering actual practical
cases.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Roumeliotis:2022:MTO,
author = "Anargyros J. Roumeliotis and Christos N. Efrem and
Athanasios D. Panagopoulos",
title = "Minimization of $n$-th Order Rate Matching in
Satellite Networks with One to Many Pairings",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "286",
day = "30",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100286",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/286",
abstract = "This paper studies the minimization of n th (positive
integer) order rate matching in high-throughput
multi-beam satellite systems, based on one-to-many
capacity allocation pairings, for the first time in the
literature. The offered and requested capacities of
gateways and users' beams are exploited, respectively.
Due to the high complexity of the binary optimization
problem, its solution is approached with a two-step
heuristic scheme. Firstly, the corresponding
continuous, in [0, 1], pairing problem is solved
applying the difference of convex optimization theory,
and then, a transformation from continuous to binary
feasible allocation is provided to extract the pairings
among gateways and users' beams. Comparing with the
exponential-time optimal exhaustive mechanism that
investigates all possible pairs to extract the best
matching for minimizing the rate matching, extended
simulations show that the presented approximation for
the solution of the non-convex optimization problem has
fast convergence and achieves a generally low relative
error for lower value of n. Finally, the simulation
results show the importance of n in the examined
problem. Specifically, pairings originated by the
minimization of rate matching with larger n result in
more fair rate matching among users' beams, which is a
valuable result for satellite and generally wireless
systems operators.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Iglesias-Sanuy:2022:ELB,
author = "Pablo Iglesias-Sanuy and Jos{\'e} Carlos
L{\'o}pez-Ardao and Miguel Rodr{\'\i}guez-P{\'e}rez and
Sergio Herrer{\'\i}a-Alonso and Andr{\'e}s
Su{\'a}rez-Gonz{\'a}lez and Ra{\'u}l F.
Rodr{\'\i}guez-Rubio",
title = "An Efficient Location-Based Forwarding Strategy for
Named Data Networking and {LEO} Satellite
Communications",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "285",
day = "29",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100285",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/285",
abstract = "Low Earth orbit (LEO) satellite constellations are
increasingly gaining attention as future global
Internet providers. At the same time, named data
networking (NDN) is a new data-centric architecture
that has been recently proposed to replace the classic
TCP/IP architecture since it is particularly well
suited to the most common usage of the Internet
nowadays as a content delivery network. Certainly, the
use of NDN is especially convenient in highly dynamic
network environments, such as those of next LEO
constellations incorporating inter-satellite links
(ISL). Among other native facilities, such as inbuilt
security, NDN readily supports the mobility of clients,
thus helping to overcome one of the main problems
raised in LEO satellite networks. Moreover, thanks to a
stateful forwarding plane with support for multicast
transmission and inbuilt data caches, NDN is also able
to provide a more efficient usage of the installed
transmission capacity. In this paper, we propose a new
location-based forwarding strategy for LEO satellite
networks that takes advantage of the knowledge of the
relative position of the satellites and the grid
structure formed by the ISLs to perform the forwarding
of NDN packets. So, forwarding at each node is done
using only local information (node and destination
locations), without the need of interchanging
information between nodes, as is the case with
conventional routing protocols. Using simulation, we
show that the proposed forwarding strategy is a good
candidate to promote the efficient and effective future
use of the NDN architecture in LEO satellite
networks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Spyridou:2022:MVN,
author = "Paschalia (Lia) Spyridou and Constantinos Djouvas and
Dimitra Milioni",
title = "Modeling and Validating a News Recommender Algorithm
in a Mainstream Medium-Sized News Organization: an
Experimental Approach",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "284",
day = "29",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100284",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/284",
abstract = "News recommending systems (NRSs) are algorithmic tools
that filter incoming streams of information according
to the users' preferences or point them to additional
items of interest. In today's high-choice media
environment, attention shifts easily between platforms
and news sites and is greatly affected by algorithmic
technologies; news personalization is increasingly used
by news media to woo and retain users' attention and
loyalty. The present study examines the implementation
of a news recommender algorithm in a leading news media
organization on the basis of observation of the
recommender system's outputs. Drawing on an
experimental design employing the `algorithmic audit'
method, and more specifically the `collaborative audit'
which entails utilizing users as testers of algorithmic
systems, we analyze the composition of the personalized
MyNews area in terms of accuracy and user engagement.
Premised on the idea of algorithms being black boxes,
the study has a two-fold aim: first, to identify the
implicated design parameters enlightening the
underlying functionality of the algorithm, and second,
to evaluate in practice the NRS through the deployed
experimentation. Results suggest that although the
recommender algorithm manages to discriminate between
different users on the basis of their past behavior,
overall, it underperforms. We find that this is related
to flawed design decisions rather than technical
deficiencies. The study offers insights to guide the
improvement of NRSs' design that both considers the
production capabilities of the news organization and
supports business goals, user demands and journalism's
civic values.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ruffo:2022:FES,
author = "Giancarlo Ruffo and Alfonso Semeraro",
title = "{FakeNewsLab}: Experimental Study on Biases and
Pitfalls Preventing Us from Distinguishing True from
False News",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "283",
day = "29",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100283",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/283",
abstract = "Misinformation posting and spreading in social media
is ignited by personal decisions on the truthfulness of
news that may cause wide and deep cascades at a large
scale in a fraction of minutes. When individuals are
exposed to information, they usually take a few seconds
to decide if the content (or the source) is reliable
and whether to share it. Although the opportunity to
verify the rumour is often just one click away, many
users fail to make a correct evaluation. We studied
this phenomenon with a web-based questionnaire that was
compiled by 7298 different volunteers, where the
participants were asked to mark 20 news items as true
or false. Interestingly, false news is correctly
identified more frequently than true news, but showing
the full article instead of just the title,
surprisingly, does not increase general accuracy.
Additionally, displaying the original source of the
news may contribute to misleading the user in some
cases, while the genuine wisdom of the crowd can
positively assist individuals' ability to classify news
correctly. Finally, participants whose browsing
activity suggests a parallel fact-checking activity
show better performance and declare themselves as young
adults. This work highlights a series of pitfalls that
can influence human annotators when building false news
datasets, which in turn can fuel the research on the
automated fake news detection; furthermore, these
findings challenge the common rationale of AI that
suggest users read the full article before
re-sharing.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pflanzner:2022:LAB,
author = "Tamas Pflanzner and Hamza Baniata and Attila Kertesz",
title = "Latency Analysis of Blockchain-Based {SSI}
Applications",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "282",
day = "29",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100282",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/python.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/282",
abstract = "Several revolutionary applications have been built on
the distributed ledgers of blockchain (BC) technology.
Besides cryptocurrencies, many other application fields
can be found in smart systems exploiting smart
contracts and Self Sovereign Identity (SSI) management.
The Hyperledger Indy platform is a suitable open-source
solution for realizing permissioned BC systems for SSI
projects. SSI applications usually require short
response times from the underlying BC network, which
may vary highly depending on the application type, the
used BC software, and the actual BC deployment
parameters. To support the developers and users of SSI
applications, we present a detailed latency analysis of
a permissioned BC system built with Indy and Aries. To
streamline our experiments, we developed a Python
application using containerized Indy and Aries
components from official Hyperledger repositories. We
deployed our experimental application on multiple
virtual machines in the public Google Cloud Platform
and on our local, private cloud using a Docker platform
with Kubernetes. We evaluated and compared their
performance benchmarked by Read and Write latencies. We
found that the local Indy ledger reads and writes
30--50\%, and 65--85\% faster than the Indy ledger
running on the Google Cloud Platform, respectively.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Al-Khafaji:2022:IQI,
author = "Hamza Mohammed Ridha Al-Khafaji",
title = "Improving Quality Indicators of the Cloud-Based {IoT}
Networks Using an Improved Form of Seagull Optimization
Algorithm",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "281",
day = "29",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100281",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/281",
abstract = "The Internet of things (IoT) points to billions of
devices located worldwide which are connected and share
their data based on the Internet. Due to the new
technologies that provide cheap computer chips and
universal wireless networks, it is feasible that
everything from a small tablet to a very large airplane
will be connected to the Internet and will be a part of
the IoT. In most applications, IoT network nodes face
limitations in terms of energy source and cost.
Therefore, the need for innovative methods to improve
quality indicators that increase the lifespan of
networks is evident. Here, a novel technique is
presented to increase the quality of service (QoS) in
IoT using an improved meta-heuristic algorithm, called
the improved seagull optimization algorithm (ISOA),
along with traffic management in these networks. Based
on this subject, the traffic-aware algorithm can manage
the sending of packets and increase the QoS provision
in terms of time to a great extent. The performance
evaluation of the proposed method and comparison with
the previous methods demonstrated the accuracy and
efficiency of this method and its superiority over the
previous works.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pirotti:2022:ITR,
author = "Francesco Pirotti and Marco Piragnolo and Marika
D'Agostini and Raffaele Cavalli",
title = "Information Technologies for Real-Time Mapping of
Human Well-Being Indicators in an Urban Historical
Garden",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "280",
day = "29",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100280",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/280",
abstract = "The post-pandemic era has raised awareness on the
importance of physical and psychological well-being for
decreasing the vulnerability of both individuals and
populations. Citizens in urban areas are subject to
numerous stress factors which can be mitigated by green
spaces such as parks and gardens. Sensor and internet
technologies support nature-based solutions in various
ways. In this paper, we show the results of ongoing
research on the use of spatially distributed IoT
sensors that collect climate data in an $ \approx $8 ha
urban garden. The novelty resides in the method for
merging the IoT data with a detailed 3D model created
by a laser scan survey from a drone flight. The end
products are 1 m resolution thermal comfort maps of
user-defined scenarios, e.g., at specific times or
aggregated in daily/monthly/yearly statistics that
represent a thermal comfort distribution. For full
replicability, the code is open source and available as
an R package on Github.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yang:2022:MAN,
author = "Sa Yang and Suoping Li and Nana Yang and Ying Lin",
title = "Modelling Analysis of a Novel Frameless
Slotted-{ALOHA} Protocol Based on the Number of
Detectable Conflicting Users",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "279",
day = "28",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100279",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/279",
abstract = "To solve the conflict when multi-user packets are
transmitted in a shared wireless link, a novel
frameless slotted-ALOHA protocol is proposed. Signature
codes are used to help the receiver identify the set of
transmitting users, and successive interference
cancellation technology is employed to recover
conflicting packets. Thus, the information in the
conflicting slot can be reused to reduce the number of
retransmissions. Taking the number of backlogged users
in each slot as a system state, a Markov chain model is
established to analyze the protocol, in which the state
transition probabilities are obtained based on the
binomial distribution of packets sent in a slot. Under
the maximum number of detectable conflicting users, the
best value is taken, traffic balance equations are
obtained, and the expressions of throughput, average
number of backlogged users, average successful
transmission probability and average memory size are
derived. Finally, a numerical simulation is carried out
to accurately analyze the influence of the first
transmission probability of the packets on various
performance indexes and the effectiveness of the
theoretical analysis is further verified by the
simulation results.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Giacco:2022:RGI,
author = "Giovanni Giacco and Stefano Marrone and Giuliano
Langella and Carlo Sansone",
title = "{ReFuse}: Generating Imperviousness Maps from
Multi-Spectral {Sentinel-2} Satellite Imagery",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "278",
day = "28",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100278",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/278",
abstract = "Continual mapping and monitoring of impervious
surfaces are crucial activities to support sustainable
urban management strategies and to plan effective
actions for environmental changes. In this context,
impervious surface coverage is increasingly becoming an
essential indicator for assessing urbanization and
environmental quality, with several works relying on
satellite imagery to determine it. However, although
satellite imagery is typically available with a
frequency of 3--10 days worldwide, imperviousness maps
are released at most annually as they require a huge
human effort to be produced and validated. Attempts
have been made to extract imperviousness maps from
satellite images using machine learning, but (i) the
scarcity of reliable and detailed ground truth (ii)
together with the need to manage different spectral
bands (iii) while making the resulting system easily
accessible to the end users is limiting their
diffusion. To tackle these problems, in this work we
introduce a deep-learning-based approach to extract
imperviousness maps from multi-spectral Sentinel-2
images leveraging a very detailed imperviousness map
realised by the Italian department for environment
protection as ground truth. We also propose a scalable
and portable inference pipeline designed to easily
scale the approach, integrating it into a web-based
Geographic Information System (GIS) application. As a
result, even non-expert GIS users can quickly and
easily calculate impervious surfaces for any place on
Earth (accuracy {$>$95}\% ), with a frequency limited
only by the availability of new satellite images.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Manugunta:2022:DLB,
author = "Ramya Krishna Manugunta and Rytis Maskeliunas and
Robertas Damasevicius",
title = "Deep Learning Based Semantic Image Segmentation
Methods for Classification of {Web} Page Imagery",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "277",
day = "27",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100277",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/277",
abstract = "Semantic segmentation is the task of clustering
together parts of an image that belong to the same
object class. Semantic segmentation of webpages is
important for inferring contextual information from the
webpage. This study examines and compares deep learning
methods for classifying webpages based on imagery that
is obscured by semantic segmentation. Fully
convolutional neural network architectures (UNet and
FCN-8) with defined hyperparameters and loss functions
are used to demonstrate how they can support an
efficient method of this type of classification
scenario in custom-prepared webpage imagery data that
are labeled multi-class and semantically segmented
masks using HTML elements such as paragraph text,
images, logos, and menus. Using the proposed Seg-UNet
model achieved the best accuracy of 95\%. A comparison
with various optimizer functions demonstrates the
overall efficacy of the proposed semantic segmentation
approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Akhilesh:2022:APT,
author = "Rohit Akhilesh and Oliver Bills and Naveen Chilamkurti
and Mohammad Jabed Morshed Chowdhury",
title = "Automated Penetration Testing Framework for
Smart-Home-Based {IoT} Devices",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "276",
day = "27",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100276",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/276",
abstract = "Security testing is fundamental to identifying
security vulnerabilities on smart home-based IoT
devices. For this, penetration testing is the most
prominent and effective solution. However, testing the
IoT manually is cumbersome and time-consuming. In
addition, penetration testing requires a deep knowledge
of the possible attacks and the available hacking
tools. Therefore, this study emphasises building an
automated penetration testing framework to discover the
most common vulnerabilities in smart home-based IoT
devices. This research involves exploring (studying)
different IoT devices to select five devices for
testing. Then, the common vulnerabilities for the five
selected smart home-based IoT devices are examined, and
the corresponding penetration testing tools required
for the detection of these vulnerabilities are
identified. The top five vulnerabilities are identified
from the most common vulnerabilities, and accordingly,
the corresponding tools for these vulnerabilities are
discovered. These tools are combined using a script
which is then implemented into a framework written in
Python 3.6. The selected IoT devices are tested
individually for known vulnerabilities using the
proposed framework. For each vulnerability discovered
in the device, the Common Vulnerability Scoring System
(CVSS) Base score is calculated and the summation of
these scores is taken to calculate the total score (for
each device). In our experiment, we found that the
Tp-Link Smart Bulb and the Tp-Link Smart Camera had the
highest score and were the most vulnerable and the
Google Home Mini had the least score and was the most
secure device of all the devices. Finally, we conclude
that our framework does not require technical expertise
and thus can be used by common people. This will help
improve the field of IoT security and ensure the
security of smart homes to build a safe and secure
future.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lucena:2022:CUU,
author = "Felipe Lucena and Fabio Marcelo Breunig and Hermann
Kux",
title = "The Combined Use of {UAV}-Based {RGB} and {DEM} Images
for the Detection and Delineation of Orange Tree Crowns
with {Mask R-CNN}: an Approach of Labeling and Unified
Framework",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "275",
day = "27",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100275",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/275",
abstract = "In this study, we used images obtained by Unmanned
Aerial Vehicles (UAV) and an instance segmentation
model based on deep learning (Mask R-CNN) to evaluate
the ability to detect and delineate canopies in high
density orange plantations. The main objective of the
work was to evaluate the improvement acquired by the
segmentation model when integrating the Canopy Height
Model (CHM) as a fourth band to the images. Two models
were evaluated, one with RGB images and the other with
RGB + CHM images, and the results indicated that the
model with combined images presents better results
(overall accuracy from 90.42\% to 97.01\%). In addition
to the comparison, this work suggests a more efficient
ground truth mapping method and proposes a methodology
for mosaicking the results by Mask R-CNN on remotely
sensed images.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kratzke:2022:CNO,
author = "Nane Kratzke",
title = "Cloud-Native Observability: The Many-Faceted Benefits
of Structured and Unified Logging---a Multi-Case
Study",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "274",
day = "26",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100274",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/274",
abstract = "Background: Cloud-native software systems often have a
much more decentralized structure and many
independently deployable and (horizontally) scalable
components, making it more complicated to create a
shared and consolidated picture of the overall
decentralized system state. Today, observability is
often understood as a triad of collecting and
processing metrics, distributed tracing data, and
logging. The result is often a complex observability
system composed of three stovepipes whose data are
difficult to correlate. Objective: This study analyzes
whether these three historically emerged observability
stovepipes of logs, metrics and distributed traces
could be handled in a more integrated way and with a
more straightforward instrumentation approach. Method:
This study applied an action research methodology used
mainly in industry--academia collaboration and common
in software engineering. The research design utilized
iterative action research cycles, including one
long-term use case. Results: This study presents a
unified logging library for Python and a unified
logging architecture that uses the structured logging
approach. The evaluation shows that several thousand
events per minute are easily processable. Conclusions:
The results indicate that a unification of the current
observability triad is possible without the necessity
to develop utterly new toolchains.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Xu:2022:DBD,
author = "Xingjian Xu and Lijun Sun and Fanjun Meng",
title = "Distributed Big Data Storage Infrastructure for
Biomedical Research Featuring High-Performance and
Rich-Features",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "273",
day = "24",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100273",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/273",
abstract = "The biomedical field entered the era of ``big data''
years ago, and a lot of software is being developed to
tackle the analysis problems brought on by big data.
However, very few programs focus on providing a solid
foundation for file systems of biomedical big data.
Since file systems are a key prerequisite for efficient
big data utilization, the absence of specialized
biomedical big data file systems makes it difficult to
optimize storage, accelerate analysis, and enrich
functionality, resulting in inefficiency. Here we
present F3BFS, a functional, fundamental, and
future-oriented distributed file system, specially
designed for various kinds of biomedical data. F3BFS
makes it possible to boost existing software's
performance without modifying its main algorithms by
transmitting raw datasets from generic file systems.
Further, F3BFS has various built-in features to help
researchers manage biology datasets more efficiently
and productively, including metadata management, fuzzy
search, automatic backup, transparent compression,
etc.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dhar:2022:AIL,
author = "Ankita Dhar and Himadri Mukherjee and Shibaprasad Sen
and Md Obaidullah Sk and Amitabha Biswas and Teresa
Gon{\c{c}}alves and Kaushik Roy",
title = "Author Identification from Literary Articles with
Visual Features: a Case Study with {Bangla} Documents",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "10",
pages = "272",
day = "23",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14100272",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Oct 26 11:06:06 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/10/272",
abstract = "Author identification is an important aspect of
literary analysis, studied in natural language
processing (NLP). It aids identify the most probable
author of articles, news texts or social media comments
and tweets, for example. It can be applied to other
domains such as criminal and civil cases,
cybersecurity, forensics, identification of
plagiarizer, and many more. An automated system in this
context can thus be very beneficial for society. In
this paper, we propose a convolutional neural network
(CNN)-based author identification system from literary
articles. This system uses visual features along with a
five-layer convolutional neural network for the
identification of authors. The prime motivation behind
this approach was the feasibility to identify distinct
writing styles through a visualization of the writing
patterns. Experiments were performed on 1200 articles
from 50 authors achieving a maximum accuracy of
93.58\%. Furthermore, to see how the system performed
on different volumes of data, the experiments were
performed on partitions of the dataset. The system
outperformed standard handcrafted feature-based
techniques as well as established works on publicly
available datasets.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Polyakov:2022:ALP,
author = "Nikita Polyakov and Anna Platonova",
title = "Assessing Latency of Packet Delivery in the {5G}
{3GPP} Integrated Access and Backhaul Architecture with
Half-Duplex Constraints",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "345",
day = "21",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110345",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/345",
abstract = "Integrated Access and Backhaul (IAB) is an enabling
technology for efficient 5G millimeter wave (mmWave)
New Radio (NR) deployment. The key feature of IAB is
multi-hop wireless backhauling, allowing utilizing
relaying IAB-nodes to provide cost-efficient access
network densification and alleviate the problem of
blockages. One of the critical performance measures in
such systems is the latency of packet delivery over the
multi-hop paths. The paper aims at assessing the impact
of multi-hop transmission on the end-to-end delay in an
IAB radio access network, taking into account the
half-duplex constraint. We build a detailed queuing
theory model for latency assessment in
time-division-multiplexing (TDM)-based IAB deployments
and evaluate the delay due to queuing in the network
nodes for several cell topologies and under different
time allocation strategies between access and backhaul.
The paper considers a practical Manhattan-style urban
deployment, which is characteristically impaired by the
blockage of buildings. The numerical results show that
balancing the access and backhaul micro phases is
crucial for reducing the end-to-end packet delay, at
least in the uplink, while increasing the number of
network hops yields a linear increase in the total
packet delay for both the uplink and downlink. The
numerical results were obtained via simulation using
the open-source software OMNeT++.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Csirmaz:2022:DSC,
author = "Elod P. Csirmaz and Laszlo Csirmaz",
title = "Data Synchronization: a Complete Theoretical Solution
for Filesystems",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "344",
day = "21",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110344",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/344",
abstract = "Data reconciliation in general, and filesystem
synchronization in particular, lacks rigorous
theoretical foundation. This paper presents, for the
first time, a complete analysis of synchronization for
two replicas of a theoretical filesystem.
Synchronization has two main stages: identifying the
conflicts, and resolving them. All existing (both
theoretical and practical) synchronizers are
operation-based: they define, using some rationale or
heuristics, how conflicts are to be resolved without
considering the effect of the resolution on subsequent
conflicts. Instead, our approach is declaration-based:
we define what constitutes the resolution of all
conflicts, and for each possible scenario we prove the
existence of sequences of operations/commands which
convert the replicas into a common synchronized state.
These sequences consist of operations rolling back some
local changes, followed by operations performed on the
other replica. The set of rolled-back operations
provides the user with clear and intuitive information
on the proposed changes, so she can easily decide
whether to accept them or ask for other alternatives.
All possible synchronized states are described by
specifying a set of conflicts, a partial order on the
conflicts describing the order in which they need to be
resolved, as well as the effect of each decision on
subsequent conflicts. Using this classification, the
outcomes of different conflict resolution policies can
be investigated easily.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kotenidis:2022:ICM,
author = "Efthimis Kotenidis and Nikolaos Vryzas and Andreas
Veglis and Charalampos Dimoulas",
title = "Integrating Chatbot Media Automations in Professional
Journalism: an Evaluation Framework",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "343",
day = "21",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110343",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/343",
abstract = "Interactivity has been a very sought-after feature in
professional journalism ever since the media industry
transitioned from print into the online space. Within
this context, chatbots started to infiltrate the media
sphere and provide news organizations with new and
innovative ways to create and share their content, with
an even larger emphasis on back-and-forth communication
and news reporting personalization. The present
research highlights two important factors that can
determine the efficient integration of chatbots in
professional journalism: the feasibility of chatbot
programming by journalists without a background in
computer science using coding-free platforms and the
usability of the created chatbot agents for news
reporting to the audience. This paper aims to review
some of the most popular, coding-free chatbot creation
platforms that are available to journalists today. To
that end, a three-phase evaluation framework is
introduced. First off, the interactivity features that
they offer to media industry workers are evaluated
using an appropriate metrics framework. Secondly, a
two- part workshop is conducted where journalists use
the aforementioned platforms to create their own
chatbot news reporting agents with minimum training,
and lastly, the created chatbots are evaluated by a
larger audience concerning the usability and overall
user experience.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mackay:2022:ESI,
author = "Michael Mackay",
title = "Editorial for the Special Issue on {5G} Enabling
Technologies and Wireless Networking",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "342",
day = "21",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110342",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/342",
abstract = "The ongoing deployment of 5G networks is seen as a key
enabler for realizing upcoming interconnected services
at scale, including the massive deployment of the
Internet of Things, providing V2X communications to
support autonomous vehicles, and the increase in smart
homes, smart cities, and Industry 4 \ldots{}",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Habib:2022:BTB,
author = "Gousia Habib and Sparsh Sharma and Sara Ibrahim and
Imtiaz Ahmad and Shaima Qureshi and Malik Ishfaq",
title = "Blockchain Technology: Benefits, Challenges,
Applications, and Integration of Blockchain Technology
with Cloud Computing",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "341",
day = "21",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110341",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/341",
abstract = "The real-world use cases of blockchain technology,
such as faster cross-border payments, identity
management, smart contracts, cryptocurrencies, and
supply chain--blockchain technology are here to stay
and have become the next innovation, just like the
Internet. There have been attempts to formulate digital
money, but they have not been successful due to
security and trust issues. However, blockchain needs no
central authority, and its operations are controlled by
the people who use it. Furthermore, it cannot be
altered or forged, resulting in massive market hype and
demand. Blockchain has moved past cryptocurrency and
discovered implementations in other real-life
applications; this is where we can expect blockchain
technology to be simplified and not remain a complex
concept. Blockchain technology's desirable
characteristics are decentralization, integrity,
immutability, verification, fault tolerance, anonymity,
audibility, and transparency. We first conduct a
thorough analysis of blockchain technology in this
paper, paying particular attention to its evolution,
applications and benefits, the specifics of
cryptography in terms of public key cryptography, and
the challenges of blockchain in distributed transaction
ledgers, as well as the extensive list of blockchain
applications in the financial transaction system. This
paper presents a detailed review of blockchain
technology, the critical challenges faced, and its
applications in different fields. Blockchain in the
transaction system is explained in detail with a
summary of different cryptocurrencies. Some of the
suggested solutions are given in the overall study of
the paper.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Roy:2022:MPU,
author = "Sanjiban Sekhar Roy and Ali Ismail Awad and Lamesgen
Adugnaw Amare and Mabrie Tesfaye Erkihun and Mohd
Anas",
title = "Multimodel Phishing {URL} Detection Using {LSTM},
Bidirectional {LSTM}, and {GRU} Models",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "340",
day = "21",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110340",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/340",
abstract = "In today's world, phishing attacks are gradually
increasing, resulting in individuals losing valuables,
assets, personal information, etc., to unauthorized
parties. In phishing, attackers craft malicious
websites disguised as well-known, legitimate sites and
send them to individuals to steal personal information
and other related private details. Therefore, an
efficient and accurate method is required to determine
whether a website is malicious. Numerous methods have
been proposed for detecting malicious uniform resource
locators (URLs) using deep learning, machine learning,
and other approaches. In this study, we have used
malicious and benign URLs datasets and have proposed a
detection mechanism for detecting malicious URLs using
recurrent neural network models such as long short-term
memory (LSTM), bidirectional long short-term memory
(Bi-LSTM), and the gated recurrent unit (GRU).
Experimental results have shown that the proposed
mechanism achieved an accuracy of 97.0\% for LSTM,
99.0\% for Bi-LSTM, and 97.5\% for GRU, respectively.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alsadeh:2022:DFI,
author = "Ahmad Alsadeh and Nasri Yatim and Yousef Hassouneh",
title = "A Dynamic Federated Identity Management Using {OpenID}
Connect",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "339",
day = "21",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110339",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/339",
abstract = "Identity federation allows one to link a user's
digital identities across several identity management
systems. Federated identity management (FIM) ensures
that users have easy access to the available resources.
However, scaling FIM to numerous partners is a
challenging process due to the interoperability issue
between different federation architectures. This study
proposes a dynamic identity federation model to
eliminate the manual configuration steps needed to
establish an organizational identity federation by
utilizing the OpenID Connect (OIDC) framework. The
proposed model consists of three major steps to
establish dynamic FIM: first, the discovery of the
OpenID service provider, which indicates the location
of the partner organization; second, the registration
of the OpenID relying party, which allows the
organization and its partner to negotiate information
for establishing the federation; finally, establishing
the dynamic trust federation. The proposed dynamic FIM
model allows applications to provide services to
end-users coming from various domains while maintaining
a trust between clients and service providers. Through
our proposed dynamic identity federation model,
organizations can save hundreds of hours by achieving
dynamic federation in runtime and serving a large
number of end-users.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Asad:2022:SKA,
author = "Muhammad Asad and Muhammad Aslam and Syeda Fizzah
Jilani and Saima Shaukat and Manabu Tsukada",
title = "{SHFL}: {$K$}-Anonymity-Based Secure Hierarchical
Federated Learning Framework for Smart Healthcare
Systems",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "338",
day = "18",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110338",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/338",
abstract = "Dynamic and smart Internet of Things (IoT)
infrastructures allow the development of smart
healthcare systems, which are equipped with mobile
health and embedded healthcare sensors to enable a
broad range of healthcare applications. These IoT
applications provide access to the clients' health
information. However, the rapid increase in the number
of mobile devices and social networks has generated
concerns regarding the secure sharing of a client's
location. In this regard, federated learning (FL) is an
emerging paradigm of decentralized machine learning
that guarantees the training of a shared global model
without compromising the data privacy of the client. To
this end, we propose a K-anonymity-based secure
hierarchical federated learning (SHFL) framework for
smart healthcare systems. In the proposed hierarchical
FL approach, a centralized server communicates
hierarchically with multiple directly and indirectly
connected devices. In particular, the proposed SHFL
formulates the hierarchical clusters of location-based
services to achieve distributed FL. In addition, the
proposed SHFL utilizes the K-anonymity method to hide
the location of the cluster devices. Finally, we
evaluated the performance of the proposed SHFL by
configuring different hierarchical networks with
multiple model architectures and datasets. The
experiments validated that the proposed SHFL provides
adequate generalization to enable network scalability
of accurate healthcare systems without compromising the
data and location privacy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Grobelna:2022:ITC,
author = "Iwona Grobelna",
title = "{Internet of Things} and Cyber--Physical Systems",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "337",
day = "18",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110337",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/337",
abstract = "Dynamic and smart Internet of Things (IoT)
infrastructures allow the development of smart
healthcare systems, which are equipped with mobile
health and embedded healthcare sensors to enable a
broad range of healthcare applications. These IoT
applications provide access to the clients' health
information. However, the rapid increase in the number
of mobile devices and social networks has generated
concerns regarding the secure sharing of a client's
location. In this regard, federated learning (FL) is an
emerging paradigm of decentralized machine learning
that guarantees the training of a shared global model
without compromising the data privacy of the client. To
this end, we propose a K-anonymity-based secure
hierarchical federated learning (SHFL) framework for
smart healthcare systems. In the proposed hierarchical
FL approach, a centralized server communicates
hierarchically with multiple directly and indirectly
connected devices. In particular, the proposed SHFL
formulates the hierarchical clusters of location-based
services to achieve distributed FL. In addition, the
proposed SHFL utilizes the K-anonymity method to hide
the location of the cluster devices. Finally, we
evaluated the performance of the proposed SHFL by
configuring different hierarchical networks with
multiple model architectures and datasets. The
experiments validated that the proposed SHFL provides
adequate generalization to enable network scalability
of accurate healthcare systems without compromising the
data and location privacy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Honecker:2022:CDT,
author = "Fabian Honecker and Julian Dreyer and Ralf
T{\"o}njes",
title = "Comparison of Distributed Tamper-Proof Storage Methods
for Public Key Infrastructures",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "336",
day = "18",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110336",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/336",
abstract = "Modern Public Key Infrastructures (PKIs) allow users
to create and maintain centrally stored cryptographic
certificates. These infrastructures use a so-called
certificate chain. At the root of the chain, a root
Certification Authority (CA) is responsible for issuing
the base certificate. Every verification and
certification step within the chain is based upon the
security of said root CA. Thus, its operation security
is of great concern. Since the root certificates are
stored locally on the root CA, any Denial of Service
(DoS) attack may render the whole certificate chain,
which is based on of the attacked root CA, inoperable.
Therefore, this article evaluates different approaches
to a decentralized data storage system that is based on
the Distributed Ledger Technology (DLT). To show the
real-world potential of the proposed approaches, we
also evaluate the different technologies using a novel
PKI mechanism called Near Field Communication Key
Exchange (NFC-KE). The results indicate that modern
distributed data storage solutions such as
Interplanetary Filesystem (IPFS) and SIA can have
significant performance and decentralization benefits
in comparison to purely Blockchain-based technologies
like Hyperledger Fabric. However, they lack any Smart
Contract functionality, which requires a software
developer to implement verification mechanisms in
centralized software solutions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Raheman:2022:FCA,
author = "Fazal Raheman",
title = "The Future of Cybersecurity in the Age of Quantum
Computers",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "335",
day = "16",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110335",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/335",
abstract = "The first week of August 2022 saw the world's
cryptographers grapple with the second shocker of the
year. Another one of the four post-quantum cryptography
(PQC) algorithms selected by the NIST (National
Institute of Standards and Technology) in a rigorous
5-year process was cracked by a team from Belgium. They
took just 62 min and a standard laptop to break the PQC
algorithm to win a USD 50,000 bounty from Microsoft.
The first shocker came 6 months earlier, when another
of the NIST finalists (Rainbow) was taken down.
Unfortunately, both failed PQC algorithms are
commercially available to consumers. With 80 of the 82
PQC candidates failing the NIST standardization
process, the future of the remaining two PQC algorithms
is, at best, questionable, placing the rigorous 5-year
NIST exercise to build a quantum-safe encryption
standard in jeopardy. Meanwhile, there is no respite
from the quantum threat that looms large. It is time we
take a step back and review the etiology of the problem
de novo. Although state-of-the-art computer security
heavily relies on cryptography, it can indeed transcend
beyond encryption. This paper analyzes an
encryption-agnostic approach that can potentially
render computers quantum-resistant. Zero-vulnerability
computing (ZVC) secures computers by banning all
third-party permissions, a root cause of most
vulnerabilities. ZVC eliminates the complexities of the
multi-layered architecture of legacy computers and
builds a minimalist, compact solid-state software on a
chip (3SoC) that is robust, energy-efficient, and
potentially resistant to malware as well as quantum
threats.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bodrunova:2022:ESI,
author = "Svetlana S. Bodrunova",
title = "Editorial for the Special Issue {``Selected Papers
from the 9th Annual Conference `Comparative Media
Studies in Today's World' (CMSTW'2021)''}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "334",
day = "16",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110334",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/334",
abstract = "The first week of August 2022 saw the world's
cryptographers grapple with the second shocker of the
year. Another one of the four post-quantum cryptography
(PQC) algorithms selected by the NIST (National
Institute of Standards and Technology) in a rigorous
5-year process was cracked by a team from Belgium. They
took just 62 min and a standard laptop to break the PQC
algorithm to win a USD 50,000 bounty from Microsoft.
The first shocker came 6 months earlier, when another
of the NIST finalists (Rainbow) was taken down.
Unfortunately, both failed PQC algorithms are
commercially available to consumers. With 80 of the 82
PQC candidates failing the NIST standardization
process, the future of the remaining two PQC algorithms
is, at best, questionable, placing the rigorous 5-year
NIST exercise to build a quantum-safe encryption
standard in jeopardy. Meanwhile, there is no respite
from the quantum threat that looms large. It is time we
take a step back and review the etiology of the problem
de novo. Although state-of-the-art computer security
heavily relies on cryptography, it can indeed transcend
beyond encryption. This paper analyzes an
encryption-agnostic approach that can potentially
render computers quantum-resistant. Zero-vulnerability
computing (ZVC) secures computers by banning all
third-party permissions, a root cause of most
vulnerabilities. ZVC eliminates the complexities of the
multi-layered architecture of legacy computers and
builds a minimalist, compact solid-state software on a
chip (3SoC) that is robust, energy-efficient, and
potentially resistant to malware as well as quantum
threats.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Suleiman:2022:CAF,
author = "Husam Suleiman",
title = "A Cost-Aware Framework for {QoS}-Based and
Energy-Efficient Scheduling in Cloud--Fog Computing",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "333",
day = "14",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110333",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/333",
abstract = "Cloud--fog computing is a large-scale service
environment developed to deliver fast, scalable
services to clients. The fog nodes of such environments
are distributed in diverse places and operate
independently by deciding on which data to process
locally and which data to send remotely to the cloud
for further analysis, in which a Service-Level
Agreement (SLA) is employed to govern Quality of
Service (QoS) requirements of the cloud provider to
such nodes. The provider experiences varying incoming
workloads that come from heterogeneous fog and Internet
of Things (IoT) devices, each of which submits jobs
that entail various service characteristics and QoS
requirements. To execute fog workloads and meet their
SLA obligations, the provider allocates appropriate
resources and utilizes load scheduling strategies that
effectively manage the executions of fog jobs on cloud
resources. Failing to fulfill such demands causes extra
network bottlenecks, service delays, and energy
constraints that are difficult to maintain at run-time.
This paper proposes a joint energy- and QoS-optimized
performance framework that tolerates delay and energy
risks on the cost performance of the cloud provider.
The framework employs scheduling mechanisms that
consider the SLA penalty and energy impacts of data
communication, service, and waiting performance metrics
on cost reduction. The findings prove the framework's
effectiveness in mitigating energy consumption due to
QoS penalties and therefore reducing the gross
scheduling cost.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2022:BBB,
author = "Xinlu Li and Yuanyuan Lei and Shengwei Ji",
title = "{BERT}- and {BiLSTM}-Based Sentiment Analysis of
Online {Chinese} Buzzwords",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "332",
day = "14",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110332",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/332",
abstract = "Sentiment analysis of online Chinese buzzwords (OCBs)
is important for healthy development of platforms, such
as games and social networking, which can avoid
transmission of negative emotions through prediction of
users' sentiment tendencies. Buzzwords have the
characteristics of varying text length, irregular
wording, ignoring syntactic and grammatical
requirements, no complete semantic structure, and no
obvious sentiment features. This results in
interference and challenges to the sentiment analysis
of such texts. Sentiment analysis also requires
capturing effective sentiment features from deeper
contextual information. To solve the above problems, we
propose a deep learning model combining BERT and
BiLSTM. The goal is to generate dynamic representations
of OCB vectors in downstream tasks by fine-tuning the
BERT model and to capture the rich information of the
text at the embedding layer to solve the problem of
static representations of word vectors. The generated
word vectors are then transferred to the BiLSTM model
for feature extraction to obtain the local and global
semantic features of the text while highlighting the
text sentiment polarity for sentiment classification.
The experimental results show that the model works well
in terms of the comprehensive evaluation index F1. Our
model also has important significance and research
value for sentiment analysis of irregular texts, such
as OCBs.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cen:2022:FMC,
author = "Yuefeng Cen and Mingxing Luo and Gang Cen and Cheng
Zhao and Zhigang Cheng",
title = "Financial Market Correlation Analysis and Stock
Selection Application Based on {TCN}-Deep Clustering",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "331",
day = "14",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110331",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/331",
abstract = "It is meaningful to analyze the market correlations
for stock selection in the field of financial
investment. Since it is difficult for existing deep
clustering methods to mine the complex and nonlinear
features contained in financial time series, in order
to deeply mine the features of financial time series
and achieve clustering, a new end-to-end deep
clustering method for financial time series is
proposed. It contains two modules: an autoencoder
feature extraction network based on TCN (temporal
convolutional neural) networks and a temporal
clustering optimization algorithm with a KL
(Kullback--Leibler) divergence. The features of
financial time series are represented by the causal
convolution and the dilated convolution of TCN
networks. Then, the pre-training results based on the
KL divergence are fine-tuned to make the clustering
results discriminative. The experimental results show
that the proposed method outperforms existing deep
clustering and general clustering algorithms in the CSI
300 and S\&P 500 index markets. In addition, the
clustering results combined with an inference strategy
can be used to select stocks that perform well or
poorly, thus guiding actual stock market trades.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Su:2022:CBR,
author = "Yue Su and Kien Nguyen and Hiroo Sekiya",
title = "A Comparison of Blockchain Recovery Time in Static and
Mobile {IoT}-Blockchain Networks",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "330",
day = "14",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110330",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/330",
abstract = "Many IoT-blockchain systems in which blockchain
connections run on an infrastructure-based network,
such as Wi-Fi or LTE, face a severe problem: the single
point of failure (SPoF) (i.e., depending on the
availability, an access point of an LTE base station).
Using infrastructure-less networks (i.e., ad hoc
networks) is an efficient approach to prevent such
highly disruptive events. An ad hoc network can
automatically restore blockchain communication using an
ad hoc routing protocol, even if a node fails.
Moreover, an ad hoc routing protocol is more efficient
when considering the IoT nodes' mobility. In this
paper, we first construct IoT-blockchain systems on
emulated and real ad hoc networks with Ethereum and
three ad hoc routing protocols (i.e., OLSR, BATMAN, and
BABEL). We then evaluate the blockchain recovery time
in static and mobile scenarios. The results show that
BATMAN achieves the best blockchain recovery
performance in all investigated scenarios because
BATMAN only determines whether to switch a route by
comparing the number of OGM packets received from a
different next-hop. More specifically, in the
small-scale real IoT-blockchain, BATMAN recovers at
least 73.9\% and 59.8\% better than OLSR and BABEL,
respectively. In the medium-scale emulated
IoT-blockchain, the recovery time of BATMAN is at least
69\% and 60\% shorter than OLSR or BABEL,
respectively.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Villarejo-Carballido:2022:KCL,
author = "Beatriz Villarejo-Carballido and Cristina M. Pulido
and Santiago Tejedor",
title = "Key Competences for Lifelong Learning through the
{``Animal} Crossing: New Horizons'' Video Game",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "329",
day = "13",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110329",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/329",
abstract = "The growth and impact of video games in education at
an international level is a reality. Research shows
that gamers can increase their knowledge, skills, and
behavioural flexibility. However, there has been no
in-depth research into the relationship between current
video games and the key competences for lifelong
learning set out by the European Commission. This
research focuses on learning acquisition through
playing the popular game ``Animal Crossing: New
Horizons''. The Communicative Methodology has been used
in this research through, on the one hand, use of the
Social Impact in Social Media (SISM) method involving
the analysis of 1000 comments posted on the social
network Twitter and, on the other hand, through
communicative inter, sanviews with five gamers and a
family member of a user. The results show that the
Animal Crossing video game promotes learning
achievements regarding literacy, multilingualism,
mathematical skills, digital competence, social skills,
citizenship, entrepreneurship, and cultural
awareness.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kitsiou:2022:RUD,
author = "Angeliki Kitsiou and Charikleia Despotidi and Christos
Kalloniatis and Stefanos Gritzalis",
title = "The Role of Users' Demographic and Social Attributes
for Accepting Biometric Systems: a {Greek} Case Study",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "328",
day = "13",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110328",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/328",
abstract = "Even though both internet-of-cloud services and
biometric systems (BSs) are used worldwide, popular and
expanded among public and private services, their
utilization has not been extended among Greek users,
and in particular within Greek HEIs. This paper aims to
examine the University of the Aegean (UA) students'
perceptions, especially on BS acceptance, determining
the impact of their sociodemographic characteristics
toward this. An online instrument was developed based
on constructs of technology acceptance models, and
previous research focused on BS acceptance, including a
great variety of sociodemographic variables. The
authors collected 768 complete responses to explore the
social and demographic attributes that impact on
students' BS acceptance through exploratory descriptive
research. This study found that several UA students'
sociodemographic attributes are linked to their BS
acceptance. Specifically, gender, age, study level,
year of study, professional profile and fathers'
occupation are useful to determine which students'
groups are in favor of BS, while employment status,
annual income and mothers' occupation are weak toward
this. Security and privacy concerns are indicated to
influence users' BS acceptance as well. This study
provides a unique approach to better understanding the
Greek students' BS acceptance, with important
implications for improved BS marketing in Greece in
synergy with the internet-of-cloud services and their
potential adoption in HEIs internal settings. It also
provides developers with further knowledge for security
and privacy non-functional requirements in order to
increase users' acceptance and to address these
challenges within the internet of cloud.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Brackin:2022:GID,
author = "Roger C. Brackin and Michael J. Jackson and Andrew
Leyshon and Jeremy G. Morley and Sarah Jewitt",
title = "Generating Indicators of Disruptive Innovation Using
Big Data",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "327",
day = "11",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110327",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/327",
abstract = "Technological evolution and its potential impacts are
of significant interest to governments, corporate
organizations and for academic enquiry; but assessments
of technology progression are often highly subjective.
This paper prototypes potential objective measures to
assess technology progression using internet-based
data. These measures may help reduce the subjective
nature of such assessments and, in conjunction with
other techniques, reduce the uncertainty of technology
progression assessment. The paper examines one part of
the technology ecosystem, namely, academic research and
publications. It uses analytics performed against a
large body of academic paper abstracts and metadata
published over 20 years to propose and demonstrate
candidate indicators of technology progression.
Measures prototyped are: (i) overall occurrence of
technologies used over time in research, (ii) the
fields in which this use was made; (iii) the geographic
spread of specific technologies within research and
(iv) the clustering of technology research over time.
An outcome of the analysis is an ability to assess the
measures of technology progression against a set of
inputs and a set of commentaries and forecasts made
publicly in the subject area over the last 20 years.
The potential automated indicators of research are
discussed together with other indicators which might
help working groups in assessing technology progression
using more quantitative methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhang:2022:TVD,
author = "Yujian Zhang and Daifu Liu",
title = "Toward Vulnerability Detection for {Ethereum} Smart
Contracts Using Graph-Matching Network",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "326",
day = "11",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110326",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/326",
abstract = "With the blooming of blockchain-based smart contracts
in decentralized applications, the security problem of
smart contracts has become a critical issue, as
vulnerable contracts have resulted in severe financial
losses. Existing research works have explored
vulnerability detection methods based on fuzzing,
symbolic execution, formal verification, and static
analysis. In this paper, we propose two static analysis
approaches called ASGVulDetector and BASGVulDetector
for detecting vulnerabilities in Ethereum smart
contacts from source-code and bytecode perspectives,
respectively. First, we design a novel intermediate
representation called abstract semantic graph (ASG) to
capture both syntactic and semantic features from the
program. ASG is based on syntax information but
enriched by code structures, such as control flow and
data flow. Then, we apply two different training
models, i.e., graph neural network (GNN) and graph
matching network (GMN), to learn the embedding of ASG
and measure the similarity of the contract pairs. In
this way, vulnerable smart contracts can be identified
by calculating the similarity to labeled ones. We
conduct extensive experiments to evaluate the
superiority of our approaches to state-of-the-art
competitors. Specifically, ASGVulDetector improves the
best of three source-code-only static analysis tools
(i.e., SmartCheck, Slither, and DR-GCN ) regarding the
F1 score by 12.6\% on average, while BASGVulDetector
improves that of the three detection tools supporting
bytecode (i.e., ContractFuzzer, Oyente, and Securify )
regarding the F1 score by 25.6\% on average. We also
investigate the effectiveness and advantages of the GMN
model for detecting vulnerabilities in smart
contracts.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhang:2022:EDM,
author = "Yiyi Zhang and Tatsuo Nakajima",
title = "Exploring the Design of a Mixed-Reality {3D} Minimap
to Enhance Pedestrian Satisfaction in Urban Exploratory
Navigation",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "325",
day = "10",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110325",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/325",
abstract = "The development of ubiquitous computing technology and
the emergence of XR could provide pedestrian navigation
with more options for user interfaces and interactions.
In this work, we aim investigate the role of a
mixed-reality map interface in urban exploration to
enhance pedestrians' mental satisfaction. We propose a
mixed-reality 3D minimap as a part of the navigation
interface which pedestrians could refer to and interact
during urban exploration. To further explore the
different levels of detail of the map interface, we
conducted a user study (n = 28, two groups with two
tasks). We designed two exploratory activities as
experimental tasks with two map modes (a normal one and
a simplified one) to discuss the detailed design of the
minimap interface. The results indicated that
participants showed a positive attitude toward our
method. The simplified map mode could result in a lower
perceived workload in both tasks while enhancing
performance in specific navigation, such as wayfinding.
However, we also found that pedestrians' preference for
the level of detail of the minimap interface is dynamic
in navigation. Thus, we suggest discussing the
different levels of detail further in specific
scenarios. Finally, we also summarize some findings
observed during user study for inspiring the study of
virtual map interface of future mixed-reality
navigation for urban exploration in various
scenarios.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Xu:2022:MLP,
author = "Xiaoting Xu and Tin Lai and Sayka Jahan and Farnaz
Farid and Abubakar Bello",
title = "A Machine Learning Predictive Model to Detect Water
Quality and Pollution",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "324",
day = "08",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110324",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/324",
abstract = "The increasing prevalence of marine pollution during
the past few decades motivated recent research to help
ease the situation. Typical water quality assessment
requires continuous monitoring of water and sediments
at remote locations with labour-intensive laboratory
tests to determine the degree of pollution. We propose
an automated water quality assessment framework where
we formalise a predictive model using machine learning
to infer the water quality and level of pollution using
collected water and sediments samples. Firstly, due to
the sparsity of sample collection locations, the amount
of sediment samples of water is limited, and the
dataset is incomplete. Therefore, after an extensive
investigation on various data imputation methods'
performance in water and sediment datasets with
different missing data rates, we chose the best
imputation method to process the missing data.
Afterwards, the water sediment sample will be tagged as
one of four levels of pollution based on some
guidelines and then the machine learning model will use
a specific technique named classification to find the
relationship between the data and the final result.
After that, the result of prediction can be compared to
the real result so that it can be checked whether the
model is good and whether the prediction is accurate.
Finally, the research gave improvement advice based on
the result obtained from the model building part.
Empirically, we show that our best model archives an
accuracy of 75\% after accounting for 57\% of missing
data. Experimentally, we show that our model would
assist in automatically assessing water quality
screening based on possibly incomplete real-world
data.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Assuncao:2022:RTI,
author = "Eduardo Assun{\c{c}}{\~a}o and Pedro D. Gaspar and
Khadijeh Alibabaei and Maria P. Sim{\~o}es and Hugo
Proen{\c{c}}a and Vasco N. G. J. Soares and Jo{\~a}o M.
L. P. Caldeira",
title = "Real-Time Image Detection for Edge Devices: a Peach
Fruit Detection Application",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "323",
day = "08",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110323",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/323",
abstract = "Within the scope of precision agriculture, many
applications have been developed to support decision
making and yield enhancement. Fruit detection has
attracted considerable attention from researchers, and
it can be used offline. In contrast, some applications,
such as robot vision in orchards, require computer
vision models to run on edge devices while performing
inferences at high speed. In this area, most modern
applications use an integrated graphics processing unit
(GPU). In this work, we propose the use of a tensor
processing unit (TPU) accelerator with a Raspberry Pi
target device and the state-of-the-art, lightweight,
and hardware-aware MobileDet detector model. Our
contribution is the extension of the possibilities of
using accelerators (the TPU) for edge devices in
precision agriculture. The proposed method was
evaluated using a novel dataset of peaches with three
cultivars, which will be made available for further
studies. The model achieved an average precision (AP)
of 88.2\% and a performance of 19.84 frames per second
(FPS) at an image size of 640 $ \times $ 480. The
results obtained show that the TPU accelerator can be
an excellent alternative for processing on the edge in
precision agriculture.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alsubhi:2022:RAL,
author = "Khalid Alsubhi and Bander Alzahrani and Nikos Fotiou
and Aiiad Albeshri and Mohammed Alreshoodi",
title = "Reliable Application Layer Routing Using Decentralized
Identifiers",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "322",
day = "06",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110322",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/322",
abstract = "Modern internet of things (IoT) applications can
benefit from advanced communication paradigms,
including multicast and anycast. Next-generation
internet architectures, such as information-centric
networking (ICN), promise to support these paradigms,
but at the same time they introduce new security
challenges. This paper presents a solution that extends
an ICN-like architecture based on software-defined
networking (SDN) that supports those communication
paradigms. Using the proposed solution, the underlying
architecture is enhanced with a novel security
mechanism that allows content ``advertisements'' only
from authorized endpoints. This mechanism prevents
``content pollution'', which is a significant security
threat in ICN architectures. The proposed solution is
lightweight, and it enables identity sharing as well as
secured and controlled identity delegation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Paajala:2022:UPK,
author = "Iikka Paajala and Jesse Nyyss{\"o}l{\"a} and Juho
Mattila and Pasi Karppinen",
title = "Users' Perceptions of Key Blockchain Features in
Games",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "321",
day = "04",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110321",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/321",
abstract = "The blockchain is an emerging technology that has the
potential to revolutionize the gaming industry among a
wide range of different business fields. So far, only a
few studies have been conducted about blockchain
gaming. This study introduces a mobile game utilizing
blockchain asset tokens and smart contracts. It was
developed for research purposes and used to demonstrate
blockchain-based games using semi-structured
interviews. This study follows the exploratory research
paradigm, which aims to map research of little-known
areas. This study focuses on how participants perceived
blockchain attributes such as trust, transparency, and
user-generated content and how this affected engagement
and their willingness to play the game again. Based on
our evaluation, generating blockchain assets positively
impacted player retention. According to the results,
providing genuine asset ownership through the
blockchain contributes to environmental engagement and
self-engagement, as well as player retention. Another
positive blockchain feature discovered from the
interview data is user-generated content implementation
into games.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Spradling:2022:EFI,
author = "Matthew Spradling and Jeremy Straub",
title = "Evaluation of the Factors That Impact the Perception
of Online Content Trustworthiness by Income, Political
Affiliation and Online Usage Time",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "320",
day = "03",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110320",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/320",
abstract = "Intentionally deceptive online content represents a
significant issue for society. Multiple techniques have
been proposed to identify and combat its spread. To
understand how to inform individuals most effectively
about the potential biases of and other issues with
content, this article studies factors that impact the
perception of online content. Specifically, it looks at
how these factors have similar or different impact
depending on the income level, political affiliation
and online usage time of Americans. A national survey
was conducted that asked respondents about multiple
factors that influence their and others' perception of
online content trustworthiness. It also asked what the
ideal impact of these factors should be. This data is
presented and analyzed herein, conclusions are drawn
and their implications, with regard to preventing the
spread of deceptive online content, are discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Daraghmi:2022:IBS,
author = "Yousef-Awwad Daraghmi and Mamoun Abu Helou and
Eman-Yasser Daraghmi and Waheeb Abu-ulbeh",
title = "{IoT}-Based System for Improving Vehicular Safety by
Continuous Traffic Violation Monitoring",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "319",
day = "02",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110319",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/319",
abstract = "The violation traffic laws by driving at high speeds,
the overloading of passengers, and the unfastening of
seatbelts are of high risk and can be fatal in the
event of any accident. Several systems have been
proposed to improve passenger safety, and the systems
either use the sensor-based approach or the
computer-vision-based approach. However, the accuracy
of these systems still needs enhancement because the
entire road network is not covered; the approaches
utilize complex estimation techniques, and they are
significantly influenced by the surrounding
environment, such as the weather and physical
obstacles. Therefore, this paper proposes a novel
IoT-based traffic violation monitoring system that
accurately estimates the vehicle speed, counts the
number of passengers, and detects the seatbelt status
on the entire road network. The system also utilizes
edge computing, fog computing, and cloud computing
technologies to achieve high accuracy. The system is
evaluated using real-life experiments and compared with
another system where the edge and cloud layers are used
without the fog layer. The results show that adding a
fog layer improves the monitoring accuracy as the
accuracy of passenger counting rises from 94\% to 97\%,
the accuracy of seatbelt detection rises from 95\% to
99\%, and the root mean square error of speed
estimation is reduced from 2.64 to 1.87.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Varela:2022:CIN,
author = "Leonilde Varela and Goran D. Putnik",
title = "Collaborative and Intelligent Networks and Decision
Systems and Services for Supporting Engineering and
Production Management",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "318",
day = "02",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110318",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/318",
abstract = "The violation traffic laws by driving at high speeds,
the overloading of passengers, and the unfastening of
seatbelts are of high risk and can be fatal in the
event of any accident. Several systems have been
proposed to improve passenger safety, and the systems
either use the sensor-based approach or the
computer-vision-based approach. However, the accuracy
of these systems still needs enhancement because the
entire road network is not covered; the approaches
utilize complex estimation techniques, and they are
significantly influenced by the surrounding
environment, such as the weather and physical
obstacles. Therefore, this paper proposes a novel
IoT-based traffic violation monitoring system that
accurately estimates the vehicle speed, counts the
number of passengers, and detects the seatbelt status
on the entire road network. The system also utilizes
edge computing, fog computing, and cloud computing
technologies to achieve high accuracy. The system is
evaluated using real-life experiments and compared with
another system where the edge and cloud layers are used
without the fog layer. The results show that adding a
fog layer improves the monitoring accuracy as the
accuracy of passenger counting rises from 94\% to 97\%,
the accuracy of seatbelt detection rises from 95\% to
99\%, and the root mean square error of speed
estimation is reduced from 2.64 to 1.87.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Stach:2022:SIS,
author = "Christoph Stach",
title = "Special Issue on Security and Privacy in Blockchains
and the {IoT}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "317",
day = "01",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110317",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/317",
abstract = "The violation traffic laws by driving at high speeds,
the overloading of passengers, and the unfastening of
seatbelts are of high risk and can be fatal in the
event of any accident. Several systems have been
proposed to improve passenger safety, and the systems
either use the sensor-based approach or the
computer-vision-based approach. However, the accuracy
of these systems still needs enhancement because the
entire road network is not covered; the approaches
utilize complex estimation techniques, and they are
significantly influenced by the surrounding
environment, such as the weather and physical
obstacles. Therefore, this paper proposes a novel
IoT-based traffic violation monitoring system that
accurately estimates the vehicle speed, counts the
number of passengers, and detects the seatbelt status
on the entire road network. The system also utilizes
edge computing, fog computing, and cloud computing
technologies to achieve high accuracy. The system is
evaluated using real-life experiments and compared with
another system where the edge and cloud layers are used
without the fog layer. The results show that adding a
fog layer improves the monitoring accuracy as the
accuracy of passenger counting rises from 94\% to 97\%,
the accuracy of seatbelt detection rises from 95\% to
99\%, and the root mean square error of speed
estimation is reduced from 2.64 to 1.87.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bai:2022:PPO,
author = "Tianyu Bai and Song Fu and Qing Yang",
title = "Privacy-Preserving Object Detection with Secure
Convolutional Neural Networks for Vehicular Edge
Computing",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "11",
pages = "316",
day = "31",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14110316",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 25 11:05:26 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/11/316",
abstract = "With the wider adoption of edge computing services,
intelligent edge devices, and high-speed V2X
communication, compute-intensive tasks for autonomous
vehicles, such as object detection using camera, LiDAR,
and/or radar data, can be partially offloaded to
road-side edge servers. However, data privacy becomes a
major concern for vehicular edge computing, as
sensitive sensor data from vehicles can be observed and
used by edge servers. We aim to address the privacy
problem by protecting both vehicles' sensor data and
the detection results. In this paper, we present
vehicle--edge cooperative deep-learning networks with
privacy protection for object-detection tasks, named
vePOD for short. In vePOD, we leverage the additive
secret sharing theory to develop secure functions for
every layer in an object-detection convolutional neural
network (CNN). A vehicle's sensor data is split and
encrypted into multiple secret shares, each of which is
processed on an edge server by going through the secure
layers of a detection network. The detection results
can only be obtained by combining the partial results
from the participating edge servers. We have developed
proof-of-concept detection networks with secure layers:
vePOD Faster R-CNN (two-stage detection) and vePOD YOLO
(single-stage detection). Experimental results on
public datasets show that vePOD does not degrade the
accuracy of object detection and, most importantly, it
protects data privacy for vehicles. The execution of a
vePOD object-detection network with secure layers is
orders of magnitude faster than the existing approaches
for data privacy. To the best of our knowledge, this is
the first work that targets privacy protection in
object-detection tasks with vehicle--edge cooperative
computing.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hu:2022:SSG,
author = "Jingyuan Hu and Zhouwang Yang",
title = "Single-Shot Global and Local Context Refinement Neural
Network for Head Detection",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "384",
day = "19",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120384",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/384",
abstract = "Head detection is a fundamental task, and it plays an
important role in many head-related problems. The
difficulty in creating the local and global context in
the face of significant lighting, orientation, and
occlusion uncertainty, among other factors, still makes
this task a remarkable challenge. To tackle these
problems, this paper proposes an effective detector,
the Context Refinement Network (CRN), that captures not
only the refined global context but also the enhanced
local context. We use simplified non-local (SNL) blocks
at hierarchical features, which can successfully
establish long-range dependencies between heads to
improve the capability of building the global context.
We suggest a multi-scale dilated convolutional module
for the local context surrounding heads that extracts
local context from various head characteristics. In
comparison to other models, our method outperforms them
on the Brainwash and the HollywoodHeads datasets.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kirigin:2022:GBT,
author = "Tajana Ban Kirigin and Sanda Bujaci{\'c} Babi{\'c} and
Benedikt Perak",
title = "Graph-Based Taxonomic Semantic Class Labeling",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "383",
day = "19",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120383",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/383",
abstract = "We present a graph-based method for the lexical task
of labeling senses of polysemous lexemes. The labeling
task aims at generalizing sense features of a lexical
item in a corpus using more abstract concepts. In this
method, a coordination dependency-based lexical graph
is first constructed with clusters of conceptually
associated lexemes representing related senses and
conceptual domains of a source lexeme. The label
abstraction is based on the syntactic patterns of the x
is\_a y dependency relation. For each sense cluster, an
additional lexical graph is constructed by extracting
label candidates from a corpus and selecting the most
prominent is\_a collocates in the constructed label
graph. The obtained label lexemes represent the sense
abstraction of the cluster of conceptually associated
lexemes. In a similar graph-based procedure, the
semantic class representation is validated by
constructing a WordNet hypernym relation graph. These
additional labels indicate the most appropriate
hypernym category of a lexical sense community. The
proposed labeling method extracts hierarchically
abstract conceptual content and the sense semantic
features of the polysemous source lexeme, which can
facilitate lexical understanding and build corpus-based
taxonomies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ghosh:2022:CPS,
author = "Uttam Ghosh and Deepak Tosh and Nawab Muhammad Faseeh
Qureshi and Ali Kashif Bashir and Al-Sakib Khan Pathan
and Zhaolong Ning",
title = "Cyber-Physical Systems: Prospects, Challenges and Role
in Software-Defined Networking and Blockchains",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "382",
day = "18",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120382",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/382",
abstract = "We present a graph-based method for the lexical task
of labeling senses of polysemous lexemes. The labeling
task aims at generalizing sense features of a lexical
item in a corpus using more abstract concepts. In this
method, a coordination dependency-based lexical graph
is first constructed with clusters of conceptually
associated lexemes representing related senses and
conceptual domains of a source lexeme. The label
abstraction is based on the syntactic patterns of the x
is\_a y dependency relation. For each sense cluster, an
additional lexical graph is constructed by extracting
label candidates from a corpus and selecting the most
prominent is\_a collocates in the constructed label
graph. The obtained label lexemes represent the sense
abstraction of the cluster of conceptually associated
lexemes. In a similar graph-based procedure, the
semantic class representation is validated by
constructing a WordNet hypernym relation graph. These
additional labels indicate the most appropriate
hypernym category of a lexical sense community. The
proposed labeling method extracts hierarchically
abstract conceptual content and the sense semantic
features of the polysemous source lexeme, which can
facilitate lexical understanding and build corpus-based
taxonomies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fiorentino:2022:MSS,
author = "Michele Fiorentino and Marina Ricci and Alessandro
Evangelista and Vito Modesto Manghisi and Antonio
Emmanuele Uva",
title = "A Multi-Sensory In-Store Virtual Reality Customer
Journey for Retailing: a Field Study in a Furniture
Flagship Store",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "381",
day = "16",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120381",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/381",
abstract = "The choice of furniture in a retail store is usually
based on a product catalog and simplistic product
renderings with different configurations. We present a
preliminary field study that tests a Multi-Sensory
In-Store Virtual Reality Customer Journey (MSISVRCJ)
through a virtual catalog and a product configurator to
support furnishings sales. The system allows customers
to stay immersed in the virtual environment (VE) while
the sales expert changes the colors, textures, and
finishes of the furniture, also exploring different
VEs. In addition, customers can experience realistic
tactile feedback with in-store samples of furniture
they can test. The journey is implemented for a
furniture manufacturer and tested in a flagship store.
Fifty real customers show positive feedback in terms of
general satisfaction, perceived realism, and
acceptance. This method can increase purchase
confidence, reduce entrepreneurial costs, and leverage
in-store versus online shopping.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chung:2022:CAS,
author = "Jen-Li Chung and Lee-Yeng Ong and Meng-Chew Leow",
title = "Comparative Analysis of Skeleton-Based Human Pose
Estimation",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "380",
day = "15",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120380",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/380",
abstract = "Human pose estimation (HPE) has become a prevalent
research topic in computer vision. The technology can
be applied in many areas, such as video surveillance,
medical assistance, and sport motion analysis. Due to
higher demand for HPE, many HPE libraries have been
developed in the last 20 years. In the last 5 years,
more and more skeleton-based HPE algorithms have been
developed and packaged into libraries to provide ease
of use for researchers. Hence, the performance of these
libraries is important when researchers intend to
integrate them into real-world applications for video
surveillance, medical assistance, and sport motion
analysis. However, a comprehensive performance
comparison of these libraries has yet to be conducted.
Therefore, this paper aims to investigate the strengths
and weaknesses of four popular state-of-the-art
skeleton-based HPE libraries for human pose detection,
including OpenPose, PoseNet, MoveNet, and MediaPipe
Pose. A comparative analysis of these libraries based
on images and videos is presented in this paper. The
percentage of detected joints (PDJ) was used as the
evaluation metric in all comparative experiments to
reveal the performance of the HPE libraries. MoveNet
showed the best performance for detecting different
human poses in static images and videos.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Anoh:2022:WCS,
author = "Kelvin Anoh and Chan Hwang See and Yousef Dama and
Raed A. Abd-Alhameed and Simeon Keates",
title = "{6G} Wireless Communication Systems: Applications,
Opportunities and Challenges",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "379",
day = "15",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120379",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/379",
abstract = "As the technical specifications of the 5th Generation
(5G) wireless communication standard are being wrapped
up, there are growing efforts amongst researchers,
industrialists, and standardisation bodies on the
enabling technologies of a 6G standard or the so-called
Beyond 5G (B5G) one. Although the 5G standard has
presented several benefits, there are still some
limitations within it. Such limitations have motivated
the setting up of study groups to determine suitable
technologies that should operate in the year 2030 and
beyond, i.e., after 5G. Consequently, this Special
Issue of Future Internet concerning what possibilities
lie ahead for a 6G wireless network includes four
high-quality research papers (three of which are review
papers with over 412 referred sources and one regular
research). This editorial piece summarises the major
contributions of the articles and the Special Issue,
outlining future directions for new research.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Surantha:2022:ISN,
author = "Nico Surantha and Noffal A. Putra",
title = "Integrated {SDN-NFV} {5G} Network Performance and
Management-Complexity Evaluation",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "378",
day = "14",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120378",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/378",
abstract = "Digitalization is one of the factors that affects the
acceleration of the application of telecommunications
technologies such as 5G. The 5G technology that has
been developed today does not yet meet different
performance and manageability standards, particularly
for data center networks as a supportive technology.
Software-defined networking (SDN) and network function
virtualization (NFV) are two complementary technologies
that are currently used by almost all data centers in
the telecommunications industry to rectify performance
and manageability issues. In this study, we deliver an
integrated SDN-NFV architecture to simplify network
management activities in telecommunication companies.
To improve network performance at the computing level,
we performed a modification of a networking system at
the computing level, underlying NFV devices by
replacing the default virtual switch with a data plane
development kit (DPDK) and single root I/O
virtualization (SR-IOV). This study evaluated the
proposed architecture design in terms of network
performance and manageability. Based on 30 days of
observation in prime time, the proposed solution
increased throughput up to 200 Mbps for the server leaf
and 1.6 Gbps for the border leaf compared to the legacy
architecture. Meanwhile, the latency decreased to 12 ms
for the server leaf and 17 ms for the border leaf. For
manageability, we tested three different scenarios and
achieved savings of 13 min for Scenario 1, 22 min for
Scenario 2 and 9 min for Scenario 3.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Al-Saedi:2022:FCE,
author = "Ahmed A. Al-Saedi and Veselka Boeva and Emiliano
Casalicchio",
title = "{FedCO}: Communication-Efficient Federated Learning
via Clustering Optimization",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "377",
day = "13",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120377",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/377",
abstract = "Federated Learning (FL) provides a promising solution
for preserving privacy in learning shared models on
distributed devices without sharing local data on a
central server. However, most existing work shows that
FL incurs high communication costs. To address this
challenge, we propose a clustering-based federated
solution, entitled Federated Learning via Clustering
Optimization (FedCO), which optimizes model aggregation
and reduces communication costs. In order to reduce the
communication costs, we first divide the participating
workers into groups based on the similarity of their
model parameters and then select only one
representative, the best performing worker, from each
group to communicate with the central server. Then, in
each successive round, we apply the Silhouette
validation technique to check whether each
representative is still made tight with its current
cluster. If not, the representative is either moved
into a more appropriate cluster or forms a cluster
singleton. Finally, we use split optimization to update
and improve the whole clustering solution. The updated
clustering is used to select new cluster
representatives. In that way, the proposed FedCO
approach updates clusters by repeatedly evaluating and
splitting clusters if doing so is necessary to improve
the workers' partitioning. The potential of the
proposed method is demonstrated on publicly available
datasets and LEAF datasets under the IID and Non-IID
data distribution settings. The experimental results
indicate that our proposed FedCO approach is superior
to the state-of-the-art FL approaches, i.e., FedAvg,
FedProx, and CMFL, in reducing communication costs and
achieving a better accuracy in both the IID and Non-IID
cases.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2022:EER,
author = "Yinglin Wang and Xinyu Xu",
title = "{ERGCN}: Enhanced Relational Graph Convolution
Network, an Optimization for Entity Prediction Tasks on
Temporal Knowledge Graphs",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "376",
day = "13",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120376",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/376",
abstract = "Reasoning on temporal knowledge graphs, which aims to
infer new facts from existing knowledge, has attracted
extensive attention and in-depth research recently. One
of the important tasks of reasoning on temporal
knowledge graphs is entity prediction, which focuses on
predicting the missing objects in facts at current time
step when relevant histories are known. The problem is
that, for entity prediction task on temporal knowledge
graphs, most previous studies pay attention to
aggregating various semantic information from entities
but ignore the impact of semantic information from
relation types. We believe that relation types is a
good supplement for our task and making full use of
semantic information of facts can promote the results.
Therefore, a framework of Enhanced Relational Graph
Convolution Network (ERGCN) is put forward in this
paper. Rather than only considering representations of
entities, the context semantic information of both
relations and entities is considered and merged
together in this framework. Experimental results show
that the proposed approach outperforms the
state-of-the-art methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gwyn:2022:EGB,
author = "Tony Gwyn and Kaushik Roy",
title = "Examining Gender Bias of Convolutional Neural Networks
via Facial Recognition",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "375",
day = "13",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120375",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/375",
abstract = "Image recognition technology systems have existed in
the realm of computer security since nearly the
inception of electronics, and have seen vast
improvements in recent years. Currently implemented
facial detection systems regularly achieve accuracy
rates close to 100 percent. This includes even
challenging environments, such as with low light or
skewed images. Despite this near perfect performance,
the problem of gender bias with respect to accuracy is
still inherent in many current facial recognition
algorithms. This bias needs to be addressed to make
facial recognition a more complete and useful system.
In particular, current image recognition system tend to
have poor accuracy concerning underrepresented groups,
including minorities and female individuals. The goal
of this research is to increase the awareness of this
bias issue, as well as to create a new model for image
recognition that is gender independent. To achieve this
goal, a variety of Convolutional Neural Networks (CNNs)
will be tested for accuracy as it pertains to gender
bias. In the future, the most accurate CNNs will then
be implemented into a new network with the goal of
creating a program which is better able to distinguish
individuals with a high accuracy, but without gender
bias. At present, our research has identified two
specific CNNs, VGG-16 and ResNet50, which we believe
will be ideal for the creation of this new CNN
algorithm.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Perez-Jorge:2022:GSA,
author = "David P{\'e}rez-Jorge and Mar{\'\i}a Carmen
Mart{\'\i}nez-Murciano",
title = "Gamification with Scratch or App Inventor in Higher
Education: a Systematic Review",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "374",
day = "13",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120374",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/374",
abstract = "Programming skills should be taught and developed;
Scratch and App Inventor are two tools that can
contribute significantly to developing this competence
in university students. This study aims to investigate
the use and effect of the programming language Scratch
and App Inventor on the development of skills and
competencies for learning (autonomy, attention,
motivation, critical thinking, creative thinking,
computational thinking, communication, problem solving
and social interaction) in higher education. To achieve
this goal, a systematic review of articles in English
and Spanish was carried out using the PRISMA statement
(research publication guidelines designed to improve
the integrity of systematic review and meta-analysis
reports). A search for studies was conducted in the Web
of Science (WOS), Dialnet, and SCOPUS. A total of 405
papers were analyzed, of which 11 were finally
selected. The results showed that both Scratch and App
Inventor favor the development of skills and
competencies for learning in the context of higher
education, despite being underutilized strategies that
all knowledge disciplines should promote.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Omasheye:2022:JRF,
author = "Okiemute Roberts Omasheye and Samuel Azi and Joseph
Isabona and Agbotiname Lucky Imoize and Chun-Ta Li and
Cheng-Chi Lee",
title = "Joint Random Forest and Particle Swarm Optimization
for Predictive Pathloss Modeling of Wireless Signals
from Cellular Networks",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "373",
day = "12",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120373",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/373",
abstract = "The accurate and reliable predictive estimation of
signal attenuation loss is of prime importance in radio
resource management. During wireless network design and
planning, a reliable path loss model is required for
optimal predictive estimation of the received signal
strength, coverage, quality, and signal
interference-to-noise ratio. A set of trees (100) on
the target measured data was employed to determine the
most informative and important subset of features,
which were in turn employed as input data to the
Particle Swarm (PS) model for predictive path loss
analysis. The proposed Random Forest (RF-PS) based
model exhibited optimal precision performance in the
real-time prognostic analysis of measured path loss
over operational 4G LTE networks in Nigeria. The
relative performance of the proposed RF-PS model was
compared to the standard PS and hybrid radial basis
function-particle swarm optimization (RBF-PS) algorithm
for benchmarking. Generally, results indicate that the
proposed RF-PS model gave better prediction accuracy
than the standard PS and RBF-PS models across the
investigated environments. The projected hybrid model
would find useful applications in path loss modeling in
related wireless propagation environments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Meng:2022:IFI,
author = "Weizhi Meng and Thanassis Giannetsos and Christian D.
Jensen",
title = "Information and Future {Internet} Security, Trust and
Privacy",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "372",
day = "12",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120372",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/372",
abstract = "The Internet has rapidly grown into a distributed and
collaborative network with over one billion users,
e.g., the Internet of Things (IoT). The future Internet
will become the core of the next information
infrastructure in regard to computation and
communication, being capable of extensibility,
survivability, mobility, and adaptability. However,
with the increasing complexity of the future Internet
and boost in information sharing, there is a threat to
such infrastructure in the aspects of security, trust,
and privacy. This editorial discusses the
state-of-the-art advancements in information and the
future internet.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vemuru:2022:ICE,
author = "Krishnamurthy V. Vemuru",
title = "Implementation of the Canny Edge Detector Using a
Spiking Neural Network",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "371",
day = "11",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120371",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/371",
abstract = "Edge detectors are widely used in computer vision
applications to locate sharp intensity changes and find
object boundaries in an image. The Canny edge detector
is the most popular edge detector, and it uses a
multi-step process, including the first step of noise
reduction using a Gaussian kernel and a final step to
remove the weak edges by the hysteresis threshold. In
this work, a spike-based computing algorithm is
presented as a neuromorphic analogue of the Canny edge
detector, where the five steps of the conventional
algorithm are processed using spikes. A spiking neural
network layer consisting of a simplified version of a
conductance-based Hodgkin--Huxley neuron as a building
block is used to calculate the gradients. The
effectiveness of the spiking neural-network-based
algorithm is demonstrated on a variety of images,
showing its successful adaptation of the principle of
the Canny edge detector. These results demonstrate that
the proposed algorithm performs as a complete spike
domain implementation of the Canny edge detector.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pires:2022:SOT,
author = "Ivan Miguel Pires",
title = "Smart Objects and Technologies for Social Good",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "370",
day = "09",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120370",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/370",
abstract = "Edge detectors are widely used in computer vision
applications to locate sharp intensity changes and find
object boundaries in an image. The Canny edge detector
is the most popular edge detector, and it uses a
multi-step process, including the first step of noise
reduction using a Gaussian kernel and a final step to
remove the weak edges by the hysteresis threshold. In
this work, a spike-based computing algorithm is
presented as a neuromorphic analogue of the Canny edge
detector, where the five steps of the conventional
algorithm are processed using spikes. A spiking neural
network layer consisting of a simplified version of a
conductance-based Hodgkin--Huxley neuron as a building
block is used to calculate the gradients. The
effectiveness of the spiking neural-network-based
algorithm is demonstrated on a variety of images,
showing its successful adaptation of the principle of
the Canny edge detector. These results demonstrate that
the proposed algorithm performs as a complete spike
domain implementation of the Canny edge detector.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Singh:2022:LLS,
author = "Surjit Singh and Vivek Mehla and Srete Nikolovski",
title = "{LSSDNF}: a Lightweight Secure Software Defined
Network Framework for Future {Internet} in {5G--6G}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "369",
day = "08",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120369",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/369",
abstract = "As information technology advances quickly, so does
the 5G--6G network management system, which is moving
toward greater integration, decentralization,
diversity, and intelligence. As flexibility is a
crucial criterion for 5G--6G network architecture, we
use the Software Defined Network (SDN) paradigm to make
the programmability more flexible. Due to their ability
to replace the current TCP/IP architecture with one
that separates the control plane and data plane,
software-defined networks have gained much popularity.
However, they are susceptible to routing attacks.
Therefore, this work proposes Lightweight Security
Framework that combines blockchain technology with
Software-Defined Networking (LSSDNF) to address this
problem. The proposed framework adds the routing data
that the controller withheld to the multichain
blockchain. Here, a mininet network simulator is used
to model the proposed framework. The data transfer rate
or network throughput, bandwidth variation, and jitter
have all been used to assess the performance of
single-controller-SDN networks and multi-controller-SDN
networks. The results demonstrate that the proposed
framework performs better than the conventional
single-controller-SDN architecture in terms of
throughput, bandwidth fluctuation, and jitter.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Goudarzi:2022:HUS,
author = "Pejman Goudarzi and Mehdi Hosseinpour and Roham
Goudarzi and Jaime Lloret",
title = "Holistic Utility Satisfaction in Cloud Data Centre
Network Using Reinforcement Learning",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "368",
day = "08",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120368",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/368",
abstract = "Cloud computing leads to efficient resource allocation
for network users. In order to achieve efficient
allocation, many research activities have been
conducted so far. Some researchers focus on classical
optimisation theory techniques (such as multi-objective
optimisation, evolutionary optimisation, game theory,
etc.) to satisfy network providers and network users'
service-level agreement (SLA) requirements. Normally,
in a cloud data centre network (CDCN), it is difficult
to jointly satisfy both the cloud provider and cloud
customer' utilities, and this leads to complex
combinatorial problems, which are usually NP-hard.
Recently, machine learning and artificial intelligence
techniques have received much attention from the
networking community because of their capability to
solve complicated networking problems. In the current
work, at first, the holistic utility satisfaction for
the cloud data centre provider and customers is
formulated as a reinforcement learning (RL) problem
with a specific reward function, which is a convex
summation of users' utility functions and cloud
provider's utility. The user utility functions are
modelled as a function of cloud virtualised resources
(such as storage, CPU, RAM), connection bandwidth, and
also, the network-based expected packet loss and
round-trip time factors associated with the cloud
users. The cloud provider utility function is modelled
as a function of resource prices and energy dissipation
costs. Afterwards, a Q-learning implementation of the
mentioned RL algorithm is introduced, which is able to
converge to the optimal solution in an online and fast
manner. The simulation results exhibit the enhanced
convergence speed and computational complexity
properties of the proposed method in comparison with
similar approaches from the joint cloud
customer/provider utility satisfaction perspective. To
evaluate the scalability property of the proposed
method, the results are also repeated for different
cloud user population scenarios (small, medium, and
large).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Campos-Castillo:2022:PCA,
author = "Celeste Campos-Castillo and Noelle Chesley and Onur
Asan",
title = "Professionals as Change Agents or Instruments of
Reproduction? {Medical} Residents' Reasoning for Not
Sharing the Electronic Health Record Screen with
Patients",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "367",
day = "07",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120367",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/367",
abstract = "The stability of physicians' authority over patients
despite decades of changes in medicine conflicts with
newer institutionalist accounts of professionals as
change agents rather than instruments of reproduction.
We analyzed whether the cultural scripts that
twenty-one residents used to justify their approach to
a new change, the electronic health record (EHR),
signaled a leveling of the patient-physician hierarchy.
Residents are intriguing because their position makes
them open to change. Indeed, residents justified using
the EHR in ways that level the patient-physician
hierarchy, but also offered rationales that sustain it.
For the latter, residents described using the EHR to
substantiate their expertise, situate themselves as
brokers between patients and the technology, and
preserve the autonomy of clinicians. Our findings
highlight how professionals with little direct
experience before a change can selectively apply
incumbent scripts to sustain extant structures, while
informing newer institutionalist accounts of
professionals and the design of EHR systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cheimaras:2022:LCO,
author = "Vasileios Cheimaras and Athanasios Trigkas and
Panagiotis Papageorgas and Dimitrios Piromalis and
Emmanouil Sofianopoulos",
title = "A Low-Cost Open-Source Architecture for a Digital
Signage Emergency Evacuation System for Cruise Ships,
Based on {IoT} and {LTE/4G} Technologies",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "366",
day = "07",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120366",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/366",
abstract = "During a ship evacuation, many people panic as they do
not know the direction that leads to the emergency
muster station. Moreover, sometimes passengers get
crowded in corridors or stairs, so they cannot save
their lives. This paper proposes an IoT-enabled
architecture for digital signage systems that directs
passengers to the muster stations of a cruise ship by
following the less dangerous route. Thus, crews' and
passengers' safety risks during a ship evacuation can
be low, and human health hazards may be limited. The
system is based on a low-cost and open-source
architecture that can also be used in a variety of
fields in industrial IoT applications. The proposed
modular digital signage architecture utilizes Light
Emitting Diode (LED) strips that are remotely managed
through a private Long-Term Evolution (LTE)/Fourth
Generation (4G) cellular network. Publish--subscribe
communication protocols were used for the control of
the digital strips and particularly through a Message
Queuing Telemetry Transport (MQTT) broker who
publishes/subscribes every message to specific topics
of the realized IoT platform, while the overall digital
signage system centralization was implemented with an
appropriate dashboard supported from an open-source
RESTful API.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Taha:2022:ELE,
author = "Ashraf A. Taha and Hagar O. Abouroumia and Shimaa A.
Mohamed and Lamiaa A. Amar",
title = "Enhancing the Lifetime and Energy Efficiency of
Wireless Sensor Networks Using {Aquila Optimizer}
Algorithm",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "365",
day = "07",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120365",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/365",
abstract = "As sensors are distributed among wireless sensor
networks (WSNs), ensuring that the batteries and
processing power last for a long time, to improve
energy consumption and extend the lifetime of the WSN,
is a significant challenge in the design of network
clustering techniques. The sensor nodes are divided in
these techniques into clusters with different cluster
heads (CHs). Recently, certain considerations such as
less energy consumption and high reliability have
become necessary for selecting the optimal CH nodes in
clustering-based metaheuristic techniques. This paper
introduces a novel enhancement algorithm using Aquila
Optimizer (AO), which enhances the energy balancing in
clusters across sensor nodes during network
communications to extend the network lifetime and
reduce power consumption. Lifetime and
energy-efficiency clustering algorithms, namely the
low-energy adaptive clustering hierarchy (LEACH)
protocol as a traditional protocol, genetic algorithm
(GA), Coyote Optimization Algorithm (COY), Aquila
Optimizer (AO), and Harris Hawks Optimization (HHO),
are evaluated in a wireless sensor network. The paper
concludes that the proposed AO algorithm outperforms
other algorithms in terms of alive nodes analysis and
energy consumption.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liborio:2022:IVD,
author = "Joao da Mata Liborio and Cesar Melo and Marcos Silva",
title = "{Internet} Video Delivery Improved by Super-Resolution
with {GAN}",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "364",
day = "06",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120364",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/364",
abstract = "In recent years, image and video super-resolution have
gained attention outside the computer vision community
due to the outstanding results produced by applying
deep-learning models to solve the super-resolution
problem. These models have been used to improve the
quality of videos and images. In the last decade,
video-streaming applications have also become popular.
Consequently, they have generated traffic with an
increasing quantity of data in network infrastructures,
which continues to grow, e.g., global video traffic is
forecast to increase from 75\% in 2017 to 82\% in 2022.
In this paper, we leverage the power of
deep-learning-based super-resolution methods and
implement a model for video super-resolution, which we
call VSRGAN+. We train our model with a dataset
proposed to teach systems for high-level visual
comprehension tasks. We also test it on a large-scale
JND-based coded video quality dataset containing 220
video clips with four different resolutions.
Additionally, we propose a cloud video-delivery
framework that uses video super-resolution. According
to our findings, the VSRGAN+ model can reconstruct
videos without perceptual distinction of the ground
truth. Using this model with added compression can
decrease the quantity of data delivered to surrogate
servers in a cloud video-delivery framework. The
traffic decrease reaches 98.42\% in total.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Schizas:2022:TUL,
author = "Nikolaos Schizas and Aristeidis Karras and Christos
Karras and Spyros Sioutas",
title = "{TinyML} for Ultra-Low Power {AI} and Large Scale
{IoT} Deployments: a Systematic Review",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "363",
day = "06",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120363",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/363",
abstract = "The rapid emergence of low-power embedded devices and
modern machine learning (ML) algorithms has created a
new Internet of Things (IoT) era where lightweight ML
frameworks such as TinyML have created new
opportunities for ML algorithms running within edge
devices. In particular, the TinyML framework in such
devices aims to deliver reduced latency, efficient
bandwidth consumption, improved data security,
increased privacy, lower costs and overall network cost
reduction in cloud environments. Its ability to enable
IoT devices to work effectively without constant
connectivity to cloud services, while nevertheless
providing accurate ML services, offers a viable
alternative for IoT applications seeking cost-effective
solutions. TinyML intends to deliver on-premises
analytics that bring significant value to IoT services,
particularly in environments with limited connection.
This review article defines TinyML, presents an
overview of its benefits and uses and provides
background information based on up-to-date literature.
Then, we demonstrate the TensorFlow Lite framework
which supports TinyML along with analytical steps for
an ML model creation. In addition, we explore the
integration of TinyML with network technologies such as
5G and LPWAN. Ultimately, we anticipate that this
analysis will serve as an informational pillar for the
IoT/Cloud research community and pave the way for
future studies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Florea:2022:GTA,
author = "Razvan Florea and Mitica Craus",
title = "A Game-Theoretic Approach for Network Security Using
Honeypots",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "362",
day = "30",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120362",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/362",
abstract = "Cybersecurity plays an increasing role in today's
digital space, and its methods must keep pace with the
changes. Both public and private sector researchers
have put efforts into strengthening the security of
networks by proposing new approaches. This paper
presents a method to solve a game theory model by
defining the contents of the game payoff matrix and
incorporating honeypots in the defense strategy. Using
a probabilistic approach we propose the
course-of-action Stackelberg game (CoASG), where every
path of the graph leads to an undesirable state based
on security issues found in every host. The reality of
the system is represented by a cost function which
helps us to define a payoff matrix and find the best
possible combination of the strategies once the game is
run. The results show the benefits of using this model
in the early prevention stages for detecting
cyberattack patterns.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Battisti:2022:NSV,
author = "Anselmo Luiz {\'E}den Battisti and Evandro Luiz
Cardoso Macedo and Marina Ivanov Pereira Josu{\'e} and
Hugo Barbalho and Fl{\'a}via C. Delicato and D{\'e}bora
Christina Muchaluat-Saade and Paulo F. Pires and
Douglas Paulo de Mattos and Ana Cristina Bernardo de
Oliveira",
title = "A Novel Strategy for {VNF} Placement in Edge Computing
Environments",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "361",
day = "30",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120361",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/361",
abstract = "Network function virtualization (NFV) is a novel
technology that virtualizes computing, network, and
storage resources to decouple the network functions
from the underlying hardware, thus allowing the
software implementation of such functions to run on
commodity hardware. By doing this, NFV provides the
necessary flexibility to enable agile, cost-effective,
and on-demand service delivery models combined with
automated management. Different management and
orchestration challenges arise in such virtualized and
distributed environments. A major challenge in the
selection of the most suitable edge nodes is that of
deploying virtual network functions (VNFs) to meet
requests from multiple users. This article addresses
the VNF placement problem by providing a novel integer
linear programming (ILP) optimization model and a novel
VNF placement algorithm. In our definition, the
multi-objective optimization problem aims to (i)
minimize the energy consumption in the edge nodes; (ii)
minimize the total latency; and (iii) reducing the
total cost of the infrastructure. Our new solution
formulates the VNF placement problem by taking these
three objectives into account simultaneously. In
addition, the novel VNF placement algorithm leverages
VNF sharing, which reuses VNF instances already placed
to potentially reduce computational resource usage.
Such a feature is still little explored in the
community. Through simulation, numerical results show
that our approach can perform better than other
approaches found in the literature regarding resource
consumption and the number of SFC requests met.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rodrigues:2022:QPP,
author = "Pedro Rodrigues and Filipe Freitas and Jos{\'e}
Sim{\~a}o",
title = "{QuickFaaS}: Providing Portability and
Interoperability between {FaaS} Platforms",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "360",
day = "30",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120360",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/360",
abstract = "Serverless computing hides infrastructure management
from developers and runs code on-demand automatically
scaled and billed during the code's execution time. One
of the most popular serverless backend services is
called Function-as-a-Service (FaaS), in which
developers are often confronted with cloud-specific
requirements. Function signature requirements, and the
usage of custom libraries that are unique to cloud
providers, were identified as the two main reasons for
portability issues in FaaS applications, leading to
various vendor lock-in problems. In this work, we
define three cloud-agnostic models that compose FaaS
platforms. Based on these models, we developed
QuickFaaS, a multi-cloud interoperability desktop tool
targeting cloud-agnostic functions and FaaS
deployments. The proposed cloud-agnostic approach
enables developers to reuse their serverless functions
in different cloud providers with no need to change
code or install extra software. We also provide an
evaluation that validates the proposed solution by
measuring the impact of a cloud-agnostic approach on
the function's performance, when compared to a
cloud-non-agnostic one. The study shows that a
cloud-agnostic approach does not significantly impact
the function's performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yakunin:2022:CIT,
author = "Alexander V. Yakunin and Svetlana S. Bodrunova",
title = "Cumulative Impact of Testing Factors in Usability
Tests for Human-Centered {Web} Design",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "359",
day = "30",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120359",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/359",
abstract = "The study examines the cumulative impact of factors
that affect usability testing for user-centered web
design, namely the so-called `contextual fidelity
model' factors that include product properties, task
features, user traits, and environment/context factors.
Today, the design, user experience and usability (DUXU)
research experiences a lack of studies that would
assess combinatorial, rather than individual, effects
of these factors upon user performance. We address this
gap by seeing both independent factors and the
resulting user states as complex and dynamic, and
testing the combined impact of aesthetic quality of
websites, user traits, and individual/group experiment
settings upon formation of two dysfunctional user
states that critically affect user performance, namely
monotony and anxiety. We develop a research design that
allows for assessing the combinatorial effects in
formation of user dysfunctionality. For that, we
conduct a study with 80 assessors of Russian/European
and Chinese origin in individual/group setting,
employing two types of tasks and websites of high/low
aesthetic quality. As the results of our experiment
show, group task solving enhances the synchronous
impact of website aesthetics and task features upon
user states. Interaction of high-quality design, group
environment, and monotonous tasks provides for an
antagonistic effect when aesthetic layout in a group
environment significantly reduces the fatigue rate. Low
aesthetic quality in a group environment leads to
cumulative enhancing of dysfunctionality for both
monotony and anxiety. We conclude by setting questions
and prospects for further research.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Andelic:2022:DMW,
author = "Nikola Andeli{\'c} and Sandi Baressi Segota and Ivan
Lorencin and Matko Glucina",
title = "Detection of Malicious {Websites} Using Symbolic
Classifier",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "358",
day = "29",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120358",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/358",
abstract = "Malicious websites are web locations that attempt to
install malware, which is the general term for anything
that will cause problems in computer operation, gather
confidential information, or gain total control over
the computer. In this paper, a novel approach is
proposed which consists of the implementation of the
genetic programming symbolic classifier (GPSC)
algorithm on a publicly available dataset to obtain a
simple symbolic expression (mathematical equation)
which could detect malicious websites with high
classification accuracy. Due to a large imbalance of
classes in the initial dataset, several data sampling
methods (random undersampling/oversampling, ADASYN,
SMOTE, BorderlineSMOTE, and KmeansSMOTE) were used to
balance the dataset classes. For this investigation,
the hyperparameter search method was developed to find
the combination of GPSC hyperparameters with which high
classification accuracy could be achieved. The first
investigation was conducted using GPSC with a random
hyperparameter search method and each dataset variation
was divided on a train and test dataset in a ratio of
70:30. To evaluate each symbolic expression, the
performance of each symbolic expression was measured on
the train and test dataset and the mean and standard
deviation values of accuracy (ACC), AUC, precision,
recall and f1-score were obtained. The second
investigation was also conducted using GPSC with the
random hyperparameter search method; however, 70\%,
i.e., the train dataset, was used to perform 5-fold
cross-validation. If the mean accuracy, AUC, precision,
recall, and f1-score values were above 0.97 then final
training and testing (train/test 70:30) were performed
with GPSC with the same randomly chosen hyperparameters
used in a 5-fold cross-validation process and the final
mean and standard deviation values of the
aforementioned evaluation methods were obtained. In
both investigations, the best symbolic expression was
obtained in the case where the dataset balanced with
the KMeansSMOTE method was used for training and
testing. The best symbolic expression obtained using
GPSC with the random hyperparameter search method and
classic train--test procedure (70:30) on a dataset
balanced with the KMeansSMOTE method achieved values of
ACC{\={}}, AUC{\={}}, Precsion{\={}}, Recall{\={}} and
F1-score{\={}} (with standard deviation)
0.9992{\pm}2.249 $ \times $ {10$-$5}, 0.9995{\pm}9.945
$ \times $ {10$-$6}, 0.9995{\pm}1.09 $ \times $
{10$-$5}, 0.999{\pm}5.17 $ \times $ {10$-$5},
0.9992{\pm}5.17 $ \times $ {10$-$6}, respectively. The
best symbolic expression obtained using GPSC with a
random hyperparameter search method and 5-fold
cross-validation on a dataset balanced with the
KMeansSMOTE method achieved values of ACC{\={}},
AUC{\={}}, Precsion{\={}}, Recall{\={}} and
F1-score{\={}} (with standard deviation)
0.9994{\pm}1.13 $ \times $ {10$-$5}, 0.9994{\pm}1.2 $
\times $ {10$-$5}, 1.0{\pm}0, 0.9988{\pm}2.4 $ \times $
{10$-$5}, and 0.9994{\pm}1.2 $ \times $ {10$-$5},
respectively.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bottrighi:2022:IIP,
author = "Alessio Bottrighi and Marco Guazzone and Giorgio
Leonardi and Stefania Montani and Manuel Striani and
Paolo Terenziani",
title = "Integrating {ISA} and Part-of Domain Knowledge into
Process Model Discovery",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "357",
day = "28",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120357",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/357",
abstract = "The traces of process executions are a strategic
source of information, from which a model of the
process can be mined. In our recent work, we have
proposed SIM (semantic interactive miner), an
innovative process mining tool to discover the process
model incrementally: it supports the interaction with
domain experts, who can selectively merge parts of the
model to achieve compactness, generalization, and
reduced redundancy. We now propose a substantial
extension of SIM, making it able to exploit (both
automatically and interactively) pre-encoded taxonomic
knowledge about the refinement (ISA relations) and
composition (part-of relations) of process activities,
as is available in many domains. The extended approach
allows analysts to move from a process description
where activities are reported at the ground level to
more user-interpretable/compact descriptions, in which
sets of such activities are abstracted into the
``macro-activities'' subsuming them or constituted by
them. An experimental evaluation based on a real-world
setting (stroke management) illustrates the advantages
of our approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Osial:2022:AAI,
author = "Magdalena Osial and Agnieszka Pregowska",
title = "The Application of Artificial Intelligence in Magnetic
Hyperthermia Based Research",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "356",
day = "28",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120356",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/356",
abstract = "The development of nanomedicine involves complex
nanomaterial research involving magnetic nanomaterials
and their use in magnetic hyperthermia. The selection
of the optimal treatment strategies is time-consuming,
expensive, unpredictable, and not consistently
effective. Delivering personalized therapy that obtains
maximal efficiency and minimal side effects is highly
important. Thus, Artificial Intelligence (AI) based
algorithms provide the opportunity to overcome these
crucial issues. In this paper, we briefly overview the
significance of the combination of AI-based methods,
particularly the Machine Learning (ML) technique, with
magnetic hyperthermia. We considered recent
publications, reports, protocols, and review papers
from Scopus and Web of Science Core Collection
databases, considering the PRISMA-S review methodology
on applying magnetic nanocarriers in magnetic
hyperthermia. An algorithmic performance comparison in
terms of their types and accuracy, data availability
taking into account their amount, types, and quality
was also carried out. Literature shows AI support of
these studies from the physicochemical evaluation of
nanocarriers, drug development and release, resistance
prediction, dosing optimization, the combination of
drug selection, pharmacokinetic profile
characterization, and outcome prediction to the heat
generation estimation. The papers reviewed here clearly
illustrate that AI-based solutions can be considered as
an effective supporting tool in drug delivery,
including optimization and behavior of nanocarriers,
both in vitro and in vivo, as well as the delivery
process. Moreover, the direction of future research,
including the prediction of optimal experiments and
data curation initiatives has been indicated.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kalgaonkar:2022:NES,
author = "Priyank Kalgaonkar and Mohamed El-Sharkawy",
title = "{NextDet}: Efficient Sparse-to-Dense Object Detection
with Attentive Feature Aggregation",
journal = j-FUTURE-INTERNET,
volume = "14",
number = "12",
pages = "355",
day = "28",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi14120355",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:52 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/14/12/355",
abstract = "Object detection is a computer vision task of
detecting instances of objects of a certain class,
identifying types of objects, determining its location,
and accurately labelling them in an input image or a
video. The scope of the work presented within this
paper proposes a modern object detection network called
NextDet to efficiently detect objects of multiple
classes which utilizes CondenseNeXt, an award-winning
lightweight image classification convolutional neural
network algorithm with reduced number of FLOPs and
parameters as the backbone, to efficiently extract and
aggregate image features at different granularities in
addition to other novel and modified strategies such as
attentive feature aggregation in the head, to perform
object detection and draw bounding boxes around the
detected objects. Extensive experiments and ablation
tests, as outlined in this paper, are performed on
Argoverse-HD and COCO datasets, which provide numerous
temporarily sparse to dense annotated images,
demonstrate that the proposed object detection
algorithm with CondenseNeXt as the backbone result in
an increase in mean Average Precision (mAP) performance
and interpretability on Argoverse-HD's monocular
ego-vehicle camera captured scenarios by up to 17.39\%
as well as COCO's large set of images of everyday
scenes of real-world common objects by up to 14.62\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Radam:2023:UMS,
author = "Neamah S. Radam and Sufyan T. Faraj Al-Janabi and
Khalid Sh. Jasim",
title = "Using Metaheuristics {(SA-MCSDN)} Optimized for
Multi-Controller Placement in Software-Defined
Networking",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "39",
day = "16",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010039",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/39",
abstract = "The multi-controller placement problem (MCPP)
represents one of the most challenging issues in
software-defined networks (SDNs). High-efficiency and
scalable optimized solutions can be achieved for a
given position in such networks, thereby enhancing
various aspects of programmability, configuration, and
construction. In this paper, we propose a model called
simulated annealing for multi-controllers in SDN
(SA-MCSDN) to solve the problem of placing multiple
controllers in appropriate locations by considering
estimated distances and distribution times among the
controllers, as well as between controllers and
switches (C2S). We simulated the proposed mathematical
model using Network Simulator NS3 in the Linux Ubuntu
environment to extract the performance results. We then
compared the results of this single-solution algorithm
with those obtained by our previously proposed
multi-solution harmony search particle swarm
optimization (HS-PSO) algorithm. The results reveal
interesting aspects of each type of solution. We found
that the proposed model works better than previously
proposed models, according to some of the metrics upon
which the network relies to achieve optimal
performance. The metrics considered in this work are
propagation delay, round-trip time (RTT), matrix of
time session (TS), average delay, reliability,
throughput, cost, and fitness value. The simulation
results presented herein reveal that the proposed model
achieves high reliability and satisfactory throughput
with a short access time standard, addressing the
issues of scalability and flexibility and achieving
high performance to support network efficiency.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rocha:2023:BQV,
author = "Geneci da Silva Ribeiro Rocha and Diego Durante
M{\"u}hl and Hermenegildo Almeida Chingamba and
Let{\'\i}cia de Oliveira and Edson Talamini",
title = "Blockchain, Quo Vadis? {Recent} Changes in
Perspectives on the Application of Technology in
Agribusiness",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "38",
day = "16",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010038",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/38",
abstract = "Information technologies such as blockchain are
developing fast, overcoming bottlenecks, and quickly
taking advantage of their application. The present
study analyzes recent changes concerning the benefits,
disadvantages, challenges, and opportunities of
blockchain applications in agribusiness. Interviews
were conducted with and a questionnaire was applied to
professionals working in the development and
application of blockchain technology in agribusiness,
to compare their perception of the recent advances. The
results showed that the importance of blockchain
technology to improve governance and information flow
along supply chains has increased, and this is the main
perceived benefit. The main disadvantages were removing
intermediaries and the high cost of implementing the
technology. The absence of a widely accepted platform
in blockchain operations is the leading and growing
challenge, while patterns for blockchain technology
seem to be being overcome. The integration of
blockchain with new technologies, and the
competitiveness provided by the technology, are seen as
the main and growing opportunities. Despite the study
limitations, we conclude that the benefits and
opportunities associated with blockchain application in
agribusiness outweigh the challenges and disadvantages
in number and importance, and are becoming more
relevant.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{deVries:2023:CPM,
author = "Sjouke de Vries and Frank Blaauw and Vasilios
Andrikopoulos",
title = "Cost-Profiling Microservice Applications Using an
{APM} Stack",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "37",
day = "13",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010037",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/37",
abstract = "Understanding how the different parts of a
cloud-native application contribute to its operating
expenses is an important step towards optimizing this
cost. However, with the adoption and rollout of
microservice architectures, the gathering of the
necessary data becomes much more involved and nuanced
due to the distributed and heterogeneous nature of
these architectures. Existing solutions for this
purpose are either closed-source and proprietary or
focus only on the infrastructural footprint of the
applications. In response to that, in this work, we
present a cost-profiling solution aimed at
Kubernetes-based microservice applications, building on
a popular open-source application performance
monitoring (APM) stack. By means of a case study with a
data engineering company, we demonstrate how our
proposed solution can provide deeper insights into the
cost profile of the various application components and
drive informed decision-making in managing the
deployment of the application.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Grimes:2023:MAA,
author = "Sean Grimes and David E. Breen",
title = "A Multi-Agent Approach to Binary Classification Using
Swarm Intelligence",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "36",
day = "12",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010036",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/36",
abstract = "Wisdom-of-Crowds-Bots (WoC-Bots) are simple, modular
agents working together in a multi-agent environment to
collectively make binary predictions. The agents
represent a knowledge-diverse crowd, with each agent
trained on a subset of available information. A
honey-bee-derived swarm aggregation mechanism is used
to elicit a collective prediction with an associated
confidence value from the agents. Due to their
multi-agent design, WoC-Bots can be distributed across
multiple hardware nodes, include new features without
re-training existing agents, and the aggregation
mechanism can be used to incorporate predictions from
other sources, thus improving overall predictive
accuracy of the system. In addition to these
advantages, we demonstrate that WoC-Bots are
competitive with other top classification methods on
three datasets and apply our system to a real-world
sports betting problem, producing a consistent return
on investment from 1 January 2021 through 15 November
2022 on most major sports.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ali:2023:RBC,
author = "Shams Mhmood Abd Ali and Mohd Najwadi Yusoff and Hasan
Falah Hasan",
title = "Redactable Blockchain: Comprehensive Review,
Mechanisms, Challenges, Open Issues and Future Research
Directions",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "35",
day = "12",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010035",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/35",
abstract = "The continuous advancements of blockchain applications
impose constant improvements on their technical
features. Particularly immutability, a highly secure
blockchain attribute forbidding unauthorized or illicit
data editing or deletion, which functions as crucial
blockchain security. Nonetheless, the security function
is currently being challenged due to improper data
stored, such as child pornography, copyright violation,
and lately the enaction of the ``Right to be Forgotten
(RtbF)'' principle disseminated by the General Data
Protection Regulation (GDPR), where it requires
blockchain data to be redacted to suit current
applications' urgent demands, and even compliance with
the regulation is a challenge and an unfeasible
practice for various blockchain technology providers
owing to the immutability characteristic. To overcome
this challenge, mutable blockchain is highly demanded
to solve previously mentioned issues, where controlled
and supervised amendments to certain content within
constrained privileges granted are suggested by several
researchers through numerous blockchain redaction
mechanisms using chameleon and non-chameleon hashing
function approaches, and methods were proposed to
achieve reasonable policies while ensuring high
blockchain security levels. Accordingly, the current
study seeks to thoroughly define redaction
implementation challenges and security properties
criteria. The analysis performed has mapped these
criteria with chameleon-based research methodologies,
technical approaches, and the latest cryptographic
techniques implemented to resolve the challenge posed
by the policy in which comparisons paved current open
issues, leading to shaping future research directions
in the scoped field.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yang:2023:DRL,
author = "Siyuan Yang and Mondher Bouazizi and Tomoaki Ohtsuki
and Yohei Shibata and Wataru Takabatake and Kenji
Hoshino and Atsushi Nagate",
title = "Deep Reinforcement Learning Evolution Algorithm for
Dynamic Antenna Control in Multi-Cell Configuration
{HAPS} System",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "34",
day = "12",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010034",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/34",
abstract = "In this paper, we propose a novel Deep Reinforcement
Learning Evolution Algorithm (DRLEA) method to control
the antenna parameters of the High-Altitude Platform
Station (HAPS) mobile to reduce the number of
low-throughput users. Considering the random movement
of the HAPS caused by the winds, the throughput of the
users might decrease. Therefore, we propose a method
that can dynamically adjust the antenna parameters
based on the throughput of the users in the coverage
area to reduce the number of low-throughput users by
improving the users' throughput. Different from other
model-based reinforcement learning methods, such as the
Deep Q Network (DQN), the proposed method combines the
Evolution Algorithm (EA) with Reinforcement Learning
(RL) to avoid the sub-optimal solutions in each state.
Moreover, we consider non-uniform user distribution
scenarios, which are common in the real world, rather
than ideal uniform user distribution scenarios. To
evaluate the proposed method, we do the simulations
under four different real user distribution scenarios
and compare the proposed method with the conventional
EA and RL methods. The simulation results show that the
proposed method effectively reduces the number of low
throughput users after the HAPS moves.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vinceslas:2023:ADD,
author = "Leny Vinceslas and Safak Dogan and Srikumar
Sundareshwar and Ahmet M. Kondoz",
title = "Abstracting Data in Distributed Ledger Systems for
Higher Level Analytics and Visualizations",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "33",
day = "11",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010033",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/33",
abstract = "By design, distributed ledger technologies persist
low-level data, which makes conducting complex business
analysis of the recorded operations challenging.
Existing blockchain visualization and analytics tools
such as block explorers tend to rely on this low-level
data and complex interfacing to provide an enriched
level of analytics. The ability to derive richer
analytics could be improved through the availability of
a higher level abstraction of the data. This article
proposes an abstraction layer architecture that enables
the design of high-level analytics of distributed
ledger systems and the decentralized applications that
run on top. Based on the analysis of existing
initiatives and identification of the relevant user
requirements, this work aims to establish key insights
and specifications to improve the auditability and
intuitiveness of distributed ledger systems by
leveraging the development of future user interfaces.
To illustrate the benefits offered by the proposed
abstraction layer architecture, a regulated sector use
case is explored.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Abesinghe:2023:ICT,
author = "Sandulika Abesinghe and Nayomi Kankanamge and Tan
Yigitcanlar and Surabhi Pancholi",
title = "Image of a City through Big Data Analytics: {Colombo}
from the Lens of Geo-Coded Social Media Data",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "32",
day = "09",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010032",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/32",
abstract = "The image of a city represents the sum of beliefs,
ideas, and impressions that people have of that city.
Mostly, city images are assessed through direct or
indirect interviews and cognitive mapping exercises.
Such methods consume more time and effort and are
limited to a small number of people. However, recently,
people tend to use social media to express their
thoughts and experiences of a place. Taking this into
consideration, this paper attempts to explore city
images through social media big data, considering
Colombo, Sri Lanka, as the testbed. The aim of the
study is to examine the image of a city through
Lynchian elements---i.e., landmarks, paths, nodes,
edges, and districts---by using community sentiments
expressed and images posted on social media platforms.
For that, this study conducted various analyses---i.e.,
descriptive, image processing, sentiment, popularity,
and geo-coded social media analyses. The study findings
revealed that: (a) the community sentiments toward the
same landmarks, paths, nodes, edges, and districts
change over time; (b) decisions related to locating
landmarks, paths, nodes, edges, and districts have a
significant impact on community cognition in perceiving
cities; and (c) geo-coded social media data analytics
is an invaluable approach to capture the image of a
city. The study informs urban authorities in their
placemaking efforts by introducing a novel
methodological approach to capture an image of a
city.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhou:2023:PEP,
author = "Qingyan Zhou and Hao Li and Youhua Zhang and Junhong
Zheng",
title = "Product Evaluation Prediction Model Based on
Multi-Level Deep Feature Fusion",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "31",
day = "09",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010031",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/31",
abstract = "Traditional product evaluation research is to collect
data through questionnaires or interviews to optimize
product design, but the whole process takes a long time
to deploy and cannot fully reflect the market
situation. Aiming at this problem, we propose a product
evaluation prediction model based on multi-level deep
feature fusion of online reviews. It mines product
satisfaction from the massive reviews published by
users on e-commerce websites, and uses this model to
analyze the relationship between design attributes and
customer satisfaction, design products based on
customer satisfaction. Our proposed model can be
divided into the following four parts: First, the DSCNN
(Depthwise Separable Convolutions) layer and pooling
layer are used to combine extracting shallow features
from the primordial data. Secondly, CBAM (Convolutional
Block Attention Module) is used to realize the
dimension separation of features, enhance the
expressive ability of key features in the two
dimensions of space and channel, and suppress the
influence of redundant information. Thirdly, BiLSTM
(Bidirectional Long Short-Term Memory) is used to
overcome the complexity and nonlinearity of product
evaluation prediction, output the predicted result
through the fully connected layer. Finally, using the
global optimization capability of the genetic
algorithm, the hyperparameter optimization of the model
constructed above is carried out. The final forecasting
model consists of a series of decision rules that avoid
model redundancy and achieve the best forecasting
effect. It has been verified that the method proposed
in this paper is better than the above-mentioned models
in five evaluation indicators such as MSE, MAE, RMSE,
MAPE and SMAPE, compared with Support Vector Regression
(SVR), DSCNN, BiLSTM and DSCNN-BiLSTM. By predicting
customer emotional satisfaction, it can provide
accurate decision-making suggestions for enterprises to
design new products.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhao:2023:TSB,
author = "Ke Zhao and Rui Han and Xu Wang",
title = "Time Segmentation-Based Hybrid Caching in {5G-ICN}
Bearer Network",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "30",
day = "07",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010030",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/30",
abstract = "The fifth-generation communication technology (5G) and
information-centric networks (ICNs) are acquiring more
and more attention. Cache plays a significant part in
the 5G-ICN architecture that the industry has
suggested. 5G mobile terminals switch between different
base stations quickly, creating a significant amount of
traffic and a significant amount of network latency.
This brings great challenges to 5G-ICN mobile cache. It
appears urgent to improve the cache placement strategy.
This paper suggests a hybrid caching strategy called
time segmentation-based hybrid caching (TSBC) strategy,
based on the 5G-ICN bearer network infrastructure. A
base station's access frequency can change throughout
the course of the day due to the ``tidal phenomena'' of
mobile networks. To distinguish the access frequency,
we split each day into periods of high and low
liquidity. To maintain the diversity of cache copies
during periods of high liquidity, we replace the path's
least-used cache copy. We determine the cache value of
each node in the path and make caching decisions during
periods of low liquidity to make sure users can access
the content they are most interested in quickly. The
simulation results demonstrate that the proposed
strategy has a positive impact on both latency and the
cache hit ratio.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pethers:2023:RAD,
author = "Brent Pethers and Abubakar Bello",
title = "Role of Attention and Design Cues for Influencing
Cyber-Sextortion Using Social Engineering and Phishing
Attacks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "29",
day = "07",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010029",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/29",
abstract = "Cyber sextortion attacks are security and privacy
threats delivered to victims online, to distribute
sexual material in order to force the victim to act
against their will. This continues to be an
under-addressed concern in society. This study
investigated social engineering and phishing email
design and influence techniques in susceptibility to
cyber sextortion attacks. Using a quantitative
methodology, a survey measured susceptibility to cyber
sextortion with a focus on four different email design
cues. One-way repeated measures ANOVA, post hoc
comparison tests, Friedman nonparametric test, and
Spearman correlation tests were conducted with results
indicating that attention to email source and
title/subject line significantly increased individuals'
susceptibility, while attention to grammar and
spelling, and urgency cues, had lesser influence. As
such, the influence of these message-related factors
should be considered when implementing effective
security controls to mitigate the risks and
vulnerabilities to cyber sextortion attacks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kabassi:2023:ARE,
author = "Katerina Kabassi and Anastasia Papadaki and Athanasios
Botonis",
title = "Adapting Recommendations on Environmental Education
Programs",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "28",
day = "04",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010028",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/28",
abstract = "Stakeholders in Environmental Education (EE) often
face difficulties identifying and selecting programs
that best suit their needs. This is due, in part, to
the lack of expertise in evaluation knowledge and
practice, as well as to the absence of a unified
database of Environmental Education Programs (EEPs)
with a defined structure. This article presents the
design and development of a web application for
evaluating and selecting EEPs. The certified users of
the application can insert, view, and evaluate the
registered EEPs. At the same time, the application
creates and maintains for each user an individual and
dynamic user model reflecting their personal
preferences. Finally, using all the above information
and applying a combination of Multi-Criteria
Decision-Making Methods (MCDM), the application
provides a comparative and adaptive evaluation in order
to help each user to select the EEPs that best suit
his/her needs. The personalized recommendations are
based on the information about the user stored in the
user model and the results of the EEPs evaluations by
the users that have applied them. As a case study, we
used the EEPs from the Greek Educational System.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Matricciani:2023:TFL,
author = "Emilio Matricciani and Carlo Riva",
title = "Transfer Functions and Linear Distortions in
Ultra-Wideband Channels Faded by Rain in {GeoSurf}
Satellite Constellations",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "27",
day = "03",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010027",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/27",
abstract = "Because of rain attenuation, the equivalent baseband
transfer function of large bandwidth radio-links will
not be ideal. We report the results concerning radio
links to/from satellites orbiting in GeoSurf satellite
constellations located at Spino d'Adda, Prague, Madrid,
and Tampa, which are all sites in different climatic
regions. By calculating rain attenuation and phase
delay with the Synthetic Storm Technique, we have found
that in a 10-GHz bandwidth centered at 80 GHz
(W-Band)---to which we refer to as ``ultra-wideband-,
both direct and orthogonal channels will introduce
significant amplitude and phase distortions, which
increase with rain attenuation. Only ``narrow-band''
channels (100--200 MHz) will not be affected. The ratio
between the probability of bit error with rain
attenuation and the probability of bit error with no
rain attenuation increases with rain attenuation. The
estimated loss in the signal-to-noise ratio can reach
3~4 dB. All results depend on the site, Tampa being the
worst. To confirm these findings, future work will need
a full Monte Carlo digital simulation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Goncalves:2023:CSP,
author = "Teresa Gon{\c{c}}alves and Rute Veladas and Hua Yang
and Renata Vieira and Paulo Quaresma and Paulo Infante
and C{\'a}tia Sousa Pinto and Jo{\~a}o Oliveira and
Maria Cortes Ferreira and J{\'e}ssica Morais and Ana
Raquel Pereira and Nuno Fernandes and Carolina
Gon{\c{c}}alves",
title = "Clinical Screening Prediction in the {Portuguese
National Health Service}: Data Analysis, Machine
Learning Models, Explainability and Meta-Evaluation",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "26",
day = "03",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010026",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/26",
abstract = "This paper presents an analysis of the calls made to
the Portuguese National Health Contact Center (SNS24)
during a three years period. The final goal was to
develop a system to help nurse attendants select the
appropriate clinical pathway (from 59 options) for each
call. It examines several aspects of the calls
distribution like age and gender of the user, date and
time of the call and final referral, among others and
presents comparative results for alternative
classification models (SVM and CNN) and different data
samples (three months, one and two years data models).
For the task of selecting the appropriate pathway, the
models, learned on the basis of the available data,
achieved F1 values that range between 0.642 (3 months
CNN model) and 0.783 (2 years CNN model), with SVM
having a more stable performance (between 0.743 and
0.768 for the corresponding data samples). These
results are discussed regarding error analysis and
possibilities for explaining the system decisions. A
final meta evaluation, based on a clinical expert
overview, compares the different choices: the nurse
attendants (reference ground truth), the expert and the
automatic decisions (2 models), revealing a higher
agreement between the ML models, followed by their
agreement with the clinical expert, and minor agreement
with the reference.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2023:VIA,
author = "Qiang Li",
title = "A {V2V} Identity Authentication and Key Agreement
Scheme Based on Identity-Based Cryptograph",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "25",
day = "03",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010025",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/25",
abstract = "Cellular vehicle to everything (C-V2X) is a technology
to achieve vehicle networking, which can improve
traffic efficiency and traffic safety. As a special
network, the C-V2X system faces many security risks.
The vehicle to vehicle (V2V) communication transmits
traffic condition data, driving path data, user driving
habits data, and so on. It is necessary to ensure the
opposite equipment is registered C-V2X equipment
(installed in the vehicle), and the data transmitted
between the equipment is secure. This paper proposes a
V2V identity authentication and key agreement scheme
based on identity-based cryptograph (IBC). The C-V2X
equipment use its vehicle identification (VID) as its
public key. The key management center (KMC) generates a
private key for the C-V2X equipment according to its
VID. The C-V2X equipment transmit secret data encrypted
with the opposite equipment public key to the other
equipment, they authenticate each other through a
challenge response protocol based on identity-based
cryptography, and they negotiate the working key used
to encrypt the communication data. The scheme can
secure the V2V communication with low computational
cost and simple architecture and meet the lightweight
and efficient communication requirements of the C-V2X
system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Du:2023:FSA,
author = "Jinze Du and Chengtai Gao and Tao Feng",
title = "Formal Safety Assessment and Improvement of {DDS}
Protocol for Industrial Data Distribution Service",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "24",
day = "31",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010024",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/24",
abstract = "The Data Distribution Service (DDS) for real-time
systems is an industrial Internet communication
protocol. Due to its distributed high reliability and
the ability to transmit device data communication in
real-time, it has been widely used in industry, medical
care, transportation, and national defense. With the
wide application of various protocols, protocol
security has become a top priority. There are many
studies on protocol security, but these studies lack a
formal security assessment of protocols. Based on the
above status, this paper evaluates and improves the
security of the DDS protocol using a model detection
method combining the Dolev--Yao attack model and the
Coloring Petri Net (CPN) theory. Because of the
security loopholes in the original protocol, a
timestamp was introduced into the original protocol,
and the shared key establishment process in the
original protocol lacked fairness and consistency. We
adopted a new establishment method to establish the
shared secret and re-verified its security. The results
show that the overall security of the protocol has been
improved by 16.7\% while effectively preventing current
replay attack.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cardone:2023:GBH,
author = "Barbara Cardone and Ferdinando {Di Martino} and
Vittorio Miraglia",
title = "A {GIS}-Based Hot and Cold Spots Detection Method by
Extracting Emotions from Social Streams",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "23",
day = "30",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010023",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/23",
abstract = "Hot and cold spot identification is a spatial analysis
technique used in various issues to identify regions
where a specific phenomenon is either strongly or
poorly concentrated or sensed. Many hot/cold spot
detection techniques are proposed in literature;
clustering methods are generally applied in order to
extract hot and cold spots as polygons on the maps; the
more precise the determination of the area of the hot
(cold) spots, the greater the computational complexity
of the clustering algorithm. Furthermore, these methods
do not take into account the hidden information
provided by users through social networks, which is
significant for detecting the presence of hot/cold
spots based on the emotional reactions of citizens. To
overcome these critical points, we propose a GIS-based
hot and cold spot detection framework encapsulating a
classification model of emotion categories of documents
extracted from social streams connected to the
investigated phenomenon is implemented. The study area
is split into subzones; residents' postings during a
predetermined time period are retrieved and analyzed
for each subzone. The proposed model measures for each
subzone the prevalence of pleasant and unpleasant
emotional categories in different time frames; with the
aid of a fuzzy-based emotion classification approach,
subzones in which unpleasant/pleasant emotions prevail
over the analyzed time period are labeled as hot/cold
spots. A strength of the proposed framework is to
significantly reduce the CPU time of cluster-based hot
and cold spot detection methods as it does not require
detecting the exact geometric shape of the spot. Our
framework was tested to detect hot and cold spots
related to citizens' discomfort due to heatwaves in the
study area made up of the municipalities of the
northeastern area of the province of Naples (Italy).
The results show that the hot spots, where the greatest
discomfort is felt, correspond to areas with a high
population/building density. On the contrary, cold
spots cover urban areas having a lower population
density.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Huang:2023:NNA,
author = "Songtao Huang and Jun Shen and Qingquan Lv and Qingguo
Zhou and Binbin Yong",
title = "A Novel {NODE} Approach Combined with {LSTM} for
Short-Term Electricity Load Forecasting",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "22",
day = "30",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010022",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/22",
abstract = "Electricity load forecasting has seen increasing
importance recently, especially with the effectiveness
of deep learning methods growing. Improving the
accuracy of electricity load forecasting is vital for
public resources management departments. Traditional
neural network methods such as long short-term memory
(LSTM) and bidirectional LSTM (BiLSTM) have been widely
used in electricity load forecasting. However, LSTM and
its variants are not sensitive to the dynamic change of
inputs and miss the internal nonperiodic rules of
series, due to their discrete observation interval. In
this paper, a novel neural ordinary differential
equation (NODE) method, which can be seen as a
continuous version of residual network (ResNet), is
applied to electricity load forecasting to learn
dynamics of time series. We design three groups of
models based on LSTM and BiLSTM and compare the
accuracy between models using NODE and without NODE.
The experimental results show that NODE can improve the
prediction accuracy of LSTM and BiLSTM. It indicates
that NODE is an effective approach to improving the
accuracy of electricity load forecasting.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Khando:2023:ETD,
author = "Khando Khando and M. Sirajul Islam and Shang Gao",
title = "The Emerging Technologies of Digital Payments and
Associated Challenges: a Systematic Literature Review",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "21",
day = "30",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010021",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/21",
abstract = "The interplay between finance and technology with the
use of the internet triggered the emergence of digital
payment technologies. Such technological innovation in
the payment industry is the foundation for financial
inclusion. However, despite the continuous progress and
potential of moving the payment landscape towards
digital payments and connecting the population to the
ubiquitous digital environment, some critical issues
need to be addressed to achieve a more harmonious
inclusive and sustainable cashless society. The study
aims to provide a comprehensive literature review on
the emerging digital payment technologies and
associated challenges. By systematically reviewing
existing empirical studies, this study puts forward the
state-of-the-art classification of digital payment
technologies and presents four categories of digital
payment technologies: card payment, e-payment, mobile
payment and cryptocurrencies. Subsequently, the paper
presents the key challenges in digital payment
technologies categorized into broad themes: social,
economic, technical, awareness and legal. The
classification and categorization of payment
technologies and associated challenges can be useful to
both researchers and practitioners to understand,
elucidate and develop a coherent digital payment
strategy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Perifanou:2023:TVI,
author = "Maria Perifanou and Anastasios A. Economides and
Stavros A. Nikou",
title = "Teachers' Views on Integrating Augmented Reality in
Education: Needs, Opportunities, Challenges and
Recommendations",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "20",
day = "29",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010020",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/20",
abstract = "The integration of augmented reality (AR) in education
is promising since it enhances teaching and offers more
engaging and appealing learning experiences. Teachers
can have a catalytic role towards the adoption of AR in
education; therefore, their perspectives with regard to
AR in teaching and learning are very important. The
current study explores teachers' views on the
integration of AR in education through an open-ended
questionnaire that has been answered by 93 educators
worldwide. A set of digital skills that can support
student-centered pedagogies in an appropriate
infrastructure are the main requirement for effective
teaching with AR. Among the perceived benefits and
opportunities are interactive teaching and learning,
increased interest and engagement, better understanding
of complex concepts. As barriers, participants reported
the lack of AR educational applications, the cost of
buying and maintaining AR equipment and resources, the
lack of teachers' and students' digital skills,
classroom management issues, and security and ethical
issues. Moreover, survey participants highlighted the
need for raising teachers' awareness for the added
value of AR in education and the need for teachers'
continuous professional development. Implications and
future research recommendations on the integration of
AR in education are discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kalafatidis:2023:LCS,
author = "Sarantis Kalafatidis and Sotiris Skaperas and Vassilis
Demiroglou and Lefteris Mamatas and Vassilis
Tsaoussidis",
title = "Logically-Centralized {SDN}-Based {NDN} Strategies for
Wireless Mesh Smart-City Networks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "19",
day = "29",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010019",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/19",
abstract = "The Internet of Things (IoT) is a key technology for
smart community networks, such as smart-city
environments, and its evolution calls for stringent
performance requirements (e.g., low delay) to support
efficient communication among a wide range of objects,
including people, sensors, vehicles, etc. At the same
time, these ecosystems usually adopt wireless mesh
technology to extend their communication range in
large-scale IoT deployments. However, due to the high
range of coverage, the smart-city WMNs may face
different network challenges according to the network
characteristic, for example, (i) areas that include a
significant number of wireless nodes or (ii) areas with
frequent dynamic changes such as link failures due to
unstable topologies. Named-Data Networking (NDN) can
enhance WMNs to meet such IoT requirements, thanks to
the content naming scheme and in-network caching, but
it necessitates adaptability to the challenging
conditions of WMNs. In this work, we aim at efficient
end-to-end NDN communication in terms of performance
(i.e., delay), performing extended experimentation over
a real WMN, evaluating and discussing the benefits
provided by two SDN-based NDN strategies: (1) a dynamic
SDN-based solution that integrates the NDN operation
with the routing decisions of a WMN routing protocol;
(2) a static one which based on SDN-based clustering
and real WMN performance measurements. Our key
contributions include (i) the implementation of two
types of NDN path selection strategies; (ii)
experimentation and data collection over the w-iLab.t
Fed4FIRE+ testbed with real WMN conditions; (ii) real
measurements released as open-data, related to the
performance of the wireless links in terms of RSSI,
delay, and packet loss among the wireless nodes of the
corresponding testbed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liccardo:2023:VAD,
author = "Annalisa Liccardo and Francesco Bonavolont{\`a}",
title = "{VR}, {AR}, and {3-D} User Interfaces for Measurement
and Control",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "18",
day = "29",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010018",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/18",
abstract = "The topics of virtual, mixed, and extended reality
have now become key areas in various fields of
scientific and industrial applications, and the
interest in them is made tangible by the numerous
papers available in the scientific literature. In this
regard, the Special Issue ``VR, AR, and 3-D User
Interfaces for Measurement and Control'' received a
fair number of varied contributions that analyzed
different aspects of the implementation of virtual,
mixed, and extended reality systems and approaches in
the real world. They range from investigating the
requirements of new potential technologies to the
prediction verification of the effectiveness and
benefits of their use, the analysis of the difficulties
of interaction with graphical interfaces to the
possibility of performing complex and risky tasks (such
as surgical operations) using mixed reality viewers.
All contributions were of a high standard and mainly
highlight that measurement and control applications
based on the new models of interaction with reality are
by now increasingly ready to leave laboratory spaces
and become objects and features of common life. The
significant benefits of this technology will radically
change the way we live and interact with information
and the reality around us, and it will surely be worthy
of further exploration, maybe even in a new Special
Issue of Future Internet.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2023:DSP,
author = "Yunchuan Liu and Amir Ghasemkhani and Lei Yang",
title = "Drifting Streaming Peaks-Over-Threshold-Enhanced
Self-Evolving Neural Networks for Short-Term Wind Farm
Generation Forecast",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "17",
day = "28",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010017",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/17",
abstract = "This paper investigates the short-term wind farm
generation forecast. It is observed from the real wind
farm generation measurements that wind farm generation
exhibits distinct features, such as the
non-stationarity and the heterogeneous dynamics of ramp
and non-ramp events across different classes of wind
turbines. To account for the distinct features of wind
farm generation, we propose a Drifting Streaming
Peaks-over-Threshold (DSPOT)-enhanced self-evolving
neural networks-based short-term wind farm generation
forecast. Using DSPOT, the proposed method first
classifies the wind farm generation data into ramp and
non-ramp datasets, where time-varying dynamics are
taken into account by utilizing dynamic ramp thresholds
to separate the ramp and non-ramp events. We then train
different neural networks based on each dataset to
learn the different dynamics of wind farm generation by
the NeuroEvolution of Augmenting Topologies (NEAT),
which can obtain the best network topology and
weighting parameters. As the efficacy of the neural
networks relies on the quality of the training datasets
(i.e., the classification accuracy of the ramp and
non-ramp events), a Bayesian optimization-based
approach is developed to optimize the parameters of
DSPOT to enhance the quality of the training datasets
and the corresponding performance of the neural
networks. Based on the developed self-evolving neural
networks, both distributional and point forecasts are
developed. The experimental results show that compared
with other forecast approaches, the proposed forecast
approach can substantially improve the forecast
accuracy, especially for ramp events. The experiment
results indicate that the accuracy improvement in a 60
min horizon forecast in terms of the mean absolute
error (MAE) is at least 33.6\% for the whole year data
and at least 37\% for the ramp events. Moreover, the
distributional forecast in terms of the continuous rank
probability score (CRPS) is improved by at least 35.8\%
for the whole year data and at least 35.2\% for the
ramp events.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hamarsheh:2023:NIT,
author = "Qadri Hamarsheh and Omar Daoud and Mohammed Baniyounis
and Ahlam Damati",
title = "Narrowband {Internet-of-Things} to Enhance the
Vehicular Communications Performance",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "16",
day = "28",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010016",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/16",
abstract = "The interest in vehicle-to-vehicle communication has
gained a high demand in the last decade. This is due to
the need for safe and robust smart communication, while
this type of communication is vulnerable to latency and
power. Therefore, this work proposes the Narrowband
Internet-of-Things to enhance the robustness of the
vehicular communication system. Accordingly, the
system's QoS is enhanced. This enhancement is based on
proposing two parts to cover the latency and the
harmonics issues, in addition to proposing a
distributed antenna configuration for the moving
vehicles under a machine learning benchmark, which uses
the across-entropy algorithm. The proposed environment
has been simulated and compared to the state-of-the-art
work performance. The simulation results verify the
proposed work performance based on three different
parameters; namely the latency, the mean squared error
rate, and the transmitted signal block error rate. From
these results, the proposed work outperforms the
literature; at the probability of 10 {$-$3}, the
proposed work reduces the peak power deficiency by
almost 49\%, an extra 23.5\% enhancement has been
attained from the self-interference cancellation side,
and a bit error rate enhancement by a ratio of 31\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{LaQuatra:2023:BIE,
author = "Moreno {La Quatra} and Luca Cagliero",
title = "{BART-IT}: an Efficient Sequence-to-Sequence Model for
{Italian} Text Summarization",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "15",
day = "27",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010015",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/15",
abstract = "The emergence of attention-based architectures has led
to significant improvements in the performance of
neural sequence-to-sequence models for text
summarization. Although these models have proved to be
effective in summarizing English-written documents,
their portability to other languages is limited thus
leaving plenty of room for improvement. In this paper,
we present BART-IT, a sequence-to-sequence model, based
on the BART architecture that is specifically tailored
to the Italian language. The model is pre-trained on a
large corpus of Italian-written pieces of text to learn
language-specific features and then fine-tuned on
several benchmark datasets established for abstractive
summarization. The experimental results show that
BART-IT outperforms other state-of-the-art models in
terms of ROUGE scores in spite of a significantly
smaller number of parameters. The use of BART-IT can
foster the development of interesting NLP applications
for the Italian language. Beyond releasing the model to
the research community to foster further research and
applications, we also discuss the ethical implications
behind the use of abstractive summarization models.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fazio:2023:HMI,
author = "Roberto {De Fazio} and Vincenzo Mariano Mastronardi
and Matteo Petruzzi and Massimo {De Vittorio} and Paolo
Visconti",
title = "Human--Machine Interaction through Advanced Haptic
Sensors: a Piezoelectric Sensory Glove with Edge
Machine Learning for Gesture and Object Recognition",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "14",
day = "27",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010014",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/14",
abstract = "Human--machine interaction (HMI) refers to systems
enabling communication between machines and humans.
Systems for human--machine interfaces have advanced
significantly in terms of materials, device design, and
production methods. Energy supply units, logic
circuits, sensors, and data storage units must be
flexible, stretchable, undetectable, biocompatible, and
self-healing to act as human--machine interfaces. This
paper discusses the technologies for providing
different haptic feedback of different natures.
Notably, the physiological mechanisms behind touch
perception are reported, along with a classification of
the main haptic interfaces. Afterward, a comprehensive
overview of wearable haptic interfaces is presented,
comparing them in terms of cost, the number of
integrated actuators and sensors, their main haptic
feedback typology, and their future application.
Additionally, a review of sensing systems that use
haptic feedback technologies---specifically, smart
gloves---is given by going through their fundamental
technological specifications and key design
requirements. Furthermore, useful insights related to
the design of the next-generation HMI devices are
reported. Lastly, a novel smart glove based on thin and
conformable AlN (aluminum nitride) piezoelectric
sensors is demonstrated. Specifically, the device
acquires and processes the signal from the piezo
sensors to classify performed gestures through an
onboard machine learning (ML) algorithm. Then, the
design and testing of the electronic conditioning
section of AlN-based sensors integrated into the smart
glove are shown. Finally, the architecture of a
wearable visual-tactile recognition system is
presented, combining visual data acquired by a
micro-camera mounted on the user's glass with the
haptic ones provided by the piezoelectric sensors.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhao:2023:CPP,
author = "Jiaxu Zhao and Binting Su and Xuli Rao and Zhide
Chen",
title = "A Cross-Platform Personalized Recommender System for
Connecting E-Commerce and Social Network",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "13",
day = "27",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010013",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/13",
abstract = "In this paper, we build a recommender system for a new
study area: social commerce, which combines rich
information about social network users and products on
an e-commerce platform. The idea behind this
recommender system is that a social network contains
abundant information about its users which could be
exploited to create profiles of the users. For social
commerce, the quality of the profiles of potential
consumers determines whether the recommender system is
a success or a failure. In our work, not only the
user's textual information but also the tags and the
relationships between users have been considered in the
process of building user profiling model. A topic model
has been adopted in our system, and a feedback
mechanism also been design in this paper. Then, we
apply a collative filtering method and a clustering
algorithm in order to obtain a high recommendation
accuracy. We do an empirical analysis based on real
data collected on a social network and an e-commerce
platform. We find that the social network has an impact
on e-commerce, so social commerce could be realized.
Simulations show that our topic model has a better
performance in topic finding, meaning that our
profile-building model is suitable for a social
commerce recommender system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vizzari:2023:PSR,
author = "Giuseppe Vizzari and Thomas Cecconello",
title = "Pedestrian Simulation with Reinforcement Learning: a
Curriculum-Based Approach",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "12",
day = "27",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010012",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/12",
abstract = "Pedestrian simulation is a consolidated but still
lively area of research. State of the art models mostly
take an agent-based perspective, in which pedestrian
decisions are made according to a manually defined
model. Reinforcement learning (RL), on the other hand,
is used to train an agent situated in an environment
how to act so as to maximize an accumulated numerical
reward signal (a feedback provided by the environment
to every chosen action). We explored the possibility of
applying RL to pedestrian simulation. We carefully
defined a reward function combining elements related to
goal orientation, basic proxemics, and basic
way-finding considerations. The proposed approach
employs a particular training curriculum, a set of
scenarios growing in difficulty supporting an
incremental acquisition of general movement competences
such as orientation, walking, and pedestrian
interaction. The learned pedestrian behavioral model is
applicable to situations not presented to the agents in
the training phase, and seems therefore reasonably
general. This paper describes the basic elements of the
approach, the training procedure, and an
experimentation within a software framework employing
Unity and ML-Agents.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ngo:2023:HNH,
author = "Duc-Minh Ngo and Dominic Lightbody and Andriy Temko
and Cuong Pham-Quoc and Ngoc-Thinh Tran and Colin C.
Murphy and Emanuel Popovici",
title = "{HH-NIDS}: Heterogeneous Hardware-Based Network
Intrusion Detection Framework for {IoT} Security",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "9",
day = "26",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010009",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/9",
abstract = "This study proposes a heterogeneous hardware-based
framework for network intrusion detection using
lightweight artificial neural network models. With the
increase in the volume of exchanged data, IoT networks'
security has become a crucial issue. Anomaly-based
intrusion detection systems (IDS) using machine
learning have recently gained increased popularity due
to their generation's ability to detect unseen attacks.
However, the deployment of anomaly-based AI-assisted
IDS for IoT devices is computationally expensive. A
high-performance and ultra-low power consumption
anomaly-based IDS framework is proposed and evaluated
in this paper. The framework has achieved the highest
accuracy of 98.57\% and 99.66\% on the UNSW-NB15 and
IoT-23 datasets, respectively. The inference engine on
the MAX78000EVKIT AI-microcontroller is 11.3 times
faster than the Intel Core i7-9750H 2.6 GHz and 21.3
times faster than NVIDIA GeForce GTX 1650 graphics
cards, when the power drawn was 18mW. In addition, the
pipelined design on the PYNQ-Z2 SoC FPGA board with the
Xilinx Zynq xc7z020-1clg400c device is optimised to run
at the on-chip frequency (100 MHz), which shows a
speedup of 53.5 times compared to the MAX78000EVKIT.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Orehovacki:2023:EPQ,
author = "Tihomir Orehovacki and Luka Blaskovi{\'c} and Matej
Kurevija",
title = "Evaluating the Perceived Quality of Mobile Banking
Applications in {Croatia}: an Empirical Study",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "1",
pages = "8",
day = "26",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15010008",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:53 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/1/8",
abstract = "Mobile banking is nowadays a standard service provided
by banks worldwide because it adds convenience for
people. There is no more rushing to a bank or waiting
in lines for a simple transaction that can be conducted
from anywhere and at any time in the blink of an eye.
To be consumed by a respective amount of bank clients
regularly, mobile banking applications are required to
be continuously improved and updated, be in line with
recent security standards, and meet quality
requirements. This paper tackles the perceived quality
of mobile banking applications that are most commonly
used in Croatia and has three objectives in that
respect. The first one is to identify the extent to
which pragmatic and hedonic dimensions of quality
contribute to customers' satisfaction and their
behavioral intentions related to the continuous use of
mobile banking applications. The second one is to
determine if there are significant differences in the
perceived quality between users of diverse mobile
banking applications as well as between users who
belong to different age groups. The last one is to
uncover the advantages and disadvantages of evaluated
mobile banking applications. For this purpose, an
empirical study was carried out, during which data were
collected with an online questionnaire. The sample was
composed of 130 participants who are representative and
regular users of mobile banking applications. The
psychometric features of the proposed research model,
which represents an interplay of perceived quality
attributes, were tested using the partial least squares
structural equation modeling (PLS-SEM) method.
Differences in the perceived quality among different
mobile banking applications and customers of various
age groups were explored with Kruskal--Wallis tests.
Pros and cons of mobile banking applications were
identified with the help of descriptive statistics.
Study findings indicate that, in the context of mobile
banking applications used in Croatia, feedback quality
and responsiveness contribute to the ease of use,
usefulness is affected by both ease of use and
efficiency, responsiveness has a significant impact on
efficiency while ease of use, usefulness, and security
of personal data are predictors of customers'
satisfaction which in turn influences their behavioral
intentions. While no significant difference exists in
the perceived quality of four examined mobile banking
applications, we found a significant difference in the
perceived quality among three age groups of users of
mobile banking applications. The most commonly reported
advantages of mobile banking applications were related
to facets of their efficiency and usefulness, whereas
their main drawback appeared to be the lack of features
dealing with the personalization of offered services.
The reported and discussed results of an empirical
study can be used as a set of guidelines for future
advances in the evaluation and design of mobile banking
applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{AlZubi:2023:DMS,
author = "Shadi AlZu'bi and Mohammad Elbes and Ala Mughaid and
Noor Bdair and Laith Abualigah and Agostino Forestiero
and Raed Abu Zitar",
title = "Diabetes Monitoring System in Smart Health Cities
Based on Big Data Intelligence",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "85",
day = "20",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020085",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/85",
abstract = "Diabetes is a metabolic disorder in which the body is
unable to properly regulate blood sugar levels. It can
occur when the body does not produce enough insulin or
when cells become resistant to insulin's effects. There
are two main types of diabetes, Type 1 and Type 2,
which have different causes and risk factors. Early
detection of diabetes allows for early intervention and
management of the condition. This can help prevent or
delay the development of serious complications
associated with diabetes. Early diagnosis also allows
for individuals to make lifestyle changes to prevent
the progression of the disease. Healthcare systems play
a vital role in the management and treatment of
diabetes. They provide access to diabetes education,
regular check-ups, and necessary medications for
individuals with diabetes. They also provide monitoring
and management of diabetes-related complications, such
as heart disease, kidney failure, and neuropathy.
Through early detection, prevention and management
programs, healthcare systems can help improve the
quality of life and outcomes for people with diabetes.
Current initiatives in healthcare systems for diabetes
may fail due to lack of access to education and
resources for individuals with diabetes. There may also
be inadequate follow-up and monitoring for those who
have been diagnosed, leading to poor management of the
disease and lack of prevention of complications.
Additionally, current initiatives may not be tailored
to specific cultural or demographic groups, resulting
in a lack of effectiveness for certain populations. In
this study, we developed a diabetes prediction system
using a healthcare framework. The system employs
various machine learning methods, such as K-nearest
neighbors, decision tree, deep learning, SVM, random
forest, AdaBoost and logistic regression. The
performance of the system was evaluated using the PIMA
Indians Diabetes dataset and achieved a training
accuracy of 82\% and validation accuracy of 80\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Latifinavid:2023:DVB,
author = "Masoud Latifinavid and Aydin Azizi",
title = "Development of a Vision-Based Unmanned Ground Vehicle
for Mapping and Tennis Ball Collection: a Fuzzy Logic
Approach",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "84",
day = "19",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020084",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/84",
abstract = "The application of robotic systems is widespread in
all fields of life and sport. Tennis ball collection
robots have recently become popular because of their
potential for saving time and energy and increasing the
efficiency of training sessions. In this study, an
unmanned and autonomous tennis ball collection robot
was designed and produced that used LiDAR for 2D
mapping of the environment and a single camera for
detecting tennis balls. A novel method was used for the
path planning and navigation of the robot. A fuzzy
controller was designed for controlling the robot
during the collection operation. The developed robot
was tested, and it successfully detected 91\% of the
tennis balls and collected 83\% of them.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mazhar:2023:ACS,
author = "Tehseen Mazhar and Hafiz Muhammad Irfan and Sunawar
Khan and Inayatul Haq and Inam Ullah and Muhammad Iqbal
and Habib Hamam",
title = "Analysis of Cyber Security Attacks and Its Solutions
for the Smart grid Using Machine Learning and
Blockchain Methods",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "83",
day = "19",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020083",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/83",
abstract = "Smart grids are rapidly replacing conventional
networks on a worldwide scale. A smart grid has
drawbacks, just like any other novel technology. A
smart grid cyberattack is one of the most challenging
things to stop. The biggest problem is caused by
millions of sensors constantly sending and receiving
data packets over the network. Cyberattacks can
compromise the smart grid's dependability,
availability, and privacy. Users, the communication
network of smart devices and sensors, and network
administrators are the three layers of an innovative
grid network vulnerable to cyberattacks. In this study,
we look at the many risks and flaws that can affect the
safety of critical, innovative grid network components.
Then, to protect against these dangers, we offer
security solutions using different methods. We also
provide recommendations for reducing the chance that
these three categories of cyberattacks may occur.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Flamini:2023:OPR,
author = "Marta Flamini and Maurizio Naldi",
title = "Optimal Pricing in a Rented {5G} Infrastructure
Scenario with Sticky Customers",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "82",
day = "19",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020082",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/82",
abstract = "The ongoing deployment of 5G is accompanied by
architecture and pricing decisions. Network sharing is
a critical feature, allowing operators to reduce their
costs, but introducing a mixed partnering/competition
situation, where the infrastructure owner, renting out
their infrastructure to virtual operators (who act as
customers), also provides services to end customers,
competing with virtual operators. Pricing is the
leverage through which an optimal balance between the
two roles is accomplished. However, pricing may not be
the only variable affecting customers' choice, which
may prefer (stick to) one operator for several reasons.
In this paper, we formulate a game model to analyse the
optimal pricing decisions for operators in the presence
of such sticky behaviour of customers. After concluding
that the game does not allow for a Nash equilibrium, we
consider a case when one of the parties (the
infrastructure owner, the virtual operators, or the
regulator) is responsible for setting prices and
analyse how operators' profits are impacted when
price-setting powers are shifted among the parties. The
scenario where the regulator sets prices leads to the
lowest profits for the operators, even lower than when
competitors set prices.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kulakli:2023:RTI,
author = "Atik Kulakli and Cenk Lacin Arikan",
title = "Research Trends of the {Internet of Things} in
Relation to Business Model Innovation: Results from
Co-Word and Content Analyses",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "81",
day = "17",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020081",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/81",
abstract = "In the era of the Internet of Things, innovative
business model initiatives continue to deepen, and the
trend of search domains continues to expand. This paper
aims to scientifically analyze research trends of the
Internet of Things in relation to Business Model
Innovation through bibliometric studies. The data were
collected using the Clarivate Web of Science (WoS) Core
Collection (SSCI and SCI indexed) from 2005 to 2022
(November). However, the publications for the research
domains started in 2015. The results show that
scientific publications on the Internet of Things in
relation to Business Model Innovation have increased
gradually since 2019. The WoS database is utilized for
analyses because it contains journals and conference
proceedings deemed more relevant by the academic domain
and highly reputable sources for bibliometric studies.
The VOS viewer, R Language, and Microsoft Excel were
also used to analyze and complete the study.
Bibliometric and scientometric analyses were conducted
to identify publication patterns, text analysis, most
important keywords (co-word, word cloud, and
co-occurrence), trends for the topicality, and content
clustering for the publication periods. The
visualization of the research trends of the Internet of
Things in relation to Business Model Innovation
resulted in four co-occurrence clusters leading to some
of the topic areas mentioned as follows: (1) The
Internet of Things, (2) Business model innovation, (3)
Technology infrastructure, and (4) Digital
transformation and capabilities. The results of this
study will assist academics in identifying worldwide
research trends related to the Internet of Things and
Business Model Innovation as well as recommending
future research areas.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Xu:2023:NMT,
author = "Yong Xu and Hong Ni and Xiaoyong Zhu",
title = "A Novel Multipath Transmission Scheme for
Information-Centric Networking",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "80",
day = "17",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020080",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/80",
abstract = "Due to the overload of IP semantics, the traditional
TCP/IP network has a number of problems in scalability,
mobility, and security. In this context,
information-centric networking (ICN) is proposed to
solve these problems. To reduce the cost of deployment
and smoothly evolve, the ICN architecture needs to be
compatible with existing IP infrastructure. However,
the rigid underlying IP routing regulation limits the
data transmission efficiency of ICN. In this paper, we
propose a novel multipath transmission scheme by
utilizing the characteristics and functions of ICN to
enhance data transmission. The process of multipath
transmission can be regarded as a service, and a
multipath transmission service ID (MPSID) is assigned.
By using the ICN routers bound to the MPSID as relay
nodes, multiple parallel paths between the data source
and the receiver are constructed. Moreover, we design a
path management mechanism, including path selection and
path switching. It can determine the initial path based
on historical transmission information and switch to
other optimal paths according to the congestion degree
during transmission. The experimental results show that
our proposed method can improve the average throughput
and reduce the average flow completion time and the
average chunk completion time.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mehmood:2023:UKT,
author = "Tahir Mehmood and Ivan Serina and Alberto Lavelli and
Luca Putelli and Alfonso Gerevini",
title = "On the Use of Knowledge Transfer Techniques for
Biomedical Named Entity Recognition",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "79",
day = "17",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020079",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/79",
abstract = "Biomedical named entity recognition (BioNER) is a
preliminary task for many other tasks, e.g., relation
extraction and semantic search. Extracting the text of
interest from biomedical documents becomes more
demanding as the availability of online data is
increasing. Deep learning models have been adopted for
biomedical named entity recognition (BioNER) as deep
learning has been found very successful in many other
tasks. Nevertheless, the complex structure of
biomedical text data is still a challenging aspect for
deep learning models. Limited annotated biomedical text
data make it more difficult to train deep learning
models with millions of trainable parameters. The
single-task model, which focuses on learning a specific
task, has issues in learning complex feature
representations from a limited quantity of annotated
data. Moreover, manually constructing annotated data is
a time-consuming job. It is, therefore, vital to
exploit other efficient ways to train deep learning
models on the available annotated data. This work
enhances the performance of the BioNER task by taking
advantage of various knowledge transfer techniques:
multitask learning and transfer learning. This work
presents two multitask models (MTMs), which learn
shared features and task-specific features by
implementing the shared and task-specific layers. In
addition, the presented trained MTM is also fine-tuned
for each specific dataset to tailor it from a general
features representation to a specialized features
representation. The presented empirical results and
statistical analysis from this work illustrate that the
proposed techniques enhance significantly the
performance of the corresponding single-task model
(STM).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sharma:2023:CSD,
author = "Sachin Sharma and Avishek Nag",
title = "Cognitive Software Defined Networking and Network
Function Virtualization and Applications",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "78",
day = "17",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020078",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/78",
abstract = "The emergence of Software-Defined Networking (SDN) and
Network Function Virtualization (NFV) has
revolutionized the Internet. Using SDN, network devices
can be controlled from a centralized, programmable
control plane that is decoupled from their data plane,
whereas with NFV, network functions (such as network
address translation, firewall, and intrusion detection)
can be virtualized instead of being implemented on
proprietary hardware. In addition, Artificial
Intelligence (AI) and Machine Learning (ML) techniques
will be key to automating network operations and
enhancing customer service. Many of the challenges
behind SDN and NFV are currently being investigated in
several projects all over the world using AI and ML
techniques, such as AI- and software-based networking,
autonomic networking, and policy-based network
management. Contributions to this Special Issue come
from the above areas of research. Following a rigorous
review process, four excellent articles were accepted
that address and go beyond many of the challenges
mentioned above.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Seiger:2023:IMD,
author = "Ronny Seiger and Marco Franceschetti and Barbara
Weber",
title = "An Interactive Method for Detection of Process
Activity Executions from {IoT} Data",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "77",
day = "16",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020077",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/77",
abstract = "The increasing number of IoT devices equipped with
sensors and actuators pervading every domain of
everyday life allows for improved automated monitoring
and analysis of processes executed in IoT-enabled
environments. While sophisticated analysis methods
exist to detect specific types of activities from
low-level IoT data, a general approach for detecting
activity executions that are part of more complex
business processes does not exist. Moreover, dedicated
information systems to orchestrate or monitor process
executions are not available in typical IoT
environments. As a consequence, the large corpus of
existing process analysis and mining techniques to
check and improve process executions cannot be applied.
In this work, we develop an interactive method guiding
the analysis of low-level IoT data with the goal of
detecting higher-level process activity executions. The
method is derived following the exploratory data
analysis of an IoT data set from a smart factory. We
propose analysis steps, sensor-actuator-activity
patterns, and the novel concept of activity signatures
that are applicable in many IoT domains. The method
shows to be valuable for the early stages of IoT data
analyses to build a ground truth based on domain
knowledge and decisions of the process analyst, which
can be used for automated activity detection in later
stages.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ahmed:2023:EED,
author = "Sheeraz Ahmed and Zahoor Ali Khan and Syed Muhammad
Mohsin and Shahid Latif and Sheraz Aslam and Hana
Mujlid and Muhammad Adil and Zeeshan Najam",
title = "Effective and Efficient {DDoS} Attack Detection Using
Deep Learning Algorithm, Multi-Layer Perceptron",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "76",
day = "15",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020076",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/76",
abstract = "Distributed denial of service (DDoS) attacks pose an
increasing threat to businesses and government
agencies. They harm internet businesses, limit access
to information and services, and damage corporate
brands. Attackers use application layer DDoS attacks
that are not easily detectable because of impersonating
authentic users. In this study, we address novel
application layer DDoS attacks by analyzing the
characteristics of incoming packets, including the size
of HTTP frame packets, the number of Internet Protocol
(IP) addresses sent, constant mappings of ports, and
the number of IP addresses using proxy IP. We analyzed
client behavior in public attacks using standard
datasets, the CTU-13 dataset, real weblogs (dataset)
from our organization, and experimentally created
datasets from DDoS attack tools: Slow Lairs, Hulk,
Golden Eyes, and Xerex. A multilayer perceptron (MLP),
a deep learning algorithm, is used to evaluate the
effectiveness of metrics-based attack detection.
Simulation results show that the proposed MLP
classification algorithm has an efficiency of 98.99\%
in detecting DDoS attacks. The performance of our
proposed technique provided the lowest value of false
positives of 2.11\% compared to conventional
classifiers, i.e., Na{\"\i}ve Bayes, Decision Stump,
Logistic Model Tree, Na{\"\i}ve Bayes Updateable,
Na{\"\i}ve Bayes Multinomial Text, AdaBoostM1,
Attribute Selected Classifier, Iterative Classifier,
and OneR.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bouarourou:2023:EMB,
author = "Soukaina Bouarourou and Abderrahim Zannou and El Habib
Nfaoui and Abdelhak Boulaalam",
title = "An Efficient Model-Based Clustering via Joint Multiple
Sink Placement for {WSNs}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "75",
day = "15",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020075",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/75",
abstract = "Wireless sensor networks consist of many restrictive
sensor nodes with limited abilities, including limited
power, low bandwidth and battery, small storage space,
and limited computational capacity. Sensor nodes
produce massive amounts of data that are then collected
and transferred to the sink via single or multihop
pathways. Since the nodes' abilities are limited,
ineffective data transmission across the nodes makes
the network unstable due to the rising data
transmission delay and the high consumption of energy.
Furthermore, sink location and sensor-to-sink routing
significantly impact network performance. Although
there are suggested solutions for this challenge, they
suffer from low-lifetime networks, high energy
consumption, and data transmission delay. Based on
these constrained capacities, clustering is a promising
technique for reducing the energy use of wireless
sensor networks, thus improving their performance. This
paper models the problem of multiple sink deployment
and sensor-to-sink routing using the clustering
technique to extend the lifetime of wireless sensor
networks. The proposed model determines the sink
placements and the most effective way to transmit data
from sensor nodes to the sink. First, we propose an
improved ant clustering algorithm to group nodes, and
we select the cluster head based on the chance of
picking factor. Second, we assign nodes to sinks that
are designated as data collectors. Third, we provide
optimal paths for nodes to relay the data to the sink
by maximizing the network's lifetime and improving data
flow. The results of simulation on a real network
dataset demonstrate that our proposal outperforms the
existing state-of-the-art approaches in terms of energy
consumption, network lifetime, data transmission delay,
and scalability.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2023:CSR,
author = "Yanxia Li and Yang Li",
title = "Collaborative Storage and Resolution Method between
Layers in Hierarchical {ICN} Name Resolution Systems",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "74",
day = "13",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020074",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/74",
abstract = "Name resolution system is an important infrastructure
in Information Centric Networking (ICN) network
architecture of identifier--locator separation mode. In
the Local Name Resolution System (LNMRS), a
hierarchical name resolution system for
latency-sensitive scenarios; higher-level resolution
nodes serve more users and suffer more storage
pressure, which causes the problem of unbalanced
storage load between layers, and requires inter-layer
collaborative storage under the constraint of
deterministic service latency characteristics. In this
paper, we use the constraints required for inter-layer
collaborative resolution to construct an index neighbor
structure and perform collaborative storage based on
this structure. This method relieves storage pressure
on high-level resolution nodes. Experimental results
show that the increase of total storage load brought by
the proposed method is 57.1\% of that by MGreedy
algorithm, 8.1\% of that by Greedy algorithm, and 0.8\%
of that by the K-Mediod algorithm when relieving the
same storage load for high-level resolution nodes.
Meanwhile, deterministic service latency feature is
still sustained when our proposed method is used for
collaborative resolution.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zilli:2023:INW,
author = "Vit{\'o}ria Francesca Biasibetti Zilli and Cesar David
Paredes Crovato and Rodrigo da Rosa Righi and Rodrigo
Ivan Goytia Mejia and Giovani Pesenti and Dhananjay
Singh",
title = "{I4.0I}: a New Way to Rank How Involved a Company Is
in the {Industry 4.0} Era",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "73",
day = "13",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020073",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/73",
abstract = "Cloud, IoT, big data, and artificial intelligence are
currently very present in the industrial and academic
areas, being drivers of technological revolution. Such
concepts are closely related to Industry 4.0, which can
be defined as the idea of a flexible, technological,
and connected factory, encompassing the shop floor
itself and its relationship between workers, the chain
of supply, and final products. Some studies have
already been developed to quantify a company's level of
maturity within the scope of Industry 4.0. However,
there is a lack of a global and unique index that, by
receiving as input how many implemented technologies a
company has, enables its classification and therefore,
comparison with other companies of the same genre.
Thus, we present the I4.0I (Industry 4.0 Index), an
index that allows companies to measure how far they are
in Industry 4.0, enabling competitiveness between
factories and stimulating economic and technological
growth. To assess the method, companies in the
technology sector received and answered a questionnaire
in which they marked the technologies they used over
the years and the income obtained. The results were
used to compare the I4.0I with the profit measured in
the same period, proving that the greater the use of
technology, the greater the benefits for the company.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Anton-Sancho:2023:PUV,
author = "{\'A}lvaro Ant{\'o}n-Sancho and Pablo
Fern{\'a}ndez-Arias and Diego Vergara",
title = "Perception of the Use of Virtual Reality Didactic
Tools among Faculty in {Mexico}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "72",
day = "12",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020072",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/72",
abstract = "This paper develops descriptive quantitative research
of the assessments of virtual reality (VR) technology,
used as a didactic tool, by a sample of 712 university
professors in Mexico. For this purpose, a validated
Likert-type questionnaire was used as an instrument,
the responses to which were statistically analyzed. The
results obtained show that professors in Mexico report
low levels of digital skills, but high valuations of
VR. These ratings depend strongly on the professors'
area of knowledge. In this sense, the biggest gap is
between Engineering professors, who value VR better,
and Humanities professors, who value it worse. There
are also gender gaps and gaps due to the digital
generation of the participants in the assessments made,
whose behavior is also different according to the area
of knowledge. As a result, some recommendations are
provided to try to reduce the gaps found.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Stach:2023:DNO,
author = "Christoph Stach",
title = "Data Is the New Oil --- Sort of: a View on Why This
Comparison Is Misleading and Its Implications for
Modern Data Administration",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "71",
day = "12",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020071",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/71",
abstract = "Currently, data are often referred to as the oil of
the 21st century. This comparison is not only used to
express that the resource data are just as important
for the fourth industrial revolution as oil was for the
technological revolution in the late 19th century.
There are also further similarities between these two
valuable resources in terms of their handling. Both
must first be discovered and extracted from their
sources. Then, the raw materials must be cleaned,
preprocessed, and stored before they can finally be
delivered to consumers. Despite these undeniable
similarities, however, there are significant
differences between oil and data in all of these
processing steps, making data a resource that is
considerably more challenging to handle. For instance,
data sources, as well as the data themselves, are
heterogeneous, which means there is no
one-size-fits-all data acquisition solution.
Furthermore, data can be distorted by the source or by
third parties without being noticed, which affects both
quality and usability. Unlike oil, there is also no
uniform refinement process for data, as data
preparation should be tailored to the subsequent
consumers and their intended use cases. With regard to
storage, it has to be taken into account that data are
not consumed when they are processed or delivered to
consumers, which means that the data volume that has to
be managed is constantly growing. Finally, data may be
subject to special constraints in terms of
distribution, which may entail individual delivery
plans depending on the customer and their intended
purposes. Overall, it can be concluded that innovative
approaches are needed for handling the resource data
that address these inherent challenges. In this paper,
we therefore study and discuss the relevant
characteristics of data making them such a challenging
resource to handle. In order to enable appropriate data
provisioning, we introduce a holistic research concept
from data source to data sink that respects the
processing requirements of data producers as well as
the quality requirements of data consumers and,
moreover, ensures a trustworthy data administration.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ghosh:2023:IWS,
author = "Swarnendu Ghosh and Teresa Gon{\c{c}}alves and Nibaran
Das",
title = "{Im2Graph}: a Weakly Supervised Approach for
Generating Holistic Scene Graphs from Regional
Dependencies",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "70",
day = "10",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020070",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/70",
abstract = "Conceptual representations of images involving
descriptions of entities and their relations are often
represented using scene graphs. Such scene graphs can
express relational concepts by using sets of triplets
``subject---predicate---object''. Instead of building
dedicated models for scene graph generation, our model
tends to extract the latent relational information
implicitly encoded in image captioning models. We
explored dependency parsing to build grammatically
sound parse trees from captions. We used detection
algorithms for the region propositions to generate
dense region-based concept graphs. These were optimally
combined using the approximate sub-graph isomorphism to
create holistic concept graphs for images. The major
advantages of this approach are threefold. Firstly, the
proposed graph generation module is completely
rule-based and, hence, adheres to the principles of
explainable artificial intelligence. Secondly, graph
generation can be used as plug-and-play along with any
region proposition and caption generation framework.
Finally, our results showed that we could generate rich
concept graphs without explicit graph-based
supervision.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ricci:2023:DMM,
author = "Marina Ricci and Alessandra Scarcelli and Michele
Fiorentino",
title = "Designing for the Metaverse: a Multidisciplinary
Laboratory in the Industrial Design Program",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "69",
day = "10",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020069",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/69",
abstract = "The design research and education landscapes are
changing. The widespread development and use of
technologies such as Mixed Reality (MR) and the
diffusion of Head-Mounted Displays (HMDs) available at
low cost are causing a shift in design education toward
the Metaverse. In this ever-changing scenario, there is
a need to rethink design and teaching methods. However,
scientific literature lacks the ability to provide
contributions that include MR technology education in
the industrial design program. We, therefore, present
an innovative laboratory with an integrated
multidisciplinary approach that starts from the
fundamentals of interaction design and aims to teach
students how to design next-generation MR interfaces
for the Metaverse. The lab combines theory and practice
within three courses: Information Design, Information
Systems, and Virtual Design and Simulation. Industrial
design students follow a precise multidisciplinary
method consisting of five steps, from state-of-the-art
analysis to the presentation of a final group design of
an MR user interface. Thus, we introduce a class case
study by presenting the outcomes of a semester project
in the field of household appliances. Evaluation of the
teaching method is conducted through a semi-structured
questionnaire. Preliminary results show positive
outcomes from students in terms of acceptance,
effectiveness, usefulness, efficiency, and satisfaction
with the teaching method adopted for the laboratory.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Han:2023:RRA,
author = "Lu Han and Xiaohong Huang and Dandan Li and Yong
Zhang",
title = "{RingFFL}: a Ring-Architecture-Based Fair Federated
Learning Framework",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "68",
day = "09",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020068",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; Mon
Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/68",
abstract = "In the ring-architecture-based federated learning
framework, security and fairness are severely
compromised when dishonest clients abort the training
process after obtaining useful information. To solve
the problem, we propose a Ring- architecture-based F
air F ederated L earning framework called RingFFL, in
which we design a penalty mechanism for FL. Before the
training starts in each round, all clients that will
participate in the training pay deposits in a set order
and record the transactions on the blockchain to ensure
that they are not tampered with. Subsequently, the
clients perform the FL training process, and the
correctness of the models transmitted by the clients is
guaranteed by the HASH algorithm during the training
process. When all clients perform honestly, each client
can obtain the final model, and the number of digital
currencies in each client's wallet is kept constant;
otherwise, the deposits of clients who leave halfway
will be compensated to the clients who perform honestly
during the training process. In this way, through the
penalty mechanism, all clients either obtain the final
model or are compensated, thus ensuring the fairness of
federated learning. The security analysis and
experimental results show that RingFFL not only
guarantees the accuracy and security of the federated
learning model but also guarantees the fairness.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bagnoli:2023:SMK,
author = "Franco Bagnoli and Guido de Bonfioli Cavalcabo'",
title = "A Simple Model of Knowledge Scaffolding Applied to
{Wikipedia} Growth",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "67",
day = "06",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020067",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/67",
abstract = "We illustrate a simple model of knowledge scaffolding,
based on the process of building a corpus of knowledge,
each item of which is linked to ``previous'' ones. The
basic idea is that the relationships among the items of
corpus can be essentially drawn as an acyclic network,
in which topmost contributions are ``derived'' from
items at lower levels. When a new item is added to the
corpus, we impose a limit to the maximum unit increase
(i.e., ``jumps'') of knowledge. We analyzed the time
growth of the corpus (number of items) and the maximum
knowledge, both showing a power law. Another result was
that the number of ``holes'' in the knowledge corpus
always remains limited. Our model can be used as a
rough approximation to the asymptotic growth of
Wikipedia, and indeed, actual data show a certain
resemblance with our model. Assuming that the user base
is growing, at beginning, in an exponential way, one
can also recover the early phases of Wikipedia
growth.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Koryzis:2023:DTP,
author = "Dimitris Koryzis and Dionisis Margaris and Costas
Vassilakis and Konstantinos Kotis and Dimitris
Spiliotopoulos",
title = "Disruptive Technologies for Parliaments: a Literature
Review",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "66",
day = "05",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020066",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/66",
abstract = "Exploitation and use of disruptive technologies, such
as the Internet of Things, recommender systems, and
artificial intelligence, with an ambidextrous balance,
are a challenge, nowadays. Users of the technologies,
and stakeholders, could be part of a new organisational
model that affects business procedures and processes.
Additionally, the use of inclusive participatory
organisational models is essential for the effective
adoption of these technologies. Such models aim to
transform organisational structures, as well. Public
organisations, such as the parliament, could utilise
information systems' personalisation techniques. As
there are a lot of efforts to define the framework, the
methodology, the techniques, the platforms, and the
suitable models for digital technologies adoption in
public organisations, this paper aims to provide a
literature review for disruptive technology inclusive
use in parliaments. The review emphasises the
assessment of the applicability of the technologies,
their maturity and usefulness, user acceptance, their
performance, and their correlation to the adoption of
relevant innovative, inclusive organisational models.
It is argued that the efficient digital transformation
of democratic institutions, such as parliaments, with
the use of advanced e-governance tools and disruptive
technologies, requires strategic approaches for
adoption, acceptance, and inclusive service
adaptation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2023:MSA,
author = "Fan Liu and Jiandong Fang",
title = "Multi-Scale Audio Spectrogram Transformer for
Classroom Teaching Interaction Recognition",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "65",
day = "02",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020065",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/65",
abstract = "Classroom interactivity is one of the important
metrics for assessing classrooms, and identifying
classroom interactivity through classroom image data is
limited by the interference of complex teaching
scenarios. However, audio data within the classroom are
characterized by significant student--teacher
interaction. This study proposes a multi-scale audio
spectrogram transformer (MAST) speech scene
classification algorithm and constructs a classroom
interactive audio dataset to achieve interactive
teacher--student recognition in the classroom teaching
process. First, the original speech signal is sampled
and pre-processed to generate a multi-channel
spectrogram, which enhances the representation of
features compared with single-channel features; Second,
in order to efficiently capture the long-range global
context of the audio spectrogram, the audio features
are globally modeled by the multi-head self-attention
mechanism of MAST, and the feature resolution is
reduced during feature extraction to continuously
enrich the layer-level features while reducing the
model complexity; Finally, a further combination with a
time-frequency enrichment module maps the final output
to a class feature map, enabling accurate audio
category recognition. The experimental comparison of
MAST is carried out on the public environment audio
dataset and the self-built classroom audio interaction
datasets. Compared with the previous state-of-the-art
methods on public datasets AudioSet and ESC-50, its
accuracy has been improved by 3\% and 5\%,
respectively, and the accuracy of the self-built
classroom audio interaction dataset has reached 92.1\%.
These results demonstrate the effectiveness of MAST in
the field of general audio classification and the smart
classroom domain.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ahmad:2023:SCC,
author = "Nafi Ahmad and Abdul Wahab and John Schormans and Ali
Adib Arnab",
title = "Significance of Cross-Correlated {QoS} Configurations
for Validating the Subjective and Objective {QoE} of
Cloud Gaming Applications",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "64",
day = "02",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020064",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/64",
abstract = "In this paper, utilising real-internet traffic data,
we modified a popular network emulator to better
imitate real network traffic and studied its subjective
and objective implications on QoE for cloud-gaming
apps. Subjective QoE evaluation was then used to
compare cross-correlated QoS metric with the default
non-correlated emulator setup. Human test subjects
showed different correlated versus non-correlated QoS
parameters affects regarding cloud gaming QoE. Game-QoE
is influenced more by network degradation than video
QoE. To validate our subjective QoE study, we analysed
the experiment's video objectively. We tested how well
Full-Reference VQA measures subjective QoE. The
correlation between FR QoE and subjective MOS was
greater in non-correlated QoS than in correlated QoS
conditions. We also found that correlated scenarios had
more stuttering events compared to non-correlated
scenarios, resulting in lower game QoE.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Truyen:2023:VAR,
author = "Eddy Truyen and Hongjie Xie and Wouter Joosen",
title = "Vendor-Agnostic Reconfiguration of {Kubernetes}
Clusters in Cloud Federations",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "63",
day = "01",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020063",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/63",
abstract = "Kubernetes (K8s) defines standardized APIs for
container-based cluster orchestration such that it
becomes possible for application managers to deploy
their applications in a portable and interopable
manner. However, a practical problem arises when the
same application must be replicated in a distributed
fashion across different edge, fog and cloud sites;
namely, there will not exist a single K8s vendor that
is able to provision and manage K8s clusters across all
these sites. Hence, the problem of feature
incompatibility between different K8s vendors arises. A
large number of documented features in the open-source
distribution of K8s are optional features that are
turned off by default but can be activated by setting
specific combinations of parameters and plug-in
components in configuration manifests for the K8s
control plane and worker node agents. However, none of
these configuration manifests are standardized, giving
K8s vendors the freedom to hide the manifests behind a
single, more restricted, and proprietary customization
interface. Therefore, some optional K8s features cannot
be activated consistently across K8s vendors and
applications that require these features cannot be run
on those vendors. In this paper, we present a unified,
vendor-agnostic feature management approach for
consistently configuring optional K8s features across a
federation of clusters hosted by different Kubernetes
vendors. We describe vendor-agnostic reconfiguration
tactics that are already applied in industry and that
cover a wide range of optional K8s features. Based on
these tactics, we design and implement an autonomic
controller for declarative feature compatibility
management across a cluster federation. We found that
the features configured through our vendor-agnostic
approach have no impact on application performance when
compared with a cluster where the features are
configured using the configuration manifests of the
open-source K8s distribution. Moreover, the maximum
time to complete reconfiguration of a single feature is
within 100 seconds, which is 6 times faster than using
proprietary customization interfaces of mainstream K8s
vendors such as Google Kubernetes Engine. However,
there is a non-negligible disruption to running
applications when performing the reconfiguration to an
existing cluster; this disruption impact does not
appear using the proprietary customization methods of
the K8s vendors due to the use of rolling upgrade of
cluster nodes. Therefore, our approach is best applied
in the following three use cases: (i) when starting up
new K8s clusters, (ii) when optional K8s features of
existing clusters must be activated as quickly as
possibly and temporary disruption to running
applications can be tolerated or (iii) when proprietary
customization interfaces do not allow to activate the
desired optional feature.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alotaibi:2023:AML,
author = "Afnan Alotaibi and Murad A. Rassam",
title = "Adversarial Machine Learning Attacks against Intrusion
Detection Systems: a Survey on Strategies and Defense",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "62",
day = "31",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020062",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/62",
abstract = "Concerns about cybersecurity and attack methods have
risen in the information age. Many techniques are used
to detect or deter attacks, such as intrusion detection
systems (IDSs), that help achieve security goals, such
as detecting malicious attacks before they enter the
system and classifying them as malicious activities.
However, the IDS approaches have shortcomings in
misclassifying novel attacks or adapting to emerging
environments, affecting their accuracy and increasing
false alarms. To solve this problem, researchers have
recommended using machine learning approaches as
engines for IDSs to increase their efficacy.
Machine-learning techniques are supposed to
automatically detect the main distinctions between
normal and malicious data, even novel attacks, with
high accuracy. However, carefully designed adversarial
input perturbations during the training or testing
phases can significantly affect their predictions and
classifications. Adversarial machine learning (AML)
poses many cybersecurity threats in numerous sectors
that use machine-learning-based classification systems,
such as deceiving IDS to misclassify network packets.
Thus, this paper presents a survey of adversarial
machine-learning strategies and defenses. It starts by
highlighting various types of adversarial attacks that
can affect the IDS and then presents the defense
strategies to decrease or eliminate the influence of
these attacks. Finally, the gaps in the existing
literature and future research directions are
presented.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Avazov:2023:FFD,
author = "Kuldoshbay Avazov and An Eui Hyun and Alabdulwahab
Abrar Sami S and Azizbek Khaitov and Akmalbek
Bobomirzaevich Abdusalomov and Young Im Cho",
title = "Forest Fire Detection and Notification Method Based on
{AI} and {IoT} Approaches",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "61",
day = "31",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020061",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/61",
abstract = "There is a high risk of bushfire in spring and autumn,
when the air is dry. Do not bring any flammable
substances, such as matches or cigarettes. Cooking or
wood fires are permitted only in designated areas.
These are some of the regulations that are enforced
when hiking or going to a vegetated forest. However,
humans tend to disobey or disregard guidelines and the
law. Therefore, to preemptively stop people from
accidentally starting a fire, we created a technique
that will allow early fire detection and classification
to ensure the utmost safety of the living things in the
forest. Some relevant studies on forest fire detection
have been conducted in the past few years. However,
there are still insufficient studies on early fire
detection and notification systems for monitoring fire
disasters in real time using advanced approaches.
Therefore, we came up with a solution using the
convergence of the Internet of Things (IoT) and You
Only Look Once Version 5 (YOLOv5). The experimental
results show that IoT devices were able to validate
some of the falsely detected fires or undetected fires
that YOLOv5 reported. This report is recorded and sent
to the fire department for further verification and
validation. Finally, we compared the performance of our
method with those of recently reported fire detection
approaches employing widely used performance matrices
to test the achieved fire classification results.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mokrov:2023:PAC,
author = "Evgeni Mokrov and Konstantin Samouylov",
title = "Performance Assessment and Comparison of Deployment
Options for {5G} Millimeter Wave Systems",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "60",
day = "31",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020060",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/60",
abstract = "The roll-outs of fifth-generation (5G) New Radio (NR)
systems operating in the millimeter-wave (mmWave)
frequency band are essential for satisfying IMT-2020
requirements set forth by ITU-R in terms of the data
rate at the access interface. To overcome
mmWave-specific propagation phenomena, a number of
radio access network densification options have been
proposed, including a conventional base station (BS) as
well as integrated access and backhaul (IAB) with
terrestrial and aerial IAB nodes. The aim of this paper
is to qualitatively and quantitatively compare the
proposed deployments using coverage, spectral
efficiency and BS density as the main metrics of
interest. To this end, we develop a model capturing the
specifics of various deployment options. Our numerical
results demonstrate that, while the implementation of
terrestrial relaying nodes potentially improves
coverage and spectral efficiency, aerial relays provide
the highest coverage, three times that of a direct link
connection, and also significantly reduce the required
BS density. The main benefit is provided by the link
between the BS and the aerial relay. However, gains are
highly dependent on a number of elements in antenna
arrays and targeted outage probability. The use of
terrestrial relays can be considered a natural
trade-off between coverage and the aggregate rate.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Maaradji:2023:SCM,
author = "Abderrahmane Maaradji and Hakim Hacid and Assia
Soukane",
title = "From Service Composition to {Mashup Editor}: a
Multiperspective Taxonomy",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "59",
day = "31",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020059",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/59",
abstract = "Service-oriented computing has become a popular area
of research, with a particular focus on service
composition. There have been many developments in this
field, such as new techniques for data engineering in
service description languages, protocols for
publication and discovery, the optimization of service
selection and scheduling, and the deployment and
monitoring of composed services. However, this
diversity of approaches and methodologies can make it
challenging to navigate between different proposed
solutions and identify research gaps. In order to
provide a clearer understanding of this body of work,
this paper presents a comprehensive framework for the
taxonomy of service composition approaches,
methodologies, and tools. This framework proposes a
structured view of different perspectives, such as
formal, semantic, and automatic approaches, with a
particular focus on the end-user's perspective and
tools such as Mashups.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ferreira:2023:OPT,
author = "Eduardo Ferreira and Pedro Sebasti{\~a}o and Francisco
Cercas and Carlos S{\'a} Costa and Am{\'e}rico
Correia",
title = "An Optimized Planning Tool for Microwave Terrestrial
and Satellite Link Design",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "58",
day = "31",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020058",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/58",
abstract = "Today, the internet is fundamental to social
inclusion. There are many people that live in remote
areas, and the only way to supply internet services is
through the use of microwave terrestrial and satellite
systems. Thus, it is important to have efficient tools
to design and optimize these systems. In this paper, a
tool with the objective to shorten the time spent in
the design process of microwave terrestrial and
satellite point-to-point links is presented. This tool
can be applied in academia by engineering students,
providing an extended analysis of many sections of a
link project design, as well as in professional
practice by telecommunication engineering departments,
presenting a concise step-by-step interactive design
process. This tool uses three-dimensional world
visualization, with the Cesium Application Programming
Interface (API), to display and analyze site-specific
characteristics that can disrupt the link's quality of
service (QoS). Using this visualization, two
ray-tracing algorithms were developed to analyze signal
diffraction and reflection mainly throughout
terrestrial links. Using this new algorithm, an
innovative process for signal diffraction and
reflection calculations was created. Using updated
standards provided by the International
Telecommunication Union Radiocommunication Sector
(ITU-R), the characteristics of the defined simulated
links could be predicted, thus providing the user with
the metrics of signal quality and system link budget.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Nekovee:2023:VET,
author = "Maziar Nekovee and Ferheen Ayaz",
title = "Vision, Enabling Technologies, and Scenarios for a
{6G}-Enabled {Internet of Verticals (6G-IoV)}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "57",
day = "30",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020057",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/57",
abstract = "5G is the critical mobile infrastructure required to
both enable and accelerate the full digital
transformation of vertical sectors. While the 5G for
vertical sectors is aiming at connectivity requirements
of specific verticals, such as manufacturing,
automotive and energy, we envisage that in the longer
term the expansion of wide area cellular connectivity
to these sectors will pave the way for a transformation
to a new Internet of Verticals (IoV) in the 6G era,
which we call 6G-IoV. In this paper, we describe our
vision of 6G-IoV and examine its emerging and future
architectural and networking enablers. We then
illustrate our vision by describing a number of future
scenarios of the 6G-IoV, namely the Internet of Cloud
Manufacturing accounting for around 25\% of digital
services and products, the Internet of Robotics to
cater the challenges of the growing number of robotics
and expected 7\% increase in usage over the coming
years and the Internet of Smart Energy Grids for
net-zero energy balance and shifting to 100\%
dependence on the renewables of energy generation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chen:2023:EEH,
author = "Yonghong Chen and Lei Xun and Shibing Zhang",
title = "The Energy Efficiency of Heterogeneous Cellular
Networks Based on the {Poisson} Hole Process",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "2",
pages = "56",
day = "30",
month = jan,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15020056",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Feb 27 09:26:59 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/2/56",
abstract = "In order to decrease energy consumption caused by the
dense deployment of pico base stations (PBSs) in
heterogeneous cellular networks (HetNets), this paper
first analyzes the energy efficiency (EE) of two-tier
HetNets and then proposes a method to maximize the
network EE by adjusting the PBS transmit power. The
two-tier HetNets are modeled by the Poisson point
process (PPP) and the Poisson hole process (PHP), and
then the coverage probability of the macro base station
(MBS) and the PBS in the two-tier HetNets is derived
based on the mean interference to signal ratio (MISR).
According to the user association probability, the
coverage probability of the PPP-PHP HetNets is
obtained. Then, the tractable expression of the average
achievable rate is deduced on the basis of the
relationship between the coverage probability and the
average achievable rate. Finally, the expression of EE
is derived and the EE optimization algorithm is
proposed based on the PBS transmit power. The
simulation results show that the PPP-PHP network is
superior to the PPP-PPP network in terms of coverage
probability and EE, and the network EE can be
effectively improved by setting an appropriate PBS
transmit power.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cho:2023:AIB,
author = "Hsin-Hung Cho and Wei-Che Chien and Fan-Hsun Tseng and
Han-Chieh Chao",
title = "Artificial-Intelligence-Based Charger Deployment in
Wireless Rechargeable Sensor Networks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "117",
day = "22",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030117",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/117",
abstract = "To extend a network's lifetime, wireless rechargeable
sensor networks are promising solutions. Chargers can
be deployed to replenish energy for the sensors.
However, deployment cost will increase when the number
of chargers increases. Many metrics may affect the
final policy for charger deployment, such as distance,
the power requirement of the sensors and transmission
radius, which makes the charger deployment problem very
complex and difficult to solve. In this paper, we
propose an efficient method for determining the field
of interest (FoI) in which to find suitable candidate
positions of chargers with lower computational costs.
In addition, we designed four metaheuristic algorithms
to address the local optima problem. Since we know that
metaheuristic algorithms always require more
computational costs for escaping local optima, we
designed a new framework to reduce the searching space
effectively. The simulation results show that the
proposed method can achieve the best price--performance
ratio.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Emad-Ud-Din:2023:IOS,
author = "Muhammad Emad-Ud-Din and Ya Wang",
title = "Indoor Occupancy Sensing via Networked Nodes
(2012--2022): a Review",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "116",
day = "22",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030116",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/116",
abstract = "In the past decade, different sensing mechanisms and
algorithms have been developed to detect or estimate
indoor occupancy. One of the most recent advancements
is using networked sensor nodes to create a more
comprehensive occupancy detection system where multiple
sensors can identify human presence within more
expansive areas while delivering enhanced accuracy
compared to a system that relies on stand-alone sensor
nodes. The present work reviews the studies from 2012
to 2022 that use networked sensor nodes to detect
indoor occupancy, focusing on PIR-based sensors.
Methods are compared based on pivotal ADPs that play a
significant role in selecting an occupancy detection
system for applications such as Health and Safety or
occupant comfort. These parameters include accuracy,
information requirement, maximum sensor failure and
minimum observation rate, and feasible detection area.
We briefly describe the overview of occupancy detection
criteria used by each study and introduce a metric
called ``sensor node deployment density'' through our
analysis. This metric captures the strength of
network-level data filtering and fusion algorithms
found in the literature. It is hinged on the fact that
a robust occupancy estimation algorithm requires a
minimal number of nodes to estimate occupancy. This
review only focuses on the occupancy estimation models
for networked sensor nodes. It thus provides a
standardized insight into networked nodes' occupancy
sensing pipelines, which employ data fusion strategies,
network-level machine learning algorithms, and
occupancy estimation algorithms. This review thus helps
determine the suitability of the reviewed methods to a
standard set of application areas by analyzing their
gaps.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Serrano:2023:PNM,
author = "Salvatore Serrano and Marco Scarpa",
title = "A {Petri} Net Model for Cognitive Radio {Internet of
Things} Networks Exploiting {GSM} Bands",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "115",
day = "21",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030115",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/115",
abstract = "Quality of service (QoS) is a crucial requirement in
distributed applications. Internet of Things
architectures have become a widely used approach in
many application domains, from Industry 4.0 to smart
agriculture; thus, it is crucial to develop appropriate
methodologies for managing QoS in such contexts. In an
overcrowded spectrum scenario, cognitive radio
technology could be an effective methodology for
improving QoS requirements. In order to evaluate QoS in
the context of a cognitive radio Internet of Things
network, we propose a Petri net-based model that
evaluates the cognitive radio environment and operates
in a 200 kHz GSM/EDGE transponder band. The model is
quite flexible as it considers several circuit and
packet switching primary user network loads and
configurations and several secondary user types of
services (that involve semantic transparency or time
transparency); furthermore, it is able to take into
account mistakes of the spectrum sensing algorithm used
by secondary users. Specifically, we derive the
distribution of the response time perceived by the
secondary users, where it is then possible to obtain an
estimation of both the maximum throughput and jitter.
The proposed cognitive radio scenario considers a
secondary user synchronized access to the channel when
using the GSM/EDGE frame structure.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Shi:2023:RST,
author = "Qi Shi and Daheng Wang and Wen Chen and Jinpei Yu and
Weiting Zhou and Jun Zou and Guangzu Liu",
title = "Research on Spaceborne Target Detection Based on
{Yolov5} and Image Compression",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "114",
day = "19",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030114",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/114",
abstract = "Satellite image compression technology plays an
important role in the development of space science. As
optical sensors on satellites become more
sophisticated, high-resolution and high-fidelity
satellite images will occupy more storage. This raises
the required transmission bandwidth and transmission
rate in the satellite--ground data transmission system.
In order to reduce the pressure from image transmission
on the data transmission system, a spaceborne target
detection system based on Yolov5 and a satellite image
compression transmission system is proposed in this
paper. It can reduce the pressure on the data
transmission system by detecting the object of interest
and deciding whether to transmit. An improved Yolov5
network is proposed to detect the small target on the
high-resolution satellite image. Simulation results
show that the improved Yolov5 network proposed in this
paper can detect specific targets in real satellite
images, including aircraft, ships, etc. At the same
time, image compression has little effect on target
detection, so detection complexity can be effectively
reduced and detection speed can be improved by
detecting the compressed images.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Federico:2023:CEA,
author = "Gemma {Di Federico} and Andrea Burattin",
title = "{CvAMoS} --- Event Abstraction Using Contextual
Information",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "113",
day = "18",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030113",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/113",
abstract = "Process mining analyzes events that are logged during
the execution of a process, with the aim of gathering
useful information and knowledge. Process discovery
algorithms derive process models that represent these
processes. The level of abstraction at which the
process model is represented is reflected in the
granularity of the event log. When a process is
captured by the usage of sensor systems, process
activities are recorded at the sensor-level in the form
of sensor readings, and are therefore too fine-grained
and non-explanatory. To increase the understandability
of the process model, events need to be abstracted into
higher-level activities that provide a more meaningful
representation of the process. The abstraction becomes
more relevant and challenging when the process involves
human behavior, as the flexible nature of human actions
can make it harder to identify and abstract meaningful
activities. This paper proposes CvAMoS, a trace-based
approach for event abstraction, which focuses on
identifying motifs while taking context into account. A
motif is a recurring sequence of events that represents
an activity that took place under specific
circumstances depicted by the context. Context
information is logged in the event log in the form of
environmental sensor readings (e.g., the temperature
and light sensors). The presented algorithm uses a
distance function to deal with the variability in the
execution of activities. The result is a set of
meaningful and interpretable motifs. The algorithm has
been tested on both synthetic and real datasets, and
compared to the state of the art. CvAMoS is implemented
as a Java application and the code is freely
available.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Schnell:2023:DSW,
author = "Karen Schnell and Kaushik Roy and Madhuri Siddula",
title = "A Descriptive Study of Webpage Designs for Posting
Privacy Policies for Different-Sized {US} Hospitals to
Create an Assessment Framework",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "112",
day = "17",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030112",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/112",
abstract = "In the United States, there are laws and standards
guiding how people should be informed about the use of
their private data. However, the challenge of
communicating these guidelines to the na{\"\i}ve user
is still at its peak. Research has shown that the
willingness to read privacy statements is influenced by
attitudes toward privacy risks and privacy benefits.
Many websites publish privacy policies somewhere on
their web pages, and it can be difficult to navigate to
them. In the healthcare field, research has found that
health information websites' key information is
presented poorly and inconsistently. For the policies
to be legally binding, a person must be able to find
them. In the healthcare industry, where sensitive data
are being collected, research on how a user navigates
to privacy policies for different size hospital
websites is limited. Studies exist about privacy
policies or website design and not both. This
descriptive study involved ascertaining commonalities
and differences among different-sized hospitals'
website designs for supporting privacy policies. A
foundation framework was created using Web Content
Accessibility Guidelines (WGAC) principles and the
literature review findings for evaluating practices for
website publishing of privacy policies. The results
demonstrated a very low variance in the website design
concepts employed by hospitals to publish their privacy
policy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bajaj:2023:CDD,
author = "Ruhi Kiran Bajaj and Rebecca Mary Meiring and Fernando
Beltran",
title = "Co-Design, Development, and Evaluation of a Health
Monitoring Tool Using Smartwatch Data: A
Proof-of-Concept Study",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "111",
day = "17",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030111",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/111",
abstract = "Computational analysis and integration of smartwatch
data with Electronic Medical Records (EMR) present
potential uses in preventing, diagnosing, and managing
chronic diseases. One of the key requirements for the
successful clinical application of smartwatch data is
understanding healthcare professional (HCP)
perspectives on whether these devices can play a role
in preventive care. Gaining insights from the vast
amount of smartwatch data is a challenge for HCPs, thus
tools are needed to support HCPs when integrating
personalized health monitoring devices with EMR. This
study aimed to develop and evaluate an application
prototype, co-designed with HCPs and employing design
science research methodology and diffusion of
innovation frameworks to identify the potential for
clinical integration. A machine learning algorithm was
developed to detect possible health anomalies in
smartwatch data, and these were presented visually to
HCPs in a web-based platform. HCPs completed a
usability questionnaire to evaluate the prototype, and
over 60\% of HCPs scored positively on usability. This
preliminary study tested the proposed research to solve
the practical challenges of HCP in interpreting
smartwatch data before fully integrating smartwatches
into the EMR. The findings provide design directions
for future applications that use smartwatch data to
improve clinical decision-making and reduce HCP
workloads.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wu:2023:CAE,
author = "Zixiu Wu and Simone Balloccu and Vivek Kumar and Rim
Helaoui and Diego Reforgiato Recupero and Daniele
Riboni",
title = "Creation, Analysis and Evaluation of {AnnoMI}, a
Dataset of Expert-Annotated Counselling Dialogues",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "110",
day = "14",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030110",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/110",
abstract = "Research on the analysis of counselling conversations
through natural language processing methods has seen
remarkable growth in recent years. However, the
potential of this field is still greatly limited by the
lack of access to publicly available therapy dialogues,
especially those with expert annotations, but it has
been alleviated thanks to the recent release of AnnoMI,
the first publicly and freely available conversation
dataset of 133 faithfully transcribed and
expert-annotated demonstrations of high- and
low-quality motivational interviewing (MI)---an
effective therapy strategy that evokes client
motivation for positive change. In this work, we
introduce new expert-annotated utterance attributes to
AnnoMI and describe the entire data collection process
in more detail, including dialogue source selection,
transcription, annotation, and post-processing. Based
on the expert annotations on key MI aspects, we carry
out thorough analyses of AnnoMI with respect to
counselling-related properties on the utterance,
conversation, and corpus levels. Furthermore, we
introduce utterance-level prediction tasks with
potential real-world impacts and build baseline models.
Finally, we examine the performance of the models on
dialogues of different topics and probe the
generalisability of the models to unseen topics.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mangler:2023:DXE,
author = "Juergen Mangler and Joscha Gr{\"u}ger and Lukas
Malburg and Matthias Ehrendorfer and Yannis Bertrand
and Janik-Vasily Benzin and Stefanie Rinderle-Ma and
Estefania Serral Asensio and Ralph Bergmann",
title = "{DataStream} {XES} Extension: Embedding {IoT} Sensor
Data into Extensible Event Stream Logs",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "109",
day = "14",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030109",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/109",
abstract = "The Internet of Things (IoT) has been shown to be very
valuable for Business Process Management (BPM), for
example, to better track and control process
executions. While IoT actuators can automatically
trigger actions, IoT sensors can monitor the changes in
the environment and the humans involved in the
processes. These sensors produce large amounts of
discrete and continuous data streams, which hold the
key to understanding the quality of the executed
processes. However, to enable this understanding, it is
needed to have a joint representation of the data
generated by the process engine executing the process,
and the data generated by the IoT sensors. In this
paper, we present an extension of the event log
standard format XES called DataStream. DataStream
enables the connection of IoT data to process events,
preserving the full context required for data analysis,
even when scenarios or hardware artifacts are rapidly
changing. The DataStream extension is designed based on
a set of goals and evaluated by creating two datasets
for real-world scenarios from the
transportation/logistics and manufacturing domains.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sultana:2023:NHE,
author = "Habiba Sultana and A. H. M. Kamal and Gahangir Hossain
and Muhammad Ashad Kabir",
title = "A Novel Hybrid Edge Detection and {LBP} Code-Based
Robust Image Steganography Method",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "108",
day = "10",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030108",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/108",
abstract = "In digital image processing and steganography, images
are often described using edges and local binary
pattern (LBP) codes. By combining these two properties,
a novel hybrid image steganography method of secret
embedding is proposed in this paper. This method only
employs edge pixels that influence how well the novel
approach embeds data. To increase the quantity of
computed edge pixels, several edge detectors are
applied and hybridized using a logical OR operation. A
morphological dilation procedure in the hybridized edge
image is employed to this purpose. The least
significant bits (LSB) and all LBP codes are calculated
for edge pixels. Afterward, these LBP codes, LSBs, and
secret bits using an exclusive-OR operation are merged.
These resulting implanted bits are delivered to edge
pixels' LSBs. The experimental results show that the
suggested approach outperforms current strategies in
terms of measuring perceptual transparency, such as
peak signal-to-noise ratio (PSNR) and structural
similarity index (SSI). The embedding capacity per
tempered pixel in the proposed approach is also
substantial. Its embedding guidelines protect the
privacy of implanted data. The entropy, correlation
coefficient, cosine similarity, and pixel difference
histogram data show that our proposed method is more
resistant to various types of cyber-attacks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Capkovic:2023:DDI,
author = "Frantisek Capkovic",
title = "Dealing with Deadlocks in Industrial Multi Agent
Systems",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "107",
day = "09",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030107",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/107",
abstract = "Automated Manufacturing Systems (AMS) consisting of
many cooperating devices incorporated into multiple
cooperating production lines, sharing common resources,
represent industrial Multi-Agent Systems (MAS).
Deadlocks may occur during operation of such MAS. It is
necessary to deal with deadlocks (more precisely said,
to prevent them) to ensure the correct behavior of AMS.
For this purpose, among other methods, methods based on
Petri nets (PN) are used too. Because AMS are very
often described by PN models, two PN-based methods will
be presented here, namely based on (i) PN place
invariants (P-invariants); and (ii) PN siphons and
traps. Intended final results of usage these methods is
finding a supervisor allowing a deadlock-free activity
of the global MAS. While the former method yields
results in analytical terms, latter one need
computation of siphons and traps.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Boumechaal:2023:CQQ,
author = "Hasna Boumechaal and Zizette Boufaida",
title = "Complex Queries for Querying Linked Data",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "106",
day = "09",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030106",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/106",
abstract = "Querying Linked Data is one of the most important
issues for the semantic web community today because it
requires the user to understand the structure and
vocabularies used in various data sources. Furthermore,
users must be familiar with the syntax of query
languages, such as SPARQL. However, because users are
accustomed to natural language-based search, novice
users may find it challenging to use these features. As
a result, new approaches for querying Linked Data
sources on the web with NL queries must be defined. In
this paper, we propose a novel system for converting
natural language queries into SPARQL queries to query
linked and heterogeneous semantic data on the web.
While most existing methods have focused on simple
queries and have ignored complex queries, the method
described in this work aims to handle various types of
NL queries, particularly complex queries containing
negation, numbers, superlatives, and comparative
adjectives. Three complementary strategies are used in
this context: (1) identifying the semantic relations
between query terms in order to understand the user's
needs; (2) mapping the NL terms to semantic entities;
and (3) constructing the query's valid triples based on
the different links used to describe the identified
entities in order to generate correct SPARQL queries.
The empirical evaluations show that the proposed system
is effective.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Andrade:2023:BBS,
author = "Daniel Andrade and Roberto Magueta and Ad{\~a}o Silva
and Paulo Marques",
title = "Beamforming Based on a {SSS} Angle Estimation
Algorithm for {5G} {NR} Networks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "105",
day = "09",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030105",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/105",
abstract = "The current 5G-NR standard includes the transmission
of multiple synchronization signal blocks (SSBs) in
different directions to be exploited in beamforming
techniques. However, choosing a pair of these beams
leads to performance degradation, mainly for the cases
where the transmit and receive beams are not aligned,
because it considers that only few fixed directions
among wide beams are established. Therefore, in this
article, we design a new 3GPP-standard- compliant beam
pair selection algorithm based on secondary
synchronization signal (SSS) angle estimation (BSAE)
that makes use of multiple synchronization signal
blocks (SSBs) to maximize the reference signal received
power (RSRP) value at the receiver. This optimization
is performed using the SSSs present in each SSB to
perform channel estimation in the digital domain.
Afterwards, the combination of those estimations is
used to perform equivalent channel propagation matrix
estimation without the analog processing effects.
Finally, through the estimated channel propagation
matrix, the angle that maximizes the RSRP is determined
to compute the most suitable beam. The proposed
algorithm was evaluated and compared with a
conventional beam pair selection algorithm. Ours has
better performance results. Furthermore, the proposed
algorithm achieved performance close to the optimal
performance, where all channel state information (CSI)
is available, emphasizing the interest of the proposed
approach for practical 5G mmWave mMIMO
implementations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Iqbal:2023:OTE,
author = "Mansoor Iqbal and Zahid Ullah and Izaz Ahmad Khan and
Sheraz Aslam and Haris Shaheer and Mujtaba Humayon and
Muhammad Asjad Salahuddin and Adeel Mehmood",
title = "Optimizing Task Execution: The Impact of Dynamic Time
Quantum and Priorities on Round {Robin} Scheduling",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "104",
day = "08",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030104",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/104",
abstract = "Task scheduling algorithms are crucial for optimizing
the utilization of computing resources. This work
proposes a unique approach for improving task execution
in real-time systems using an enhanced Round Robin
scheduling algorithm variant incorporating dynamic time
quantum and priority. The proposed algorithm adjusts
the time slice allocated to each task based on
execution time and priority, resulting in more
efficient resource utilization. We also prioritize
higher-priority tasks and execute them as soon as they
arrive in the ready queue, ensuring the timely
completion of critical tasks. We evaluate the
performance of our algorithm using a set of real-world
tasks and compare it with traditional Round Robin
scheduling. The results show that our proposed approach
significantly improves task execution time and resource
utilization compared to conventional Round Robin
scheduling. Our approach offers a promising solution
for optimizing task execution in real-time systems. The
combination of dynamic time quantum and priorities adds
a unique element to the existing literature in this
field.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alfian:2023:URF,
author = "Ganjar Alfian and Muhammad Syafrudin and Norma Latif
Fitriyani and Sahirul Alam and Dinar Nugroho Pratomo
and Lukman Subekti and Muhammad Qois Huzyan Octava and
Ninis Dyah Yulianingsih and Fransiskus Tatas Dwi Atmaji
and Filip Benes",
title = "Utilizing Random Forest with {iForest}-Based Outlier
Detection and {SMOTE} to Detect Movement and Direction
of {RFID} Tags",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "103",
day = "08",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030103",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/103",
abstract = "In recent years, radio frequency identification (RFID)
technology has been utilized to monitor product
movements within a supply chain in real time. By
utilizing RFID technology, the products can be tracked
automatically in real-time. However, the RFID cannot
detect the movement and direction of the tag. This
study investigates the performance of machine learning
(ML) algorithms to detect the movement and direction of
passive RFID tags. The dataset utilized in this study
was created by considering a variety of conceivable tag
motions and directions that may occur in actual
warehouse settings, such as going inside and out of the
gate, moving close to the gate, turning around, and
static tags. The statistical features are derived from
the received signal strength (RSS) and the timestamp of
tags. Our proposed model combined Isolation Forest
(iForest) outlier detection, Synthetic Minority Over
Sampling Technique (SMOTE) and Random Forest (RF) has
shown the highest accuracy up to 94.251\% as compared
to other ML models in detecting the movement and
direction of RFID tags. In addition, we demonstrated
the proposed classification model could be applied to a
web-based monitoring system, so that tagged products
that move in or out through a gate can be correctly
identified. This study is expected to improve the RFID
gate on detecting the status of products (being
received or delivered) automatically.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2023:IPA,
author = "Juan Wang and Jing Zhong and Jiangqi Li",
title = "{IoT}-Portrait: Automatically Identifying {IoT}
Devices via Transformer with Incremental Learning",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "102",
day = "07",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030102",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/102",
abstract = "With the development of IoT, IoT devices have
proliferated. With the increasing demands of network
management and security evaluation, automatic
identification of IoT devices becomes necessary.
However, existing works require a lot of manual effort
and face the challenge of catastrophic forgetting. In
this paper, we propose IoT-Portrait, an automatic IoT
device identification framework based on a transformer
network. IoT-Portrait automatically acquires
information about IoT devices as labels and learns the
traffic behavior characteristics of devices through a
transformer neural network. Furthermore, for privacy
protection and overhead reasons, it is not easy to save
all past samples to retrain the classification model
when new devices join the network. Therefore, we use a
class incremental learning method to train the new
model to preserve old classes' features while learning
new devices' features. We implement a prototype of
IoT-Portrait based on our lab environment and
open-source database. Experimental results show that
IoT-Portrait achieves a high identification rate of up
to 99\% and is well resistant to catastrophic
forgetting with a negligible added cost both in memory
and time. It indicates that IoT-Portrait can classify
IoT devices effectively and continuously.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liang:2023:RAB,
author = "Haoming Liang and Jinze Du and Hongchen Zhang and Bing
Han and Yan Ma",
title = "Relational Action Bank with Semantic--Visual Attention
for Few-Shot Action Recognition",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "101",
day = "03",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030101",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/101",
abstract = "Recently, few-shot learning has attracted significant
attention in the field of video action recognition,
owing to its data-efficient learning paradigm. Despite
the encouraging progress, identifying ways to further
improve the few-shot learning performance by exploring
additional or auxiliary information for video action
recognition remains an ongoing challenge. To address
this problem, in this paper we make the first attempt
to propose a relational action bank with
semantic--visual attention for few-shot action
recognition. Specifically, we introduce a relational
action bank as the auxiliary library to assist the
network in understanding the actions in novel classes.
Meanwhile, the semantic--visual attention is devised to
adaptively capture the connections to the foregone
actions via both semantic correlation and visual
similarity. We extensively evaluate our approach via
two backbone models (ResNet-50 and C3D) on HMDB and
Kinetics datasets, and demonstrate that the proposed
model can obtain significantly better performance
compared against state-of-the-art methods. Notably, our
results demonstrate an average improvement of about
6.2\% when compared to the second-best method on the
Kinetics dataset.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Abikoye:2023:SCU,
author = "Oluwakemi Christiana Abikoye and Esau Taiwo Oladipupo
and Agbotiname Lucky Imoize and Joseph Bamidele
Awotunde and Cheng-Chi Lee and Chun-Ta Li",
title = "Securing Critical User Information over the {Internet
of Medical Things} Platforms Using a Hybrid
Cryptography Scheme",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "99",
day = "28",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030099",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/99",
abstract = "The application of the Internet of Medical Things
(IoMT) in medical systems has brought much ease in
discharging healthcare services by medical
practitioners. However, the security and privacy
preservation of critical user data remain the reason
the technology has not yet been fully maximized.
Undoubtedly, a secure IoMT model that preserves
individual users' privacy will enhance the wide
acceptability of IoMT technology. However, existing
works that have attempted to solve these privacy and
insecurity problems are not space-conservative,
computationally intensive, and also vulnerable to
security attacks. In this paper, an IoMT-based model
that conserves the privacy of the data, is less
computationally intensive, and is resistant to various
cryptanalysis attacks is proposed. Specifically, an
efficient privacy-preserving technique where an
efficient searching algorithm through encrypted data
was used and a hybrid cryptography algorithm that
combines the modification of the Caesar cipher with the
Elliptic Curve Diffie Hellman (ECDH) and Digital
Signature Algorithm (DSA) were projected to achieve
user data security and privacy preservation of the
patient. Furthermore, the modified algorithm can secure
messages during transmission, perform key exchanges
between clients and healthcare centres, and guarantee
user authentication by authorized healthcare centres.
The proposed IoMT model, leveraging the hybrid
cryptography algorithm, was analysed and compared
against different security attacks. The analysis
results revealed that the model is secure, preserves
the privacy of critical user information, and shows
robust resistance against different cryptanalysis
attacks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rangelov:2023:TIM,
author = "Denis Rangelov and Philipp L{\"a}mmel and Lisa Brunzel
and Stephan Borgert and Paul Darius and Nikolay
Tcholtchev and Michell Boerger",
title = "Towards an Integrated Methodology and Toolchain for
Machine Learning-Based Intrusion Detection in Urban
{IoT} Networks and Platforms",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "98",
day = "28",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030098",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/98",
abstract = "The constant increase in volume and wide variety of
available Internet of Things (IoT) devices leads to
highly diverse software and hardware stacks, which
opens new avenues for exploiting previously unknown
vulnerabilities. The ensuing risks are amplified by the
inherent IoT resource constraints both in terms of
performance and energy expenditure. At the same time,
IoT devices often generate or collect sensitive,
real-time data used in critical application scenarios
(e.g., health monitoring, transportation, smart energy,
etc.). All these factors combined make IoT networks a
primary target and potential victim of malicious
actors. In this paper, we presented a brief overview of
existing attacks and defense strategies and used this
as motivation for proposing an integrated methodology
for developing protection mechanisms for smart city IoT
networks. The goal of this work was to lay out a
theoretical plan and a corresponding pipeline of steps,
i.e., a development and implementation process, for the
design and application of cybersecurity solutions for
urban IoT networks. The end goal of following the
proposed process is the deployment and continuous
improvement of appropriate IoT security measures in
real-world urban IoT infrastructures. The application
of the methodology was exemplified on an
OMNET++-simulated scenario, which was developed in
collaboration with industrial partners and a
municipality.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Asif:2023:IBB,
author = "Rameez Asif and Syed Raheel Hassan and Gerard Parr",
title = "Integrating a Blockchain-Based Governance Framework
for Responsible {AI}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "97",
day = "28",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030097",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/97",
abstract = "This research paper reviews the potential of smart
contracts for responsible AI with a focus on
frameworks, hardware, energy efficiency, and
cyberattacks. Smart contracts are digital agreements
that are executed by a blockchain, and they have the
potential to revolutionize the way we conduct business
by increasing transparency and trust. When it comes to
responsible AI systems, smart contracts can play a
crucial role in ensuring that the terms and conditions
of the contract are fair and transparent as well as
that any automated decision-making is explainable and
auditable. Furthermore, the energy consumption of
blockchain networks has been a matter of concern; this
article explores the energy efficiency element of smart
contracts. Energy efficiency in smart contracts may be
enhanced by the use of techniques such as off-chain
processing and sharding. The study emphasises the need
for careful auditing and testing of smart contract code
in order to protect against cyberattacks along with the
use of secure libraries and frameworks to lessen the
likelihood of smart contract vulnerabilities.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Singh:2023:BEC,
author = "Raman Singh and Sean Sturley and Hitesh Tewari",
title = "Blockchain-Enabled {Chebyshev} Polynomial-Based Group
Authentication for Secure Communication in an {Internet
of Things} Network",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "96",
day = "28",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030096",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/96",
abstract = "The utilization of Internet of Things (IoT) devices in
various smart city and industrial applications is
growing rapidly. Within a trusted authority (TA), such
as an industry or smart city, all IoT devices are
closely monitored in a controlled infrastructure.
However, in cases where an IoT device from one TA needs
to communicate with another IoT device from a different
TA, the trust establishment between these devices
becomes extremely important. Obtaining a digital
certificate from a certificate authority for each IoT
device can be expensive. To solve this issue, a group
authentication framework is proposed that can establish
trust between group IoT devices owned by different
entities. The Chebyshev polynomial has many important
properties, semigroup is one of the most important.
These properties make the Chebyshev polynomial a good
candidate for the proposed group authentication
mechanism. The secure exchange of information between
trusted authorities is supported by Blockchain
technology. The proposed framework was implemented and
tested using Python and deployed on Blockchain using
Ethereum's Goerli's testnet. The results show that the
proposed framework can reasonably use Chebyshev
polynomials with degrees up to four digits in length.
The values of various parameters related to Blockchain
are also discussed to understand the usability of the
proposed framework.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ntafloukas:2023:VAA,
author = "Konstantinos Ntafloukas and Liliana Pasquale and
Beatriz Martinez-Pastor and Daniel P. McCrum",
title = "A Vulnerability Assessment Approach for Transportation
Networks Subjected to Cyber--Physical Attacks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "100",
day = "28",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030100",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/100",
abstract = "Transportation networks are fundamental to the
efficient and safe functioning of modern societies. In
the past, physical and cyber space were treated as
isolated environments, resulting in transportation
network being considered vulnerable only to threats
from the physical space (e.g., natural hazards). The
integration of Internet of Things-based wireless sensor
networks into the sensing layer of critical
transportation infrastructure has resulted in
transportation networks becoming susceptible to
cyber--physical attacks due to the inherent
vulnerabilities of IoT devices. However, current
vulnerability assessment methods lack details related
to the integration of the cyber and physical space in
transportation networks. In this paper, we propose a
new vulnerability assessment approach for
transportation networks subjected to cyber--physical
attacks at the sensing layer. The novelty of the
approach used relies on the combination of the physical
and cyber space, using a Bayesian network attack graph
that enables the probabilistic modelling of
vulnerability states in both spaces. A new probability
indicator is proposed to enable the assignment of
probability scores to vulnerability states, considering
different attacker profile characteristics and control
barriers. A probability-based ranking table is
developed that details the most vulnerable nodes of the
graph. The vulnerability of the transportation network
is measured as a drop in network efficiency after the
removal of the highest probability-based ranked nodes.
We demonstrate the application of the approach by
studying the vulnerability of a transportation network
case study to a cyber--physical attack at the sensing
layer. Monte Carlo simulations and sensitivity analysis
are performed as methods to evaluate the results. The
results indicate that the vulnerability of the
transportation network depends to a large extent on the
successful exploitation of vulnerabilities, both in the
cyber and physical space. Additionally, we demonstrate
the usefulness of the proposed approach by comparing
the results with other currently available methods. The
approach is of interest to stakeholders who are
attempting to incorporate the cyber domain into the
vulnerability assessment procedures of their system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Berardi:2023:WOT,
author = "Davide Berardi and Franco Callegati and Andrea Giovine
and Andrea Melis and Marco Prandini and Lorenzo
Rinieri",
title = "When Operation Technology Meets Information
Technology: Challenges and Opportunities",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "95",
day = "27",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030095",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/95",
abstract = "Industry 4.0 has revolutionized process innovation
while facilitating and encouraging many new
possibilities. The objective of Industry 4.0 is the
radical enhancement of productivity, a goal that
presupposes the integration of Operational Technology
(OT) networks with Information Technology (IT)
networks, which were hitherto isolated. This disruptive
approach is enabled by adopting several emerging
technologies in Enterprise processes. In this
manuscript, we discuss what we believe to be one of the
main challenges preventing the full employment of
Industry 4.0, namely, the integration of Operation
Technology networking and Information Technology
networking. We discuss the technical challenges
alongside the potential tools while providing a
state-of-the-art use case scenario. We showcase a
possible solution based on the Asset Administration
Shell approach, referring to the use case of camera
synchronization for collaborative tasks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rasool:2023:QCH,
author = "Raihan Ur Rasool and Hafiz Farooq Ahmad and Wajid
Rafique and Adnan Qayyum and Junaid Qadir and Zahid
Anwar",
title = "Quantum Computing for Healthcare: a Review",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "94",
day = "27",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030094",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/94",
abstract = "In recent years, the interdisciplinary field of
quantum computing has rapidly developed and garnered
substantial interest from both academia and industry
due to its ability to process information in
fundamentally different ways, leading to hitherto
unattainable computational capabilities. However,
despite its potential, the full extent of quantum
computing's impact on healthcare remains largely
unexplored. This survey paper presents the first
systematic analysis of the various capabilities of
quantum computing in enhancing healthcare systems, with
a focus on its potential to revolutionize
compute-intensive healthcare tasks such as drug
discovery, personalized medicine, DNA sequencing,
medical imaging, and operational optimization. Through
a comprehensive analysis of existing literature, we
have developed taxonomies across different dimensions,
including background and enabling technologies,
applications, requirements, architectures, security,
open issues, and future research directions, providing
a panoramic view of the quantum computing paradigm for
healthcare. Our survey aims to aid both new and
experienced researchers in quantum computing and
healthcare by helping them understand the current
research landscape, identifying potential opportunities
and challenges, and making informed decisions when
designing new architectures and applications for
quantum computing in healthcare.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jiang:2023:DPM,
author = "Lili Jiang and Vicen{\c{c}} Torra",
title = "Data Protection and Multi-Database Data-Driven
Models",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "93",
day = "27",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030093",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/93",
abstract = "Anonymization and data masking have effects on
data-driven models. Different anonymization methods
have been developed to provide a good trade-off between
privacy guarantees and data utility. Nevertheless, the
effects of data protection (e.g., data microaggregation
and noise addition) on data integration and on
data-driven models (e.g., machine learning models)
built from these data are not known. In this paper, we
study how data protection affects data integration, and
the corresponding effects on the results of machine
learning models built from the outcome of the data
integration process. The experimental results show that
the levels of protection that prevent proper database
integration do not affect machine learning models that
learn from the integrated database to the same degree.
Concretely, our preliminary analysis and experiments
show that data protection techniques have a lower level
of impact on data integration than on machine learning
models.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{He:2023:GTB,
author = "Jingsha He and Yue Li and Nafei Zhu",
title = "A Game Theory-Based Model for the Dissemination of
Privacy Information in Online Social Networks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "92",
day = "27",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030092",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/92",
abstract = "Online social networks (OSNs) have experienced rapid
growth in recent years, and an increasing number of
people now use OSNs, such as Facebook and Twitter, to
share and spread information on a daily basis. As a
special type of information, user personal information
is also widely disseminated in such networks, posing
threats to user privacy. The study on privacy
information dissemination is thus useful for the
development of mechanisms and tools for the effective
protection of privacy information in OSNs. In this
paper, we propose to apply the game theory to establish
a sender--receiver game model and the Nash equilibrium
to describe the behavioral strategies of users in
disseminating privacy information. Factors that affect
the dissemination of privacy information are also
analyzed with two important aspects: intimacy and
popularity of the privacy-concerning subject.
Simulation experiments were conducted based on real
data sets from scale-free networks and real social
networks to compare and analyze the effectiveness of
the model. Results show that the proposed game theory
is applicable to the privacy information dissemination
model, which implements intimacy and popularity in the
modeling of the dissemination of privacy information in
OSNs. Both the impact of the macro-level OSNs and the
micro-relationships between users are evaluated on the
dissemination of privacy information, which provides a
new perspective for exploring the dissemination of
privacy information and facilitates the development of
effective mechanisms for privacy protection in OSNs.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hasslinger:2023:SAA,
author = "Gerhard Hasslinger and Konstantinos Ntougias and Frank
Hasslinger and Oliver Hohlfeld",
title = "Scope and Accuracy of Analytic and Approximate Results
for {FIFO}, Clock-Based and {LRU} Caching Performance",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "91",
day = "24",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030091",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/91",
abstract = "We evaluate analysis results and approximations for
the performance of basic caching methods, assuming
independent requests. Compared with simulative
evaluations, the analysis results are accurate, but
their computation is tractable only within a limited
scope. We compare the scalability of analytical FIFO
and LRU solutions including extensions for multisegment
caches and for caches with data of varying sizes. On
the other hand, approximations have been proposed for
the FIFO and LRU hit ratio. They are simple and
scalable, but their accuracy is confirmed mainly
through asymptotic behaviour only for large caches. We
derive bounds on the approximation errors in a detailed
worst-case study with a focus on small caches. The
approximations are extended to data of different sizes.
Then a fraction of unused cache space can add to the
deviations, which is estimated in order to improve the
solution.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kirikkayis:2023:BFM,
author = "Yusuf Kirikkayis and Florian Gallik and Michael Winter
and Manfred Reichert",
title = "{BPMNE4IoT}: a Framework for Modeling, Executing and
Monitoring {IoT}-Driven Processes",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "90",
day = "22",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030090",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/90",
abstract = "The Internet of Things (IoT) enables a variety of
smart applications, including smart home, smart
manufacturing, and smart city. By enhancing Business
Process Management Systems with IoT capabilities, the
execution and monitoring of business processes can be
significantly improved. Providing a holistic support
for modeling, executing and monitoring IoT-driven
processes, however, constitutes a challenge. Existing
process modeling and process execution languages, such
as BPMN 2.0, are unable to fully meet the IoT
characteristics (e.g., asynchronicity and parallelism)
of IoT-driven processes. In this article, we present
BPMNE4IoT---A holistic framework for modeling,
executing and monitoring IoT-driven processes. We
introduce various artifacts and events based on the
BPMN 2.0 metamodel that allow realizing the desired IoT
awareness of business processes. The framework is
evaluated along two real-world scenarios from two
different domains. Moreover, we present a user study
for comparing BPMNE4IoT and BPMN 2.0. In particular,
this study has confirmed that the BPMNE4IoT framework
facilitates the support of IoT-driven processes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2023:FWP,
author = "Sheng-Ming Wang and Wei-Min Cheng",
title = "Fast Way to Predict Parking Lots Availability: For
Shared Parking Lots Based on Dynamic Parking Fee
System",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "89",
day = "22",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030089",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/89",
abstract = "This study mainly focuses on the estimation
calculation of urban parking space. Urban parking has
always been a problem that plagues governments
worldwide. Due to limited parking space, if the parking
space is not controlled correctly, with the city's
development, the city will eventually face the result
that there is nowhere to park. In order to effectively
manage the urban parking problem, using the dynamic
parking fee pricing mechanism combined with the concept
of shared parking is an excellent way to alleviate the
parking problem, but how to quickly estimate the total
number of available parking spaces in the area is a big
problem. This study provides a fast parking space
estimation method and verifies the feasibility of this
estimation method through actual data from various
types of fields. This study also comprehensively
discusses the changing characteristics of parking space
data in multiple areas and possible data anomalies and
studies and explains the causes of data anomalies. The
study also concludes with a description of potential
applications of the predictive model in conjunction
with subsequent dynamic parking pricing mechanisms and
self-driving systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gebreyesus:2023:MLD,
author = "Yibrah Gebreyesus and Damian Dalton and Sebastian
Nixon and Davide {De Chiara} and Marta Chinnici",
title = "Machine Learning for Data Center Optimizations:
Feature Selection Using {Shapley Additive exPlanation
(SHAP)}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "3",
pages = "88",
day = "21",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15030088",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Mar 29 11:12:24 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/3/88",
abstract = "The need for artificial intelligence (AI) and machine
learning (ML) models to optimize data center (DC)
operations increases as the volume of operations
management data upsurges tremendously. These strategies
can assist operators in better understanding their DC
operations and help them make informed decisions
upfront to maintain service reliability and
availability. The strategies include developing models
that optimize energy efficiency, identifying
inefficient resource utilization and scheduling
policies, and predicting outages. In addition to model
hyperparameter tuning, feature subset selection (FSS)
is critical for identifying relevant features for
effectively modeling DC operations to provide insight
into the data, optimize model performance, and reduce
computational expenses. Hence, this paper introduces
the Shapley Additive exPlanation (SHAP) values method,
a class of additive feature attribution values for
identifying relevant features that is rarely discussed
in the literature. We compared its effectiveness with
several commonly used, importance-based feature
selection methods. The methods were tested on real DC
operations data streams obtained from the ENEA CRESCO6
cluster with 20,832 cores. To demonstrate the
effectiveness of SHAP compared to other methods, we
selected the top ten most important features from each
method, retrained the predictive models, and evaluated
their performance using the MAE, RMSE, and MPAE
evaluation criteria. The results presented in this
paper demonstrate that the predictive models trained
using features selected with the SHAP-assisted method
performed well, with a lower error and a reasonable
execution time compared to other methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Song:2023:PFP,
author = "Beibei Song and Dehua Zhou and Jiahe Wu and Xiaowei
Yuan and Yiming Zhu and Chuansheng Wang",
title = "Protecting Function Privacy and Input Privacy in the
Publicly Verifiable Outsourcing Computation of
Polynomial Functions",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "152",
day = "21",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040152",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/152",
abstract = "With the prevalence of cloud computing, the
outsourcing of computation has gained significant
attention. Clients with limited computing power often
outsource complex computing tasks to the cloud to save
on computing resources and costs. In outsourcing the
computation of functions, a function owner delegates a
cloud server to perform the function's computation on
the input received from the user. There are three
primary security concerns associated with this process:
protecting function privacy for the function owner,
protecting input privacy for the user and guaranteeing
that the cloud server performs the computation
correctly. Existing works have only addressed privately
verifiable outsourcing computation with privacy or
publicly verifiable outsourcing computation without
input privacy or function privacy. By using the
technologies of homomorphic encryption, proxy
re-encryption and verifiable computation, we propose
the first publicly verifiable outsourcing computation
scheme that achieves both input privacy and function
privacy for matrix functions, which can be extended to
arbitrary multivariate polynomial functions. We
additionally provide a faster privately verifiable
method. Moreover, the function owner retains control
over the function.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2023:DSE,
author = "Xu Wang and Bin Shi and Yili Fang",
title = "Distributed Systems for Emerging Computing: Platform
and Application",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "151",
day = "20",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040151",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/151",
abstract = "In recent years, the new computing paradigms such as
serverless computing, edge computing and
blockchain-based computing have attracted much
attention in both academia and industrial communities.
Distributed systems and applications play fundamental
roles in connecting the underlying computers, network
and devices for collaboration, as well as providing new
services for users. However, due to the increasing
complexity of the large-scale and dynamic heterogeneous
resource, and the new requirements and features, these
distributed systems and applications will face many
challenges in terms of their efficiency, flexibility
and algorithms. This editorial discusses the
state-of-the-art advancements in distributed systems
and applications for the emerging computing.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alaei:2023:TOD,
author = "Alireza Alaei and Ying Wang and Vinh Bui and Bela
Stantic",
title = "Target-Oriented Data Annotation for Emotion and
Sentiment Analysis in Tourism Related Social Media
Data",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "150",
day = "19",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040150",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/150",
abstract = "Social media have been a valuable data source for
studying people's opinions, intentions, and behaviours.
Such a data source incorporating advanced big data
analysis methods, such as machine-operated emotion and
sentiment analysis, will open unprecedented
opportunities for innovative data-driven destination
monitoring and management. However, a big challenge any
machine-operated text analysis method faces is the
ambiguity of the natural languages, which may cause an
expression to have different meanings in different
contexts. In this work, we address the ambiguity
challenge by proposing a context-aware dictionary-based
target-oriented emotion and sentiment analysis method
that incorporates inputs from both humans and machines
to introduce an alternative approach to measuring
emotions and sentiment in limited tourism-related data.
The study makes a methodological contribution by
creating a target dictionary specifically for tourism
sentiment analysis. To demonstrate the performance of
the proposed method, a case of target-oriented emotion
and sentiment analysis of posts from Twitter for the
Gold Coast of Australia as a tourist destination was
considered. The results suggest that Twitter data cover
a broad range of destination attributes and can be a
valuable source for comprehensive monitoring of tourist
experiences at a destination.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Paglialonga:2023:APS,
author = "Alessia Paglialonga and Rebecca Theal and Bruce Knox
and Robert Kyba and David Barber and Aziz Guergachi and
Karim Keshavjee",
title = "Applying Patient Segmentation Using Primary Care
Electronic Medical Records to Develop a Virtual
Peer-to-Peer Intervention for Patients with Type 2
Diabetes",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "149",
day = "14",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040149",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/149",
abstract = "The aim of this study was to design a virtual
peer-to-peer intervention for patients with type 2
diabetes (T2D) by grouping patients from specific
segments using data from primary care electronic
medical records (EMRs). Two opposing segments were
identified: patients living with diabetes who tend to
take several medications (``medication'' segment:
$\approx$32\%) and patients who do not take any
diabetes-specific medications (``lifestyle'' segment:
~15\%). The remaining patients were from two
intermediate segments and exhibited medication-taking
behavior that placed them midway between the medication
and lifestyle segments. Patients were grouped into six
workshops (two workshops in each group: medication,
lifestyle, and mixed group), including individuals with
good and bad control of their disease. Measures of
attitudes, learning, and motivation were addressed
during and after the workshops. Results showed that
patients in the lifestyle segment were more interested
in T2D lifestyle control strategies, more satisfied
with their in-workshop learning experience, and more
motivated to set a goal than those in the medication
segment. These results suggest that the proposed
intervention may be more viable for patients in the
lifestyle segment and that EMR data may be used to
tailor behavioral interventions to specific patient
groups. Future research is needed to investigate
different segmentation approaches (e.g., using data
related to smoking, drinking, diet, and physical
activity) that could help tailor the intervention more
effectively.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Xu:2023:MDS,
author = "Yong Xu and Hong Ni and Xiaoyong Zhu",
title = "A Multipath Data-Scheduling Strategy Based on Path
Correlation for Information-Centric Networking",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "148",
day = "11",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040148",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/148",
abstract = "Information-Centric Networking (ICN) has
revolutionized the manner of content acquisition by
shifting the communication mode from host-centric to
information-centric. Considering the existing, large
amount of IP infrastructure in current networks, the
new ICN architecture is proposed to be compatible with
existing networks in order to reduce deployment cost.
However, due to compatibility with IP networks, ICN
data packets must be transmitted through the default
path provided by IP routing regulations, which also
limits the transmission efficiency and reliability of
ICN. In order to address this issue, this paper
introduces a multipath transmission method applied in
ICN which takes full advantage of the functions and
characteristics of ICN and builds multiple end-to-end
relay paths by using the ICN routers as relay nodes. We
then propose a relay-node-selection algorithm based on
path correlation to minimize the impact of overlapping
links. Moreover, we comprehensively calculate the path
state value by combining the round-trip time and packet
loss rate and propose a multipath data-scheduling
algorithm based on the path state value. Simulation
experiments show that the proposed method can maintain
high bandwidth utilization while reducing the number of
out-of-order packets.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fabre:2023:MGH,
author = "Renaud Fabre and Otmane Azeroual and Joachim
Sch{\"o}pfel and Patrice Bellot and Daniel Egret",
title = "A Multiverse Graph to Help Scientific Reasoning from
{Web} Usage: Interpretable Patterns of Assessor Shifts
in {GRAPHYP}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "147",
day = "10",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040147",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/147",
abstract = "The digital support for scientific reasoning presents
contrasting results. Bibliometric services are
improving, but not academic assessment; no service for
scholars relies on logs of web usage to base query
strategies for relevance judgments (or assessor
shifts). Our Scientific Knowledge Graph GRAPHYP
innovates with interpretable patterns of web usage,
providing scientific reasoning with conceptual
fingerprints and helping identify eligible hypotheses.
In a previous article, we showed how usage log data, in
the form of `documentary tracks', help determine
distinct cognitive communities (called adversarial
cliques) within sub-graphs. A typology of these
documentary tracks through a triplet of measurements
from logs (intensity, variety and attention) describes
the potential approaches to a (research) question.
GRAPHYP assists interpretation as a classifier, with
possibilistic graphical modeling. This paper shows what
this approach can bring to scientific reasoning; it
involves visualizing complete interpretable pathways,
in a multi-hop assessor shift, which users can then
explore toward the `best possible solution'---the one
that is most consistent with their hypotheses. Applying
the Leibnizian paradigm of scientific reasoning,
GRAPHYP highlights infinitesimal learning pathways, as
a `multiverse' geometric graph in modeling possible
search strategies answering research questions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Otta:2023:SSM,
author = "Soumya Prakash Otta and Subhrakanta Panda and Maanak
Gupta and Chittaranjan Hota",
title = "A Systematic Survey of Multi-Factor Authentication for
Cloud Infrastructure",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "146",
day = "10",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040146",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/146",
abstract = "The unauthorized usage of various services and
resources in cloud computing is something that must be
protected against. Authentication and access control
are the most significant concerns in cloud computing.
Several researchers in this field suggest numerous
approaches to enhance cloud authentication towards
robustness. User names and associated passwords have
been a common practice for long as Single Factor
Authentication. However, advancements in the speed of
computing and the usage of simple methods, starting
from the Brute Force technique to the implementation of
advanced and efficient cryptographic algorithms, have
posed several threats and vulnerabilities for
authentication systems, leading to the degradation of
their effectiveness. Multi-factor authentication has
emerged as a robust means of securing the cloud using
simultaneous and multiple means of authentication
factors. This employs multiple levels of cascaded
authentication checks. This paper covers an extensive
and systematic survey of various factors towards their
adoption and suitability for authentication for
multi-factor authentication mechanisms. The inference
drawn from the survey is in terms of arriving at a
unique authentication factor that does not require any
additional, specialized hardware or software for
multi-factor authentication. Such authentication also
uses the distinct biometric characteristics of the
concerned user in the process. This arrangement
augments the secured and robust user authentication
process. The mechanism is also assessed as an effective
means against impersonation attacks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{AlKhasawneh:2023:CAT,
author = "Mohammad {Al Khasawneh} and Abdel-Aziz Ahmad Sharabati
and Shafig Al-Haddad and Rania Al-Daher and Sarah
Hammouri and Sima Shaqman",
title = "Consumer's Attitude towards Display {Google Ads}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "145",
day = "07",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040145",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/145",
abstract = "The context of Display Google ads and its components
has significant importance to previous studies.
However, the full understanding of the variables that
influence both Display Google ads avoidance and
intention to click has not been thoroughly
acknowledged. Thus, this study aims to outline an
entire understanding of the different variables that
lead Display Google ads to be avoided or clicked on. A
detailed review of previous studies has been completed
to illustrate a thorough image of Display Google ads.
Accordingly, this study developed a theoretical model
combining four variables (Display Google ads' Prior
Experience, Originality, Relevance, and Credibility)
that lead to affecting Display Google ads' Avoidance
and Intention to Click, with one mediator (Consumer's
Attitude). A quantitative methodology has been
employed, in which an online survey has been used to
collect data, which were collected from 358
respondents, then coded against AMOS. The data analysis
results show that three independent variables
positively impact the intention to click; however,
credibility has the highest value, then relevance and
originality, consequently., while Display Google ads
prior experience had no impact on the intention to
click. Finally, the research concluded different
practical and theoretical implications, and future
potential research, and limitations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gazzan:2023:OED,
author = "Mazen Gazzan and Frederick T. Sheldon",
title = "Opportunities for Early Detection and Prediction of
Ransomware Attacks against Industrial Control Systems",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "144",
day = "07",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040144",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/144",
abstract = "Industrial control systems (ICS) and supervisory
control and data acquisition (SCADA) systems, which
control critical infrastructure such as power plants
and water treatment facilities, have unique
characteristics that make them vulnerable to ransomware
attacks. These systems are often outdated and run on
proprietary software, making them difficult to protect
with traditional cybersecurity measures. The limited
visibility into these systems and the lack of effective
threat intelligence pose significant challenges to the
early detection and prediction of ransomware attacks.
Ransomware attacks on ICS and SCADA systems have become
a growing concern in recent years. These attacks can
cause significant disruptions to critical
infrastructure and result in significant financial
losses. Despite the increasing threat, the prediction
of ransomware attacks on ICS remains a significant
challenge for the cybersecurity community. This is due
to the unique characteristics of these systems,
including the use of proprietary software and limited
visibility into their operations. In this review paper,
we will examine the challenges associated with
predicting ransomware attacks on industrial systems and
the existing approaches for mitigating these risks. We
will also discuss the need for a multi-disciplinary
approach that involves a close collaboration between
the cybersecurity and ICS communities. We aim to
provide a comprehensive overview of the current state
of ransomware prediction on industrial systems and to
identify opportunities for future research and
development in this area.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Goncalves:2023:IGC,
author = "Ricardo Martins Gon{\c{c}}alves and Miguel Mira da
Silva and Paulo Rupino da Cunha",
title = "Implementing {GDPR}-Compliant Surveys Using
Blockchain",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "143",
day = "07",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040143",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/143",
abstract = "The immutability of data stored in a blockchain is a
crucial pillar of trust in this technology, which has
led to its increasing adoption in various use cases.
However, there are situations where the inability to
change or delete data may be illegal. European Union's
General Data Protection Regulation (GDPR)---applying to
any company processing personal data from European
citizens---explicitly entitles individuals to the right
to rectification and the right to be forgotten. In this
paper, we describe the design of a system to deploy and
process survey data in a GDPR-compliant manner. It
combines an Hyperledger Fabric blockchain to ensure
that data cannot be tampered with and InterPlanetary
File Systems (IPFS) for storage. With the proposed
arrangement, we reap several security benefits enabled
by blockchain's immutability without running afoul of
the regulations. Furthermore, the proof-of-concept is
generic and can easily be adapted to various domains.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jamshidi:2023:FDD,
author = "Mohammad (Behdad) Jamshidi and Omid Moztarzadeh and
Alireza Jamshidi and Ahmed Abdelgawad and Ayman S.
El-Baz and Lukas Hauer",
title = "Future of Drug Discovery: The Synergy of Edge
Computing, {Internet of Medical Things}, and Deep
Learning",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "142",
day = "07",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040142",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/142",
abstract = "The global spread of COVID-19 highlights the urgency
of quickly finding drugs and vaccines and suggests that
similar challenges will arise in the future. This
underscores the need for ongoing efforts to overcome
the obstacles involved in the development of potential
treatments. Although some progress has been made in the
use of Artificial Intelligence (AI) in drug discovery,
virologists, pharmaceutical companies, and investors
seek more long-term solutions and greater investment in
emerging technologies. One potential solution to aid in
the drug-development process is to combine the
capabilities of the Internet of Medical Things (IoMT),
edge computing (EC), and deep learning (DL). Some
practical frameworks and techniques utilizing EC, IoMT,
and DL have been proposed for the monitoring and
tracking of infected individuals or high-risk areas.
However, these technologies have not been widely
utilized in drug clinical trials. Given the
time-consuming nature of traditional drug- and
vaccine-development methods, there is a need for a new
AI-based platform that can revolutionize the industry.
One approach involves utilizing smartphones equipped
with medical sensors to collect and transmit real-time
physiological and healthcare information on
clinical-trial participants to the nearest edge nodes
(EN). This allows the verification of a vast amount of
medical data for a large number of individuals in a
short time frame, without the restrictions of latency,
bandwidth, or security constraints. The collected
information can be monitored by physicians and
researchers to assess a vaccine's performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ocampo-Lopez:2023:PDL,
author = "Carlos Ocampo-L{\'o}pez and Oscar
Mu{\~n}oz-Bland{\'o}n and Leidy
Rend{\'o}n-Castrill{\'o}n and Margarita
Ram{\'\i}rez-Carmona",
title = "Post-Digital Learning for Rural Development: a Case
Study of {Open Biotec MOOCs} in {Colombia}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "141",
day = "06",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040141",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/141",
abstract = "This research presents an experience of post-digital
learning of biotechnology in rural areas in Colombia by
implementing a massive open online course (MOOC) for
biotechnology education called Open Biotec. The
objective was to improve Colombian rural development by
creating learning communities around five topics: waste
management, environmental biotechnology, bioprocesses,
alternative energies, and bio-entrepreneurship. The
study utilized various methods, including a
socioeconomic diagnosis of a subregion of the
department of Antioquia, Colombia, and the creation of
MOOCs using the Action Research methodology. The pilot
test of the training route in biotechnology involved
the progressive development of the MOOC courses that
comprise it. Around 918 students from rural areas were
trained, and statistical analysis showed that the
average grade of the students increased significantly
from 6.13 to 7.53 and the median from 6.15 to 8.00. The
study results demonstrate how the learning experience
designed in the Open Biotec MOOC increases the degree
of knowledge of students in this field of
biotechnology, offering an opportunity to establish
sustainable learning communities with participation and
collaborative action mediated by virtual tools. The
study concludes that rural education in Colombia could
be strengthened with a training strategy for rural
communities supported by MOOCs focused on the
responsible use of local biodiversity from a
biotechnological perspective.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Garcia-Delgado:2023:ETT,
author = "Miguel {\'A}ngel Garc{\'\i}a-Delgado and Sonia
Rodr{\'\i}guez-Cano and Vanesa Delgado-Benito and
Mar{\'\i}a Lozano-{\'A}lvarez",
title = "Emerging Technologies and Their Link to Digital
Competence in Teaching",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "140",
day = "05",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040140",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/140",
abstract = "The new educational reality requires teachers to have
a series of skills and competences that allow them to
improve the teaching--learning process and therefore
the quality of teaching, integrating technology and
emerging technologies. In order to assess the
competence level of teachers, a descriptive study was
designed, in which 101 teachers from different stages
and geographical locations in Spain took part and were
administered the DigCompEdu Check-in questionnaire. The
results show average levels of teachers' digital
competence (B1 and B2, particularly), and an incipient
use of emerging technologies by teachers, with less
than 50\% of the sample not using these technologies in
their daily classroom activities, although those who
show a higher level of digital competence are also
those who integrate them more in their daily work. The
results correspond with similar studies, corroborating
the average level of teachers' digital skills.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Romero:2023:TRA,
author = "Virginia M. Romero and Eduardo B. Fernandez",
title = "Towards a Reference Architecture for Cargo Ports",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "139",
day = "04",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040139",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/139",
abstract = "Cyber-Physical Systems (CPS) are physical systems
whose operations are coordinated, monitored, and
controlled by computing and communication functions.
These systems are typically heterogeneous, including
Internet of Things and information technology
subsystems, and can present a myriad of implementation
details, making them very complex systems. An important
type of CPS is a maritime container terminal (cargo
port), which is a facility where cargo containers are
transported between ships and land vehicles for onward
transportation and vice versa. A cargo port performs
four basic functions: receiving, storing, staging, and
loading for both import and export containers. We
present here process patterns that describe the
functional aspects of cargo ports and a pattern that
describes their structural properties (patterns are
encapsulated solutions to recurrent problems). These
patterns describe semantic aspects found in any cargo
port and can be adapted to describe other CPSs. We
decompose these process patterns into use cases that
describe their interactions with the system. We then
integrate the process patterns with structural patterns
to assemble a partial reference architecture (RA) that
shows the interactions of all the patterns while also
indicating the typical stakeholders found in all ports.
We validate the proposed reference architecture,
highlighting its theoretical and practical value.
Software and system designers of cargo ports need to
start from a conceptual and abstract view that is
subsequently refined to add more details. The use of
reference architectures and patterns is an effective
way to organize and describe the functional and
non-functional aspects of a system, as well as to unify
the design of all its aspects. This is, until now, the
only published RA for cargo ports, and it can be a
useful guideline for the designers of any type of cargo
port.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lancelot:2023:PEL,
author = "Jonathan Lancelot and Bhaskar P. Rimal and Edward M.
Dennis",
title = "Performance Evaluation of a Lane Correction Module
Stress Test: a Field Test of {Tesla Model 3}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "138",
day = "31",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040138",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/138",
abstract = "This paper is designed to explicate and analyze data
acquired from experimental field tests of a Tesla Model
3 lane correction module within the vehicle's Autopilot
Suite, a component of Tesla OS. The initial problem was
discovered during a nominal drive of the Tesla Model 3,
where after a random number of lane correction events,
the lane correction module shuts down, issues a visual
disable warning on the touchscreen, and control of the
vehicle is given to the driver until the next drive.
That development was considered problematic, as the
driver can be caught off guard or may be medically
disabled and unable to respond. During a controlled
stress test, a more severe issue was discovered. After
a random number of lane correction events, the lane
correction module shuts down without warning, then
stays activated after the test driver corrects the
vehicle's trajectory. This is considered a fatal error
in the system and adds a dangerous element to an
otherwise standard feature in a modern automotive
vehicle. The results established that the number of
events needed to trigger a fatal error without warning
is unpredictable. Our results also demonstrate that the
system is inconsistent.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhai:2023:CRD,
author = "Qiuhong Zhai and Wenhao Zhu and Xiaoyu Zhang and
Chenyun Liu",
title = "Contrastive Refinement for Dense Retrieval Inference
in the Open-Domain Question Answering Task",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "137",
day = "31",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040137",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/137",
abstract = "In recent years, dense retrieval has emerged as the
primary method for open-domain question-answering
(OpenQA). However, previous research often focused on
the query side, neglecting the importance of the
passage side. We believe that both the query and
passage sides are equally important and should be
considered for improved OpenQA performance. In this
paper, we propose a contrastive pseudo-labeled data
constructed around passages and queries separately. We
employ an improved pseudo-relevance feedback (PRF)
algorithm with a knowledge-filtering strategy to enrich
the semantic information in dense representations.
Additionally, we proposed an Auto Text Representation
Optimization Model (AOpt) to iteratively update the
dense representations. Experimental results demonstrate
that our methods effectively optimize dense
representations, making them more distinguishable in
dense retrieval, thus improving the OpenQA system's
overall performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hasan:2023:EIC,
author = "Husam H. Hasan and Zainab T. Alisa",
title = "Effective {IoT} Congestion Control Algorithm",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "136",
day = "31",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040136",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/136",
abstract = "The Internet of Things (IoT) connects devices via the
Internet. Network congestion is one of the key problems
that has been identified by researchers in the IoT
field. When there is a huge number of IoT devices
connected to the internet, this creates network
congestion. Transfer control protocol is a transport
layer protocol that provides a reliable end-to-end
connection between two devices. Many Congestion Control
Algorithms have been proposed to solve network
congestion. However, there is no perfect solution to
this problem. This paper proposes an effective
loss-based Congestion Control Algorithm to effectively
adapt the congestion window in the IoT environment. It
uses simple experiment scenarios to test the algorithm
for wired and wireless channels and observes important
performance metrics: link utilization, inter-protocol
fairness, intra-protocol fairness and throughput. The
results are impressive, and the proposed algorithm is
shown to outperform other standard algorithms.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gkoulis:2023:TIE,
author = "Dimitris Gkoulis and Cleopatra Bardaki and George
Kousiouris and Mara Nikolaidou",
title = "Transforming {IoT} Events to Meaningful Business
Events on the Edge: Implementation for Smart Farming
Application",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "135",
day = "31",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040135",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/135",
abstract = "This paper focuses on Internet of Things (IoT)
architectures and knowledge generation out of streams
of events as the primary elements concerning the
creation of user-centric IoT services. We provide a
general, symmetrical IoT architecture, which enables
two-way bidirectional communication between things and
users within an application domain. We focus on two
main components of the architecture (i.e., Event Engine
and Process Engine) that handle event transformation by
implementing parametric Complex Event Processing (CEP).
More specifically, we describe and implement the
transformation cycle of events starting from raw IoT
data to their processing and transformation of events
for calculating information that we need in an
IoT-enabled application context. The implementation
includes a library of composite transformations
grouping the gradual and sequential steps for
transforming basic IoT events into business events,
which include ingestion, event splitting, and
calculation of measurements' average value. The
appropriateness and possibility of inclusion and
integration of the implementation in an IoT environment
are demonstrated by providing our implementation for a
smart farming application domain with four scenarios
that each reflect a user's requirements. Further, we
discuss the quality properties of each scenario.
Ultimately, we propose an IoT architecture and,
specifically, a parametric CEP model and implementation
for future researchers and practitioners who aspire to
build IoT applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Taha:2023:CSS,
author = "Ahmad Taha and Basel Barakat and Mohammad M. A. Taha
and Mahmoud A. Shawky and Chun Sing Lai and Sajjad
Hussain and Muhammad Zainul Abideen and Qammer H.
Abbasi",
title = "A Comparative Study of Single and Multi-Stage
Forecasting Algorithms for the Prediction of
Electricity Consumption Using a {UK-National Health
Service (NHS)} Hospital Dataset",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "134",
day = "31",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040134",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/134",
abstract = "Accurately looking into the future was a significantly
major challenge prior to the era of big data, but with
rapid advancements in the Internet of Things (IoT),
Artificial Intelligence (AI), and the data availability
around us, this has become relatively easier.
Nevertheless, in order to ensure high-accuracy
forecasting, it is crucial to consider suitable
algorithms and the impact of the extracted features.
This paper presents a framework to evaluate a total of
nine forecasting algorithms categorised into single and
multistage models, constructed from the Prophet,
Support Vector Regression (SVR), Long Short-Term Memory
(LSTM), and the Least Absolute Shrinkage and Selection
Operator (LASSO) approaches, applied to an electricity
demand dataset from an NHS hospital. The aim is to see
such techniques widely used in accurately predicting
energy consumption, limiting the negative impacts of
future waste on energy, and making a contribution
towards the 2050 net zero carbon target. The proposed
method accounts for patterns in demand and temperature
to accurately forecast consumption. The Coefficient of
Determination ( R2 ), Mean Absolute Error (MAE), and
Root Mean Square Error (RMSE) were used to evaluate the
algorithms' performance. The results show the
superiority of the Long Short-Term Memory (LSTM) model
and the multistage Facebook Prophet model, with R2
values of 87.20\% and 68.06\%, respectively.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Guan:2023:SBB,
author = "Yuting Guan and Junjiang He and Tao Li and Hui Zhao
and Baoqiang Ma",
title = "{SSQLi}: a Black-Box Adversarial Attack Method for
{SQL} Injection Based on Reinforcement Learning",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "133",
day = "30",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040133",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/133",
abstract = "SQL injection is a highly detrimental web attack
technique that can result in significant data leakage
and compromise system integrity. To counteract the harm
caused by such attacks, researchers have devoted much
attention to the examination of SQL injection detection
techniques, which have progressed from traditional
signature-based detection methods to machine- and
deep-learning-based detection models. These detection
techniques have demonstrated promising results on
existing datasets; however, most studies have
overlooked the impact of adversarial attacks,
particularly black-box adversarial attacks, on
detection methods. This study addressed the
shortcomings of current SQL injection detection
techniques and proposed a reinforcement-learning-based
black-box adversarial attack method. The proposal
included an innovative vector transformation approach
for the original SQL injection payload, a comprehensive
attack-rule matrix, and a reinforcement-learning-based
method for the adaptive generation of adversarial
examples. Our approach was evaluated on existing web
application firewalls (WAF) and detection models based
on machine- and deep-learning methods, and the
generated adversarial examples successfully bypassed
the detection method at a rate of up to 97.39\%.
Furthermore, there was a substantial decrease in the
detection accuracy of the model after multiple attacks
had been carried out on the detection model via the
adversarial examples.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sousa-Vieira:2023:SCA,
author = "Mar{\'\i}a E. Sousa-Vieira and Manuel
Fern{\'a}ndez-Veiga",
title = "Study of Coded {ALOHA} with Multi-User Detection under
Heavy-Tailed and Correlated Arrivals",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "132",
day = "30",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040132",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/132",
abstract = "In this paper, we study via simulation the performance
of irregular repetition slotted ALOHA under
multi-packet detection and different patterns of the
load process. On the one hand, we model the arrival
process with a version of the M/G/ {\infty} process
able to exhibit a correlation structure decaying slowly
in time. Given the independence among frames in
frame-synchronous coded-slotted ALOHA (CSA), this
variation should only take effect on frame-asynchronous
CSA. On the other hand, we vary the marginal
distribution of the arrival process using discrete
versions of the Lognormal and Pareto distributions,
with the objective of investigating the influence of
the right tail. In this case, both techniques should be
affected by the change, albeit to a different degree.
Our results confirm these hypotheses and show that
these factors must be taken into account when designing
and analyzing these systems. In frameless operations,
both the shape of the packet arrivals tail distribution
and the existence of short-range and long-range
correlations strongly impact the packet loss ratio and
the average delay. Nevertheless, these effects emerge
only weakly in the case of frame-aligned operations,
because this enforces the system to introduce a delay
in the newly arrived packets (until the beginning of
the next frame), and implies that the backlog of
accumulated packets is the key quantity for calculating
the performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Aria:2023:IFD,
author = "Reza Aria and Norm Archer and Moein Khanlari and
Bharat Shah",
title = "Influential Factors in the Design and Development of a
Sustainable {Web3\slash Metaverse} and Its
Applications",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "131",
day = "30",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040131",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/131",
abstract = "This paper summarizes the work of many different
authors, industries, and countries by introducing
important and influential factors that will help in the
development, successful adoption, and sustainable use
of the Web3/metaverse and its applications. We
introduce a few important factors derived from the
current state-of-the-art literature, including four
essential elements including (1) appropriate
decentralization, (2) good user experience, (3)
appropriate translation and synchronization to the real
world, and (4) a viable economy, which are required for
appropriate implementation of a metaverse and its
applications. The future of Web3 is all about
decentralization, and blockchain can play a significant
part in the development of the Metaverse. This paper
also sheds light on some of the most relevant open
issues and challenges currently facing the
Web3/metaverse and its applications, with the hope that
this discourse will help to encourage the development
of appropriate solutions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bagui:2023:RIN,
author = "Sikha Bagui and Dustin Mink and Subhash Bagui and
Sakthivel Subramaniam and Daniel Wallace",
title = "Resampling Imbalanced Network Intrusion Datasets to
Identify Rare Attacks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "130",
day = "29",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040130",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/130",
abstract = "This study, focusing on identifying rare attacks in
imbalanced network intrusion datasets, explored the
effect of using different ratios of oversampled to
undersampled data for binary classification. Two
designs were compared: random undersampling before
splitting the training and testing data and random
undersampling after splitting the training and testing
data. This study also examines how oversampling\slash
undersampling ratios affect random forest
classification rates in datasets with minority data or
rare attacks. The results suggest that random
undersampling before splitting gives better
classification rates; however, random undersampling
after oversampling with BSMOTE allows for the use of
lower ratios of oversampled data.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Xevgenis:2023:AZS,
author = "Michael Xevgenis and Dimitrios G. Kogias and
Panagiotis A. Karkazis and Helen C. Leligou",
title = "Addressing {ZSM} Security Issues with Blockchain
Technology",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "129",
day = "28",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040129",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/129",
abstract = "Undoubtedly, we are witnessing a new era of computer
networks that aspire to support modern demanding
applications by providing the highest Quality of
Experience (QoE) to the end user. Next Generations
Networks (NGNs) ensure that characteristics such as
ultra-low latency, high availability and wide service
coverage can be met across the network regardless of
the network infrastructure ownership. To accomplish
that, beyond the necessary improvements in the radio
propagation field, changes have been made in the core
network functions which are now characterized as
programmable, and software defined. Software Defined
Networks (SDNs) and Network Function Virtualization
(NFV) are the keystones of the NGNs flexibility. The
high expectations of NGNs' performance and the
continuous changes in the network conditions lead to
the development of new network management frameworks
that add elasticity and dynamicity and minimize human
intervention. ETSI (the European Standards
Organization) presents the Zero-touch Service
Management (ZSM) framework that uses hyped technologies
such as Artificial Intelligence (AI) and Machine
Learning (ML) to achieve full end-to-end automation of
the network services' management across one or many
different domains. Focusing on multi-domain network
service management, there are several security issues
identified by the standardization team which mostly
derive from the lack of trust among network providers.
In the present research, we explore the suitability of
blockchain technology adoption for facing these
security issues. Blockchain technology inherently
addresses security in trustless environments such as
the infrastructures defined by the ZSM team. Our
contribution is three-fold: (a) we define the
architecture of a multi-domain network infrastructure
that adopts the ZSM approach and integrates blockchain
functionality, (b) we explore the adoption of different
blockchain and distributed ledger technologies (DLT)
approaches to address ZSM security needs and (c) we
provide guidelines to prospective solution
designers\slash implementors on the detailed
requirements that this solution has to meet to maximize
the offered value.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wu:2023:NID,
author = "Kongpei Wu and Huiqin Qu and Conggui Huang",
title = "A Network Intrusion Detection Method Incorporating
{Bayesian} Attack Graph and Incremental Learning Part",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "128",
day = "28",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040128",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/128",
abstract = "For the current stage of complex and changing network
environments and correlated and synchronized
vulnerability attacks, this study first fuses attack
graph technology and Bayesian networks and constructs
Bayesian attack graphs to portray the correlation
relationships between vulnerabilities and discovering
attackers' intentions. Meanwhile, improving the
Bayesian attack graph is difficult because it is
difficult to achieve active updates and adapt to the
changing network environment and other problems. The
study proposed a detection method that integrated the
Bayesian attack graph and the XGBoost incremental
learning (IL) approach. Experiments showed that the IL
model had an accuracy of 0.951, an accuracy of 0.999, a
recall of 0.815, an F1 value of 0.898, and an Area
Under Curve (AUC) value of 0.907. The prediction
ability of this method was better than that of the base
model. Bayesian attack graphs fused with IL can detect
attacks in the network more efficiently and accurately,
so the probability of each node in the network system
being attacked can be updated in real time.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yang:2023:HIH,
author = "Xingyuan Yang and Jie Yuan and Hao Yang and Ya Kong
and Hao Zhang and Jinyu Zhao",
title = "A Highly Interactive Honeypot-Based Approach to
Network Threat Management",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "127",
day = "28",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040127",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/127",
abstract = "In this paper, considering the problem that the common
defensive means in the current cyber confrontation
often fall into disadvantage, honeypot technology is
adopted to turn reactive into proactive to deal with
the increasingly serious cyberspace security problem.
We address the issue of common defensive measures in
current cyber confrontations that frequently lead to
disadvantages. To tackle the progressively severe
cyberspace security problem, we propose the adoption of
honeypot technology to shift from a reactive to a
proactive approach. This system uses honeypot
technology for active defense, tempting attackers into
a predetermined sandbox to observe the attacker's
behavior and attack methods to better protect equipment
and information security. During the research, it was
found that due to the singularity of traditional
honeypots and the limitations of low-interactivity
honeypots, the application of honeypot technology has
difficulty in achieving the desired protective effect.
Therefore, the system adopts a highly interactive
honeypot and a modular design idea to distinguish the
honeypot environment from the central node of data
processing, so that the honeypot can obtain more
sufficient information and the honeypot technology can
be used more easily. By managing honeypots at the
central node, i.e., adding, deleting, and modifying
honeypots and other operations, it is easy to maintain
and upgrade the system, while reducing the difficulty
of using honeypots. The high-interactivity honeypot
technology not only attracts attackers into pre-set
sandboxes to observe their behavior and attack methods,
but also performs a variety of advanced functions, such
as network threat analysis, virtualization,
vulnerability perception, tracing reinforcement, and
camouflage detection. We have conducted a large number
of experimental comparisons and proven that our method
has significant advantages compared to traditional
honeypot technology and provides detailed data support.
Our research provides new ideas and effective methods
for network security protection.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lee:2023:VSS,
author = "Uddom Lee and Peng Jiang and Hongyi Wu and Chunsheng
Xin",
title = "View Synthesis with Scene Recognition for Cross-View
Image Localization",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "126",
day = "28",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040126",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/126",
abstract = "Image-based localization has been widely used for
autonomous vehicles, robotics, augmented reality, etc.,
and this is carried out by matching a query image taken
from a cell phone or vehicle dashcam to a large scale
of geo-tagged reference images, such as
satellite/aerial images or Google Street Views.
However, the problem remains challenging due to the
inconsistency between the query images and the
large-scale reference datasets regarding various light
and weather conditions. To tackle this issue, this work
proposes a novel view synthesis framework equipped with
deep generative models, which can merge the unique
features from the outdated reference dataset with
features from the images containing seasonal changes.
Our design features a unique scheme to ensure that the
synthesized images contain the important features from
both reference and patch images, covering seasonable
features and minimizing the gap for the image-based
localization tasks. The performance evaluation shows
that the proposed framework can synthesize the views in
various weather and lighting conditions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Keller:2023:BIU,
author = "Dami{\'a}n Keller and Azeema Yaseen and Joseph Timoney
and Sutirtha Chakraborty and Victor Lazzarini",
title = "Banging Interaction: a Ubimus-Design Strategy for the
Musical {Internet}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "125",
day = "27",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040125",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/125",
abstract = "We introduce a new perspective for musical interaction
tailored to a specific class of sonic resources: impact
sounds. Our work is informed by the field of ubiquitous
music (ubimus) and engages with the demands of artistic
practices. Through a series of deployments of a
low-cost and highly flexible network-based prototype,
the Dynamic Drum Collective, we exemplify the
limitations and specific contributions of banging
interaction. Three components of this new design
strategy---adaptive interaction, mid-air techniques and
timbre-led design---target the development of
creative-action metaphors that make use of resources
available in everyday settings. The techniques
involving the use of sonic gridworks yielded positive
outcomes. The subjects tended to choose sonic materials
that---when combined with their actions on the
prototype---approached a full rendition of the proposed
soundtrack. The results of the study highlighted the
subjects' reliance on visual feedback as a
non-exclusive strategy to handle both temporal
organization and collaboration. The results show a
methodological shift from device-centric and
instrumental-centric methods to designs that target the
dynamic relational properties of ubimus ecosystems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Samarnggoon:2023:DVW,
author = "Keattikorn Samarnggoon and Supara Grudpan and Noppon
Wongta and Konlawat Klaynak",
title = "Developing a Virtual World for an Open-House Event: a
Metaverse Approach",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "124",
day = "27",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040124",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/124",
abstract = "The concept of a metaverse, a virtual world that
offers immersive experiences, has gained widespread
interest in recent years. Despite the hype, there is
still a gap in its practical application, especially in
the realm of education. This study presents the design
and implementation of a metaverse tailored to the needs
of education. The goal of this paper is to demonstrate
the feasibility of such a system and evaluate its
effectiveness. It is crucial to understand the
architecture and implementation of a metaverse to
effectively customise it for educational purposes. To
assess user experience, a field study was conducted,
collecting data through questionnaires and qualitative
feedback. The results show that users were pleased with
the features, player experience, and ease of use.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Trim:2023:IHV,
author = "Peter R. J. Trim and Yang-Im Lee and An Vu",
title = "Insights into How {Vietnamese} Retailers Utilize
Social Media to Facilitate Knowledge Creation through
the Process of Value Co-Creation",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "4",
pages = "123",
day = "26",
month = mar,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15040123",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Apr 28 07:04:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/4/123",
abstract = "Social media usage is a direct result of Internet
connectivity and is gaining increased prominence in
business-to-consumer (B2C), business-to-business (B2B),
and consumer-to-business (C2B) relationship building,
which is allowing marketers to devise and implement
digital marketing strategies that are perceived as
enhancing a customer's well-being. Through the process
of utilizing social media (SM) to share information
with consumers, marketers are affording themselves with
the concept of value co-creation and ensuring that the
development of knowledge is given priority. To explain
how this happens in an emerging economy, in-depth
personal interviews were undertaken with the owners of
five retail fashion companies in Vietnam. The findings
indicate that fashion retail companies in Vietnam are
deploying digital marketing strategies that deliver
perceived enhanced value to consumers through the
process of value co-creation. This highlights the
advantage of using SM in relation to increasing retail
staff's ability to convert information into usable
resources such as intelligence and knowledge. By
achieving knowledge conversion, retail staff fulfill
the role of `knowledge broker' and `knowledge
connector', and identify how organizational
intervention, such as new operating structures, can
help to deliver perceived enhanced value to
customers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lightbody:2023:AIS,
author = "Dominic Lightbody and Duc-Minh Ngo and Andriy Temko
and Colin C. Murphy and Emanuel Popovici",
title = "Attacks on {IoT}: Side-Channel Power Acquisition
Framework for Intrusion Detection",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "187",
day = "21",
month = may,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050187",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/187",
abstract = "This study proposes the wider use of non-intrusive
side-channel power data in cybersecurity for intrusion
detection. An in-depth analysis of side-channel IoT
power behaviour is performed on two well-known IoT
devices-a Raspberry Pi 3 model B and a DragonBoard
410c-operating under normal conditions and under
attack. Attacks from the categories of reconnaissance,
brute force and denial of service are applied, and the
side-channel power data of the IoT testbeds are then
studied in detail. These attacks are used together to
further compromise the IoT testbeds in a
``capture-the-flag scenario'', where the attacker aims
to infiltrate the device and retrieve a secret file.
Some clear similarities in the side-channel power
signatures of these attacks can be seen across the two
devices. Furthermore, using the knowledge gained from
studying the features of these attacks individually and
the signatures witnessed in the ``capture the flag
scenario'', we show that security teams can reverse
engineer attacks applied to their system to achieve a
much greater understanding of the events that occurred
during a breach. While this study presents behaviour
signatures analysed visually, the acquired power series
datasets will be instrumental for future human-centred
AI-assisted intrusion detection.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ma:2023:DSB,
author = "Khai-Minh Ma and Duc-Hung Le and Cong-Kha Pham and
Trong-Thuc Hoang",
title = "Design of an {SoC} Based on 32-Bit {RISC-V} Processor
with Low-Latency Lightweight Cryptographic Cores in
{FPGA}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "186",
day = "19",
month = may,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050186",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/risc-v.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/186",
abstract = "The security of Internet of Things (IoTs) devices in
recent years has created interest in developing
implementations of lightweight cryptographic algorithms
for such systems. Additionally, open-source hardware
and field-programable gate arrays (FPGAs) are gaining
traction via newly developed tools, frameworks, and
HDLs. This enables new methods of creating hardware and
systems faster, more simply, and more efficiently. In
this paper, the implementation of a system-on-chip
(SoC) based on a 32-bit RISC-V processor with
lightweight cryptographic accelerator cores in FPGA and
an open-source integrating framework is presented. The
system consists of a 32-bit VexRiscv processor, written
in SpinalHDL, and lightweight cryptographic accelerator
cores for the PRINCE block cipher, the PRESENT-80 block
cipher, the ChaCha stream cipher, and the SHA3-512 hash
function, written in Verilog HDL and optimized for low
latency with fewer clock cycles. The primary aim of
this work was to develop a customized SoC platform with
a register-controlled bus suitable for integrating
lightweight cryptographic cores to become compact
embedded systems that require encryption
functionalities. Additionally, custom firmware was
developed to verify the functionality of the SoC with
all integrated accelerator cores, and to evaluate the
speed of cryptographic processing. The proposed system
was successfully implemented in a Xilinx Nexys4 DDR
FPGA development board. The resources of the system in
the FPGA were low with 11,830 LUTs and 9552 FFs. The
proposed system can be applicable to enhancing the
security of Internet of Things systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2023:CTA,
author = "Yufeng Li and Mengxiao Liu and Chenhong Cao and
Jiangtao Li",
title = "Communication-Traffic-Assisted Mining and Exploitation
of Buffer Overflow Vulnerabilities in {ADASs}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "185",
day = "18",
month = may,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050185",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/185",
abstract = "Advanced Driver Assistance Systems (ADASs) are crucial
components of intelligent vehicles, equipped with a
vast code base. To enhance the security of ADASs, it is
essential to mine their vulnerabilities and
corresponding exploitation methods. However, mining
buffer overflow (BOF) vulnerabilities in ADASs can be
challenging since their code and data are not publicly
available. In this study, we observed that ADAS devices
commonly utilize unencrypted protocols for module
communication, providing us with an opportunity to
locate input stream and buffer data operations more
efficiently. Based on the above observation, we
proposed a communication-traffic-assisted ADAS BOF
vulnerability mining and exploitation method. Our
method includes firmware extraction, a firmware and
system analysis, the locating of risk points with
communication traffic, validation, and exploitation. To
demonstrate the effectiveness of our proposed method,
we applied our method to several commercial ADAS
devices and successfully mined BOF vulnerabilities. By
exploiting these vulnerabilities, we executed the
corresponding commands and mapped the attack to the
physical world, showing the severity of these
vulnerabilities.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gao:2023:DRL,
author = "Siyu Gao and Yuchen Wang and Nan Feng and Zhongcheng
Wei and Jijun Zhao",
title = "Deep Reinforcement Learning-Based Video Offloading and
Resource Allocation in {NOMA}-Enabled Networks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "184",
day = "18",
month = may,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050184",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/184",
abstract = "With the proliferation of video surveillance system
deployment and related applications, real-time video
analysis is very critical to achieving intelligent
monitoring, autonomous driving, etc. Analyzing video
stream with high accuracy and low latency through the
traditional cloud computing represents a non-trivial
problem. In this paper, we propose a non-orthogonal
multiple access (NOMA)-based edge real-time video
analysis framework with one edge server (ES) and
multiple user equipments (UEs). A cost minimization
problem composed of delay, energy and accuracy is
formulated to improve the quality of experience (QoE)
of the UEs. In order to efficiently solve this problem,
we propose the joint video frame resolution scaling,
task offloading, and resource allocation algorithm
based on the Deep Q-Learning Network (JVFRS-TO-RA-DQN),
which effectively overcomes the sparsity of the
single-layer reward function and accelerates the
training convergence speed. JVFRS-TO-RA-DQN consists of
two DQN networks to reduce the curse of dimensionality,
which, respectively, select the offloading and resource
allocation action, as well as the resolution scaling
action. The experimental results show that
JVFRS-TO-RA-DQN can effectively reduce the cost of edge
computing and has better performance in terms of
convergence compared to other baseline schemes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kenyeres:2023:DAC,
author = "Martin Kenyeres and Jozef Kenyeres",
title = "Distributed Average Consensus Algorithms in
$d$-Regular Bipartite Graphs: Comparative Study",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "183",
day = "16",
month = may,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050183",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/183",
abstract = "Consensus-based data aggregation in d -regular
bipartite graphs poses a challenging task for the
scientific community since some of these algorithms
diverge in this critical graph topology. Nevertheless,
one can see a lack of scientific studies dealing with
this topic in the literature. Motivated by our recent
research concerned with this issue, we provide a
comparative study of frequently applied consensus
algorithms for distributed averaging in d -regular
bipartite graphs in this paper. More specifically, we
examine the performance of these algorithms with
bounded execution in this topology in order to identify
which algorithm can achieve the consensus despite no
reconfiguration and find the best-performing algorithm
in these graphs. In the experimental part, we apply the
number of iterations required for consensus to evaluate
the performance of the algorithms in randomly generated
regular bipartite graphs with various connectivities
and for three configurations of the applied stopping
criterion, allowing us to identify the optimal
distributed consensus algorithm for this graph
topology. Moreover, the obtained experimental results
presented in this paper are compared to other
scientific manuscripts where the analyzed algorithms
are examined in non-regular non-bipartite topologies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Taleb:2023:EMS,
author = "Anas Abu Taleb and Qasem Abu Al-Haija and Ammar Odeh",
title = "Efficient Mobile Sink Routing in Wireless Sensor
Networks Using Bipartite Graphs",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "182",
day = "14",
month = may,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050182",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/182",
abstract = "Wireless sensor networks (W.S.N.s) are a critical
research area with numerous practical applications.
W.S.N.s are utilized in real-life scenarios, including
environmental monitoring, healthcare, industrial
automation, smart homes, and agriculture. As W.S.N.s
advance and become more sophisticated, they offer
limitless opportunities for innovative solutions in
various fields. However, due to their unattended
nature, it is essential to develop strategies to
improve their performance without draining the battery
power of the sensor nodes, which is their most valuable
resource. This paper proposes a novel sink mobility
model based on constructing a bipartite graph from a
deployed wireless sensor network. The proposed model
uses bipartite graph properties to derive a controlled
mobility model for the mobile sink. As a result,
stationary nodes will be visited and planned to reduce
routing overhead and enhance the network's performance.
Using the bipartite graph's properties, the mobile sink
node can visit stationary sensor nodes in an optimal
way to collect data and transmit it to the base
station. We evaluated the proposed approach through
simulations using the NS-2 simulator to investigate the
performance of wireless sensor networks when adopting
this mobility model. Our results show that using the
proposed approach can significantly enhance the
performance of wireless sensor networks while
conserving the energy of the sensor nodes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Imoize:2023:OQS,
author = "Agbotiname Lucky Imoize and Friday Udeji and Joseph
Isabona and Cheng-Chi Lee",
title = "Optimizing the Quality of Service of Mobile Broadband
Networks for a Dense Urban Environment",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "181",
day = "12",
month = may,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050181",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/181",
abstract = "Mobile broadband (MBB) services in Lagos, Nigeria are
marred with poor signal quality and inconsistent user
experience, which can result in frustrated end-users
and lost revenue for service providers. With the
introduction of 5G, it is becoming more necessary for
4G LTE users to find ways of maximizing the technology
while they await the installation and implementation of
the new 5G networks. A comprehensive analysis of the
quality of 4G LTE MBB services in three different
locations in Lagos is performed. Minimal optimization
techniques using particle swarm optimization (PSO) are
used to propose solutions to the identified problems. A
methodology that involves data collection, statistical
analysis, and optimization techniques is adopted to
measure key performance indicators (KPIs) for MBB
services in the three locations: UNILAG, Ikorodu, and
Oniru VI. The measured KPIs include reference signal
received power (RSRP), reference signal received
quality (RSRQ), received signal strength indicator
(RSSI), and signal-to-noise ratio (SINR). Specific
statistical analysis was performed, and the mean,
standard deviation, skewness, and kurtosis were
calculated for the measured KPIs. Additionally, the
probability distribution functions for each KPI were
plotted to infer the quality of MBB services in each
location. Subsequently, the PSO algorithm was used to
optimize the KPIs in each location, and the results
were compared with the measured data to evaluate the
effectiveness of the optimization. Generally, the
optimization process results in an improvement in the
quality of service (QoS) in the investigated
environments. Findings also indicated that a single
KPI, such as RSRP, is insufficient for assessing the
quality of MBB services as perceived by end-users.
Therefore, multiple KPIs should be considered instead,
including RSRQ and RSSI. In order to improve MBB
performance in Lagos, recommendations require mapping
and replanning of network routes and hardware design.
Additionally, it is clear that there is a significant
difference in user experience between locations with
good and poor reception and that consistency in signal
values does not necessarily indicate a good user
experience. Therefore, this study provides valuable
insights and solutions for improving the quality of MBB
services in Lagos and can help service providers better
understand the needs and expectations of their end
users.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhu:2023:HTG,
author = "Wenhao Zhu and Xiaoyu Zhang and Qiuhong Zhai and
Chenyun Liu",
title = "A Hybrid Text Generation-Based Query Expansion Method
for Open-Domain Question Answering",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "180",
day = "12",
month = may,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050180",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/180",
abstract = "In the two-stage open-domain question answering
(OpenQA) systems, the retriever identifies a subset of
relevant passages, which the reader then uses to
extract or generate answers. However, the performance
of OpenQA systems is often hindered by issues such as
short and semantically ambiguous queries, making it
challenging for the retriever to find relevant passages
quickly. This paper introduces Hybrid Text
Generation-Based Query Expansion (HTGQE), an effective
method to improve retrieval efficiency. HTGQE combines
large language models with Pseudo-Relevance Feedback
techniques to enhance the input for generative models,
improving text generation speed and quality. Building
on this foundation, HTGQE employs multiple query
expansion generators, each trained to provide query
expansion contexts from distinct perspectives. This
enables the retriever to explore relevant passages from
various angles for complementary retrieval results. As
a result, under an extractive and generative QA setup,
HTGQE achieves promising results on both Natural
Questions (NQ) and TriviaQA (Trivia) datasets for
passage retrieval and reading tasks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hasan:2023:RDL,
author = "Md. Tarek Hasan and Md. Al Emran Hossain and Md.
Saddam Hossain Mukta and Arifa Akter and Mohiuddin
Ahmed and Salekul Islam",
title = "A Review on Deep-Learning-Based Cyberbullying
Detection",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "179",
day = "11",
month = may,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050179",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/179",
abstract = "Bullying is described as an undesirable behavior by
others that harms an individual physically, mentally,
or socially. Cyberbullying is a virtual form (e.g.,
textual or image) of bullying or harassment, also known
as online bullying. Cyberbullying detection is a
pressing need in today's world, as the prevalence of
cyberbullying is continually growing, resulting in
mental health issues. Conventional machine learning
models were previously used to identify cyberbullying.
However, current research demonstrates that deep
learning surpasses traditional machine learning
algorithms in identifying cyberbullying for several
reasons, including handling extensive data, efficiently
classifying text and images, extracting features
automatically through hidden layers, and many others.
This paper reviews the existing surveys and identifies
the gaps in those studies. We also present a
deep-learning-based defense ecosystem for cyberbullying
detection, including data representation techniques and
different deep-learning-based models and frameworks. We
have critically analyzed the existing DL-based
cyberbullying detection techniques and identified their
significant contributions and the future research
directions they have presented. We have also summarized
the datasets being used, including the DL architecture
being used and the tasks that are accomplished for each
dataset. Finally, several challenges faced by the
existing researchers and the open issues to be
addressed in the future have been presented.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Falayi:2023:SDD,
author = "Ayodeji Falayi and Qianlong Wang and Weixian Liao and
Wei Yu",
title = "Survey of Distributed and Decentralized {IoT}
Securities: Approaches Using Deep Learning and
Blockchain Technology",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "178",
day = "11",
month = may,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050178",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/178",
abstract = "The Internet of Things (IoT) continues to attract
attention in the context of computational resource
growth. Various disciplines and fields have begun to
employ IoT integration technologies in order to enable
smart applications. The main difficulty in supporting
industrial development in this scenario involves
potential risk or malicious activities occurring in the
network. However, there are tensions that are difficult
to overcome at this stage in the development of IoT
technology. In this situation, the future of security
architecture development will involve enabling
automatic and smart protection systems. Due to the
vulnerability of current IoT devices, it is
insufficient to ensure system security by implementing
only traditional security tools such as encryption and
access control. Deep learning and blockchain technology
has now become crucial, as it provides distinct and
secure approaches to IoT network security. The aim of
this survey paper is to elaborate on the application of
deep learning and blockchain technology in the IoT to
ensure secure utility. We first provide an introduction
to the IoT, deep learning, and blockchain technology,
as well as a discussion of their respective security
features. We then outline the main obstacles and
problems of trusted IoT and how blockchain and deep
learning may be able to help. Next, we present the
future challenges in integrating deep learning and
blockchain technology into the IoT. Finally, as a
demonstration of the value of blockchain in
establishing trust, we provide a comparison between
conventional trust management methods and those based
on blockchain.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Marin:2023:BSB,
author = "Oana Marin and Tudor Cioara and Ionut Anghel",
title = "Blockchain Solution for Buildings' Multi-Energy
Flexibility Trading Using Multi-Token Standards",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "177",
day = "10",
month = may,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050177",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/177",
abstract = "Buildings can become a significant contributor to an
energy system's resilience if they are operated in a
coordinated manner to exploit their flexibility in
multi-carrier energy networks. However, research and
innovation activities are focused on single-carrier
optimization (i.e., electricity), aiming to achieve
Zero Energy Buildings, and miss the significant
flexibility that buildings may offer through
multi-energy coupling. In this paper, we propose to use
blockchain technology and ERC-1155 tokens to digitize
the heat and electrical energy flexibility of
buildings, transforming them into active flexibility
assets within integrated multi-energy grids, allowing
them to trade both heat and electricity within
community-level marketplaces. The solution increases
the level of interoperability and integration of the
buildings with community multi-energy grids and brings
advantages from a transactive perspective. It permits
digitizing multi-carrier energy using the same token
and a single transaction to transfer both types of
energy, processing transaction batches between the
sender and receiver addresses, and holding both
fungible and non-fungible tokens in smart contracts to
support energy markets' financial payments and energy
transactions' settlement. The results show the
potential of our solution to support buildings in
trading heat and electricity flexibility in the same
market session, increasing their interoperability with
energy markets while decreasing the transactional
overhead and gas consumption.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chang:2023:SUF,
author = "Sang-Yoon Chang and Kyungmin Park and Jonghyun Kim and
Jinoh Kim",
title = "Securing {UAV} Flying Base Station for Mobile
Networking: a Review",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "176",
day = "09",
month = may,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050176",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/176",
abstract = "A flying base station based on an unmanned aerial
vehicle (UAV) uses its mobility to extend its
connectivity coverage and improve its communication
channel quality to achieve a greater communication rate
and latency performances. While UAV flying base
stations have been used in emergency events in 5G
networking (sporadic and temporary), their use will
significantly increase in 6G networking, as 6G expects
reliable connectivity even in rural regions and
requires high-performance communication channels and
line-of-sight channels for millimeter wave (mmWave)
communications. Securing the integrity and availability
of the base station operations is critical because of
the users' increasing reliance on the connectivity
provided by the base stations, e.g., the mobile user
loses connectivity if the base station operation gets
disrupted. This paper identifies the security issues
and research gaps of flying base stations, focusing on
their unique properties, while building on the existing
research in wireless communications for stationary
ground base stations and embedded control for UAV
drones. More specifically, the flying base station's
user-dependent positioning, its battery-constrained
power, and the dynamic and distributed operations cause
vulnerabilities that are distinct from those in 5G and
previous-generation mobile networking with stationary
ground base stations. This paper reviews the relevant
security research from the perspectives of
communications (mobile computing, 5G networking, and
distributed computing) and embedded/control systems
(UAV vehicular positioning and battery control) and
then identifies the security gaps and new issues
emerging for flying base stations. Through this review
paper, we inform readers of flying base station
research, development, and standardization for future
mobile and 6G networking.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wadatkar:2023:MTV,
author = "Prachi V. Wadatkar and Rosario G. Garroppo and
Gianfranco Nencioni",
title = "{5G-MEC} Testbeds for {V2X} Applications",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "175",
day = "09",
month = may,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050175",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/175",
abstract = "Fifth-generation (5G) mobile networks fulfill the
demands of critical applications, such as
Ultra-Reliable Low-Latency Communication (URLLC),
particularly in the automotive industry. Vehicular
communication requires low latency and high
computational capabilities at the network's edge. To
meet these requirements, ETSI standardized Multi-access
Edge Computing (MEC), which provides cloud computing
capabilities and addresses the need for low latency.
This paper presents a generalized overview for
implementing a 5G-MEC testbed for Vehicle-to-Everything
(V2X) applications, as well as the analysis of some
important testbeds and state-of-the-art implementations
based on their deployment scenario, 5G use cases, and
open source accessibility. The complexity of using the
testbeds is also discussed, and the challenges
researchers may face while replicating and deploying
them are highlighted. Finally, the paper summarizes the
tools used to build the testbeds and addresses open
issues related to implementing the testbeds.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Moustakidis:2023:PFT,
author = "Serafeim Moustakidis and Spyridon Plakias and Christos
Kokkotis and Themistoklis Tsatalas and Dimitrios
Tsaopoulos",
title = "Predicting Football Team Performance with Explainable
{AI}: Leveraging {SHAP} to Identify Key Team-Level
Performance Metrics",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "174",
day = "05",
month = may,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050174",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/174",
abstract = "Understanding the performance indicators that
contribute to the final score of a football match is
crucial for directing the training process towards
specific goals. This paper presents a pipeline for
identifying key team-level performance variables in
football using explainable ML techniques. The input
data includes various team-specific features such as
ball possession and pass behaviors, with the target
output being the average scoring performance of each
team over a season. The pipeline includes data
preprocessing, sequential forward feature selection,
model training, prediction, and explainability using
SHapley Additive exPlanations (SHAP). Results show that
14 variables have the greatest contribution to the
outcome of a match, with 12 having a positive effect
and 2 having a negative effect. The study also
identified the importance of certain performance
indicators, such as shots, chances, passing, and ball
possession, to the final score. This pipeline provides
valuable insights for coaches and sports analysts to
understand which aspects of a team's performance need
improvement and enable targeted interventions to
improve performance. The use of explainable ML
techniques allows for a deeper understanding of the
factors contributing to the predicted average team
score performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Singh:2023:BEN,
author = "Raman Singh and Zeeshan Pervez and Hitesh Tewari",
title = "Blockchain-Enabled {NextGen} Service Architecture for
Mobile {Internet} Offload",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "173",
day = "05",
month = may,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050173",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/173",
abstract = "The amalgamation of heterogeneous generations of
mobile cellular networks around the globe has resulted
in diverse data speed experiences for end users. At
present, there are no defined mechanisms in place for
subscribers of a mobile network operator (MNO) to use
the services of third-party WiFi providers. MNOs also
have no standardized procedures to securely interact
with each other, and allow their subscribers to use
third-party services on a pay-as-you-go basis. This
paper proposes a blockchain-enabled offloading
framework that allows a subscriber of a mobile operator
to temporarily use another MNO or WiFi provider's
higher-speed network. A smart contract is employed to
allow diverse entities, such as MNOs, brokers and WiFi
providers, to automatically execute mutual agreements,
to enable the utilization of third-party infrastructure
in a secure and controlled manner. The proposed
framework is tested using Ethereum's testnet on the
Goerli network using Alchemy and Hardhat. The analysis
of the results obtained shows that the proposed
technique helps mobile operators to offer improved user
experience in the form of average speed and latency.
The experiments show that the average time taken to
deliver a 500 MB file is reduced from 10.23 s to 0.91 s
for the global average scenario, from 6.09 s to 0.50 s
for 5G, from 13.50 s to 0.50 s for 4G-LTE, from 41.11 s
to 0.49 s for 4G, and from 339.11 s to 0.49 s for the
3G scenario. The results also show that, with WiFi
offloading, users from all cellular generations can
enjoy a similar quality of services, because delivery
time ranges from 0.49 s to 0.91 s for offloaded
experiments whereas for the non-offloaded scenario it
ranges from 6.09 s to 339.11 s.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lei:2023:SPA,
author = "Kuncheng Lei and Zhenrong Zhang",
title = "System Performance Analysis of Sensor Networks for
{RF} Energy Harvesting and Information Transmission",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "172",
day = "30",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050172",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/172",
abstract = "This paper investigates the problem of RF energy
harvesting in wireless sensor networks, with the aim of
finding a suitable communication protocol by comparing
the performance of the system under different
protocols. The network is made up of two parts: first,
at the beginning of each timeslot, the sensor nodes
harvest energy from the base station (BS) and then send
packets to the BS using the harvested energy. For the
energy-harvesting part of the wireless sensor network,
we consider two methods: point-to-point and
multi-point-to-point energy harvesting. For each
method, we use two independent control protocols,
namely head harvesting energy of each timeslot (HHT)
and head harvesting energy of dedicated timeslot (HDT).
Additionally, for complex channel states, we derive the
cumulative distribution function (CDF) of packet
transmission time using selective combining (SC) and
maximum ratio combining (MRC) techniques. Analytical
expressions for system reliability and packet timeout
probability are obtained. At the same time, we also
utilize the Monte Carlo simulation method to simulate
our system and have analyzed both the numerical and
simulation solutions. Results show that the performance
of the HHT protocol is better than that of the HDT
protocol, and the MRC technology outperforms the SC
technology for the HHT protocol in terms of the
energy-harvesting efficiency coefficient, sensor
positions, transmit signal-to-noise ratio (SNR), and
length of energy harvesting time.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2023:DSS,
author = "Mian Wang and Cong'an Xu and Yun Lin and Zhiyi Lu and
Jinlong Sun and Guan Gui",
title = "A Distributed Sensor System Based on Cloud-Edge-End
Network for Industrial {Internet of Things}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "171",
day = "30",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050171",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/171",
abstract = "The Industrial Internet of Things (IIoT) refers to the
application of the IoT in the industrial field. The
development of fifth-generation (5G) communication
technology has accelerated the world's entry into the
era of the industrial revolution and has also promoted
the overall optimization of the IIoT. In the IIoT
environment, challenges such as complex operating
conditions and diverse data transmission have become
increasingly prominent. Therefore, studying how to
collect and process a large amount of real-time data
from various devices in a timely, efficient, and
reasonable manner is a significant problem. To address
these issues, we propose a three-level networking model
based on distributed sensor self-networking and cloud
server platforms for networking. This model can collect
monitoring data for a variety of industrial scenarios
that require data collection. It enables the processing
and storage of key information in a timely manner,
reduces data transmission and storage costs, and
improves data transmission reliability and efficiency.
Additionally, we have designed a feature fusion network
to further enhance the amount of feature information
and improve the accuracy of industrial data
recognition. The system also includes data
preprocessing and data visualization capabilities.
Finally, we discuss how to further preprocess and
visualize the collected dataset and provide a specific
algorithm analysis process using a large manipulator
dataset as an example.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alotaibi:2023:TSB,
author = "Fahad M. Alotaibi and Vassilios G. Vassilakis",
title = "Toward an {SDN}-Based {Web} Application Firewall:
Defending against {SQL} Injection Attacks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "170",
day = "29",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050170",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/170",
abstract = "Web attacks pose a significant threat to enterprises,
as attackers often target web applications first.
Various solutions have been proposed to mitigate and
reduce the severity of these threats, such as web
application firewalls (WAFs). On the other hand,
software-defined networking (SDN) technology has
significantly improved network management and operation
by providing centralized control for network
administrators. In this work, we investigated the
possibility of using SDN to implement a firewall
capable of detecting and blocking web attacks. As a
proof of concept, we designed and implemented a WAF to
detect a known web attack, specifically SQL injection.
Our design utilized two detection methods: signatures
and regular expressions. The experimental results
demonstrate that the SDN controller can successfully
function as a WAF and detect SQL injection attacks.
Furthermore, we implemented and compared ModSecurity, a
traditional WAF, with our proposed SDN-based WAF. The
results reveal that our system is more efficient in
terms of TCP ACK latency, while ModSecurity exhibits a
slightly lower overhead on the controller.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sakurai:2023:BCD,
author = "Guilherme Yukio Sakurai and Jessica Fernandes Lopes
and Bruno Bogaz Zarpel{\~a}o and Sylvio Barbon Junior",
title = "Benchmarking Change Detector Algorithms from Different
Concept Drift Perspectives",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "169",
day = "29",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050169",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/169",
abstract = "The stream mining paradigm has become increasingly
popular due to the vast number of algorithms and
methodologies it provides to address the current
challenges of Internet of Things (IoT) and modern
machine learning systems. Change detection algorithms,
which focus on identifying drifts in the data
distribution during the operation of a machine learning
solution, are a crucial aspect of this paradigm.
However, selecting the best change detection method for
different types of concept drift can be challenging.
This work aimed to provide a benchmark for four drift
detection algorithms (EDDM, DDM, HDDMW, and HDDMA) for
abrupt, gradual, and incremental drift types. To shed
light on the capacity and possible trade-offs involved
in selecting a concept drift algorithm, we compare
their detection capability, detection time, and
detection delay. The experiments were carried out using
synthetic datasets, where various attributes, such as
stream size, the amount of drifts, and drift duration
can be controlled and manipulated on our generator of
synthetic stream. Our results show that HDDMW provides
the best trade-off among all performance indicators,
demonstrating superior consistency in detecting abrupt
drifts, but has suboptimal time consumption and a
limited ability to detect incremental drifts. However,
it outperforms other algorithms in detection delay for
both abrupt and gradual drifts with an efficient
detection performance and detection time performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Duarte:2023:MAR,
author = "Rui P. Duarte and Carlos A. S. Cunha and Valter N. N.
Alves",
title = "Mobile Application for Real-Time Food Plan Management
for {Alzheimer} Patients through Design-Based
Research",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "168",
day = "29",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050168",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/168",
abstract = "Alzheimer's disease is a type of dementia that affects
many individuals, mainly in an older age group. Over
time, it leads to other diseases that affect their
autonomy and independence. The quality of food
ingestion is a way to mitigate the disease and preserve
the patient's well-being, which substantially impacts
their health. Many existing applications for food plan
management focus on the prescription of food plans but
do not provide feedback to the nutritionist on the real
amount of ingested calories. It makes these
applications inadequate for these diseases, where
monitoring and control are most important. This paper
proposed the design and development of a mobile
application to monitor and control the food plans of
Alzheimer's patients, focused on informal caregivers
and respective patients. It allows both the realistic
visualization of the food plans and users to adjust
their consumption and register extra meals and water
consumption. The interface design process comprises a
two-level approach: the user centered design
methodology that accounts for users' needs and
requirements and the user experience questionnaire to
measure user satisfaction. The results show that the
interface is intuitive, visually appealing, and easy to
use, adjusted for users that require a particular level
of understanding regarding specific subjects.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Benmoussa:2023:NBB,
author = "Ahmed Benmoussa and Chaker Abdelaziz Kerrache and
Carlos T. Calafate and Nasreddine Lagraa",
title = "{NDN-BDA}: a Blockchain-Based Decentralized Data
Authentication Mechanism for Vehicular Named Data
Networking",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "167",
day = "29",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050167",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/167",
abstract = "Named Data Networking (NDN) is an implementation of
Information-Centric Networking (ICN) that has emerged
as a promising candidate for the Future Internet
Architecture (FIA). In contrast to traditional
networking protocols, NDN's focus is on content, rather
than the source of the content. NDN enables name-based
routing and location-independent data retrieval, which
gives NDN the ability to support the highly dynamic
nature of mobile networks. Among other important
features, NDN integrates security mechanisms and
prioritizes protecting content over communication
channels through cryptographic signatures. However, the
data verification process that NDN employs may cause
significant delays, especially in mobile networks and
vehicular networks. This aspect makes it unsuitable for
time-critical and sensitive applications such as the
sharing of safety messages. Therefore, in this work, we
propose NDN-BDA, a blockchain-based decentralized
mechanism that provides a faster and more efficient
data authenticity mechanism for NDN-based vehicular
networks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mohammed:2023:FIA,
author = "Sarfaraz Ahmed Mohammed and Anca L. Ralescu",
title = "Future {Internet} Architectures on an Emerging Scale
--- a Systematic Review",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "166",
day = "29",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050166",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/166",
abstract = "Future Internet is a general term that is used to
refer to the study of new Internet architectures that
emphasize the advancements that are paving the way for
the next generation of internet. Today's internet has
become more complicated and arduous to manage due to
its increased traffic. This traffic is a result of the
transfer of 247 billion emails, the management of more
than a billion websites and 735 active top-level
domains, the viewing of at least one billion YouTube
videos per day (which is the source of main traffic),
and the uploading of more than 2.5 billion photos to
Facebook every year. The internet was never anticipated
to provide quality of service (QoS) support, but one
can have a best effort service that provides support
for video streams and downloaded media applications.
Therefore, the future architecture of the internet
becomes crucial. Furthermore, the internet as a service
has witnessed many evolving conflicts among its
stakeholders, leading to extensive research. This
article presents a systematic review of the internet's
evolution and discusses the ongoing research efforts
towards new internet architectures, as well as the
challenges that are faced in increasing the network's
performance and quality. Moreover, as part of these
anticipated future developments, this article draws
attention to the Metaverse, which combines the emerging
areas of augmented reality, virtual reality, mixed
reality, and extended reality, and is considered to be
the next frontier for the future internet. This article
examines the key role of the blockchain in organizing
and advancing the applications and services within the
Metaverse. It also discusses the potential benefits and
challenges of future internet research. Finally, the
article outlines certain directions for future internet
research, particularly in the context of utilizing
blockchains in the Metaverse.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dimoulas:2023:TAW,
author = "Charalampos A. Dimoulas and Andreas Veglis",
title = "Theory and Applications of {Web 3.0} in the Media
Sector",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "165",
day = "28",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050165",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/165",
abstract = "We live in a digital era, with vast technological
advancements, which, among others, have a major impact
on the media domain. More specifically, progress in the
last two decades led to the end-to-end digitalization
of the media industry, resulting in a rapidly evolving
media landscape. In addition to news digitization,
User-Generated Content (UGC) is dominant in this new
environment, also fueled by Social Media, which has
become commonplace for news publishing, propagation,
consumption, and interactions. However, the exponential
increase in produced and distributed content, with the
multiplied growth in the number of plenary individuals
involved in the processes, created urgent needs and
challenges that need careful treatment. Hence,
intelligent processing and automation incorporated into
the Semantic Web vision, also known as Web 3.0, aim at
providing sophisticated data documentation, retrieval,
and management solutions to meet the demands of the new
digital world. Specifically, for the sensitive news and
media domains, necessities are created both at the
production and consumption ends, dealing with content
production and validation, as well as tools empowering
and engaging audiences (professionals and end users).
In this direction, state-of-the-art works studying news
detection, modeling, generation, recommendation,
evaluation, and utilization are included in the current
Special Issue, enlightening multiple contemporary
journalistic practices and media perspectives.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{vanderSchyff:2023:OPF,
author = "Karl van der Schyff and Greg Foster and Karen Renaud
and Stephen Flowerday",
title = "Online Privacy Fatigue: a Scoping Review and Research
Agenda",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "164",
day = "28",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050164",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/164",
abstract = "Online users are responsible for protecting their
online privacy themselves: the mantra is custodiat te
(protect yourself). Even so, there is a great deal of
evidence pointing to the fact that online users
generally do not act to preserve the privacy of their
personal information, consequently disclosing more than
they ought to and unwisely divulging sensitive
information. Such self-disclosure has many negative
consequences, including the invasion of privacy and
identity theft. This often points to a need for more
knowledge and awareness but does not explain why even
knowledgeable users fail to preserve their privacy. One
explanation for this phenomenon may be attributed to
online privacy fatigue. Given the importance of online
privacy and the lack of integrative online privacy
fatigue research, this scoping review aims to provide
researchers with an understanding of online privacy
fatigue, its antecedents and outcomes, as well as a
critical analysis of the methodological approaches
used. A scoping review based on the PRISMA-ScR
checklist was conducted. Only empirical studies
focusing on online privacy were included, with
nontechnological studies being excluded. All studies
had to be written in English. A search strategy
encompassing six electronic databases resulted in
eighteen eligible studies, and a backward search of the
references resulted in an additional five publications.
Of the 23 studies, the majority were quantitative
(74\%), with fewer than half being theory driven
(48\%). Privacy fatigue was mainly conceptualized as a
loss of control (74\% of studies). Five categories of
privacy fatigue antecedents were identified: privacy
risk, privacy control and management, knowledge and
information, individual differences, and privacy policy
characteristics. This study highlights the need for
greater attention to be paid to the methodological
design and theoretical underpinning of future research.
Quantitative studies should carefully consider the use
of CB-SEM or PLS-SEM, should aim to increase the sample
size, and should improve on analytical rigor. In
addition, to ensure that the field matures, future
studies should be underpinned by established
theoretical frameworks. This review reveals a notable
absence of privacy fatigue research when modeling the
influence of privacy threats and invasions and their
relationship with privacy burnout, privacy resignation,
and increased self-disclosure. In addition, this review
provides insight into theoretical and practical
research recommendations that future privacy fatigue
researchers should consider going forward.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Frattolillo:2023:WPS,
author = "Franco Frattolillo",
title = "Watermarking Protocols: a Short Guide for Beginners",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "163",
day = "28",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050163",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/163",
abstract = "Watermarking protocols, in conjunction with digital
watermarking technologies, make it possible to trace
back digital copyright infringers by identifying who
has legitimately purchased digital content and then
illegally shared it on the Internet. Although they can
act as an effective deterrent against copyright
violations, their adoption in the current web context
is made difficult due to unresolved usability and
performance issues. This paper aims at providing
researchers with the basics needed to design
watermarking protocols suited to the web context. It is
focused on two important aspects. The first concerns
the basic requirements that make a protocol usable by
both web users and content providers, whereas the
second concerns the security primitives and how they
have been used to implement the most relevant examples
of watermarking protocols documented in the literature.
In this way, researchers can rely on a quick guide to
getting started in the field of watermarking
protocols.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mourtzis:2023:FHM,
author = "Dimitris Mourtzis and John Angelopoulos and Nikos
Panopoulos",
title = "The Future of the Human--Machine Interface ({HMI}) in
{Society 5.0}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "162",
day = "27",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050162",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/162",
abstract = "The blending of human and mechanical capabilities has
become a reality in the realm of Industry 4.0.
Enterprises are encouraged to design frameworks capable
of harnessing the power of human and technological
resources to enhance the era of Artificial Intelligence
(AI). Over the past decade, AI technologies have
transformed the competitive landscape, particularly
during the pandemic. Consequently, the job market, at
an international level, is transforming towards the
integration of suitably skilled people in cutting edge
technologies, emphasizing the need to focus on the
upcoming super-smart society known as Society 5.0. The
concept of a Humachine builds on the notion that humans
and machines have a common future that capitalizes on
the strengths of both humans and machines. Therefore,
the aim of this paper is to identify the capabilities
and distinguishing characteristics of both humans and
machines, laying the groundwork for improving
human-machine interaction (HMI).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Santos:2023:BBL,
author = "Andr{\'e} F. Santos and Jos{\'e} Marinho and Jorge
Bernardino",
title = "Blockchain-Based Loyalty Management System",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "161",
day = "27",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050161",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/161",
abstract = "Loyalty platforms are designed to increase customer
loyalty and thus increase consumers' attraction to
purchase. Although successful in increasing brand reach
and sales, these platforms fail to meet their primary
objective due to a lack of incentives and encouragement
for customers to return. Along with the problem in
originating sales, they bring excessive costs to brands
due to the maintenance and infrastructure required to
make the systems feasible. In that sense, recent
blockchain technology can help to overcome some of
these problems, providing capabilities such as smart
contracts, which have the potential to reinvent the way
loyalty systems work and solve current problems.
Although blockchain is a relatively new technology,
some brands are already investigating its usefulness
and rebuilding their loyalty systems. However, these
platforms are independent and linked directly to a
brand. Thus, there is a need for a generic platform
capable of creating and managing different loyalty
programs, regardless of the size of the business. This
paper explores the shortcomings of current loyalty
programs identified through the literature review, and
proposes a loyalty management system with blockchain
integration that allows any retailer to create and
manage their loyalty programs and have customers
interact directly with multiple programs in a single
application.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Delgado:2023:ELC,
author = "Francisco Delgado",
title = "Extending Learning and Collaboration in Quantum
Information with {Internet} Support: a Future
Perspective on Research Education beyond Boundaries,
Limitations, and Frontiers",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "160",
day = "26",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050160",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/160",
abstract = "Quantum information is an emerging scientific and
technological discipline attracting a growing number of
professionals from various related fields. Although it
can potentially serve as a valuable source of skilled
labor, the Internet provides a way to disseminate
information about education, opportunities, and
collaboration. In this work, we analyzed, through a
blended approach, the sustained effort over 12 years to
involve science and engineering students in research
education and collaboration, emphasizing the role
played by the Internet. Three main spaces have been
promoted, workshops, research stays, and a minor, all
successfully developed through distance education in
2021-2022, involving students from various locations in
Mexico and the United States. The success of these
efforts was measured by research-oriented indicators,
the number of participants, and their surveyed
opinions. The decisive inclusion of the Internet to
facilitate the blended approach has accelerated the
boost in human resources and research production.
During the COVID-19 pandemic, the Internet played a
crucial role in the digital transformation of this
research education initiative, leading to effective
educative and collaborative experiences in the ``New
Normal''.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Medeiros:2023:DAS,
author = "Eduardo Medeiros and Leonel Corado and Lu{\'\i}s Rato
and Paulo Quaresma and Pedro Salgueiro",
title = "Domain Adaptation Speech-to-Text for Low-Resource
{European} {Portuguese} Using Deep Learning",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "159",
day = "24",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050159",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/159",
abstract = "Automatic speech recognition (ASR), commonly known as
speech-to-text, is the process of transcribing audio
recordings into text, i.e., transforming speech into
the respective sequence of words. This paper presents a
deep learning ASR system optimization and evaluation
for the European Portuguese language. We present a
pipeline composed of several stages for data
acquisition, analysis, pre-processing, model creation,
and evaluation. A transfer learning approach is
proposed considering an English language-optimized
model as starting point; a target composed of European
Portuguese; and the contribution to the transfer
process by a source from a different domain consisting
of a multiple-variant Portuguese language dataset,
essentially composed of Brazilian Portuguese. A domain
adaptation was investigated between European Portuguese
and mixed (mostly Brazilian) Portuguese. The proposed
optimization evaluation used the NVIDIA NeMo framework
implementing the QuartzNet15$ \times $5 architecture
based on 1D time-channel separable convolutions.
Following this transfer learning data-centric approach,
the model was optimized, achieving a state-of-the-art
word error rate (WER) of 0.0503.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2023:CST,
author = "Jinlong Wang and Dong Cui and Qiang Zhang",
title = "{Chinese} Short-Text Sentiment Prediction: a Study of
Progressive Prediction Techniques and Attentional
Fine-Tuning",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "158",
day = "23",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050158",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/158",
abstract = "With sentiment prediction technology, businesses can
quickly look at user reviews to find ways to improve
their products and services. We present the BertBilstm
Multiple Emotion Judgment (BBMEJ) model for
small-sample emotion prediction tasks to solve the
difficulties of short emotion identification datasets
and the high dataset annotation costs encountered by
small businesses. The BBMEJ model is suitable for many
datasets. When an insufficient quantity of relevant
datasets prevents the model from achieving the desired
training results, the prediction accuracy of the model
can be enhanced by fine-tuning it with additional
datasets prior to training. Due to the number of
parameters in the Bert model, fine-tuning requires a
lot of data, which drives up the cost of fine-tuning.
We present the Bert Tail Attention Fine-Tuning (BTAFT)
method to make fine-tuning work better. Our
experimental findings demonstrate that the BTAFT
fine-tuning approach performs better in terms of the
prediction effect than fine-tuning all parameters. Our
model obtains a small sample prediction accuracy of
0.636, which is better than the ideal baseline of
0.064. The Macro-F1 (F1) evaluation metrics
significantly exceed other models.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Weerasinghe:2023:TCB,
author = "Nuwan Weerasinghe and Muhammad Arslan Usman and
Chaminda Hewage and Eckhard Pfluegel and Christos
Politis",
title = "Threshold Cryptography-Based Secure
Vehicle-to-Everything {(V2X)} Communication in
{5G}-Enabled Intelligent Transportation Systems",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "157",
day = "23",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050157",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/157",
abstract = "Implementing 5G-enabled Vehicle-to-Everything (V2X)
intelligent transportation systems presents a promising
opportunity to enhance road safety and traffic flow
while facilitating the integration of artificial
intelligence (AI) based solutions. Yet, security and
privacy concerns pose significant challenges that must
be addressed. Therefore, researchers have focused on
improving the security and integrity of vehicle data
sharing, with a particular emphasis on V2X application
layer security and privacy requirements. This is
crucial given that V2X networks can consist of vehicles
manufactured by different companies and registered in
various jurisdictions, which may only be within
communication range for a few seconds. Thus, it is
necessary to establish a trusting relationship between
vehicles quickly. The article proposes a threshold
cryptography-based key exchange protocol that meets the
key requirements for V2X data sharing and privacy,
including the rapid establishment of trust, the
maintenance of vehicle anonymity, and the provision of
secure messages. To evaluate the feasibility and
performance of the proposed protocol, a tailored
testbed that leverages the NS-3 network simulator, a
commercial 5G network, and public cloud infrastructure
is used. Overall, the proposed protocol provides a
potential solution for addressing security and privacy
concerns in V2X networks, which is essential for
successfully implementing and adopting this
technology.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tian:2023:RSP,
author = "Zhenyu Tian and Jiali You and Linlin Hu",
title = "A Reverse Shortest Path Tree-Based Multicast Joining
Node Selection Method",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "156",
day = "23",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050156",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/156",
abstract = "Network layer multicast is a powerful method for
transmitting data from sources to multiple group
members. When joining a multicast group, a group member
first sends a request to a designated router (DR).
Then, the DR selects a node in the existing multicast
tree (known as a multicast joining node, or MJN) to
establish a multicast distribution path from the MJN to
itself. The MJN selection method runs on the DR and has
a significant impact on the distribution of the
multicast tree, that directly affects the load
distribution in the network. However, the current MJN
selection method cannot effectively detect the load
status of the downlink multicast path in the case of
asymmetric routing, leading to network congestion and
limiting the number of multicast groups that the
network can accommodate (multicast capacity). To solve
this problem, we propose an MJN selection method based
on the reverse shortest path tree (RSPT). RSPT can
effectively detect the load status of downlink
multicast paths in case of routing asymmetry. Based on
the detection results of RSPT, DR can select the MJN
with the lowest path load to join the multicast tree.
Our experimental results indicate that compared to
existing multicast methods, our method has a lower cost
and delay, and can effectively balance the network load
in the case of asymmetric routing, increasing multicast
capacity by more than two times.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hernandez:2023:ADI,
author = "Luis Alberto Mart{\'\i}nez Hern{\'a}ndez and Ana
Lucila Sandoval Orozco and Luis Javier Garc{\'\i}a
Villalba",
title = "Analysis of Digital Information in Storage Devices
Using Supervised and Unsupervised Natural Language
Processing Techniques",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "155",
day = "23",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050155",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/155",
abstract = "Due to the advancement of technology, cybercrime has
increased considerably, making digital forensics
essential for any organisation. One of the most
critical challenges is to analyse and classify the
information on devices, identifying the relevant and
valuable data for a specific purpose. This phase of the
forensic process is one of the most complex and
time-consuming, and requires expert analysts to avoid
overlooking data relevant to the investigation.
Although tools exist today that can automate this
process, they will depend on how tightly their
parameters are tuned to the case study, and many lack
support for complex scenarios where language barriers
play an important role. Recent advances in machine
learning allow the creation of new architectures to
significantly increase the performance of information
analysis and perform the intelligent search process
automatically, reducing analysis time and identifying
relationships between files based on initial
parameters. In this paper, we present a bibliographic
review of artificial intelligence algorithms that allow
an exhaustive analysis of multimedia information
contained in removable devices in a forensic process,
using natural language processing and natural language
understanding techniques for the automatic
classification of documents in seized devices. Finally,
some of the open challenges technology developers face
when generating tools that use artificial intelligence
techniques to analyse the information contained in
documents on seized devices are reviewed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sada:2023:CAE,
author = "Abdelkarim {Ben Sada} and Abdenacer Naouri and Amar
Khelloufi and Sahraoui Dhelim and Huansheng Ning",
title = "A Context-Aware Edge Computing Framework for Smart
{Internet of Things}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "154",
day = "22",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050154",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/154",
abstract = "The data explosion caused by the rapid and widespread
use of IoT devices is placing tremendous pressure on
current communication, computing and storage resources.
In an ambient ubiquitous computing environment, taking
advantage of the context of the application scenario
can significantly improve the system performance of IoT
networks. Therefore, in this paper, we propose CONTESS,
a context-aware edge computing framework with selective
sensing that leverages the context information of the
sensed environment to improve its applicability to
smart IoT systems. CONTESS is composed of two parts:
context management, where context acquisition, modeling
and reasoning happens; and selective sensing, where
data selection happens. We demonstrate the capabilities
of CONTESS in the scenario of a parking management
system for a smart city environment. We implement
CONTESS using linked data and semantic web
technologies. We start by designing an OWL-based
ontology and then simulating the proposed scenario
using the OMNET++ network simulator along with the
Veins framework and SUMO traffic simulator. The results
show an improvement compared to traditional sensing
methods in both communication overhead and the
application results.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Papathanasiou:2023:MFP,
author = "Dimitris Papathanasiou and Konstantinos Demertzis and
Nikos Tziritas",
title = "Machine Failure Prediction Using Survival Analysis",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "5",
pages = "153",
day = "22",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15050153",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Jun 1 07:41:25 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/5/153",
abstract = "With the rapid growth of cloud computing and the
creation of large-scale systems such as IoT
environments, the failure of machines/devices and, by
extension, the systems that rely on them is a major
risk to their performance, usability, and the security
systems that support them. The need to predict such
anomalies in combination with the creation of
fault-tolerant systems to manage them is a key factor
for the development of safer and more stable systems.
In this work, a model consisting of survival analysis,
feature analysis/selection, and machine learning was
created, in order to predict machine failure. The
approach is based on the random survival forest model
and an architecture that aims to filter the features
that are of major importance to the cause of machine
failure. The objectives of this paper are to (1) Create
an efficient feature filtering mechanism, by combining
different methods of feature importance ranking, that
can remove the ``noise'' from the data and leave only
the relevant information. The filtering mechanism uses
the RadViz, COX, Rank2D, random survival forest feature
ranking, and recursive feature elimination, with each
of the methods used to achieve a different
understanding of the data. (2) Predict the machine
failure with a high degree of accuracy using the RSF
model, which is trained with optimal features. The
proposed method yields superior performance compared to
other similar models, with an impressive C-index
accuracy rate of approximately 97\%. The consistency of
the model's predictions makes it viable in large-scale
systems, where it can be used to improve the
performance and security of these systems while also
lowering their overall cost and longevity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hurst:2023:DAM,
author = "William Hurst and Orestis Spyrou and Bedir
Tekinerdogan and Caspar Krampe",
title = "Digital Art and the Metaverse: Benefits and
Challenges",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "188--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060188",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/188",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Guidi:2023:NNR,
author = "Barbara Guidi and Andrea Michienzi",
title = "From {NFT 1.0} to {NFT 2.0}: a Review of the Evolution
of Non-Fungible Tokens",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "189--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060189",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/189",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Azeroual:2023:ESG,
author = "Otmane Azeroual and Renaud Fabre and Uta St{\"o}rl and
and Ruidong Qi",
title = "Elastic Stack and {GRAPHYP} Knowledge Graph of {Web}
Usage: a Win--Win Workflow for Semantic
Interoperability in Decision Making",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "190--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060190",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/190",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Patrickson:2023:DCD,
author = "Bronwin Patrickson and Mike Musker and Dan Thorpe and
Yasmin van Kasteren and Niranjan Bidargaddi",
title = "In-Depth Co-Design of Mental Health Monitoring
Technologies by People with Lived Experience",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "191--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060191",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/191",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Roumeliotis:2023:COA,
author = "Konstantinos I. Roumeliotis and Nikolaos D. Tselikas",
title = "{ChatGPT} and Open-{AI} Models: a Preliminary Review",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "192--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060192",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/192",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Majeed:2023:DLB,
author = "Abdul Majeed and Abdullah M. Alnajim and Athar Waseem
and Aleem Khaliq and Aqdas Naveed and Shabana Habib and
Muhammad Islam and Sheroz Khan",
title = "Deep Learning-Based Symptomizing Cyber Threats Using
Adaptive {5G} Shared Slice Security Approaches",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "193--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060193",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/193",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gao:2023:RDD,
author = "Han Gao and Zhangqin Huang and Xiaobo Zhang and
Huapeng Yang",
title = "Research and Design of a Decentralized
Edge-Computing-Assisted {LoRa} Gateway",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "194--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060194",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/194",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chen:2023:FCU,
author = "Renjie Chen and Nalini Ravishanker",
title = "Feature Construction Using Persistence Landscapes for
Clustering Noisy {IoT} Time Series",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "195--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060195",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/195",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wali:2023:TAI,
author = "Abdul Wali and Saipunidzam Mahamad and Suziah
Sulaiman",
title = "Task Automation Intelligent Agents: a Review",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "196--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060196",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/196",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhu:2023:HCW,
author = "Yiming Zhu and Dehua Zhou and Yuan Li and Beibei Song
and Chuansheng Wang",
title = "How Can We Achieve Query Keyword Frequency Analysis in
Privacy-Preserving Situations?",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "197--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060197",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/197",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Csirmaz:2023:SMF,
author = "Elod P. Csirmaz and Laszlo Csirmaz",
title = "Synchronizing Many Filesystems in Near Linear Time",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "198--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060198",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/198",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Musa:2023:DNN,
author = "Abubakar Ahmad Musa and Adamu Hussaini and Weixian
Liao and Fan Liang and Wei Yu",
title = "Deep Neural Networks for Spatial-Temporal
Cyber-Physical Systems: a Survey",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "199--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060199",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/199",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ismail:2023:SWS,
author = "Shereen Ismail and Diana W. Dawoud and Hassan Reza",
title = "Securing Wireless Sensor Networks Using Machine
Learning and Blockchain: a Review",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "200--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060200",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/200",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pticek:2023:MAI,
author = "Martina Pticek and Jasminka Dobsa",
title = "Methods of Annotating and Identifying Metaphors in the
Field of Natural Language Processing",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "201--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060201",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/201",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Munoz:2023:PAD,
author = "Ernesto Cadena Mu{\~n}oz and Gustavo Chica Pedraza and
Rafael Cubillos-S{\'a}nchez and Alexander Aponte-Moreno
and M{\'o}nica Espinosa Buitrago",
title = "{PUE} Attack Detection by Using {DNN} and Entropy in
Cooperative Mobile Cognitive Radio Networks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "202--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060202",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/202",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{AlAsqah:2023:FLB,
author = "Muneerah {Al Asqah} and Tarek Moulahi",
title = "Federated Learning and Blockchain Integration for
Privacy Protection in the {Internet of Things}:
Challenges and Solutions",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "203--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060203",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/203",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ilie:2023:ADH,
author = "Dragos Ilie and H{\aa}kan Grahn and Lars Lundberg and
Alexander Westerhagen and Bo Granbom and Anders
H{\"o}{\"o}k",
title = "Avoiding Detection by Hostile Nodes in Airborne
Tactical Networks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "204--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060204",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/204",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Guo:2023:SSR,
author = "Yu Guo and Guigen Nie and Wenliang Gao and Mi Liao",
title = "{2D} Semantic Segmentation: Recent Developments and
Future Directions",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "205--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060205",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/205",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fic:2023:ADH,
author = "Pawe{\l} Fic and Adam Czornik and Piotr Rosikowski",
title = "Anomaly Detection for Hydraulic Power Units --- a Case
Study",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "206--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060206",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/206",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pliatsios:2023:SSS,
author = "Antonios Pliatsios and Dimitrios Lymperis and Christos
Goumopoulos",
title = "{S2NetM}: a Semantic Social Network of Things
Middleware for Developing Smart and Collaborative
{IoT}-Based Solutions",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "207--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060207",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/207",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ahmed:2023:BSS,
author = "Khaled A. M. Ahmed and Sabry F. Saraya and John F.
Wanis and Amr M. T. Ali-Eldin",
title = "A Blockchain Self-Sovereign Identity for Open Banking
Secured by the {Customer}'s Banking Cards",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "208--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060208",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/208",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Xu:2023:DBM,
author = "Tongyang Xu and Yuan Liu and Zhaotai Ma and Yiqiang
Huang and Peng Liu",
title = "A {DQN}-Based Multi-Objective Participant Selection
for Efficient Federated Learning",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "209--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060209",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/209",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Koirala:2023:EID,
author = "Ashish Koirala and Rabindra Bista and Joao C.
Ferreira",
title = "Enhancing {IoT} Device Security through Network Attack
Data Analysis Using Machine Learning Algorithms",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "210--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060210",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/210",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pergantis:2023:SOA,
author = "Minas Pergantis and Iraklis Varlamis and Nikolaos
Grigorios Kanellopoulos and Andreas Giannakoulopoulos",
title = "Searching Online for Art and Culture: User Behavior
Analysis",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "211--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060211",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/211",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Si:2023:RBD,
author = "Honghao Si and Baoning Niu",
title = "Research on Blockchain Data Availability and Storage
Scalability",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "212--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060212",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/212",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bashir:2023:BBL,
author = "Syed Raza Bashir and Shaina Raza and Vojislav B.
Misic",
title = "{BERT4Loc}: {BERT} for Location-{POI} Recommender
System",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "213--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060213",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/213",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhu:2023:TAM,
author = "Jinting Zhu and Julian Jang-Jaccard and Amardeep Singh
and Paul A. Watters and Seyit Camtepe",
title = "Task-Aware Meta Learning-Based {Siamese} Neural
Network for Classifying Control Flow Obfuscated
Malware",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "214--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060214",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/214",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ou:2023:DCF,
author = "Yuanyou Ou and Baoning Niu",
title = "Dual-Channel Feature Enhanced Collaborative Filtering
Recommendation Algorithm",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "215--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060215",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/215",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sun:2023:MTA,
author = "Yiming Sun and Tatsuo Nakajima",
title = "Mitigating Technological Anxiety through the
Application of Natural Interaction in Mixed Reality
Systems",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "216--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060216",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/216",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lehniger:2023:TWE,
author = "Kai Lehniger and Peter Langend{\"o}rfer",
title = "Through the Window: Exploitation and Countermeasures
of the {ESP32} Register Window Overflow",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "217--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060217",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/217",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gheyas:2023:OMD,
author = "Iffat Gheyas and Alessandro Raschella and Michael
Mackay",
title = "Optimal Meshing Degree Performance Analysis in a
{mmWave} {FWA} {5G} Network Deployment",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "218--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060218",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/218",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bushur:2023:NNE,
author = "Jacob Bushur and Chao Chen",
title = "Neural Network Exploration for Keyword Spotting on
Edge Devices",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "219--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060219",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/219",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Khan:2023:RDP,
author = "Imran Moez Khan and Andrew Thompson and Akram
Al-Hourani and Kandeepan Sithamparanathan and Wayne S.
T. Rowe",
title = "{RSSI} and Device Pose Fusion for Fingerprinting-Based
Indoor Smartphone Localization Systems",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "6",
pages = "220--??",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15060220",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/6/220",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liotou:2023:CEA,
author = "Eirini Liotou and Dionysis Xenakis and Vasiliki
Georgara and Georgios Kourouniotis and Lazaros
Merakos",
title = "Cache-Enabled Adaptive Video Streaming: a {QoE}-Based
Evaluation Study",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "221--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070221",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/221",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yin:2023:BTT,
author = "Zhenzhong Yin and Bin Zhang",
title = "Bus Travel Time Prediction Based on the Similarity in
Drivers' Driving Styles",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "222--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070222",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/222",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Avanzato:2023:HDM,
author = "Roberta Avanzato and Francesco Beritelli and Alfio
Lombardo and Carmelo Ricci",
title = "Heart {DT}: Monitoring and Preventing Cardiac
Pathologies Using {AI} and {IoT} Sensors",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "223--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070223",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/223",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bocci:2023:SPC,
author = "Alessandro Bocci and Stefano Forti and Roberto
Guanciale and Gian-Luigi Ferrari and Antonio Brogi",
title = "Secure Partitioning of Cloud Applications, with Cost
Look-Ahead",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "224--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070224",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/224",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sone:2023:OST,
author = "Takuro Sone and Shin Kato and Ray Atarashi and Jin
Nakazato and Manabu Tsukada and Hiroshi Esaki",
title = "An Ontology for Spatio-Temporal Media Management and
an Interactive Application",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "225--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070225",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/225",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Haimed:2023:EMV,
author = "Ibrahim Bu Haimed and Marwan Albahar and Ali
Alzubaidi",
title = "Exploiting Misconfiguration Vulnerabilities in
{Microsoft}'s {Azure} Active Directory for Privilege
Escalation Attacks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "226--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070226",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/226",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Villafuerte:2023:AIV,
author = "Naythan Villafuerte and Santiago Manzano and Paulina
Ayala and Marcelo V. Garc{\'\i}a",
title = "Artificial Intelligence in Virtual Telemedicine
Triage: a Respiratory Infection Diagnosis Tool with
Electronic Measuring Device",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "227--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070227",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/227",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{DellImmagine:2023:KDM,
author = "Giorgio Dell'Immagine and Jacopo Soldani and Antonio
Brogi",
title = "{KubeHound}: Detecting Microservices' Security Smells
in {Kubernetes} Deployments",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "228--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070228",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/228",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rudwan:2023:HFS,
author = "Mohammed Suleiman Mohammed Rudwan and Jean Vincent
Fonou-Dombeu",
title = "Hybridizing Fuzzy String Matching and Machine Learning
for Improved Ontology Alignment",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "229--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070229",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/229",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Serina:2023:SAF,
author = "Lorenzo Serina and Luca Putelli and Alfonso Emilio
Gerevini and Ivan Serina",
title = "Synonyms, Antonyms and Factual Knowledge in {BERT}
Heads",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "230--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070230",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/230",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sufi:2023:NAB,
author = "Fahim Sufi",
title = "A New {AI}-Based Semantic Cyber Intelligence Agent",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "231--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070231",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/231",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pinna:2023:ISA,
author = "Andrea Pinna and Maria Ilaria Lunesu and Stefano
Orr{\`u} and Roberto Tonelli",
title = "Investigation on Self-Admitted Technical Debt in
Open-Source Blockchain Projects",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "232--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070232",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/232",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Reis:2023:DCV,
author = "Manuel J. C. S. Reis",
title = "Developments of Computer Vision and Image Processing:
Methodologies and Applications",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "233--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070233",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/233",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tang:2023:IVS,
author = "Xiangdong Tang and Fei Chen and Yunlong He",
title = "Intelligent Video Streaming at Network Edge: an
Attention-Based Multiagent Reinforcement Learning
Solution",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "234--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070234",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/234",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Karabila:2023:ECF,
author = "Ikram Karabila and Nossayba Darraz and Anas El-Ansari
and Nabil Alami and Mostafa {El Mallahi}",
title = "Enhancing Collaborative Filtering-Based Recommender
System Using Sentiment Analysis",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "235--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070235",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/235",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bagui:2023:UGE,
author = "Sikha S. Bagui and Dustin Mink and Subhash C. Bagui
and Michael Plain and Jadarius Hill and Marshall Elam",
title = "Using a Graph Engine to Visualize the Reconnaissance
Tactic of the {MITRE ATT\&CK} Framework from
{UWF-ZeekData22}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "236--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070236",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/236",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Battistoni:2023:CPS,
author = "Pietro Battistoni and Andrea Antonio Cantone and
Gerardo Martino and Valerio Passamano and Marco Romano
and Monica Sebillo and Giuliana Vitiello",
title = "A Cyber-Physical System for Wildfire Detection and
Firefighting",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "237--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070237",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/237",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Younes:2023:ADS,
author = "Maram Bani Younes",
title = "Assisting Drivers at Stop Signs in a Connected Vehicle
Environment",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "238--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070238",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/238",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Haralambous:2023:BSW,
author = "Yannis Haralambous and Philippe Lenca",
title = "Beyond the Semantic {Web}: Towards an Implicit
Pragmatic {Web} and a {Web} of Social Representations",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "239--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070239",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/239",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cheng:2023:ATM,
author = "Bingbing Cheng and Jiao Wu",
title = "Acoustic {TDOA} Measurement and Accurate Indoor
Positioning for Smartphone",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "240--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070240",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/240",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mesbah:2023:AIS,
author = "Mohamed Mesbah and Mahmoud Said Elsayed and Anca Delia
Jurcut and Marianne Azer",
title = "Analysis of {ICS} and {SCADA} Systems Attacks Using
Honeypots",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "241--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070241",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/241",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Roka:2023:ODC,
author = "Rastislav R{\'o}ka",
title = "Optimization of the Decision Criterion for Increasing
the Bandwidth Utilization by Means of the Novel
Effective {DBA} Algorithm in {NG-PON2} Networks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "242--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070242",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/242",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{AlLail:2023:MLN,
author = "Mustafa {Al Lail} and Alejandro Garcia and Saul
Olivo",
title = "Machine Learning for Network Intrusion Detection --- a
Comparative Study",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "243--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070243",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/243",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Johnphill:2023:SHC,
author = "Obinna Johnphill and Ali Safaa Sadiq and Feras
Al-Obeidat and Haider Al-Khateeb and Mohammed Adam
Taheir and Omprakash Kaiwartya and Mohammed Ali",
title = "Self-Healing in Cyber-Physical Systems Using Machine
Learning: a Critical Analysis of Theories and Tools",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "244--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070244",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/244",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Phan:2023:ISM,
author = "Vu Hien Phan and Danh Phan Hong Pham and Tran Vu Pham
and Kashif Naseer Qureshi and Cuong Pham-Quoc",
title = "An {IoT} System and {MODIS} Images Enable Smart
Environmental Management for {Mekong Delta}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "245--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070245",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/245",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Aoyagi:2023:API,
author = "Shunji Aoyagi and Yuki Horie and Do Thi Thu Hien and
Thanh Duc Ngo and Duy-Dinh Le and Kien Nguyen and Hiroo
Sekiya",
title = "An Accurate Platform for Investigating {TCP}
Performance in {Wi-Fi} Networks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "246--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070246",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/246",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hu:2023:CMN,
author = "Yang Hu and Liangliang Gong and Xinyang Li and Hui Li
and Ruoxin Zhang and Rentao Gu",
title = "A Carrying Method for {5G} Network Slicing in Smart
Grid Communication Services Based on Neural Network",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "247--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070247",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/247",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bhurtel:2023:ULO,
author = "Manish Bhurtel and Danda B. Rawat",
title = "Unveiling the Landscape of Operating System
Vulnerabilities",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "7",
pages = "248--??",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15070248",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Aug 2 06:19:58 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/7/248",
acknowledgement = ack-nhfb,
fjournal = "Future Internet",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jadhav:2023:ITA,
author = "Hindavi Kishor Jadhav and Vinoth Babu Kumaravelu and
Arthi Murugadass and Agbotiname Lucky Imoize and
Poongundran Selvaprabhu and Arunkumar Chandrasekhar",
title = "Intelligent Transmit Antenna Selection Schemes for
High-Rate Fully Generalized Spatial Modulation",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "281",
day = "21",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080281",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/281",
abstract = "The sixth-generation (6G) network is supposed to
transmit significantly more data at much quicker rates
than existing networks while meeting severe energy
efficiency (EE) targets. The high-rate spatial
modulation (SM) methods can be used to deal with these
design metrics. SM uses transmit antenna selection
(TAS) practices to improve the EE of the network.
Although it is computationally intensive, free distance
optimized TAS (FD-TAS) is the best for performing the
average bit error rate (ABER). The present
investigation aims to examine the effectiveness of
various machine learning (ML)-assisted TAS practices,
such as support vector machine (SVM), na{\"\i}ve Bayes
(NB), K -nearest neighbor (KNN), and decision tree
(DT), to the small-scale multiple-input multiple-output
(MIMO)-based fully generalized spatial modulation
(FGSM) system. To the best of our knowledge, there is
no ML-based antenna selection schemes for high-rate
FGSM. SVM-based TAS schemes achieve {\sim}71.1\%
classification accuracy, outperforming all other
approaches. The ABER performance of each scheme is
evaluated using a higher constellation order, along
with various transmit antennas to achieve the target
ABER of {10$-$5}. By employing SVM for TAS, FGSM can
achieve a minimal gain of {\sim}2.2 dB over FGSM
without TAS (FGSM-NTAS). All TAS strategies based on ML
perform better than FGSM-NTAS.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Obonna:2023:DMM,
author = "Ugochukwu Onyekachi Obonna and Felix Kelechi Opara and
Christian Chidiebere Mbaocha and Jude-Kennedy Chibuzo
Obichere and Isdore Onyema Akwukwaegbu and Miriam
Mmesoma Amaefule and Cosmas Ifeanyi Nwakanma",
title = "Detection of Man-in-the-Middle {(MitM)} Cyber-Attacks
in Oil and Gas Process Control Networks Using Machine
Learning Algorithms",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "280",
day = "21",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080280",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/280",
abstract = "Recently, the process control network (PCN) of oil and
gas installation has been subjected to amorphous
cyber-attacks. Examples include the denial-of-service
(DoS), distributed denial-of-service (DDoS), and
man-in-the-middle (MitM) attacks, and this may have
largely been caused by the integration of open network
to operation technology (OT) as a result of low-cost
network expansion. The connection of OT to the internet
for firmware updates, third-party support, or the
intervention of vendors has exposed the industry to
attacks. The inability to detect these unpredictable
cyber-attacks exposes the PCN, and a successful attack
can lead to devastating effects. This paper reviews the
different forms of cyber-attacks in PCN of oil and gas
installations while proposing the use of machine
learning algorithms to monitor data exchanges between
the sensors, controllers, processes, and the final
control elements on the network to detect anomalies in
such data exchanges. Python 3.0 Libraries,
Deep-Learning Toolkit, MATLAB, and Allen Bradley
RSLogic 5000 PLC Emulator software were used in
simulating the process control. The outcomes of the
experiments show the reliability and functionality of
the different machine learning algorithms in detecting
these anomalies with significant precise attack
detections identified using tree algorithms (bagged or
coarse ) for man-in-the-middle (MitM) attacks while
taking note of accuracy-computation complexity
trade-offs.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Salam:2023:CBD,
author = "Abdu Salam and Qaisar Javaid and Masood Ahmad and
Ishtiaq Wahid and Muhammad Yeasir Arafat",
title = "Cluster-Based Data Aggregation in Flying Sensor
Networks Enabled {Internet of Things}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "279",
day = "20",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080279",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/279",
abstract = "Multiple unmanned aerial vehicles (UAVs) are organized
into clusters in a flying sensor network (FSNet) to
achieve scalability and prolong the network lifetime.
There are a variety of optimization schemes that can be
adapted to determine the cluster head (CH) and to form
stable and balanced clusters. Similarly, in FSNet,
duplicated data may be transmitted to the CHs when
multiple UAVs monitor activities in the vicinity where
an event of interest occurs. The communication of
duplicate data may consume more energy and bandwidth
than computation for data aggregation. This paper
proposes a honey-bee algorithm (HBA) to select the
optimal CH set and form stable and balanced clusters.
The modified HBA determines CHs based on the residual
energy, UAV degree, and relative mobility. To transmit
data, the UAV joins the nearest CH. The re-affiliation
rate decreases with the proposed stable clustering
procedure. Once the cluster is formed, ordinary UAVs
transmit data to their UAVs-CH. An aggregation method
based on dynamic programming is proposed to save energy
consumption and bandwidth. The data aggregation
procedure is applied at the cluster level to minimize
communication and save bandwidth and energy. Simulation
experiments validated the proposed scheme. The
simulation results are compared with recent
cluster-based data aggregation schemes. The results
show that our proposed scheme outperforms
state-of-the-art cluster-based data aggregation schemes
in FSNet.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mousa:2023:IDL,
author = "Amthal K. Mousa and Mohammed Najm Abdullah",
title = "An Improved Deep Learning Model for {DDoS} Detection
Based on Hybrid Stacked Autoencoder and Checkpoint
Network",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "278",
day = "19",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080278",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/278",
abstract = "The software defined network (SDN) collects network
traffic data and proactively manages networks. SDN's
programmability makes it excellent for developing
distributed applications, cybersecurity, and
decentralized network control in multitenant data
centers. This exceptional architecture is vulnerable to
security concerns, such as distributed denial of
service (DDoS) attacks. DDoS attacks can be very
serious due to the fact that they prevent authentic
users from accessing, temporarily or indefinitely,
resources they would normally expect to have. Moreover,
there are continuous efforts from attackers to produce
new techniques to avoid detection. Furthermore, many
existing DDoS detection methods now in use have a high
potential for producing false positives. This motivates
us to provide an overview of the research studies that
have already been conducted in this area and point out
the strengths and weaknesses of each of those
approaches. Hence, adopting an optimal detection method
is necessary to overcome these issues. Thus, it is
crucial to accurately detect abnormal flows to maintain
the availability and security of the network. In this
work, we propose hybrid deep learning algorithms, which
are the long short-term memory network (LSTM) and
convolutional neural network (CNN) with a stack
autoencoder for DDoS attack detection and checkpoint
network, which is a fault tolerance strategy for
long-running processes. The proposed approach is
trained and tested with the aid of two DDoS attack
datasets in the SDN environment: the DDoS attack SDN
dataset and Botnet dataset. The results show that the
proposed model achieves a very high accuracy, reaching
99.99\% in training, 99.92\% in validation, and 100\%
in precision, recall, and F1 score with the DDoS attack
SDN dataset. Also, it achieves 100\% in all metrics
with the Botnet dataset. Experimental results reveal
that our proposed model has a high feature extraction
ability and high performance in detecting attacks. All
performance metrics indicate that the proposed approach
is appropriate for a real-world flow detection
environment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fragiadakis:2023:AML,
author = "George Fragiadakis and Evangelia Filiopoulou and
Christos Michalakelis and Thomas Kamalakis and Mara
Nikolaidou",
title = "Applying Machine Learning in Cloud Service Price
Prediction: The Case of {Amazon IaaS}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "277",
day = "19",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080277",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/277",
abstract = "When exploring alternative cloud solution designs, it
is important to also consider cost. Thus, having a
comprehensive view of the cloud market and future price
evolution allows well-informed decisions to choose
between alternatives. Cloud providers offer various
service types with different pricing policies.
Currently, infrastructure-as-a-Service (IaaS) is
considered the most mature cloud service, while
reserved instances, where virtual machines are reserved
for a fixed period of time, have the largest market
share. In this work, we employ a machine-learning
approach based on the CatBoost algorithm to explore a
price-prediction model for the reserve instance market.
The analysis is based on historical data provided by
Amazon Web Services from 2016 to 2022. Early results
demonstrate the machine-learning model's ability to
capture the underlying evolution patterns and predict
future trends. Findings suggest that prediction
accuracy is not improved by integrating data from older
time periods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lymperis:2023:SPS,
author = "Dimitrios Lymperis and Christos Goumopoulos",
title = "{SEDIA}: A Platform for Semantically Enriched {IoT}
Data Integration and Development of Smart City
Applications",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "276",
day = "18",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080276",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/276",
abstract = "The development of smart city applications often
encounters a variety of challenges. These include the
need to address complex requirements such as
integrating diverse data sources and incorporating
geographical data that reflect the physical urban
environment. Platforms designed for smart cities hold a
pivotal position in materializing these applications,
given that they offer a suite of high-level services,
which can be repurposed by developers. Although a
variety of platforms are available to aid the creation
of smart city applications, most fail to couple their
services with geographical data, do not offer the
ability to execute semantic queries on the available
data, and possess restrictions that could impede the
development process. This paper introduces SEDIA, a
platform for developing smart applications based on
diverse data sources, including geographical
information, to support a semantically enriched data
model for effective data analysis and integration. It
also discusses the efficacy of SEDIA in a
proof-of-concept smart city application related to air
quality monitoring. The platform utilizes ontology
classes and properties to semantically annotate
collected data, and the Neo4j graph database
facilitates the recognition of patterns and
relationships within the data. This research also
offers empirical data demonstrating the performance
evaluation of SEDIA. These contributions collectively
advance our understanding of semantically enriched data
integration within the realm of smart city
applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ray:2023:OWI,
author = "Partha Pratim Ray",
title = "An Overview of {WebAssembly} for {IoT}: Background,
Tools, State-of-the-Art, Challenges, and Future
Directions",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "275",
day = "18",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080275",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/275",
abstract = "This paper explores the relationship between two
emerging technologies, WebAssembly (Wasm) and the
Internet of Things (IoT). It examines the complementary
roles of these technologies and their impact on modern
web applications. First, it delves into the
capabilities of Wasm as a high-performance binary
format that allows developers to leverage low-level
languages for computationally intensive tasks. Second,
it seeks to explain why integration of IoT and Wasm is
important. Third, it discusses the strengths and
limitations of various tools and tool chains that are
crucial for Wasm development and implementation, with a
special focus on IoT. Fourth, it presents the
state-of-the-art with regard to advances that combine
both technologies. Fifth, it discusses key challenges
and provides future directions. Lastly, it provides an
in-depth elaboration of the future aspects of Wasm,
with a strong focus on IoT, concluding that IoT and
Wasm can provide developers with a versatile toolkit
that enables them to balance productivity and
performance in both web and non-web development
scenarios. The collaborative use of these technologies
opens up new possibilities for pushing the boundaries
of web application development in terms of
interactivity, security, portability, scalability, and
efficient computational capabilities. As web and
non-web embeddings continue to evolve, the integration
of IoT and Wasm will play a crucial role in shaping the
future of innovative application development. The key
findings of this extensive review work suggest that
existing tool sets can be easily conglomerated together
to form a new era in WebAssembly--IoT infrastructure
for low-power, energy-efficient, and secure edge--IoT
ecosystems with near-native execution speed.
Furthermore, the expansion of edge--IoT ecosystems can
be augmented with prospective cloud-side deployments.
However, there remains a strong need to more cohesively
advance the amalgamation of Wasm and IoT technologies
in the near future.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gonzalez:2023:LLV,
author = "Luis F. Gonzalez and Ivan Vidal and Francisco Valera
and Raul Martin and Dulce Artalejo",
title = "A Link-Layer Virtual Networking Solution for
Cloud-Native Network Function Virtualisation
Ecosystems: {L2S-M}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "274",
day = "17",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080274",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/274",
abstract = "Microservices have become promising candidates for the
deployment of network and vertical functions in the
fifth generation of mobile networks. However,
microservice platforms like Kubernetes use a flat
networking approach towards the connectivity of
virtualised workloads, which prevents the deployment of
network functions on isolated network segments (for
example, the components of an IP Telephony system or a
content distribution network). This paper presents
L2S-M, a solution that enables the connectivity of
Kubernetes microservices over isolated link-layer
virtual networks, regardless of the compute nodes where
workloads are actually deployed. L2S-M uses
software-defined networking (SDN) to fulfil this
purpose. Furthermore, the L2S-M design is flexible to
support the connectivity of Kubernetes workloads across
different Kubernetes clusters. We validate the
functional behaviour of our solution in a moderately
complex Smart Campus scenario, where L2S-M is used to
deploy a content distribution network, showing its
potential for the deployment of network services in
distributed and heterogeneous environments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Coutinho:2023:EAD,
author = "Micael Coutinho and Jose A. Afonso and S{\'e}rgio F.
Lopes",
title = "An Efficient Adaptive Data-Link-Layer Architecture for
{LoRa} Networks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "273",
day = "17",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080273",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/273",
abstract = "LoRa is one of the most popular low-power wireless
network technologies for implementation of the Internet
of Things, with the advantage of providing long-range
communication, but lower data rates, when compared with
technologies such as Zigbee or Bluetooth. LoRa is a
single-channel physical layer technology on top of
which LoRaWAN implements a more complex multi-channel
network with enhanced functionalities, such as adaptive
data rate. However, LoRaWAN relies on expensive
hardware to support these functionalities. This paper
proposes a LoRa data-link-layer architecture based on a
multi-layer star network topology that adapts relevant
LoRa parameters for each end node dynamically taking
into account its link distance and quality in order to
balance communication range and energy consumption. The
developed solution is comprised of multiple components,
including a LoRa parameter calculator to help the user
to configure the network parameters, a contention-free
MAC protocol to avoid collisions, and an adaptive
spreading factor and transmission power mechanism.
These components work together to ensure a more
efficient use of the chosen ISM band and end node
resources, but with low-cost implementation and
operation requirements.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Stach:2023:SIS,
author = "Christoph Stach and Cl{\'e}mentine Gritti",
title = "Special Issue on Security and Privacy in Blockchains
and the {IoT} Volume {II}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "272",
day = "16",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080272",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/272",
abstract = "LoRa is one of the most popular low-power wireless
network technologies for implementation of the Internet
of Things, with the advantage of providing long-range
communication, but lower data rates, when compared with
technologies such as Zigbee or Bluetooth. LoRa is a
single-channel physical layer technology on top of
which LoRaWAN implements a more complex multi-channel
network with enhanced functionalities, such as adaptive
data rate. However, LoRaWAN relies on expensive
hardware to support these functionalities. This paper
proposes a LoRa data-link-layer architecture based on a
multi-layer star network topology that adapts relevant
LoRa parameters for each end node dynamically taking
into account its link distance and quality in order to
balance communication range and energy consumption. The
developed solution is comprised of multiple components,
including a LoRa parameter calculator to help the user
to configure the network parameters, a contention-free
MAC protocol to avoid collisions, and an adaptive
spreading factor and transmission power mechanism.
These components work together to ensure a more
efficient use of the chosen ISM band and end node
resources, but with low-cost implementation and
operation requirements.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rajawat:2023:QML,
author = "Anand Singh Rajawat and S. B. Goyal and Pradeep Bedi
and Tony Jan and Md Whaiduzzaman and Mukesh Prasad",
title = "Quantum Machine Learning for Security Assessment in
the {Internet of Medical Things (IoMT)}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "271",
day = "15",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080271",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/271",
abstract = "Internet of Medical Things (IoMT) is an ecosystem
composed of connected electronic items such as small
sensors/actuators and other cyber-physical devices
(CPDs) in medical services. When these devices are
linked together, they can support patients through
medical monitoring, analysis, and reporting in more
autonomous and intelligent ways. The IoMT devices;
however, often do not have sufficient computing
resources onboard for service and security assurance
while the medical services handle large quantities of
sensitive and private health-related data. This leads
to several research problems on how to improve security
in IoMT systems. This paper focuses on quantum machine
learning to assess security vulnerabilities in IoMT
systems. This paper provides a comprehensive review of
both traditional and quantum machine learning
techniques in IoMT vulnerability assessment. This paper
also proposes an innovative fused semi-supervised
learning model, which is compared to the
state-of-the-art traditional and quantum machine
learning in an extensive experiment. The experiment
shows the competitive performance of the proposed model
against the state-of-the-art models and also highlights
the usefulness of quantum machine learning in IoMT
security assessments and its future applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Askhedkar:2023:LCU,
author = "Anjali R. Askhedkar and Bharat S. Chaudhari and Maha
Abdelhaq and Raed Alsaqour and Rashid Saeed and Marco
Zennaro",
title = "{LoRa} Communication Using {TVWS} Frequencies: Range
and Data Rate",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "270",
day = "14",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080270",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/270",
abstract = "Low power wide area network (LPWAN) is a wireless
communication technology that offers large coverage,
low data rates, and low power consumption, making it a
suitable choice for the growing Internet of Things and
machine-to-machine communication applications. Long
range (LoRa), an LPWAN technology, has recently been
used in the industrial, scientific and medical (ISM)
band for various low-power wireless applications. The
coverage and data rate supported by these devices in
the ISM band is well-studied in the literature. In this
paper, we study the usage of TV white spaces (TVWS) for
LoRa transmissions to address the growing spectrum
demand. Additionally, the range and data rate of
TVWS-based LoRa, for different transmission parameter
values using different path-loss models and for various
scenarios such as free space, outdoor and indoor are
investigated. A path-loss model for TVWS-based LoRa is
also proposed and explored, and the evaluations show
that TVWS offers a longer range. This range and data
rate study would be useful for efficient network
planning and system design for TVWS-based LoRa
LPWANs.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Salah:2023:ENS,
author = "Zaher Salah and Esraa Abu Elsoud",
title = "Enhancing Network Security: A Machine Learning-Based
Approach for Detecting and Mitigating {Krack} and
{Kr00k} Attacks in {IEEE 802.11}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "269",
day = "14",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080269",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/269",
abstract = "The rise in internet users has brought with it the
impending threat of cybercrime as the Internet of
Things (IoT) increases and the introduction of 5G
technologies continues to transform our digital world.
It is now essential to protect communication networks
from illegal intrusions to guarantee data integrity and
user privacy. In this situation, machine learning
techniques used in data mining have proven to be
effective tools for constructing intrusion detection
systems (IDS) and improving their precision. We use the
well-known AWID3 dataset, a comprehensive collection of
wireless network traffic, to investigate the
effectiveness of machine learning in enhancing network
security. Our work primarily concentrates on Krack and
Kr00k attacks, which target the most recent and
dangerous flaws in IEEE 802.11 protocols. Through
diligent implementation, we were able to successfully
identify these threats using an IDS model that is based
on machine learning. Notably, the resilience of our
method was demonstrated by our ensemble classifier's
astounding 99\% success rate in detecting the Krack
attack. The effectiveness of our suggested remedy was
further demonstrated by the high accuracy rate of
96.7\% displayed by our neural network-based model in
recognizing instances of the Kr00k attack. Our research
shows the potential for considerably boosting network
security in the face of new threats by leveraging the
capabilities of machine learning and a diversified
dataset. Our findings open the door for stronger, more
proactive security measures to protect IEEE. 802.11
networks' integrity, resulting in a safer online
environment for all users.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Arici:2023:RWI,
author = "Nicola Arici and Alfonso Emilio Gerevini and Matteo
Olivato and Luca Putelli and Luca Sigalini and Ivan
Serina",
title = "Real-World Implementation and Integration of an
Automatic Scoring System for Workplace Safety Courses
in {Italian}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "268",
day = "12",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080268",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/268",
abstract = "Artificial Intelligence and Natural Language
Processing techniques can have a very significant
impact on the e-learning sector, with the introduction
of chatbots, automatic correctors, or scoring systems.
However, integrating such technologies into the
business environment in an effective way is not a
trivial operation, and it not only requires realising a
model with good predictive performance, but also it
requires the following: (i) a proper study of the task,
(ii) a data collection process, (iii) a real-world
evaluation of its utility. Moreover, it is also very
important to build an entire IT infrastructure that
connects the AI system with the company database, with
the human employees, the users, etc. In this work, we
present a real-world system, based on the
state-of-the-art BERT model, which implements an
automatic scoring system for open-ended questions
written in Italian. More specifically, these questions
pertain to the workplace safety courses which every
worker must attend by law, often via e-learning
platforms such as the one offered by Mega Italia Media.
This article describes how our system has been
designed, evaluated, and finally deployed for
commercial use with complete integration with the other
services provided by the company.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rajaei:2023:SPD,
author = "Mohammad Javad Rajaei and Qusay H. Mahmoud",
title = "A Survey on Pump and Dump Detection in the
Cryptocurrency Market Using Machine Learning",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "267",
day = "11",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080267",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/267",
abstract = "The popularity of cryptocurrencies has skyrocketed in
recent years, with blockchain technologies enabling the
development of new digital assets. However, along with
their advantages, such as lower transaction costs,
increased security, and transactional transparency,
cryptocurrencies have also become susceptible to
various forms of market manipulation. The pump and dump
(P\&D) scheme is of significant concern among these
manipulation tactics. Despite the growing awareness of
P\&D activities in cryptocurrency markets, a
comprehensive survey is needed to explore the detection
methods. This paper aims to fill this gap by reviewing
the literature on P\&D detection in the cryptocurrency
world. This survey provides valuable insights into
detecting and classifying P\&D schemes in the
cryptocurrency market by analyzing the selected
studies, including their definitions and the taxonomies
of P\&D schemes, the methodologies employed, their
strengths and weaknesses, and the proposed solutions.
Presented here are insights that can guide future
research in this field and offer practical approaches
to combating P\&D manipulations in cryptocurrency
trading.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Iqbal:2023:ESC,
author = "Asad Iqbal and Muhammad Zubair and Muhammad Asghar
Khan and Insaf Ullah and Ghani Ur-Rehman and Alexey V.
Shvetsov and Fazal Noor",
title = "An Efficient and Secure Certificateless Aggregate
Signature Scheme for Vehicular Ad hoc Networks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "266",
day = "10",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080266",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/266",
abstract = "Vehicular ad hoc networks (VANETs) have become an
essential part of the intelligent transportation system
because they provide secure communication among
vehicles, enhance vehicle safety, and improve the
driving experience. However, due to the openness and
vulnerability of wireless networks, the participating
vehicles in a VANET system are prone to a variety of
cyberattacks. To secure the privacy of vehicles and
assure the authenticity, integrity, and nonrepudiation
of messages, numerous signature schemes have been
employed in the literature on VANETs. The majority of
these solutions, however, are either not fully secured
or entail high computational costs. To address the
above issues and to enable secure communication between
the vehicle and the roadside unit (RSU), we propose a
certificateless aggregate signature (CLAS) scheme based
on hyperelliptic curve cryptography (HECC). This scheme
enables participating vehicles to share their
identities with trusted authorities via an open
wireless channel without revealing their identities to
unauthorized participants. Another advantage of this
approach is its capacity to release the partial private
key to participating devices via an open wireless
channel while keeping its identity secret from any
other third parties. A provable security analysis
through the random oracle model (ROM), which relies on
the hyperelliptic curve discrete logarithm problem, is
performed, and we have proven that the proposed scheme
is unforgeable against Type 1 ( FGR1 ) and Type 2 (
FGR2 ) forgers. The proposed scheme is compared with
relevant schemes in terms of computational cost and
communication overhead, and the results demonstrate
that the proposed scheme is more efficient than the
existing schemes in maintaining high-security levels.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mukasine:2023:CAM,
author = "Angelique Mukasine and Louis Sibomana and Kayalvizhi
Jayavel and Kizito Nkurikiyeyezu and Eric Hitimana",
title = "Correlation Analysis Model of Environment Parameters
Using {IoT} Framework in a Biogas Energy Generation
Context",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "265",
day = "09",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080265",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/265",
abstract = "Recently, the significance and demand for biogas
energy has dramatically increased. However, biogas
operators lack automated and intelligent mechanisms to
produce optimization. The Internet of Things (IoT) and
Machine Learning (ML) have become key enablers for the
real-time monitoring of biogas production environments.
This paper aimed to implement an IoT framework to
gather environmental parameters for biogas generation.
In addition, data analysis was performed to assess the
effect of environmental parameters on biogas
production. The edge-based computing architecture was
designed comprising sensors, microcontrollers,
actuators, and data acquired for the cloud Mongo
database via MQTT protocol. Data were captured at a
home digester on a time-series basis for 30 days.
Further, Pearson distribution and multiple linear
regression models were explored to evaluate
environmental parameter effects on biogas production.
The constructed regression model was evaluated using R
2 metrics, and this was found to be 73.4\% of the
variability. From a correlation perspective, the
experimental result shows a strong correlation of
biogas production with an indoor temperature of 0.78
and a pH of 0.6. On the other hand, outdoor temperature
presented a moderated correlation of 0.4. This implies
that the model had a relatively good fit and could
effectively predict the biogas production process.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{GomezRomero-Borquez:2023:MEA,
author = "Jesus GomezRomero-Borquez and J. Alberto {Del
Puerto-Flores} and Carolina Del-Valle-Soto",
title = "Mapping {EEG} Alpha Activity: Assessing Concentration
Levels during Player Experience in Virtual Reality
Video Games",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "264",
day = "09",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080264",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/264",
abstract = "This work presents a study in which the cognitive
concentration levels of participants were evaluated
using electroencephalogram (EEG) measures while they
were playing three different categories of virtual
reality (VR) video games: Challenging Puzzlers, Casual
Games, and Exergames. Thirty-one voluntary participants
between the ages of 17 and 35 were recruited. EEG data
were processed to analyze the brain's electrical
activity in the alpha band. The values of power
spectral density (PSD) and individual alpha frequency
(IAF) of each participant were compared to detect
changes that could indicate a state of concentration.
Additionally, frontal alpha asymmetry (FAA) between the
left and right hemispheres of the brain was compared.
The results showed that the Exergame category of video
games elicited higher average cognitive concentration
in players, as indicated by the IAF and FAA values.
These findings contribute to understanding the
cognitive effects of VR video games and their
implications for designing and developing VR
experiences to enhance cognitive abilities.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{AlJawarneh:2023:EIH,
author = "Isam Mashhour {Al Jawarneh} and Luca Foschini and
Paolo Bellavista",
title = "Efficient Integration of Heterogeneous
Mobility-Pollution Big Data for Joint Analytics at
Scale with {QoS} Guarantees",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "263",
day = "07",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080263",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/263",
abstract = "Numerous real-life smart city application scenarios
require joint analytics on unified views of
georeferenced mobility data with environment contextual
data including pollution and meteorological data.
particularly, future urban planning requires
restricting vehicle access to specific areas of a city
to reduce the adverse effect of their engine combustion
emissions on the health of dwellers and cyclers.
Current editions of big spatial data management systems
do not come with over-the-counter support for similar
scenarios. To close this gap, in this paper, we show
the design and prototyping of a novel system we term as
EMDI for the enrichment of human and vehicle mobility
data with pollution information, thus enabling
integrated analytics on a unified view. Our system
supports a variety of queries including single
geo-statistics, such as `mean', and Top-N queries, in
addition to geo-visualization on the combined view. We
have tested our system with real big georeferenced
mobility and environmental data coming from the city of
Bologna in Italy. Our testing results show that our
system can be efficiently utilized for advanced
combined pollution-mobility analytics at a scale with
QoS guarantees. Specifically, a reduction in latency
that equals roughly 65\%, on average, is obtained by
using EMDI as opposed to the plain baseline, we also
obtain statistically significant accuracy results for
Top-N queries ranging roughly from 0.84 to 1 for both
Spearman and Pearson correlation coefficients depending
on the geo-encoding configurations, in addition to
significant single geo-statistics accuracy values
expressed using Mean Absolute Percentage Error on the
range from 0.00392 to 0.000195.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Al-Zubaidie:2023:ADL,
author = "Mishall Al-Zubaidie and Ghanima Sabr Shyaa",
title = "Applying Detection Leakage on Hybrid Cryptography to
Secure Transaction Information in E-Commerce Apps",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "262",
day = "01",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080262",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/262",
abstract = "Technology advancements have driven a boost in
electronic commerce use in the present day due to an
increase in demand processes, regardless of whether
goods, products, services, or payments are being bought
or sold. Various goods are purchased and sold online by
merchants ( M )s for large amounts of money.
Nonetheless, during the transmission of information via
electronic commerce, M s' information may be
compromised or attacked. In order to enhance the
security of e-commerce transaction data, particularly
sensitive M information, we have devised a protocol
that combines the Fernet (FER) algorithm with the
ElGamal (ELG) algorithm. Additionally, we have
integrated data leakage detection (DLD) technology to
verify the integrity of keys, encryptions, and
decryptions. The integration of these algorithms
ensures that electronic-commerce transactions are both
highly secure and efficiently processed. Our analysis
of the protocol's security and performance indicates
that it outperforms the algorithms used in previous
studies, providing superior levels of security and
performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Nikolaidis:2023:TER,
author = "Fotis Nikolaidis and Moysis Symeonides and Demetris
Trihinas",
title = "Towards Efficient Resource Allocation for Federated
Learning in Virtualized Managed Environments",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "261",
day = "31",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080261",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/261",
abstract = "Federated learning (FL) is a transformative approach
to Machine Learning that enables the training of a
shared model without transferring private data to a
central location. This decentralized training paradigm
has found particular applicability in edge computing,
where IoT devices and edge nodes often possess limited
computational power, network bandwidth, and energy
resources. While various techniques have been developed
to optimize the FL training process, an important
question remains unanswered: how should resources be
allocated in the training workflow? To address this
question, it is crucial to understand the nature of
these resources. In physical environments, the
allocation is typically performed at the node level,
with the entire node dedicated to executing a single
workload. In contrast, virtualized environments allow
for the dynamic partitioning of a node into
containerized units that can adapt to changing
workloads. Consequently, the new question that arises
is: how can a physical node be partitioned into virtual
resources to maximize the efficiency of the FL process?
To answer this, we investigate various resource
allocation methods that consider factors such as
computational and network capabilities, the complexity
of datasets, as well as the specific characteristics of
the FL workflow and ML backend. We explore two
scenarios: (i) running FL over a finite number of
testbed nodes and (ii) hosting multiple parallel FL
workflows on the same set of testbed nodes. Our
findings reveal that the default configurations of
state-of-the-art cloud orchestrators are sub-optimal
when orchestrating FL workflows. Additionally, we
demonstrate that different libraries and ML models
exhibit diverse computational footprints. Building upon
these insights, we discuss methods to mitigate
computational interferences and enhance the overall
performance of the FL pipeline execution.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bandi:2023:PGA,
author = "Ajay Bandi and Pydi Venkata Satya Ramesh Adapa and
Yudu Eswar Vinay Pratap Kumar Kuchi",
title = "The Power of Generative {AI}: A Review of
Requirements, Models, Input--Output Formats, Evaluation
Metrics, and Challenges",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "260",
day = "31",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080260",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/260",
abstract = "Generative artificial intelligence (AI) has emerged as
a powerful technology with numerous applications in
various domains. There is a need to identify the
requirements and evaluation metrics for generative AI
models designed for specific tasks. The purpose of the
research aims to investigate the fundamental aspects of
generative AI systems, including their requirements,
models, input--output formats, and evaluation metrics.
The study addresses key research questions and presents
comprehensive insights to guide researchers,
developers, and practitioners in the field. Firstly,
the requirements necessary for implementing generative
AI systems are examined and categorized into three
distinct categories: hardware, software, and user
experience. Furthermore, the study explores the
different types of generative AI models described in
the literature by presenting a taxonomy based on
architectural characteristics, such as variational
autoencoders (VAEs), generative adversarial networks
(GANs), diffusion models, transformers, language
models, normalizing flow models, and hybrid models. A
comprehensive classification of input and output
formats used in generative AI systems is also provided.
Moreover, the research proposes a classification system
based on output types and discusses commonly used
evaluation metrics in generative AI. The findings
contribute to advancements in the field, enabling
researchers, developers, and practitioners to
effectively implement and evaluate generative AI models
for various applications. The significance of the
research lies in understanding that generative AI
system requirements are crucial for effective planning,
design, and optimal performance. A taxonomy of models
aids in selecting suitable options and driving
advancements. Classifying input--output formats enables
leveraging diverse formats for customized systems,
while evaluation metrics establish standardized methods
to assess model quality and performance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jain:2023:VGB,
author = "Shushant Kumar Jain and Rinkoo Bhatia and Neeraj
Shrivastava and Sharad Salunke and Mohammad Farukh
Hashmi and Neeraj Dhanraj Bokde",
title = "Virtual Grid-Based Routing for Query-Driven Wireless
Sensor Networks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "259",
day = "30",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080259",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/259",
abstract = "In the context of query-driven wireless sensor
networks (WSNs), a unique scenario arises where sensor
nodes are solicited by a base station, also known as a
sink, based on specific areas of interest (AoIs). Upon
receiving a query, designated sensor nodes are tasked
with transmitting their data to the sink. However, the
routing of these queries from the sink to the sensor
nodes becomes intricate when the sink is mobile. The
sink's movement after issuing a query can potentially
disrupt the performance of data delivery. To address
these challenges, we have proposed an innovative
approach called Query-driven Virtual Grid-based Routing
Protocol (VGRQ), aiming to enhance energy efficiency
and reduce data delivery delays. In VGRQ, we construct
a grid consisting of square-shaped virtual cells, with
the number of cells matching the count of sensor nodes.
Each cell designates a specific node as the cell header
(CH), and these CHs establish connections with each
other to form a chain-like structure. This chain serves
two primary purposes: sharing the mobile sink's
location information and facilitating the transmission
of queries to the AoI as well as data to the sink. By
employing the VGRQ approach, we seek to optimize the
performance of query-driven WSNs. It enhances energy
utilization and reduces data delivery delays.
Additionally, VGRQ results in {\SGMLasymp}10\% and
{\SGMLasymp}27\% improvement in energy consumption when
compared with QRRP and QDVGDD, respectively.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jamroz:2023:OAS,
author = "Zainab Jamroz and Insaf Ullah and Bilal Hassan and
Noor Ul Amin and Muhammad Asghar Khan and Pascal Lorenz
and Nisreen Innab",
title = "An Optimal Authentication Scheme through Dual
Signature for the {Internet of Medical Things}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "258",
day = "30",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080258",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/258",
abstract = "The Internet of Medical Things (IoMT) overcomes the
flaws in the traditional healthcare system by enabling
remote administration, more effective use of resources,
and the mobility of medical devices to fulfil the
patient's needs. The IoMT makes it simple to review the
patient's cloud-based medical history in addition to
allowing the doctor to keep a close eye on the
patient's condition. However, any communication must be
secure and dependable due to the private nature of
patient medical records. In this paper, we proposed an
authentication method for the IoMT based on
hyperelliptic curves and featuring dual signatures. The
decreased key size of hyperelliptic curves makes the
proposed scheme efficient. Furthermore, security
validation analysis is performed with the help of the
formal verification tool called Scyther, which shows
that the proposed scheme is secure against several
types of attacks. A comparison of the proposed scheme's
computational and communication expenses with those of
existing schemes reveals its efficiency.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Adibi:2023:MFA,
author = "Sasan Adibi",
title = "The {mPOC} Framework: An Autonomous Outbreak
Prediction and Monitoring Platform Based on Wearable
{IoMT} Approach",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "257",
day = "30",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080257",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/257",
abstract = "This paper presents the mHealth Predictive Outbreak
for COVID-19 (mPOC) framework, an autonomous platform
based on wearable Internet of Medical Things (IoMT)
devices for outbreak prediction and monitoring. It
utilizes real-time physiological and environmental data
to assess user risk. The framework incorporates the
analysis of psychological and user-centric data,
adopting a combination of top-down and bottom-up
approaches. The mPOC mechanism utilizes the
bidirectional Mobile Health (mHealth) Disaster Recovery
System (mDRS) and employs an intelligent algorithm to
calculate the Predictive Exposure Index (PEI) and
Deterioration Risk Index (DRI). These indices trigger
warnings to users based on adaptive threshold criteria
and provide updates to the Outbreak Tracking Center
(OTC). This paper provides a comprehensive description
and analysis of the framework's mechanisms and
algorithms, complemented by the performance accuracy
evaluation. By leveraging wearable IoMT devices, the
mPOC framework showcases its potential in disease
prevention and control during pandemics, offering
timely alerts and vital information to healthcare
professionals and individuals to mitigate outbreaks'
impact.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2023:FSR,
author = "Jinying Li and Ananda Maiti and Jiangang Fei",
title = "Features and Scope of Regulatory Technologies:
Challenges and Opportunities with {Industrial Internet
of Things}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "256",
day = "30",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080256",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/256",
abstract = "Regulatory Technology (RegTech) is an emerging set of
computing and network-based information systems and
practices intended to enhance and improve regulatory
compliance processes. Such technologies rely on
collecting exclusive information from the environment
and humans through automated Internet of Things (IoT)
sensors and self-reported data. The key enablers of
RegTech are the increased capabilities and reduced cost
of IoT and Artificial Intelligence (AI) technologies.
This article focuses on a survey of RegTech,
highlighting the recent developments in various
sectors. This work identifies the characteristics of
existing implementations of RegTech applications in the
financial industry. It examines the critical features
that non-financial industries such as agriculture must
address when using such technologies. We investigate
the suitability of existing technologies applied in
financial sectors to other industries and the potential
gaps to be filled between them in terms of designing
information systems for regulatory frameworks. This
includes identifying specific operational parameters
that are key differences between the financial and
non-financial sectors that can be supported with IoT
and AI technologies. These can be used by both
producers of goods and services and regulators who need
an affordable and efficient supervision method for
managing relevant organizations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kontopoulou:2023:RAV,
author = "Vaia I. Kontopoulou and Athanasios D. Panagopoulos and
Ioannis Kakkos and George K. Matsopoulos",
title = "A Review of {ARIMA} vs. Machine Learning Approaches
for Time Series Forecasting in Data Driven Networks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "255",
day = "30",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080255",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/255",
abstract = "In the broad scientific field of time series
forecasting, the ARIMA models and their variants have
been widely applied for half a century now due to their
mathematical simplicity and flexibility in application.
However, with the recent advances in the development
and efficient deployment of artificial intelligence
models and techniques, the view is rapidly changing,
with a shift towards machine and deep learning
approaches becoming apparent, even without a complete
evaluation of the superiority of the new approach over
the classic statistical algorithms. Our work
constitutes an extensive review of the published
scientific literature regarding the comparison of ARIMA
and machine learning algorithms applied to time series
forecasting problems, as well as the combination of
these two approaches in hybrid statistical-AI models in
a wide variety of data applications (finance, health,
weather, utilities, and network traffic prediction).
Our review has shown that the AI algorithms display
better prediction performance in most applications,
with a few notable exceptions analyzed in our
Discussion and Conclusions sections, while the hybrid
statistical-AI models steadily outperform their
individual parts, utilizing the best algorithmic
features of both worlds.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Patsias:2023:TAM,
author = "Vasilios Patsias and Petros Amanatidis and Dimitris
Karampatzakis and Thomas Lagkas and Kalliopi
Michalakopoulou and Alexandros Nikitas",
title = "Task Allocation Methods and Optimization Techniques in
Edge Computing: A Systematic Review of the Literature",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "254",
day = "28",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080254",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/254",
abstract = "Task allocation in edge computing refers to the
process of distributing tasks among the various nodes
in an edge computing network. The main challenges in
task allocation include determining the optimal
location for each task based on the requirements such
as processing power, storage, and network bandwidth,
and adapting to the dynamic nature of the network.
Different approaches for task allocation include
centralized, decentralized, hybrid, and machine
learning algorithms. Each approach has its strengths
and weaknesses and the choice of approach will depend
on the specific requirements of the application. In
more detail, the selection of the most optimal task
allocation methods depends on the edge computing
architecture and configuration type, like mobile edge
computing (MEC), cloud-edge, fog computing,
peer-to-peer edge computing, etc. Thus, task allocation
in edge computing is a complex, diverse, and
challenging problem that requires a balance of
trade-offs between multiple conflicting objectives such
as energy efficiency, data privacy, security, latency,
and quality of service (QoS). Recently, an increased
number of research studies have emerged regarding the
performance evaluation and optimization of task
allocation on edge devices. While several survey
articles have described the current state-of-the-art
task allocation methods, this work focuses on comparing
and contrasting different task allocation methods,
optimization algorithms, as well as the network types
that are most frequently used in edge computing
systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Simon:2023:CAH,
author = "Marek Simon and Ladislav Huraj and Nicolas B{\'u}cik",
title = "A Comparative Analysis of High Availability for
{Linux} Container Infrastructures",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "253",
day = "28",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080253",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/linux.bib;
https://www.math.utah.edu/pub/tex/bib/unix.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/253",
abstract = "In the current era of prevailing information
technology, the requirement for high availability and
reliability of various types of services is critical.
This paper focusses on the comparison and analysis of
different high-availability solutions for Linux
container environments. The objective was to identify
the strengths and weaknesses of each solution and to
determine the optimal container approach for common use
cases. Through a series of structured experiments,
basic performance metrics were collected, including
average service recovery time, average transfer rate,
and total number of failed calls. The container
platforms tested included Docker, Kubernetes, and
Proxmox. On the basis of a comprehensive evaluation, it
can be concluded that Docker with Docker Swarm is
generally the most effective high-availability solution
for commonly used Linux containers. Nevertheless, there
are specific scenarios in which Proxmox stands out, for
example, when fast data transfer is a priority or when
load balancing is not a critical requirement.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jamshidi:2023:MMI,
author = "Mohammad (Behdad) Jamshidi and Arash Dehghaniyan Serej
and Alireza Jamshidi and Omid Moztarzadeh",
title = "The Meta-Metaverse: Ideation and Future Directions",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "8",
pages = "252",
day = "27",
month = jul,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15080252",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Aug 26 11:22:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/8/252",
abstract = "In the era of digitalization and artificial
intelligence (AI), the utilization of Metaverse
technology has become increasingly crucial. As the
world becomes more digitized, there is a pressing need
to effectively transfer real-world assets into the
digital realm and establish meaningful relationships
between them. However, existing approaches have shown
significant limitations in achieving this goal
comprehensively. To address this, this research
introduces an innovative methodology called the
Meta-Metaverse, which aims to enhance the immersive
experience and create realistic digital twins across
various domains such as biology, genetics, economy,
medicine, environment, gaming, digital twins, Internet
of Things, artificial intelligence, machine learning,
psychology, supply chain, social networking, smart
manufacturing, and politics. The multi-layered
structure of Metaverse platforms and digital twins
allows for greater flexibility and scalability,
offering valuable insights into the potential impact of
advancing science, technology, and the internet. This
article presents a detailed description of the proposed
methodology and its applications, highlighting its
potential to transform scientific research and inspire
groundbreaking ideas in science, medicine, and
technology.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Arachchige:2023:EBN,
author = "Kithmini Godewatte Arachchige and Philip Branch and
and Jason But",
title = "Evaluation of Blockchain Networks' Scalability
Limitations in Low-Powered {Internet of Things} {(IoT)}
Sensor Networks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "317",
day = "21",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090317",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/317",
abstract = "With the development of Internet of Things (IoT)
technologies, industries such as healthcare have
started using low-powered sensor-based devices. Because
IoT devices are typically low-powered, they are
susceptible to cyber intrusions. As an emerging
information security solution, blockchain technology
has considerable potential for protecting low-powered
IoT end devices. Blockchain technology provides
promising security features such as cryptography, hash
functions, time stamps, and a distributed ledger
function. Therefore, blockchain technology can be a
robust security technology for securing IoT low-powered
devices. However, the integration of blockchain and IoT
technologies raises a number of research questions.
Scalability is one of the most significant. Blockchain'
scalability of low-powered sensor networks needs to be
evaluated to identify the practical application of both
technologies in low-powered sensor networks. In this
paper, we analyse the scalability limitations of three
commonly used blockchain algorithms running on
low-powered single-board computers communicating in a
wireless sensor network. We assess the scalability
limitations of three blockchain networks as we increase
the number of nodes. Our analysis shows considerable
scalability variations between three blockchain
networks. The results indicate that some blockchain
networks can have over 800 ms network latency and some
blockchain networks may use a bandwidth over 1600 Kbps.
This work will contribute to developing efficient
blockchain-based IoT sensor networks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ozadowicz:2023:TQE,
author = "Andrzej Ozadowicz",
title = "Technical, Qualitative and Energy Analysis of Wireless
Control Modules for Distributed Smart Home Systems",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "316",
day = "20",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090316",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/316",
abstract = "Distributed smart home systems using wireless
communication are increasingly installed and operated
in households. Their popularity is due to the ease of
installation and configuration. This paper presents a
comprehensive technical, quality, and energy analysis
of several popular smart home modules. Specifically, it
focuses on verifying their power consumption levels,
both in standby and active mode, to assess their impact
on the energy efficiency of building installations.
This is an important aspect in the context of their
continuous operation, as well as in relation to the
relatively lower power of loads popular in buildings,
such as LED lighting. The author presents the results
of measurements carried out for seven different smart
home modules controlling seven different types of
loads. The analysis of the results shows a significant
share of home automation modules in the energy balance;
in particular, the appearance of reactive power
consumption due to the installation of smart home
modules is noteworthy. Bearing in mind all the threads
of the analysis and discussion of the results of
measurement experiments, a short SWOT analysis is
presented, with an indication of important issues in
the context of further development of smart systems and
the Internet of Things with wireless communication
interfaces, dedicated to home and building
applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Saffre:2023:FBS,
author = "Fabrice Saffre and Hanno Hildmann and Antti Anttonen",
title = "Force-Based Self-Organizing {MANET\slash FANET} with a
{UAV} Swarm",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "315",
day = "19",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090315",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/315",
abstract = "This paper introduces a novel distributed algorithm
designed to optimize the deployment of access points
within Mobile Ad Hoc Networks (MANETs) for better
service quality in infrastructure-less environments.
The algorithm operates based on local, independent
execution by each network node, thus ensuring a high
degree of scalability and adaptability to changing
network conditions. The primary focus is to match the
spatial distribution of access points with the
distribution of client devices while maintaining strong
connectivity to the network root. Using autonomous
decision-making and choreographed path-planning, this
algorithm bridges the gap between demand-responsive
network service provision and the maintenance of
crucial network connectivity links. The assessment of
the performance of this approach is motivated by using
numerical results generated by simulations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gorchakov:2023:APR,
author = "Artyom V. Gorchakov and Liliya A. Demidova and Peter
N. Sovietov",
title = "Analysis of Program Representations Based on Abstract
Syntax Trees and Higher-Order {Markov} Chains for
Source Code Classification Task",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "314",
day = "18",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090314",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/314",
abstract = "In this paper we consider the research and development
of classifiers that are trained to predict the task
solved by source code. Possible applications of such
task detection algorithms include method name
prediction, hardware--software partitioning,
programming standard violation detection, and semantic
code duplication search. We provide the comparative
analysis of modern approaches to source code
transformation into vector-based representations that
extend the variety of classification and clustering
algorithms that can be used for intelligent source code
analysis. These approaches include word2vec, code2vec,
first-order and second-order Markov chains constructed
from abstract syntax trees (AST), histograms of
assembly language instruction opcodes, and histograms
of AST node types. The vectors obtained with the
forementioned approaches are then used to train such
classification algorithms as k-nearest neighbor (KNN),
support vector machine (SVM), random forest (RF), and
multilayer perceptron (MLP). The obtained results show
that the use of program vectors based on first-order
AST-based Markov chains with an RF-based classifier
leads to the highest accuracy, precision, recall, and
F1 score. Increasing the order of Markov chains
considerably increases the dimensionality of a vector,
without any improvements in classifier quality, so we
assume that first-order Markov chains are best suitable
for real world applications. Additionally, the
experimental study shows that first-order AST-based
Markov chains are least sensitive to the used
classification algorithm.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mandarino:2023:PFD,
author = "Valerio Mandarino and Giuseppe Pappalardo and Emiliano
Tramontana",
title = "Proof of Flow: a Design Pattern for the Green Energy
Market",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "313",
day = "17",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090313",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/313",
abstract = "The increased penetration of Distributed Energy
Resources (DERs) in electricity markets has given rise
to a new category of energy players, called
Aggregators, whose role is to ensure fair remuneration
for energy supplied by DERs, and support the smooth
feeding of the intermittent energy produced into the
distribution network. This paper presents a software
solution, described as a design pattern, that governs
the interaction between an Aggregator and DERs,
leveraging blockchain technology to achieve a higher
degree of decentralization, data integrity and
security, through a properly designed,
blockchain-based, smart contract. Thus, the proposed
solution reduces the reliance on intermediaries acting
as authorities, while affording transparency,
efficiency and trust to the energy exchange process.
Thanks to the underlying blockchain properties,
generated events are easily observable and cannot be
forged or altered. However, blockchain technology has
inherent drawbacks, i.e., mainly the cost of storage
and execution, hence our solution provides additional
strategies for limiting blockchain usage, without
undermining its strengths. Moreover, the design of our
smart contract takes care of orchestrating the players,
and copes with their potential mutual disagreements,
which could arise from different measures of energy,
providing an automatic decision process to resolve such
disputes. The overall approach results in lower fees
for running smart contacts supporting energy players
and in a greater degree of fairness assurance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tosi:2023:ESI,
author = "Davide Tosi",
title = "Editorial for the Special Issue on {``Software
Engineering and Data Science''}, Volume {II}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "312",
day = "16",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090312",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/312",
abstract = "The increased penetration of Distributed Energy
Resources (DERs) in electricity markets has given rise
to a new category of energy players, called
Aggregators, whose role is to ensure fair remuneration
for energy supplied by DERs, and support the smooth
feeding of the intermittent energy produced into the
distribution network. This paper presents a software
solution, described as a design pattern, that governs
the interaction between an Aggregator and DERs,
leveraging blockchain technology to achieve a higher
degree of decentralization, data integrity and
security, through a properly designed,
blockchain-based, smart contract. Thus, the proposed
solution reduces the reliance on intermediaries acting
as authorities, while affording transparency,
efficiency and trust to the energy exchange process.
Thanks to the underlying blockchain properties,
generated events are easily observable and cannot be
forged or altered. However, blockchain technology has
inherent drawbacks, i.e., mainly the cost of storage
and execution, hence our solution provides additional
strategies for limiting blockchain usage, without
undermining its strengths. Moreover, the design of our
smart contract takes care of orchestrating the players,
and copes with their potential mutual disagreements,
which could arise from different measures of energy,
providing an automatic decision process to resolve such
disputes. The overall approach results in lower fees
for running smart contacts supporting energy players
and in a greater degree of fairness assurance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ghanem:2023:AST,
author = "Fahd A. Ghanem and M. C. Padma and Ramez Alkhatib",
title = "Automatic Short Text Summarization Techniques in
Social Media Platforms",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "311",
day = "13",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090311",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/311",
abstract = "The rapid expansion of social media platforms has
resulted in an unprecedented surge of short text
content being generated on a daily basis. Extracting
valuable insights and patterns from this vast volume of
textual data necessitates specialized techniques that
can effectively condense information while preserving
its core essence. In response to this challenge,
automatic short text summarization (ASTS) techniques
have emerged as a compelling solution, gaining
significant importance in their development. This paper
delves into the domain of summarizing short text on
social media, exploring various types of short text and
the associated challenges they present. It also
investigates the approaches employed to generate
concise and meaningful summaries. By providing a survey
of the latest methods and potential avenues for future
research, this paper contributes to the advancement of
ASTS in the ever-evolving landscape of social media
communication.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Aziz:2023:EHE,
author = "Rezak Aziz and Soumya Banerjee and Samia Bouzefrane
and Thinh Le Vinh",
title = "Exploring Homomorphic Encryption and Differential
Privacy Techniques towards Secure Federated Learning
Paradigm",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "310",
day = "13",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090310",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/310",
abstract = "The trend of the next generation of the internet has
already been scrutinized by top analytics enterprises.
According to Gartner investigations, it is predicted
that, by 2024, 75\% of the global population will have
their personal data covered under privacy regulations.
This alarming statistic necessitates the orchestration
of several security components to address the enormous
challenges posed by federated and distributed learning
environments. Federated learning (FL) is a promising
technique that allows multiple parties to
collaboratively train a model without sharing their
data. However, even though FL is seen as a
privacy-preserving distributed machine learning method,
recent works have demonstrated that FL is vulnerable to
some privacy attacks. Homomorphic encryption (HE) and
differential privacy (DP) are two promising techniques
that can be used to address these privacy concerns. HE
allows secure computations on encrypted data, while DP
provides strong privacy guarantees by adding noise to
the data. This paper first presents consistent attacks
on privacy in federated learning and then provides an
overview of HE and DP techniques for secure federated
learning in next-generation internet applications. It
discusses the strengths and weaknesses of these
techniques in different settings as described in the
literature, with a particular focus on the trade-off
between privacy and convergence, as well as the
computation overheads involved. The objective of this
paper is to analyze the challenges associated with each
technique and identify potential opportunities and
solutions for designing a more robust,
privacy-preserving federated learning framework.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tadj:2023:EID,
author = "Timothy Tadj and Reza Arablouei and Volkan Dedeoglu",
title = "On Evaluating {IoT} Data Trust via Machine Learning",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "309",
day = "12",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090309",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/309",
abstract = "Data trust in IoT is crucial for safeguarding privacy,
security, reliable decision-making, user acceptance,
and complying with regulations. Various approaches
based on supervised or unsupervised machine learning
(ML) have recently been proposed for evaluating IoT
data trust. However, assessing their real-world
efficacy is hard mainly due to the lack of related
publicly available datasets that can be used for
benchmarking. Since obtaining such datasets is
challenging, we propose a data synthesis method, called
random walk infilling (RWI), to augment IoT time-series
datasets by synthesizing untrustworthy data from
existing trustworthy data. Thus, RWI enables us to
create labeled datasets that can be used to develop and
validate ML models for IoT data trust evaluation. We
also extract new features from IoT time-series sensor
data that effectively capture its autocorrelation as
well as its cross-correlation with the data of the
neighboring (peer) sensors. These features can be used
to learn ML models for recognizing the trustworthiness
of IoT sensor data. Equipped with our synthesized
ground-truth-labeled datasets and informative
correlation-based features, we conduct extensive
experiments to critically examine various approaches to
evaluating IoT data trust via ML. The results reveal
that commonly used ML-based approaches to IoT data
trust evaluation, which rely on unsupervised cluster
analysis to assign trust labels to unlabeled data,
perform poorly. This poor performance is due to the
underlying assumption that clustering provides reliable
labels for data trust, which is found to be untenable.
The results also indicate that ML models, when trained
on datasets augmented via RWI and using the proposed
features, generalize well to unseen data and surpass
existing related approaches. Moreover, we observe that
a semi-supervised ML approach that requires only about
10\% of the data labeled offers competitive performance
while being practically more appealing compared to the
fully supervised approaches. The related Python code
and data are available online.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pelekoudas-Oikonomou:2023:PHF,
author = "Filippos Pelekoudas-Oikonomou and Jos{\'e} C. Ribeiro
and Georgios Mantas and Georgia Sakellari and Jonathan
Gonzalez",
title = "Prototyping a Hyperledger Fabric-Based Security
Architecture for {IoMT}-Based Health Monitoring
Systems",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "308",
day = "11",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090308",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/308",
abstract = "The Internet of Medical Things (IoMT) has risen
significantly in recent years and has provided better
quality of life by enabling IoMT-based health
monitoring systems. Despite that fact, innovative
security mechanisms are required to meet the security
concerns of such systems effectively and efficiently.
Additionally, the industry and the research community
have anticipated that blockchain technology will be a
disruptive technology that will be able to be
integrated into innovative security solutions for IoMT
networks since it has the potential to play a big role
in: (a) enabling secure data transmission, (b) ensuring
IoMT device security, and (c) enabling tamper-proof
data storage. Therefore, the purpose of this research
work is to design a novel lightweight blockchain-based
security architecture for IoMT-based health monitoring
systems leveraging the features of the Hyperledger
Fabric (HF) Platform, its utilities. and its
lightweight blockchain nature in order to: (i) ensure
entity authentication, (ii) ensure data
confidentiality, and (iii) enable a more
energy-efficient blockchain-based security architecture
for IoMT-based health monitoring systems while
considering the limited resources of IoMT gateways.
While security mechanisms for IoT utilizing HF do
exist, to the best of our knowledge there is no
specific HF-based architecture for IoMT-based health
monitoring systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Aggarwal:2023:FLN,
author = "Shobhit Aggarwal and Asis Nasipuri",
title = "{FL-LoRaMAC}: a Novel Framework for Enabling On-Device
Learning for {LoRa}-Based {IoT} Applications",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "307",
day = "10",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090307",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/307",
abstract = "The Internet of Things (IoT) enables us to gain access
to a wide range of data from the physical world that
can be analyzed for deriving critical state
information. In this regard, machine learning (ML) is a
valuable tool that can be used to develop models based
on observed physical data, leading to efficient
analytical decisions, including anomaly detection. In
this work, we address some key challenges for applying
ML in IoT applications that include maintaining privacy
considerations of user data that are needed for
developing ML models and minimizing the communication
cost for transmitting the data over the IoT network. We
consider a representative application of the anomaly
detection of ECG signals that are obtained from a set
of low-cost wearable sensors and transmitted to a
central server using LoRaWAN, which is a popular and
emerging low-power wide-area network (LPWAN)
technology. We present a novel framework utilizing
federated learning (FL) to preserve data privacy and
appropriate features for uplink and downlink
communications between the end devices and the gateway
to optimize the communication cost. Performance results
obtained from computer simulations demonstrate that the
proposed framework leads to a 98\% reduction in the
volume of data that is required to achieve the same
level of performance as in traditional centralized
ML.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Midolo:2023:ATS,
author = "Alessandro Midolo and Emiliano Tramontana",
title = "An Automatic Transformer from Sequential to Parallel
{Java} Code",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "306",
day = "08",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090306",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/java2020.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/306",
abstract = "Sequential programs can benefit from parallel
execution to improve their performance. When developing
a parallel application, several techniques are employed
to achieve the desired behavior: identifying parts that
can run in parallel, synchronizing access to shared
data, tuning performance, etc. Admittedly, manually
transforming a sequential application to make it
parallel can be tedious due to the large number of
lines of code to inspect, the possibility of errors
arising from inaccurate data dependence analysis
leading to unpredictable behavior, and inefficiencies
when the workload between parallel threads is
unbalanced. This paper proposes an automatic approach
that analyzes Java source code to identify method calls
that are suitable for parallel execution and transforms
them so that they run in another thread. The approach
is based on data dependence and control dependence
analyses to determine the execution flow and data
accessed. Based on the proposed method, a tool has been
developed to enhance applications by incorporating
parallelism, i.e., transforming suitable method calls
to execute on parallel threads, and synchronizing data
access where needed. The developed tool has been
extensively tested to verify the accuracy of its
analysis in finding parallel execution opportunities,
the correctness of the source code alterations, and the
resultant performance gain.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bucur:2023:EMJ,
author = "Vlad Bucur and Liviu-Cristian Miclea",
title = "Entering the Metaverse from the {JVM}: The State of
the Art, Challenges, and Research Areas of {JVM}-Based
{Web 3.0} Tools and Libraries",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "305",
day = "07",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090305",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/java2020.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/305",
abstract = "Web 3.0 is the basis on which the proposed metaverse,
a seamless virtual world enabled by computers and
interconnected devices, hopes to interact with its
users, but beyond the high-level project overview of
what Web 3.0 applications try to achieve, the
implementation is still down to low-level coding
details. This article aims to analyze the low-level
implementations of key components of Web 3.0 using a
variety of frameworks and tools as well as several
JVM-based languages. This paper breaks down the
low-level implementation of smart contracts and
semantic web principles using three frameworks, Corda
and Ethereum for smart contracts and Jeda for semantic
web, using both Scala and Java as implementing
languages all while highlighting differences and
similarities between the frameworks used.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tavakolian:2023:HRL,
author = "Alireza Tavakolian and Alireza Rezaee and Farshid
Hajati and Shahadat Uddin",
title = "Hospital Readmission and Length-of-Stay Prediction
Using an Optimized Hybrid Deep Model",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "304",
day = "06",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090304",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/304",
abstract = "Hospital readmission and length-of-stay predictions
provide information on how to manage hospital bed
capacity and the number of required staff, especially
during pandemics. We present a hybrid deep model called
the Genetic Algorithm-Optimized Convolutional Neural
Network (GAOCNN), with a unique preprocessing method to
predict hospital readmission and the length of stay
required for patients of various conditions. GAOCNN
uses one-dimensional convolutional layers to predict
hospital readmission and the length of stay. The
parameters of the layers are optimized via a genetic
algorithm. To show the performance of the proposed
model in patients with various conditions, we evaluate
the model under three healthcare datasets: the Diabetes
130-US hospitals dataset, the COVID-19 dataset, and the
MIMIC-III dataset. The diabetes 130-US hospitals
dataset has information on both readmission and the
length of stay, while the COVID-19 and MIMIC-III
datasets just include information on the length of
stay. Experimental results show that the proposed
model's accuracy for hospital readmission was 97.2\%
for diabetic patients. Furthermore, the accuracy of the
length-of-stay prediction was 89\%, 99.4\%, and 94.1\%
for the diabetic, COVID-19, and ICU patients,
respectively. These results confirm the superiority of
the proposed model compared to existing methods. Our
findings offer a platform for managing the healthcare
funds and resources for patients with various
diseases.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Malarczyk:2023:IRT,
author = "Mateusz Malarczyk and Grzegorz Kaczmarczyk and
Jaroslaw Szrek and Marcin Kaminski",
title = "{Internet of Robotic Things (IoRT)} and Metaheuristic
Optimization Techniques Applied for Wheel-Legged
Robot",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "303",
day = "06",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090303",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/303",
abstract = "This paper presents the operation of a remotely
controlled, wheel-legged robot. The developed Wi-Fi
connection framework is established on a popular ARM
microcontroller board. The implementation provides a
low-cost solution that is in congruence with the newest
industrial standards. Additionally, the problem of limb
structure and motor speed control is solved. The design
process of the mechanical structure is enhanced by a
nature-inspired metaheuristic optimization algorithm.
An FOC-based BLDC motor speed control strategy is
selected to guarantee dynamic operation of the drive.
The paper provides both the theoretical considerations
and the obtained prototype experimental results.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Peng:2023:HNO,
author = "Chao-Chung Peng and Yi-Ho Chen",
title = "A Hybrid Neural Ordinary Differential Equation Based
Digital Twin Modeling and Online Diagnosis for an
Industrial Cooling Fan",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "302",
day = "04",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090302",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/302",
abstract = "Digital twins can reflect the dynamical behavior of
the identified system, enabling self-diagnosis and
prediction in the digital world to optimize the
intelligent manufacturing process. One of the key
benefits of digital twins is the ability to provide
real-time data analysis during operation, which can
monitor the condition of the system and prognose the
failure. This allows manufacturers to resolve the
problem before it happens. However, most digital twins
are constructed using discrete-time models, which are
not able to describe the dynamics of the system across
different sampling frequencies. In addition, the high
computational complexity due to significant memory
storage and large model sizes makes digital twins
challenging for online diagnosis. To overcome these
issues, this paper proposes a novel structure for
creating the digital twins of cooling fan systems by
combining with neural ordinary differential equations
and physical dynamical differential equations.
Evaluated using the simulation data, the proposed
structure not only shows accurate modeling results
compared to other digital twins methods but also
requires fewer parameters and smaller model sizes. The
proposed approach has also been demonstrated using
experimental data and is robust in terms of measurement
noise, and it has proven to be an effective solution
for online diagnosis in the intelligent manufacturing
process.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chang:2023:WEH,
author = "Hsiao-Ching Chang and Hsing-Tsung Lin and Pi-Chung
Wang",
title = "Wireless Energy Harvesting for {Internet-of-Things}
Devices Using Directional Antennas",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "301",
day = "03",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090301",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/301",
abstract = "With the rapid development of the Internet of Things,
the number of wireless devices is increasing rapidly.
Because of the limited battery capacity, these devices
may suffer from the issue of power depletion. Radio
frequency (RF) energy harvesting technology can
wirelessly charge devices to prolong their lifespan.
With the technology of beamforming, the beams generated
by an antenna array can select the direction for
wireless charging. Although a good charging-time
schedule should be short, energy efficiency should also
be considered. In this work, we propose two algorithms
to optimize the time consumption for charging devices.
We first present a greedy algorithm to minimize the
total charging time. Then, a differential evolution
(DE) algorithm is proposed to minimize the energy
overflow and improve energy efficiency. The DE
algorithm can also gradually increase fully charged
devices. The experimental results show that both the
proposed greedy and DE algorithms can find a schedule
of a short charging time with the lowest energy
overflow. The DE algorithm can further improve the
performance of data transmission to promote the
feasibility of potential wireless sensing and charging
applications by reducing the number of fully charged
devices at the same time.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lan:2023:ACB,
author = "Chong Lan and Yongsheng Wang and Chengze Wang and
Shirong Song and Zheng Gong",
title = "Application of {ChatGPT}-Based Digital Human in
Animation Creation",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "300",
day = "02",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090300",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/300",
abstract = "Traditional 3D animation creation involves a process
of motion acquisition, dubbing, and mouth movement data
binding for each character. To streamline animation
creation, we propose combining artificial intelligence
(AI) with a motion capture system. This integration
aims to reduce the time, workload, and cost associated
with animation creation. By utilizing AI and natural
language processing, the characters can engage in
independent learning, generating their own responses
and interactions, thus moving away from the traditional
method of creating digital characters with pre-defined
behaviors. In this paper, we present an approach that
employs a digital person's animation environment. We
utilized Unity plug-ins to drive the character's mouth
Blendshape, synchronize the character's voice and mouth
movements in Unity, and connect the digital person to
an AI system. This integration enables AI-driven
language interactions within animation production.
Through experimentation, we evaluated the correctness
of the natural language interaction of the digital
human in the animated scene, the real-time
synchronization of mouth movements, the potential for
singularity in guiding users during digital human
animation creation, and its ability to guide user
interactions through its own thought process.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Castillo-Soria:2023:PRA,
author = "Francisco R. Castillo-Soria and J. Alberto {Del
Puerto-Flores} and Cesar A. Azurdia-Meza and Vinoth
Babu Kumaravelu and Jorge Sim{\'o}n and Carlos A.
Gutierrez",
title = "Precoding for {RIS}-Assisted Multi-User {MIMO-DQSM}
Transmission Systems",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "299",
day = "02",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090299",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/299",
abstract = "This paper presents two precoding techniques for a
reconfigurable intelligent surface (RIS)-assisted
multi-user (MU) multiple-input multiple-output (MIMO)
double quadrature spatial modulation (DQSM) downlink
transmission system. Instead of being applied at the
remote RIS, the phase shift vector is applied at the
base station (BS) by using a double precoding stage.
Results show that the proposed RIS-MU-MIMO-DQSM system
has gains of up to 17 dB in terms of bit error rate
(BER) and a reduction in detection complexity of 51\%
when compared with the conventional MU-MIMO system
based on quadrature amplitude modulation (QAM).
Compared with a similar system based on amplify and
forward (AF) relay-assisted technique, the proposed
system has a gain of up to 18 dB in terms of BER under
the same conditions and parameters.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhang:2023:IUN,
author = "Weijie Zhang and Lanping Zhang and Xixi Zhang and Yu
Wang and Pengfei Liu and Guan Gui",
title = "Intelligent Unsupervised Network Traffic
Classification Method Using Adversarial Training and
Deep Clustering for Secure {Internet of Things}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "298",
day = "01",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090298",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/298",
abstract = "Network traffic classification (NTC) has attracted
great attention in many applications such as secure
communications, intrusion detection systems. The
existing NTC methods based on supervised learning rely
on sufficient labeled datasets in the training phase,
but for most traffic datasets, it is difficult to
obtain label information in practical applications.
Although unsupervised learning does not rely on labels,
its classification accuracy is not high, and the number
of data classes is difficult to determine. This paper
proposes an unsupervised NTC method based on
adversarial training and deep clustering with improved
network traffic classification (NTC) and lower
computational complexity in comparison with the
traditional clustering algorithms. Here, the training
process does not require data labels, which greatly
reduce the computational complexity of the network
traffic classification through pretraining. In the
pretraining stage, an autoencoder (AE) is used to
reduce the dimension of features and reduce the
complexity of the initial high-dimensional network
traffic data features. Moreover, we employ the
adversarial training model and a deep clustering
structure to further optimize the extracted features.
The experimental results show that our proposed method
has robust performance, with a multiclassification
accuracy of 92.2\%, which is suitable for
classification with a large number of unlabeled data in
actual application scenarios. This paper only focuses
on breakthroughs in the algorithm stage, and future
work can be focused on the deployment and adaptation in
practical environments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Safarov:2023:ELB,
author = "Furkat Safarov and Mainak Basak and Rashid Nasimov and
Akmalbek Abdusalomov and Young Im Cho",
title = "Explainable Lightweight Block Attention Module
Framework for Network-Based {IoT} Attack Detection",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "297",
day = "01",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090297",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/297",
abstract = "In the rapidly evolving landscape of internet usage,
ensuring robust cybersecurity measures has become a
paramount concern across diverse fields. Among the
numerous cyber threats, denial of service (DoS) and
distributed denial of service (DDoS) attacks pose
significant risks, as they can render websites and
servers inaccessible to their intended users.
Conventional intrusion detection methods encounter
substantial challenges in effectively identifying and
mitigating these attacks due to their widespread
nature, intricate patterns, and computational
complexities. However, by harnessing the power of deep
learning-based techniques, our proposed dense
channel-spatial attention model exhibits exceptional
accuracy in detecting and classifying DoS and DDoS
attacks. The successful implementation of our proposed
framework addresses the challenges posed by imbalanced
data and exhibits its potential for real-world
applications. By leveraging the dense channel-spatial
attention mechanism, our model can precisely identify
and classify DoS and DDoS attacks, bolstering the
cybersecurity defenses of websites and servers. The
high accuracy rates achieved across different datasets
reinforce the robustness of our approach, underscoring
its efficacy in enhancing intrusion detection
capabilities. As a result, our framework holds promise
in bolstering cybersecurity measures in real-world
scenarios, contributing to the ongoing efforts to
safeguard against cyber threats in an increasingly
interconnected digital landscape. Comparative analysis
with current intrusion detection methods reveals the
superior performance of our model. We achieved accuracy
rates of 99.38\%, 99.26\%, and 99.43\% for Bot-IoT,
CICIDS2017, and UNSW\_NB15 datasets, respectively.
These remarkable results demonstrate the capability of
our approach to accurately detect and classify various
types of DoS and DDoS assaults. By leveraging the
inherent strengths of deep learning, such as pattern
recognition and feature extraction, our model
effectively overcomes the limitations of traditional
methods, enhancing the accuracy and efficiency of
intrusion detection systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Anastasakis:2023:FFR,
author = "Zacharias Anastasakis and Terpsichori-Helen
Velivassaki and Artemis Voulkidis and Stavroula Bourou
and Konstantinos Psychogyios and Dimitrios Skias and
and Theodore Zahariadis",
title = "{FREDY}: Federated Resilience Enhanced with
Differential Privacy",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "296",
day = "01",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090296",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/296",
abstract = "Federated Learning is identified as a reliable
technique for distributed training of ML models.
Specifically, a set of dispersed nodes may collaborate
through a federation in producing a jointly trained ML
model without disclosing their data to each other. Each
node performs local model training and then shares its
trained model weights with a server node, usually
called Aggregator in federated learning, as it
aggregates the trained weights and then sends them back
to its clients for another round of local training.
Despite the data protection and security that FL
provides to each client, there are still well-studied
attacks such as membership inference attacks that can
detect potential vulnerabilities of the FL system and
thus expose sensitive data. In this paper, in order to
prevent this kind of attack and address private data
leakage, we introduce FREDY, a differential private
federated learning framework that enables knowledge
transfer from private data. Particularly, our approach
has a teachers--student scheme. Each teacher model is
trained on sensitive, disjoint data in a federated
manner, and the student model is trained on the most
voted predictions of the teachers on public unlabeled
data which are noisy aggregated in order to guarantee
the privacy of each teacher's sensitive data. Only the
student model is publicly accessible as the teacher
models contain sensitive information. We show that our
proposed approach guarantees the privacy of sensitive
data against model inference attacks while it combines
the federated learning settings for the model training
procedures.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mrvelj:2023:FVF,
author = "Stefica Mrvelj and Marko Matulin",
title = "{FLAME-VQA}: a Fuzzy Logic-Based Model for High Frame
Rate Video Quality Assessment",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "295",
day = "01",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090295",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/295",
abstract = "In the quest to optimize user experience, network, and
service, providers continually seek to deliver
high-quality content tailored to individual
preferences. However, predicting user perception of
quality remains a challenging task, given the
subjective nature of human perception and the plethora
of technical attributes that contribute to the overall
viewing experience. Thus, we introduce a Fuzzy
Logic-bAsed ModEl for Video Quality Assessment
(FLAME-VQA), leveraging the LIVE-YT-HFR database
containing 480 video sequences and subjective ratings
of their quality from 85 test subjects. The proposed
model addresses the challenges of assessing user
perception by capturing the intricacies of individual
preferences and video attributes using fuzzy logic. It
operates with four input parameters: video frame rate,
compression rate, and spatio-temporal information. The
Spearman Rank--Order Correlation Coefficient (SROCC)
and Pearson Correlation Coefficient (PCC) show a high
correlation between the output and the ground truth.
For the training, test, and complete dataset, SROCC
equals 0.8977, 0.8455, and 0.8961, respectively, while
PCC equals 0.9096, 0.8632, and 0.9086, respectively.
The model outperforms comparative models tested on the
same dataset.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2023:ATC,
author = "Yang Wang",
title = "Advances Techniques in Computer Vision and
Multimedia",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "294",
day = "01",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090294",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/294",
abstract = "In the quest to optimize user experience, network, and
service, providers continually seek to deliver
high-quality content tailored to individual
preferences. However, predicting user perception of
quality remains a challenging task, given the
subjective nature of human perception and the plethora
of technical attributes that contribute to the overall
viewing experience. Thus, we introduce a Fuzzy
Logic-bAsed ModEl for Video Quality Assessment
(FLAME-VQA), leveraging the LIVE-YT-HFR database
containing 480 video sequences and subjective ratings
of their quality from 85 test subjects. The proposed
model addresses the challenges of assessing user
perception by capturing the intricacies of individual
preferences and video attributes using fuzzy logic. It
operates with four input parameters: video frame rate,
compression rate, and spatio-temporal information. The
Spearman Rank--Order Correlation Coefficient (SROCC)
and Pearson Correlation Coefficient (PCC) show a high
correlation between the output and the ground truth.
For the training, test, and complete dataset, SROCC
equals 0.8977, 0.8455, and 0.8961, respectively, while
PCC equals 0.9096, 0.8632, and 0.9086, respectively.
The model outperforms comparative models tested on the
same dataset.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bidry:2023:ELB,
author = "Mahmoud Bidry and Abdellah Ouaguid and Mohamed
Hanine",
title = "Enhancing E-Learning with Blockchain: Characteristics,
Projects, and Emerging Trends",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "293",
day = "28",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090293",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/293",
abstract = "Blockchain represents a decentralized and distributed
ledger technology, ensuring transparent and secure
transaction recording across networks. This innovative
technology offers several benefits, including increased
security, trust, and transparency, making it suitable
for a wide range of applications. In the last few
years, there has been a growing interest in
investigating the potential of Blockchain technology to
enhance diverse fields, such as e-learning. In this
research, we undertook a systematic literature review
to explore the potential of Blockchain technology in
enhancing the e-learning domain. Our research focused
on four main questions: (1) What potential
characteristics of Blockchain can contribute to
enhancing e-learning? (2) What are the existing
Blockchain projects dedicated to e-learning? (3) What
are the limitations of existing projects? (4) What are
the future trends in Blockchain-related research that
will impact e-learning? The results showed that
Blockchain technology has several characteristics that
could benefit e-learning. We also discussed
immutability, transparency, decentralization, security,
and traceability. We also identified several existing
Blockchain projects dedicated to e-learning and
discussed their potential to revolutionize learning by
providing more transparency, security, and
effectiveness. However, our research also revealed many
limitations and challenges that could be addressed to
achieve Blockchain technology's potential in
e-learning.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Priyadarshini:2023:AST,
author = "Ishaani Priyadarshini",
title = "Autism Screening in Toddlers and Adults Using Deep
Learning and Fair {AI} Techniques",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "292",
day = "28",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090292",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/292",
abstract = "Autism spectrum disorder (ASD) has been associated
with conditions like depression, anxiety, epilepsy,
etc., due to its impact on an individual's educational,
social, and employment. Since diagnosis is challenging
and there is no cure, the goal is to maximize an
individual's ability by reducing the symptoms, and
early diagnosis plays a role in improving behavior and
language development. In this paper, an autism
screening analysis for toddlers and adults has been
performed using fair AI (feature engineering, SMOTE,
optimizations, etc.) and deep learning methods. The
analysis considers traditional deep learning methods
like Multilayer Perceptron (MLP), Artificial Neural
Networks (ANN), Convolutional Neural Networks (CNN),
and Long Short-Term Memory (LSTM), and also proposes
two hybrid deep learning models, i.e., CNN--LSTM with
Particle Swarm Optimization (PSO), and a CNN model
combined with Gated Recurrent Units (GRU--CNN). The
models have been validated using multiple performance
metrics, and the analysis confirms that the proposed
models perform better than the traditional models.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Al-Hamid:2023:NSB,
author = "Duaa Zuhair Al-Hamid and Pejman A. Karegar and Peter
Han Joo Chong",
title = "A Novel {SDWSN}-Based Testbed for {IoT} Smart
Applications",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "291",
day = "28",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090291",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/291",
abstract = "Wireless sensor network (WSN) environment monitoring
and smart city applications present challenges for
maintaining network connectivity when, for example,
dynamic events occur. Such applications can benefit
from recent technologies such as software-defined
networks (SDNs) and network virtualization to support
network flexibility and offer validation for a physical
network. This paper aims to present a testbed-based,
software-defined wireless sensor network (SDWSN) for
IoT applications with a focus on promoting the approach
of virtual network testing and analysis prior to
physical network implementation to monitor and repair
any network failures. Herein, physical network
implementation employing hardware boards such as Texas
Instruments CC2538 (TI CC2538) and TI CC1352R sensor
nodes is presented and designed based on virtual WSN-
based clustering for stationary and dynamic networks
use cases. The key performance indicators such as
evaluating node (such as a gateway node to the
Internet) connection capability based on packet drop
and energy consumption virtually and physically are
discussed. According to the test findings, the proposed
software-defined physical network benefited from
``prior-to-implementation'' analysis via
virtualization, as the performance of both virtual and
physical networks is comparable.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kochetkova:2023:STM,
author = "Irina Kochetkova and Anna Kushchazli and Sofia
Burtseva and Andrey Gorshenin",
title = "Short-Term Mobile Network Traffic Forecasting Using
Seasonal {ARIMA} and {Holt--Winters} Models",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "290",
day = "28",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090290",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/290",
abstract = "Fifth-generation (5G) networks require efficient radio
resource management (RRM) which should dynamically
adapt to the current network load and user needs.
Monitoring and forecasting network performance
requirements and metrics helps with this task. One of
the parameters that highly influences radio resource
management is the profile of user traffic generated by
various 5G applications. Forecasting such mobile
network profiles helps with numerous RRM tasks such as
network slicing and load balancing. In this paper, we
analyze a dataset from a mobile network operator in
Portugal that contains information about volumes of
traffic in download and upload directions in one-hour
time slots. We apply two statistical models for
forecasting download and upload traffic profiles,
namely, seasonal autoregressive integrated moving
average (SARIMA) and Holt-Winters models. We
demonstrate that both models are suitable for
forecasting mobile network traffic. Nevertheless, the
SARIMA model is more appropriate for download traffic
(e.g., MAPE [mean absolute percentage error] of 11.2\%
vs. 15\% for Holt-Winters), while the Holt-Winters
model is better suited for upload traffic (e.g., MAPE
of 4.17\% vs. 9.9\% for SARIMA and Holt-Winters,
respectively).",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Carvajal-Rodriguez:2023:PPA,
author = "Jorge Carvajal-Rodriguez and Marco Morales and
Christian Tipantu{\~n}a",
title = "{3D} Path Planning Algorithms in {UAV}-Enabled
Communications Systems: a Mapping Study",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "289",
day = "27",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090289",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/289",
abstract = "Unmanned Aerial Vehicles (UAVs) equipped with
communication technologies have gained significant
attention as a promising solution for providing
wireless connectivity in remote, disaster-stricken
areas lacking communication infrastructure. However,
enabling UAVs to provide communications (e.g., UAVs
acting as flying base stations) in real scenarios
requires the integration of various technologies and
algorithms. In particular 3D path planning algorithms
are crucial in determining the optimal path free of
obstacles so that UAVs in isolation or forming networks
can provide wireless coverage in a specific region.
Considering that most of the existing proposals in the
literature only address path planning in a 2D
environment, this paper systematically studies existing
path-planning solutions in UAVs in a 3D environment in
which optimization models (optimal and heuristics) have
been applied. This paper analyzes 37 articles selected
from 631 documents from a search in the Scopus
database. This paper also presents an overview of
UAV-enabled communications systems, the research
questions, and the methodology for the systematic
mapping study. In the end, this paper provides
information about the objectives to be minimized or
maximized, the optimization variables used, and the
algorithmic strategies employed to solve the 3D path
planning problem.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{ONeill:2023:SMC,
author = "Vyas O'Neill and Ben Soh",
title = "Spot Market Cloud Orchestration Using Task-Based
Redundancy and Dynamic Costing",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "9",
pages = "288",
day = "27",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15090288",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Thu Sep 28 13:55:47 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/9/288",
abstract = "Cloud computing has become ubiquitous in the
enterprise environment as its on-demand model realizes
technical and economic benefits for users. Cloud users
demand a level of reliability, availability, and
quality of service. Improvements to reliability
generally come at the cost of additional replication.
Existing approaches have focused on the replication of
virtual environments as a method of improving the
reliability of cloud services. As cloud systems move
towards microservices-based architectures, a more
granular approach to replication is now possible. In
this paper, we propose a cloud orchestration approach
that balances the potential cost of failure with the
spot market running cost, optimizing the resource usage
of the cloud system. We present the results of
empirical testing we carried out using a simulator to
compare the outcome of our proposed approach to a
control algorithm based on a static reliability
requirement. Our empirical testing showed an
improvement of between 37\% and 72\% in total cost over
the control, depending on the specific characteristics
of the cloud models tested. We thus propose that in
clouds where the cost of failure can be reasonably
approximated, our approach may be used to optimize the
cloud redundancy configuration to achieve a lower total
cost.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Thakur:2023:CAI,
author = "Nirmalya Thakur and Kesha A. Patel and Audrey Poon and
Rishika Shah and Nazif Azizi and Changhee Han",
title = "A Comprehensive Analysis and Investigation of the
Public Discourse on {Twitter} about Exoskeletons from
2017 to 2023",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "346",
day = "22",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100346",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/346",
abstract = "Exoskeletons have emerged as a vital technology in the
last decade and a half, with diverse use cases in
different domains. Even though several works related to
the analysis of Tweets about emerging technologies
exist, none of those works have focused on the analysis
of Tweets about exoskeletons. The work of this paper
aims to address this research gap by presenting
multiple novel findings from a comprehensive analysis
of about 150,000 Tweets about exoskeletons posted
between May 2017 and May 2023. First, findings from
temporal analysis of these Tweets reveal the specific
months per year when a significantly higher volume of
Tweets was posted and the time windows when the highest
number of Tweets, the lowest number of Tweets, Tweets
with the highest number of hashtags, and Tweets with
the highest number of user mentions were posted.
Second, the paper shows that there are statistically
significant correlations between the number of Tweets
posted per hour and the different characteristics of
these Tweets. Third, the paper presents a multiple
linear regression model to predict the number of Tweets
posted per hour in terms of these characteristics of
Tweets. The R 2 score of this model was observed to be
0.9540. Fourth, the paper reports that the 10 most
popular hashtags were \#exoskeleton, \#robotics, \#iot,
\#technology, \#tech, \#innovation, \#ai, \#sci,
\#construction and \#news. Fifth, sentiment analysis of
these Tweets was performed, and the results show that
the percentages of positive, neutral, and negative
Tweets were 46.8\%, 33.1\%, and 20.1\%, respectively.
To add to this, in the Tweets that did not express a
neutral sentiment, the sentiment of surprise was the
most common sentiment. It was followed by sentiments of
joy, disgust, sadness, fear, and anger, respectively.
Furthermore, hashtag-specific sentiment analysis
revealed several novel insights. For instance, for
almost all the months in 2022, the usage of \#ai in
Tweets about exoskeletons was mainly associated with a
positive sentiment. Sixth, lexicon-based approaches
were used to detect possibly sarcastic Tweets and
Tweets that contained news, and the results are
presented. Finally, a comparison of positive Tweets,
negative Tweets, neutral Tweets, possibly sarcastic
Tweets, and Tweets that contained news is presented in
terms of the different characteristic properties of
these Tweets. The findings reveal multiple novel
insights related to the similarities, variations, and
trends of character count, hashtag usage, and user
mentions in such Tweets during this time range.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ferilli:2023:GDB,
author = "Stefano Ferilli and Eleonora Bernasconi and Davide {Di
Pierro} and Domenico Redavid",
title = "A Graph {DB}-Based Solution for Semantic Technologies
in the Future {Internet}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "345",
day = "20",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100345",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/345",
abstract = "With the progressive improvements in the power,
effectiveness, and reliability of AI solutions, more
and more critical human problems are being handled by
automated AI-based tools and systems. For more complex
or particularly critical applications, the level of
knowledge, not just information, must be handled by
systems where explicit relationships among objects are
represented and processed. For this purpose, the
knowledge representation branch of AI proposes
Knowledge Graphs, widely used in the Semantic Web,
where different online applications may interact by
understanding the meaning of the data they process and
exchange. This paper describes a framework and online
platform for the Internet-based knowledge graph
definition, population, and exploitation based on the
LPG graph model. Its main advantages are its efficiency
and representational power and the wide range of
functions that it provides to its users beyond
traditional Semantic Web reasoning: network analysis,
data mining, multistrategy reasoning, and knowledge
browsing. Still, it can also be mapped onto the SW.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Koulianos:2023:BTS,
author = "Athanasios Koulianos and Antonios Litke",
title = "Blockchain Technology for Secure Communication and
Formation Control in Smart Drone Swarms",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "344",
day = "19",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100344",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/344",
abstract = "Today, intelligent drone technology is rapidly
expanding, particularly in the defense industry. A
swarm of drones can communicate, share data, and make
the best decisions on their own. Drone swarms can
swiftly and effectively carry out missions like
surveillance, reconnaissance, and rescue operations,
without exposing military troops to hostile conditions.
However, there are still significant problems that need
to be resolved. One of them is to protect
communications on these systems from threat actors. In
this paper, we use blockchain technology as a defense
mechanism against such issues. Drones can communicate
data safely, without the need for a centralized
authority (ground station), when using a blockchain to
facilitate communication between them in a
leader--follower hierarchy structure. Solidity has been
used to create a compact, lightweight, and effective
smart contract that automates the process of choosing a
position in a certain swarm formation structure.
Additionally, a mechanism for electing a new leader is
proposed. The effectiveness of the presented model is
assessed through a simulation that makes use of a DApp
we created and Gazebo software. The purpose of this
work is to develop a reliable and secure UAV swarm
communication system that will enable widespread global
adoption by numerous sectors.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{AlQahtani:2023:TOC,
author = "Salman Ali AlQahtani",
title = "Towards an Optimal Cloud-Based Resource Management
Framework for Next-Generation {Internet} with
Multi-Slice Capabilities",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "343",
day = "19",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100343",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/343",
abstract = "With the advent of 5G networks, the demand for
improved mobile broadband, massive machine-type
communication, and ultra-reliable, low-latency
communication has surged, enabling a wide array of new
applications. A key enabling technology in 5G networks
is network slicing, which allows the creation of
multiple virtual networks to support various use cases
on a unified physical network. However, the limited
availability of radio resources in the 5G cloud-Radio
Access Network (C-RAN) and the ever-increasing data
traffic volume necessitate efficient resource
allocation algorithms to ensure quality of service
(QoS) for each network slice. This paper proposes an
Adaptive Slice Allocation (ASA) mechanism for the 5G
C-RAN, designed to dynamically allocate resources and
adapt to changing network conditions and traffic delay
tolerances. The ASA system incorporates slice admission
control and dynamic resource allocation to maximize
network resource efficiency while meeting the QoS
requirements of each slice. Through extensive
simulations, we evaluate the ASA system's performance
in terms of resource consumption, average waiting time,
and total blocking probability. Comparative analysis
with a popular static slice allocation (SSA) approach
demonstrates the superiority of the ASA system in
achieving a balanced utilization of system resources,
maintaining slice isolation, and provisioning QoS. The
results highlight the effectiveness of the proposed ASA
mechanism in optimizing future internet connectivity
within the context of 5G C-RAN, paving the way for
enhanced network performance and improved user
experiences.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Spiekermann:2023:CNF,
author = "Daniel Spiekermann and J{\"o}rg Keller",
title = "Challenges of Network Forensic Investigation in Fog
and Edge Computing",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "342",
day = "18",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100342",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/342",
abstract = "While network forensics has matured over the decades
and even made progress in the last 10 years when
deployed in virtual networks, network forensics in fog
and edge computing is still not progressed to that
level despite the now widespread use of these
paradigms. By using an approach similar to software
testing, i.e., a mixture of systematic and experience,
we analyze obstacles specific to forensics in fog and
edge computing such as spatial dispersion and possibly
incomplete recordings, and derive how far these
obstacles can be overcome by adapting processes and
techniques from other branches of network forensics,
and how new solutions could look otherwise. In
addition, we present a discussion of open problems of
network forensics in fog and edge environments and
discusses the challenges for an investigator.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gratsos:2023:KAD,
author = "Konstantinos Gratsos and Stefanos Ougiaroglou and
Dionisis Margaris",
title = "{kClusterHub}: an {AutoML}-Driven Tool for Effortless
Partition-Based Clustering over Varied Data Types",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "341",
day = "18",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100341",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/341",
abstract = "Partition-based clustering is widely applied over
diverse domains. Researchers and practitioners from
various scientific disciplines engage with
partition-based algorithms relying on specialized
software or programming libraries. Addressing the need
to bridge the knowledge gap associated with these
tools, this paper introduces kClusterHub, an
AutoML-driven web tool that simplifies the execution of
partition-based clustering over numerical, categorical
and mixed data types, while facilitating the
identification of the optimal number of clusters, using
the elbow method. Through automatic feature analysis,
kClusterHub selects the most appropriate algorithm from
the trio of k-means, k-modes, and k-prototypes. By
empowering users to seamlessly upload datasets and
select features, kClusterHub selects the algorithm,
provides the elbow graph, recommends the optimal number
of clusters, executes clustering, and presents the
cluster assignment, through tabular representations and
exploratory plots. Therefore, kClusterHub reduces the
need for specialized software and programming skills,
making clustering more accessible to non-experts. For
further enhancing its utility, kClusterHub integrates a
REST API to support the programmatic execution of
cluster analysis. The paper concludes with an
evaluation of kClusterHub's usability via the System
Usability Scale and CPU performance experiments. The
results emerge that kClusterHub is a streamlined,
efficient and user-friendly AutoML-inspired tool for
cluster analysis.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kuantama:2023:FWB,
author = "Endrowednes Kuantama and Avishkar Seth and Alice James
and Yihao Zhang",
title = "Flying Watchdog-Based Guard Patrol with Check Point
Data Verification",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "340",
day = "16",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100340",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/340",
abstract = "The effectiveness of human security-based guard patrol
systems often faces challenges related to the
consistency of perimeter checks regarding timing and
patterns. Some solutions use autonomous drones for
monitoring assistance but primarily optimize their
camera-based object detection capabilities for
favorable lighting conditions. This research introduces
an innovative approach to address these limitations---a
flying watchdog designed to augment patrol operations
with predetermined flight patterns, enabling checkpoint
identification and position verification through
vision-based methods. The system has a laser-based data
transmitter to relay real-time location and timing
information to a receiver. The proposed system consists
of drone and ground checkpoints with distinctive shapes
and colored lights, further enhanced by solar panels
serving as laser data receivers. The result
demonstrates the drone's ability to detect four white
dot LEDs with square configurations at distances
ranging from 18 to 20 m, even under deficient light
conditions based on the OpenCV detection algorithm.
Notably, the study underscores the significance of
achieving an even distribution of light shapes to
mitigate light scattering effects on readings while
also confirming that ambient light levels up to a
maximum of 390 Lux have no adverse impact on the
performance of the sensing device.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bayu:2023:RLA,
author = "Teguh Indra Bayu and Yung-Fa Huang and Jeang-Kuo
Chen",
title = "Reinforcement Learning Approach for Adaptive {C-V2X}
Resource Management",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "339",
day = "15",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100339",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/339",
abstract = "The modulation coding scheme (MCS) index is the
essential configuration parameter in cellular
vehicle-to-everything (C-V2X) communication. As
referenced by the 3rd Generation Partnership Project
(3GPP), the MCS index will dictate the transport block
size (TBS) index, which will affect the size of
transport blocks and the number of physical resource
blocks. These numbers are crucial in the C-V2X resource
management since it is also bound to the transmission
power used in the system. To the authors' knowledge,
this particular area of research has not been
previously investigated. Ultimately, this research
establishes the fundamental principles for future
studies seeking to use the MCS adaptability in many
contexts. In this work, we proposed the application of
the reinforcement learning (RL) algorithm, as we used
the Q-learning approach to adaptively change the MCS
index according to the current environmental states.
The simulation results showed that our proposed RL
approach outperformed the static MCS index and was able
to attain stability in a short number of events.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2023:FDQ,
author = "Meng Li and Jiqiang Liu and Yeping Yang",
title = "Financial Data Quality Evaluation Method Based on
Multiple Linear Regression",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "338",
day = "14",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100338",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/338",
abstract = "With the rapid growth of customer data in financial
institutions, such as trusts, issues of data quality
have become increasingly prominent. The main challenge
lies in constructing an effective evaluation method
that ensures accurate and efficient assessment of
customer data quality when dealing with massive
customer data. In this paper, we construct a data
quality evaluation index system based on the analytic
hierarchy process through a comprehensive investigation
of existing research on data quality. Then, redundant
features are filtered based on the Shapley value, and
the multiple linear regression model is employed to
adjust the weight of different indices. Finally, a case
study of the customer and institution information of a
trust institution is conducted. The results demonstrate
that the utilization of completeness, accuracy,
timeliness, consistency, uniqueness, and compliance to
establish a quality evaluation index system proves
instrumental in conducting extensive and in-depth
research on data quality measurement dimensions.
Additionally, the data quality evaluation approach
based on multiple linear regression facilitates the
batch scoring of data, and the incorporation of the
Shapley value facilitates the elimination of invalid
features. This enables the intelligent evaluation of
large-scale data quality for financial data.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Shen:2023:ECB,
author = "Tsu-Chuan Shen and Edward T.-H. Chu",
title = "Edge-Computing-Based People-Counting System for
Elevators Using {MobileNet}--Single-Stage Object
Detection",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "337",
day = "14",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100337",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/337",
abstract = "Existing elevator systems lack the ability to display
the number of people waiting on each floor and inside
the elevator. This causes an inconvenience as users
cannot tell if they should wait or seek alternatives,
leading to unnecessary time wastage. In this work, we
adopted edge computing by running the
MobileNet--Single-Stage Object Detection (SSD)
algorithm on edge devices to recognize the number of
people inside an elevator and waiting on each floor. To
ensure the accuracy of people counting, we fine-tuned
the SSD parameters, such as the recognition frequency
and confidence thresholds, and utilized the line of
interest (LOI) counting strategy for people counting.
In our experiment, we deployed four NVIDIA Jetson Nano
boards in a four-floor building as edge devices to
count people when they entered specific areas. The
counting results, such as the number of people waiting
on each floor and inside the elevator, were provided to
users through a web app. Our experimental results
demonstrate that the proposed method achieved an
average accuracy of 85\% for people counting.
Furthermore, when comparing it to sending all images
back to a remote server for people counting, the
execution time required for edge computing was shorter,
without compromising the accuracy significantly.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lozic:2023:FFC,
author = "Edisa Lozi'c and Benjamin Stular",
title = "Fluent but Not Factual: a Comparative Analysis of
{ChatGPT} and Other {AI} Chatbots' Proficiency and
Originality in Scientific Writing for Humanities",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "336",
day = "13",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100336",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/336",
abstract = "Historically, mastery of writing was deemed essential
to human progress. However, recent advances in
generative AI have marked an inflection point in this
narrative, including for scientific writing. This
article provides a comprehensive analysis of the
capabilities and limitations of six AI chatbots in
scholarly writing in the humanities and archaeology.
The methodology was based on tagging AI-generated
content for quantitative accuracy and qualitative
precision by human experts. Quantitative accuracy
assessed the factual correctness in a manner similar to
grading students, while qualitative precision gauged
the scientific contribution similar to reviewing a
scientific article. In the quantitative test, ChatGPT-4
scored near the passing grade ({$-$5}) whereas
ChatGPT-3.5 ({$-$18}), Bing ({$-$21}) and Bard
({$-$31}) were not far behind. Claude 2 ({$-$75}) and
Aria ({$-$80}) scored much lower. In the qualitative
test, all AI chatbots, but especially ChatGPT-4,
demonstrated proficiency in recombining existing
knowledge, but all failed to generate original
scientific content. As a side note, our results suggest
that with ChatGPT-4, the size of large language models
has reached a plateau. Furthermore, this paper
underscores the intricate and recursive nature of human
research. This process of transforming raw data into
refined knowledge is computationally irreducible,
highlighting the challenges AI chatbots face in
emulating human originality in scientific writing. Our
results apply to the state of affairs in the third
quarter of 2023. In conclusion, while large language
models have revolutionised content generation, their
ability to produce original scientific contributions in
the humanities remains limited. We expect this to
change in the near future as current large language
model-based AI chatbots evolve into large language
model-powered software.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gonzalez-Franco:2023:CSL,
author = "Joan D. Gonzalez-Franco and Jorge E. Preciado-Velasco
and Jose E. Lozano-Rizk and Raul Rivera-Rodriguez and
Jorge Torres-Rodriguez and Miguel A. Alonso-Arevalo",
title = "Comparison of Supervised Learning Algorithms on a {5G}
Dataset Reduced via Principal Component Analysis
{(PCA)}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "335",
day = "11",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100335",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/335",
abstract = "Improving the quality of service (QoS) and meeting
service level agreements (SLAs) are critical objectives
in next-generation networks. This article presents a
study on applying supervised learning (SL) algorithms
in a 5G/B5G service dataset after being subjected to a
principal component analysis (PCA). The study objective
is to evaluate if the reduction of the dimensionality
of the dataset via PCA affects the predictive capacity
of the SL algorithms. A machine learning (ML) scheme
proposed in a previous article used the same algorithms
and parameters, which allows for a fair comparison with
the results obtained in this work. We searched the best
hyperparameters for each SL algorithm, and the
simulation results indicate that the support vector
machine (SVM) algorithm obtained a precision of 98\%
and a F1 score of 98.1\%. We concluded that the
findings of this study hold significance for research
in the field of next-generation networks, which involve
a wide range of input parameters and can benefit from
the application of principal component analysis (PCA)
on the performance of QoS and maintaining the SLA.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Singh:2023:OMT,
author = "Satyanand Singh and Joanna Rosak-Szyrocka and
Istv{\'a}n Drot{\'a}r and Xavier Fernando",
title = "{Oceania}'s {5G} Multi-Tier Fixed Wireless Access
{Link}'s Long-Term Resilience and Feasibility
Analysis",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "334",
day = "10",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100334",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/334",
abstract = "Information and communications technologies play a
vital role in achieving the Sustainable Development
Goals (SDGs) and bridging the gap between developed and
developing countries. However, various socioeconomic
factors adversely impact the deployment of digital
infrastructure, such as 5G networks, in the countries
of Oceania. The high-speed broadband fifth-generation
cellular network (5G) will improve the quality of
service for growing mobile users and the massive
Internet of Things (IoT). It will also provide
ultra-low-latency services required by smart city
applications. This study investigates the planning
process for a 5G radio access network incorporating
sub-6 GHz macro-remote radio units (MRRUs) and mmWave
micro-remote radio units (mRRUs). We carefully define
an optimization problem for 5G network planning,
considering the characteristics of urban macro-cells
(UMa) and urban micro-cells (UMi) with appropriate
channel models and link budgets. We determine the
minimum number of MRRUs and mRRUs that can be installed
in each area while meeting coverage and user traffic
requirements. This will ensure adequate broadband
low-latency network coverage with micro-cells instead
of macro-cells. This study evaluates the technical
feasibility analysis of combining terrestrial and
airborne networks to provide 5G coverage in Oceania,
with a special emphasis on Fiji.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Elwy:2023:DDS,
author = "Fatema Elwy and Raafat Aburukba and A. R. Al-Ali and
Ahmad {Al Nabulsi} and Alaa Tarek and Ameen Ayub and
and Mariam Elsayeh",
title = "Data-Driven Safe Deliveries: The Synergy of {IoT} and
Machine Learning in Shared Mobility",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "333",
day = "10",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100333",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/333",
abstract = "Shared mobility is one of the smart city applications
in which traditional individually owned vehicles are
transformed into shared and distributed ownership.
Ensuring the safety of both drivers and riders is a
fundamental requirement in shared mobility. This work
aims to design and implement an adequate framework for
shared mobility within the context of a smart city. The
characteristics of shared mobility are identified,
leading to the proposal of an effective solution for
real-time data collection, tracking, and automated
decisions focusing on safety. Driver and rider safety
is considered by identifying dangerous driving
behaviors and the prompt response to accidents.
Furthermore, a trip log is recorded to identify the
reasons behind the accident. A prototype implementation
is presented to validate the proposed framework for a
delivery service using motorbikes. The results
demonstrate the scalability of the proposed design and
the integration of the overall system to enhance the
rider's safety using machine learning techniques. The
machine learning approach identifies dangerous driving
behaviors with an accuracy of 91.59\% using the
decision tree approach when compared against the
support vector machine and K-nearest neighbor
approaches.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Khoei:2023:MLM,
author = "Tala Talaei Khoei and Naima Kaabouch",
title = "Machine Learning: Models, Challenges, and Research
Directions",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "332",
day = "09",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100332",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/332",
abstract = "Machine learning techniques have emerged as a
transformative force, revolutionizing various
application domains, particularly cybersecurity. The
development of optimal machine learning applications
requires the integration of multiple processes, such as
data pre-processing, model selection, and parameter
optimization. While existing surveys have shed light on
these techniques, they have mainly focused on specific
application domains. A notable gap that exists in
current studies is the lack of a comprehensive overview
of machine learning architecture and its essential
phases in the cybersecurity field. To address this gap,
this survey provides a holistic review of current
studies in machine learning, covering techniques
applicable to any domain. Models are classified into
four categories: supervised, semi-supervised,
unsupervised, and reinforcement learning. Each of these
categories and their models are described. In addition,
the survey discusses the current progress related to
data pre-processing and hyperparameter tuning
techniques. Moreover, this survey identifies and
reviews the research gaps and key challenges that the
cybersecurity field faces. By analyzing these gaps, we
propose some promising research directions for the
future. Ultimately, this survey aims to serve as a
valuable resource for researchers interested in
learning about machine learning, providing them with
insights to foster innovation and progress across
diverse application domains.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Abdelreheim:2023:POR,
author = "Marwa Abdelreheim and Taysir Hassan A. Soliman and
Friederike Klan",
title = "A Personalized Ontology Recommendation System to
Effectively Support Ontology Development by Reuse",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "331",
day = "07",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100331",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/331",
abstract = "The profusion of existing ontologies in different
domains has made reusing ontologies a best practice
when developing new ontologies. The ontology reuse
process reduces the expensive cost of developing a new
ontology, in terms of time and effort, and supports
semantic interoperability. Existing ontology
development tools do not assist in the recommendation
of ontologies or their concepts to be reused. Also,
existing ontology recommendation tools could suggest
whole ontologies covering a set of input keywords
without referring to which parts of them (e.g.,
concepts) can be reused. In this paper, we propose an
effective ontology recommendation system that helps the
user in the iterative development and reuse of
ontologies. The system allows the user to provide
explicit preferences about the new ontology, and
iteratively guides the user to parts from existing
ontologies which match his preferences for reuse.
Finally, we developed a prototype of our ontology
recommendation system and conducted a user-based
evaluation to assess the effectiveness of our
approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Grigaliunas:2023:LTE,
author = "Sarunas Grigaliunas and Michael Schmidt and Rasa
Bruzgiene and Panayiota Smyrli and Vladislav Bidikov",
title = "Leveraging Taxonomical Engineering for Security
Baseline Compliance in International Regulatory
Frameworks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "330",
day = "07",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100330",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/330",
abstract = "A surge in successful Information Security (IS)
breaches targeting Research and Education (R\&E)
institutions highlights a pressing need for enhanced
protection. Addressing this, a consortium of European
National Research and Education Network (NREN)
organizations has developed a unified IS framework.
This paper aims to introduce the Security Baseline for
NRENs and a security maturity model tailored for R\&E
entities, derived from established security best
practices to meet the specific needs of NRENs,
universities, and various research institutions. The
models currently in existence do not possess a system
to smoothly correlate varying requirement tiers with
distinct user groups or scenarios, baseline standards,
and existing legislative actions. This segmentation
poses a significant hurdle to the community's capacity
to guarantee consistency, congruency, and thorough
compliance with a cohesive array of security standards
and regulations. By employing taxonomical engineering
principles, a mapping of baseline requirements to other
security frameworks and regulations has been
established. This reveals a correlation across most
regulations impacting R\&E institutions and uncovers an
overlap in the high-level requirements, which is
beneficial for the implementation of multiple
standards. Consequently, organizations can
systematically compare diverse security requirements,
pinpoint gaps in their strategy, and formulate a
roadmap to bolster their security initiatives.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kabashkin:2023:EES,
author = "Igor Kabashkin",
title = "End-to-End Service Availability in Heterogeneous
Multi-Tier Cloud--Fog--Edge Networks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "329",
day = "06",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100329",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/329",
abstract = "With the evolution towards the interconnected future
internet spanning satellites, aerial systems,
terrestrial infrastructure, and oceanic networks,
availability modeling becomes imperative to ensure
reliable service. This paper presents a methodology to
assess end-to-end availability in complex multi-tiered
architectures using a Markov model tailored to the
unique characteristics of cloud, fog, edge, and IoT
layers. By quantifying individual tier reliability and
combinations thereof, the approach enables setting
availability targets during the design and evaluation
of operational systems. In the paper, a methodology is
proposed to construct a Markov model for the
reliability of discrete tiers and end-to-end service
availability in heterogeneous multi-tier
cloud--fog--edge networks, and the model is
demonstrated through numerical examples assessing
availability in multi-tier networks. The numerical
examples demonstrate the adaptability of the model to
various topologies from conventional three-tier to
arbitrary multi-level architectures. As connectivity
becomes ubiquitous across heterogeneous devices and
networks, the proposed approach and availability
modeling provide an effective tool for reinforcing the
future internet's fault tolerance and service
quality.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Luczak:2023:EMC,
author = "Lukasz Piotr Luczak and Przemys{\l}aw Ignaciuk and
Micha{\l} Morawski",
title = "Evaluating {MPTCP} Congestion Control Algorithms:
Implications for Streaming in Open {Internet}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "328",
day = "04",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100328",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/328",
abstract = "In today's digital era, the demand for uninterrupted
and efficient data streaming is paramount across
various sectors, from entertainment to industrial
automation. While the traditional single-path solutions
often fell short in ensuring rapid and consistent data
transfers, Multipath TCP (MPTCP) emerges as a promising
alternative, enabling simultaneous data transfer across
multiple network paths. The efficacy of MPTCP, however,
hinges on the choice of appropriate congestion control
(CC) algorithms. Addressing the present knowledge gap,
this research provides a thorough evaluation of key
MPTCP CC algorithms in the context of streaming
applications in open Internet environments. Our
findings reveal that BALIA stands out as the most
suitable choice for MPTCP streaming, adeptly balancing
waiting time, throughput, and Head-of-Line blocking
reduction. Conversely, the wVegas algorithm, with its
delay-centric approach, proves less adequate for
multipath streaming. This study underscores the
imperative to fine-tune MPTCP for streaming
applications, at the same time offering insights for
future development areas and innovations.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yu:2023:MMS,
author = "Yong Yu and Shudong Chen and Rong Du and Da Tong and
Hao Xu and Shuai Chen",
title = "{MSEN}: a Multi-Scale Evolutionary Network for
Modeling the Evolution of Temporal Knowledge Graphs",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "327",
day = "30",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100327",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/327",
abstract = "Temporal knowledge graphs play an increasingly
prominent role in scenarios such as social networks,
finance, and smart cities. As such, research on
temporal knowledge graphs continues to deepen. In
particular, research on temporal knowledge graph
reasoning holds great significance, as it can provide
abundant knowledge for downstream tasks such as
question answering and recommendation systems. Current
reasoning research focuses primarily on interpolation
and extrapolation. Extrapolation research aims to
predict the likelihood of events occurring in future
timestamps. Historical events are crucial for
predicting future events. However, existing models
struggle to fully capture the evolutionary
characteristics of historical knowledge graphs. This
paper proposes a multi-scale evolutionary network
(MSEN) model that leverages Hierarchical Transfer aware
Graph Neural Network (HT-GNN) in a local memory encoder
to aggregate rich structural semantics from each
timestamp's knowledge graph. It also utilizes Time
Related Graph Neural Network (TR-GNN) in a global
memory encoder to model temporal-semantic dependencies
of entities across the global knowledge graph, mining
global evolutionary patterns. The model integrates
information from both encoders to generate entity
embeddings for predicting future events. The proposed
MSEN model demonstrates strong performance compared to
several baselines on typical benchmark datasets.
Results show MSEN achieves the highest prediction
accuracy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Szabo:2023:NAW,
author = "Zolt{\'a}n Szab{\'o} and Vilmos Bilicki",
title = "A New Approach to {Web} Application Security:
Utilizing {GPT} Language Models for Source Code
Inspection",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "326",
day = "28",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100326",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/326",
abstract = "Due to the proliferation of large language models
(LLMs) and their widespread use in applications such as
ChatGPT, there has been a significant increase in
interest in AI over the past year. Multiple researchers
have raised the question: how will AI be applied and in
what areas? Programming, including the generation,
interpretation, analysis, and documentation of static
program code based on prompts is one of the most
promising fields. With the GPT API, we have explored a
new aspect of this: static analysis of the source code
of front-end applications at the endpoints of the data
path. Our focus was the detection of the CWE-653
vulnerability---inadequately isolated sensitive code
segments that could lead to unauthorized access or data
leakage. This type of vulnerability detection consists
of the detection of code segments dealing with
sensitive data and the categorization of the isolation
and protection levels of those segments that were
previously not feasible without human intervention.
However, we believed that the interpretive capabilities
of GPT models could be explored to create a set of
prompts to detect these cases on a file-by-file basis
for the applications under study, and the efficiency of
the method could pave the way for additional analysis
tasks that were previously unavailable for automation.
In the introduction to our paper, we characterize in
detail the problem space of vulnerability and weakness
detection, the challenges of the domain, and the
advances that have been achieved in similarly complex
areas using GPT or other LLMs. Then, we present our
methodology, which includes our classification of
sensitive data and protection levels. This is followed
by the process of preprocessing, analyzing, and
evaluating static code. This was achieved through a
series of GPT prompts containing parts of static source
code, utilizing few-shot examples and chain-of-thought
techniques that detected sensitive code segments and
mapped the complex code base into manageable JSON
structures.Finally, we present our findings and
evaluation of the open source project analysis,
comparing the results of the GPT-based pipelines with
manual evaluations, highlighting that the field yields
a high research value. The results show a vulnerability
detection rate for this particular type of model of
88.76\%, among others.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lockett:2023:IIM,
author = "Adam Lockett and Ioannis Chalkias and Cagatay Yucel
and Jane Henriksen-Bulmer and Vasilis Katos",
title = "Investigating {IPTV} Malware in the Wild",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "325",
day = "28",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100325",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/325",
abstract = "Technologies providing copyright-infringing IPTV
content are commonly used as an illegal alternative to
legal IPTV subscriptions and services, as they usually
have lower monetary costs and can be more convenient
for users who follow content from different sources.
These infringing IPTV technologies may include
websites, software, software add-ons, and physical
set-top boxes. Due to the free or low cost of illegal
IPTV technologies, illicit IPTV content providers will
often resort to intrusive advertising, scams, and the
distribution of malware to increase their revenue. We
developed an automated solution for collecting and
analysing malware from illegal IPTV technologies and
used it to analyse a sample of illicit IPTV websites,
application (app) stores, and software. Our results
show that our IPTV Technologies Malware Analysis
Framework (IITMAF) classified 32 of the 60 sample URLs
tested as malicious compared to running the same test
using publicly available online antivirus solutions,
which only detected 23 of the 60 sample URLs as
malicious. Moreover, the IITMAF also detected malicious
URLs and files from 31 of the sample's websites, one of
which had reported ransomware behaviour.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cheimonidis:2023:DRA,
author = "Pavlos Cheimonidis and Konstantinos Rantos",
title = "Dynamic Risk Assessment in Cybersecurity: a Systematic
Literature Review",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "324",
day = "28",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100324",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/324",
abstract = "Traditional information security risk assessment (RA)
methodologies and standards, adopted by information
security management systems and frameworks as a
foundation stone towards robust environments, face many
difficulties in modern environments where the threat
landscape changes rapidly and new vulnerabilities are
being discovered. In order to overcome this problem,
dynamic risk assessment (DRA) models have been proposed
to continuously and dynamically assess risks to
organisational operations in (near) real time. The aim
of this work is to analyse the current state of DRA
models that have been proposed for cybersecurity,
through a systematic literature review. The screening
process led us to study 50 DRA models, categorised
based on the respective primary analysis methods they
used. The study provides insights into the key
characteristics of these models, including the maturity
level of the examined models, the domain or application
area in which these models flourish, and the
information they utilise in order to produce results.
The aim of this work is to answer critical research
questions regarding the development of dynamic risk
assessment methodologies and provide insights on the
already developed methods as well as future research
directions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chen:2023:TGK,
author = "Chin-Yi Chen and Jih-Jeng Huang",
title = "Temporal-Guided Knowledge Graph-Enhanced Graph
Convolutional Network for Personalized Movie
Recommendation Systems",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "323",
day = "28",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100323",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/323",
abstract = "Traditional movie recommendation systems are
increasingly falling short in the contemporary
landscape of abundant information and evolving user
behaviors. This study introduced the temporal knowledge
graph recommender system (TKGRS), a ground-breaking
algorithm that addresses the limitations of existing
models. TKGRS uniquely integrates graph convolutional
networks (GCNs), matrix factorization, and temporal
decay factors to offer a robust and dynamic
recommendation mechanism. The algorithm's architecture
comprises an initial embedding layer for identifying
the user and item, followed by a GCN layer for a
nuanced understanding of the relationships and fully
connected layers for prediction. A temporal decay
factor is also used to give weightage to recent
user--item interactions. Empirical validation using the
MovieLens 100K, 1M, and Douban datasets showed that
TKGRS outperformed the state-of-the-art models
according to the evaluation metrics, i.e., RMSE and
MAE. This innovative approach sets a new standard in
movie recommendation systems and opens avenues for
future research in advanced graph algorithms and
machine learning techniques.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chung:2023:AEH,
author = "Yao-Liang Chung",
title = "Application of an Effective Hierarchical
Deep-Learning-Based Object Detection Model Integrated
with Image-Processing Techniques for Detecting Speed
Limit Signs, Rockfalls, Potholes, and Car Crashes",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "322",
day = "28",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100322",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/322",
abstract = "Against the backdrop of rising road traffic accident
rates, measures to prevent road traffic accidents have
always been a pressing issue in Taiwan. Road traffic
accidents are mostly caused by speeding and roadway
obstacles, especially in the form of rockfalls,
potholes, and car crashes (involving damaged cars and
overturned cars). To address this, it was necessary to
design a real-time detection system that could detect
speed limit signs, rockfalls, potholes, and car
crashes, which would alert drivers to make timely
decisions in the event of an emergency, thereby
preventing secondary car crashes. This system would
also be useful for alerting the relevant authorities,
enabling a rapid response to the situation. In this
study, a hierarchical deep-learning-based object
detection model is proposed based on You Only Look Once
v7 (YOLOv7) and mask region-based convolutional neural
network (Mask R-CNN) algorithms. In the first level,
YOLOv7 identifies speed limit signs and rockfalls,
potholes, and car crashes. In the second level, Mask
R-CNN subdivides the speed limit signs into nine
categories (30, 40, 50, 60, 70, 80, 90, 100, and 110
km/h). The images used in this study consisted of
screen captures of dashcam footage as well as images
obtained from the Tsinghua-Tencent 100K dataset, Google
Street View, and Google Images searches. During model
training, we employed Gaussian noise and image rotation
to simulate poor weather conditions as well as
obscured, slanted, or twisted objects. Canny edge
detection was used to enhance the contours of the
detected objects and accentuate their features. The
combined use of these image-processing techniques
effectively increased the quantity and variety of
images in the training set. During model testing, we
evaluated the model's performance based on its mean
average precision (mAP). The experimental results
showed that the mAP of our proposed model was 8.6
percentage points higher than that of the YOLOv7
model---a significant improvement in the overall
accuracy of the model. In addition, we tested the model
using videos showing different scenarios that had not
been used in the training process, finding the model to
have a rapid response time and a lower overall mean
error rate. To summarize, the proposed model is a good
candidate for road safety detection.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mohammed:2023:EFA,
author = "Medina Ayta Mohammed and Carmen De-Pablos-Heredero and
and Jos{\'e} Luis Montes Botella",
title = "Exploring the Factors Affecting Countries' Adoption of
Blockchain-Enabled Central Bank Digital Currencies",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "321",
day = "28",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100321",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/321",
abstract = "Central bank-issued digital currencies have sparked
significant interest and are currently the subject of
extensive research, owing to their potential for rapid
settlement, low fees, accessibility, and automated
monetary policies. However, central bank digital
currencies are still in their infancy and the levels of
adoption vary significantly between nations, with a few
countries seeing widespread adoption. We used partial
least squares structural equation modeling to
investigate the nonlinear relationship between key
national development indicators and central bank
digital deployment across 67 countries. We explore the
technological, environmental, legal, and economic
factors that affect central bank digital currency
adoption by country. We found a statistically
significant and positive correlation between countries'
central bank digital currency adoption status and a
country's level of democracy and public confidence in
governance, and a negative association between
regulatory quality and income inequality. There was no
significant association between countries' central bank
digital currency adoption status and their level of
network readiness, foreign exchange reserves, and
sustainable development goal rank. Thus, we posit that
a country that is highly democratic and has good
governance adopts central bank digital currencies more
readily than others. Based on our findings, we
suggested areas for additional research and highlighted
policy considerations related to the wider adoption of
central bank digital currency.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chen:2023:MAJ,
author = "Dechuan Chen and Jin Li and Jianwei Hu and Xingang
Zhang and Shuai Zhang",
title = "Multi-Antenna Jammer-Assisted Secure Short Packet
Communications in {IoT} Networks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "320",
day = "26",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100320",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/320",
abstract = "In this work, we exploit a multi-antenna cooperative
jammer to enable secure short packet communications in
Internet of Things (IoT) networks. Specifically, we
propose three jamming schemes to combat eavesdropping,
i.e., the zero forcing beamforming (ZFB) scheme,
null-space artificial noise (NAN) scheme, and transmit
antenna selection (TAS) scheme. Assuming Rayleigh
fading, we derive new closed-form approximations for
the secrecy throughput with finite blocklength coding.
To gain further insights, we also analyze the
asymptotic performance of the secrecy throughput in the
case of infinite blocklength. Furthermore, we
investigate the optimization problem in terms of
maximizing the secrecy throughput with the latency and
reliability constraints to determine the optimal
blocklength. Simulation results validate the accuracy
of the approximations and evaluate the impact of key
parameters such as the jamming power and the number of
antennas at the jammer on the secrecy throughput.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Borghesi:2023:MNF,
author = "Michela Borghesi and Cristian Zambelli and Rino
Micheloni and Stefano Bonnini",
title = "Modeling {3D} {NAND} Flash with Nonparametric
Inference on Regression Coefficients for Reliable
Solid-State Storage",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "319",
day = "26",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100319",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/319",
abstract = "Solid-state drives represent the preferred backbone
storage solution thanks to their low latency and high
throughput capabilities compared to mechanical hard
disk drives. The performance of a drive is intertwined
with the reliability of the memories; hence, modeling
their reliability is an important task to be performed
as a support for storage system designers. In the
literature, storage developers devise dedicated
parametric statistical approaches to model the
evolution of the memory's error distribution through
well-known statistical frameworks. Some of these
well-founded reliability models have a deep connection
with the 3D NAND flash technology. In fact, the more
precise and accurate the model, the less the
probability of incurring storage performance slowdowns.
In this work, to avoid some limitations of the
parametric methods, a non-parametric approach to test
the model goodness-of-fit based on combined permutation
tests is carried out. The results show that the
electrical characterization of different memory blocks
and pages tested provides an FBC feature that can be
well-modeled using a multiple regression analysis.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gazzan:2023:EML,
author = "Mazen Gazzan and Frederick T. Sheldon",
title = "An Enhanced Minimax Loss Function Technique in
Generative Adversarial Network for Ransomware Behavior
Prediction",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "10",
pages = "318",
day = "22",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15100318",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Nov 3 09:03:57 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/10/318",
abstract = "Recent ransomware attacks threaten not only personal
files but also critical infrastructure like smart
grids, necessitating early detection before encryption
occurs. Current methods, reliant on pre-encryption
data, suffer from insufficient and rapidly outdated
attack patterns, despite efforts to focus on select
features. Such an approach assumes that the same
features remain unchanged. This approach proves
ineffective due to the polymorphic and metamorphic
characteristics of ransomware, which generate unique
attack patterns for each new target, particularly in
the pre-encryption phase where evasiveness is
prioritized. As a result, the selected features quickly
become obsolete. Therefore, this study proposes an
enhanced Bi-Gradual Minimax (BGM) loss function for the
Generative Adversarial Network (GAN) Algorithm that
compensates for the attack patterns insufficiency to
represents the polymorphic behavior at the earlier
phases of the ransomware lifecycle. Unlike existing
GAN-based models, the BGM-GAN gradually minimizes the
maximum loss of the generator and discriminator in the
network. This allows the generator to create artificial
patterns that resemble the pre-encryption data
distribution. The generator is used to craft evasive
adversarial patterns and add them to the original data.
Then, the generator and discriminator compete to
optimize their weights during the training phase such
that the generator produces realistic attack patterns,
while the discriminator endeavors to distinguish
between the real and crafted patterns. The experimental
results show that the proposed BGM-GAN reached maximum
accuracy of 0.98, recall (0.96), and a minimum false
positive rate (0.14) which all outperform those
obtained by the existing works. The application of
BGM-GAN can be extended to early detect malware and
other types of attacks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Utomo:2023:FAT,
author = "Sapdo Utomo and Adarsh Rouniyar and Hsiu-Chun Hsu and
and Pao-Ann Hsiung",
title = "Federated Adversarial Training Strategies for
Achieving Privacy and Security in Sustainable Smart
City Applications",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "371",
day = "20",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110371",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/371",
abstract = "Smart city applications that request sensitive user
information necessitate a comprehensive data privacy
solution. Federated learning (FL), also known as
privacy by design, is a new paradigm in machine
learning (ML). However, FL models are susceptible to
adversarial attacks, similar to other AI models. In
this paper, we propose federated adversarial training
(FAT) strategies to generate robust global models that
are resistant to adversarial attacks. We apply two
adversarial attack methods, projected gradient descent
(PGD) and the fast gradient sign method (FGSM), to our
air pollution dataset to generate adversarial samples.
We then evaluate the effectiveness of our FAT
strategies in defending against these attacks. Our
experiments show that FGSM-based adversarial attacks
have a negligible impact on the accuracy of global
models, while PGD-based attacks are more effective.
However, we also show that our FAT strategies can make
global models robust enough to withstand even PGD-based
attacks. For example, the accuracy of our FAT-PGD and
FL-mixed-PGD models is 81.13\% and 82.60\%,
respectively, compared to 91.34\% for the baseline FL
model. This represents a reduction in accuracy of 10\%,
but this could be potentially mitigated by using a more
complex and larger model. Our results demonstrate that
FAT can enhance the security and privacy of sustainable
smart city applications. We also show that it is
possible to train robust global models from modest
datasets per client, which challenges the conventional
wisdom that adversarial training requires massive
datasets.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Badidi:2023:EAE,
author = "Elarbi Badidi",
title = "Edge {AI} for Early Detection of Chronic Diseases and
the Spread of Infectious Diseases: Opportunities,
Challenges, and Future Directions",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "370",
day = "18",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110370",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/370",
abstract = "Edge AI, an interdisciplinary technology that enables
distributed intelligence with edge devices, is quickly
becoming a critical component in early health
prediction. Edge AI encompasses data analytics and
artificial intelligence (AI) using machine learning,
deep learning, and federated learning models deployed
and executed at the edge of the network, far from
centralized data centers. AI enables the careful
analysis of large datasets derived from multiple
sources, including electronic health records, wearable
devices, and demographic information, making it
possible to identify intricate patterns and predict a
person's future health. Federated learning, a novel
approach in AI, further enhances this prediction by
enabling collaborative training of AI models on
distributed edge devices while maintaining privacy.
Using edge computing, data can be processed and
analyzed locally, reducing latency and enabling instant
decision making. This article reviews the role of Edge
AI in early health prediction and highlights its
potential to improve public health. Topics covered
include the use of AI algorithms for early detection of
chronic diseases such as diabetes and cancer and the
use of edge computing in wearable devices to detect the
spread of infectious diseases. In addition to
discussing the challenges and limitations of Edge AI in
early health prediction, this article emphasizes future
research directions to address these concerns and the
integration with existing healthcare systems and
explore the full potential of these technologies in
improving public health.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wu:2023:MUC,
author = "Qianqian Wu and Qiang Liu and Zefan Wu and Jiye
Zhang",
title = "Maximizing {UAV} Coverage in Maritime Wireless
Networks: a Multiagent Reinforcement Learning
Approach",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "369",
day = "16",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110369",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/369",
abstract = "In the field of ocean data monitoring, collaborative
control and path planning of unmanned aerial vehicles
(UAVs) are essential for improving data collection
efficiency and quality. In this study, we focus on how
to utilize multiple UAVs to efficiently cover the
target area in ocean data monitoring tasks. First, we
propose a multiagent deep reinforcement learning
(DRL)-based path-planning method for multiple UAVs to
perform efficient coverage tasks in a target area in
the field of ocean data monitoring. Additionally, the
traditional Multi-Agent Twin Delayed Deep Deterministic
policy gradient (MATD3) algorithm only considers the
current state of the agents, leading to poor
performance in path planning. To address this issue, we
introduce an improved MATD3 algorithm with the
integration of a stacked long short-term memory
(S-LSTM) network to incorporate the historical
interaction information and environmental changes among
agents. Finally, the experimental results demonstrate
that the proposed MATD3-Stacked\_LSTM algorithm can
effectively improve the efficiency and practicality of
UAV path planning by achieving a high coverage rate of
the target area and reducing the redundant coverage
rate among UAVs compared with two other advanced DRL
algorithms.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gori:2023:GSM,
author = "Giacomo Gori and Lorenzo Rinieri and Amir {Al Sadi}
and Andrea Melis and Franco Callegati and Marco
Prandini",
title = "{GRAPH4}: a Security Monitoring Architecture Based on
Data Plane Anomaly Detection Metrics Calculated over
Attack Graphs",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "368",
day = "15",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110368",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/368",
abstract = "The correct and efficient measurement of security
properties is key to the deployment of effective
cyberspace protection strategies. In this work, we
propose GRAPH4, which is a system that combines
different security metrics to design an attack
detection approach that leverages the advantages of
modern network architectures. GRAPH4 makes use of
attack graphs that are generated by the control plane
to extract a view of the network components requiring
monitoring, which is based on the specific attack that
must be detected and on the knowledge of the complete
network layout. It enables an efficient distribution of
security metrics tasks between the control plane and
the data plane. The attack graph is translated into
network rules that are subsequently installed in
programmable nodes in order to enable alerting and
detecting network anomalies at a line rate. By
leveraging data plane programmability and security
metric scores, GRAPH4 enables timely responses to
unforeseen conditions while optimizing resource
allocation and enhancing proactive defense. This paper
details the architecture of GRAPH4, and it provides an
evaluation of the performance gains it can achieve.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Badshah:2023:TEI,
author = "Afzal Badshah and Ghani Ur Rehman and Haleem Farman
and Anwar Ghani and Shahid Sultan and Muhammad Zubair
and Moustafa M. Nasralla",
title = "Transforming Educational Institutions: Harnessing the
Power of {Internet of Things}, Cloud, and Fog
Computing",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "367",
day = "13",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110367",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/367",
abstract = "The Internet of Things (IoT), cloud, and fog computing
are now a reality and have become the vision of the
smart world. Self-directed learning approaches, their
tools, and smart spaces are transforming traditional
institutions into smart institutions. This transition
has a positive impact on learner engagement,
motivation, attendance, and advanced learning outcomes.
In developing countries, there are many barriers to
quality education, such as inadequate implementation of
standard operating procedures, lack of involvement from
learners and parents, and lack of transparent
performance measurement for both institutions and
students. These issues need to be addressed to ensure
further growth and improvement. This study explored the
use of smart technologies (IoT, fog, and cloud
computing) to address challenges in student learning
and administrative tasks. A novel framework (a
five-element smart institution framework) is proposed
to connect administrators, teachers, parents, and
students using smart technologies to improve
attendance, pedagogy, and evaluation. The results
showed significant increases in student attendance and
homework progress, along with improvements in annual
results, student discipline, and teacher/parent
engagement.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liaqat:2023:DCP,
author = "Rao Muzamal Liaqat and Philip Branch and Jason But",
title = "Design Considerations and Performance Evaluation of
Gossip Routing in {LoRa}-Based Linear Networks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "366",
day = "11",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110366",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/366",
abstract = "Linear networks (sometimes called chain-type networks)
occur frequently in Internet of Things (IoT)
applications, where sensors or actuators are deployed
along pipelines, roads, railways, mines, and
international borders. LoRa, short for Long Range, is
an increasingly important technology for the IoT with
great potential for linear networking. Despite its
potential, limited research has explored LoRa's
implementation in such networks. In this paper, we
addressed two important issues related to LoRa linear
networks. The first is contention, when multiple nodes
attempt to access a shared channel. Although originally
designed to deal with interference, LoRa's technique of
synchronisation with a transmission node permits a
novel approach to contention, which we explored. The
second issue revolves around routing, where linear
networks permit simpler strategies, in contrast to the
common routing complexities of mesh networks. We
present gossip routing as a very lightweight approach
to routing. All our evaluations were carried out using
real equipment by developing real networks. We
constructed networks of up to three hops in length and
up to three nodes in width. We carried out experiments
looking at contention and routing. We demonstrate using
the novel approach that we could achieve up to 98\%
throughput. We compared its performance considering
collocated scenarios that achieved 84\% and 89\%
throughputby using relay widths of two and three at
each hop, respectively. Lastly, we demonstrate the
effectiveness of gossip routing by using various
transmission probabilities. We noticed high performance
up to 98\% throughputat Tprob = 0.90 and Tprob = 0.80
by employing two and three active relay nodes,
respectively. The experimental result showed that, at
Tprob = 0.40, it achieved an average performance of
62.8\% and 73.77\% by using two and three active relay
nodes, respectively. We concluded that LoRa is an
excellent technology for Internet of Things
applications where sensors and actuators are deployed
in an approximately linear fashion.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{AlSalem:2023:AIW,
author = "Thanaa Saad AlSalem and Majed Aadi AlShamari",
title = "Assessing Interactive {Web}-Based Systems Using
Behavioral Measurement Techniques",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "365",
day = "11",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110365",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/365",
abstract = "Nowadays, e-commerce websites have become part of
people's daily lives; therefore, it has become
necessary to seek help in assessing and improving the
usability of the services of e-commerce websites.
Essentially, usability studies offer significant
information about users' assessment and perceptions of
satisfaction, effectiveness, and efficiency of online
services. This research investigated the usability of
two e-commerce web-sites in Saudi Arabia and compared
the effectiveness of different behavioral measurement
techniques, such as heuristic evaluation, usability
testing, and eye-tracking. In particular, this research
selected the Extra and Jarir e-commerce websites in
Saudi Arabia based on a combined approach of criteria
and ranking. This research followed an experimental
approach in which both qualitative and quantitative
approaches were employed to collect and analyze the
data. Each of the behavioral measurement techniques
identified usability issues ranging from cosmetic to
catastrophic issues. It is worth mentioning that the
heuristic evaluation by experts provided both the
majority of the issues and identified the most severe
usability issues compared to the number of issues
identified by both usability testing and eye-tracking
combined. Usability testing provided fewer problems,
most of which had already been identified by the
experts. Eye-tracking provided critical information
regarding the page design and element placements and
revealed certain user behavior patterns that indicated
certain usability problems. Overall, the research
findings appeared useful to user experience (UX) and
user interface (UI) designers to consider the provided
recommendations to enhance the usability of e-commerce
websites.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yuan:2023:SAC,
author = "Ye Yuan and Wang Wang and Guangze Wen and Zikun Zheng
and Zhemin Zhuang",
title = "Sentiment Analysis of {Chinese} Product Reviews Based
on Fusion of {DUAL}-Channel {BiLSTM} and
Self-Attention",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "364",
day = "10",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110364",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/364",
abstract = "Product reviews provide crucial information for both
consumers and businesses, offering insights needed
before purchasing a product or service. However,
existing sentiment analysis methods, especially for
Chinese language, struggle to effectively capture
contextual information due to the complex semantics,
multiple sentiment polarities, and long-term
dependencies between words. In this paper, we propose a
sentiment classification method based on the BiLSTM
algorithm to address these challenges in natural
language processing. Self-Attention-CNN BiLSTM
(SAC-BiLSTM) leverages dual channels to extract
features from both character-level embeddings and
word-level embeddings. It combines BiLSTM and
Self-Attention mechanisms for feature extraction and
weight allocation, aiming to overcome the limitations
in mining contextual information. Experiments were
conducted on the onlineshopping10cats dataset, which is
a standard corpus of e-commerce shopping reviews
available in the ChineseNlpCorpus 2018. The
experimental results demonstrate the effectiveness of
our proposed algorithm, with Recall, Precision, and F1
scores reaching 0.9409, 0.9369, and 0.9404,
respectively.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Skondras:2023:GSR,
author = "Panagiotis Skondras and Panagiotis Zervas and Giannis
Tzimas",
title = "Generating Synthetic Resume Data with Large Language
Models for Enhanced Job Description Classification",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "363",
day = "09",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110363",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/363",
abstract = "In this article, we investigate the potential of
synthetic resumes as a means for the rapid generation
of training data and their effectiveness in data
augmentation, especially in categories marked by sparse
samples. The widespread implementation of machine
learning algorithms in natural language processing
(NLP) has notably streamlined the resume classification
process, delivering time and cost efficiencies for
hiring organizations. However, the performance of these
algorithms depends on the abundance of training data.
While selecting the right model architecture is
essential, it is also crucial to ensure the
availability of a robust, well-curated dataset. For
many categories in the job market, data sparsity
remains a challenge. To deal with this challenge, we
employed the OpenAI API to generate both structured and
unstructured resumes tailored to specific criteria.
These synthetically generated resumes were cleaned,
preprocessed and then utilized to train two distinct
models: a transformer model (BERT) and a feedforward
neural network (FFNN) that incorporated Universal
Sentence Encoder 4 (USE4) embeddings. While both models
were evaluated on the multiclass classification task of
resumes, when trained on an augmented dataset
containing 60 percent real data (from Indeed website)
and 40 percent synthetic data from ChatGPT, the
transformer model presented exceptional accuracy. The
FFNN, albeit predictably, achieved lower accuracy.
These findings highlight the value of augmented
real-world data with ChatGPT-generated synthetic
resumes, especially in the context of limited training
data. The suitability of the BERT model for such
classification tasks further reinforces this
narrative.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Shaibu:2023:PPL,
author = "Farouq E. Shaibu and Elizabeth N. Onwuka and Nathaniel
Salawu and Stephen S. Oyewobi and Karim Djouani and
Adnan M. Abu-Mahfouz",
title = "Performance of Path Loss Models over Mid-Band and
High-Band Channels for {5G} Communication Networks: a
Review",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "362",
day = "07",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110362",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/362",
abstract = "The rapid development of 5G communication networks has
ushered in a new era of high-speed, low-latency
wireless connectivity, as well as the enabling of
transformative technologies. However, a crucial aspect
of ensuring reliable communication is the accurate
modeling of path loss, as it directly impacts signal
coverage, interference, and overall network efficiency.
This review paper critically assesses the performance
of path loss models in mid-band and high-band
frequencies and examines their effectiveness in
addressing the challenges of 5G deployment. In this
paper, we first present the summary of the background,
highlighting the increasing demand for high-quality
wireless connectivity and the unique characteristics of
mid-band (1--6 GHz) and high-band ({$>$6} GHz)
frequencies in the 5G spectrum. The methodology
comprehensively reviews some of the existing path loss
models, considering both empirical and machine learning
approaches. We analyze the strengths and weaknesses of
these models, considering factors such as urban and
suburban environments and indoor scenarios. The results
highlight the significant advancements in path loss
modeling for mid-band and high-band 5G channels. In
terms of prediction accuracy and computing
effectiveness, machine learning models performed better
than empirical models in both mid-band and high-band
frequency spectra. As a result, they might be suggested
as an alternative yet promising approach to predicting
path loss in these bands. We consider the results of
this review to be promising, as they provide network
operators and researchers with valuable insights into
the state-of-the-art path loss models for mid-band and
high-band 5G channels. Future work suggests tuning an
ensemble machine learning model to enhance a stable
empirical model with multiple parameters to develop a
hybrid path loss model for the mid-band frequency
spectrum.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sun:2023:IPP,
author = "Nigang Sun and Chenyang Zhu and Yuanyi Zhang and
Yining Liu",
title = "An Identity Privacy-Preserving Scheme against Insider
Logistics Data Leakage Based on One-Time-Use Accounts",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "361",
day = "05",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110361",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/361",
abstract = "Digital transformation of the logistics industry
triggered by the widespread use of Internet of Things
(IoT) technology has prompted a significant revolution
in logistics companies, further bringing huge dividends
to society. However, the concurrent accelerated growth
of logistics companies also significantly hinders the
safeguarding of individual privacy. Digital identity
has ascended to having the status of a prevalent
privacy-protection solution, principally due to its
efficacy in mitigating privacy compromises. However,
the extant schemes fall short of addressing the issue
of privacy breaches engendered by insider maleficence.
This paper proposes an innovative identity
privacy-preserving scheme aimed at addressing the
quandary of internal data breaches. In this scheme, the
identity provider furnishes one-time-use accounts for
logistics users, thereby obviating the protracted
retention of logistics data within the internal
database. The scheme also employs ciphertext policy
attribute-based encryption (CP-ABE) to encrypt address
nodes, wherein the access privileges accorded to
logistics companies are circumscribed. Therefore,
internal logistics staff have to secure unequivocal
authorization from users prior to accessing
identity-specific data and privacy protection of user
information is also concomitantly strengthened.
Crucially, this scheme ameliorates internal privacy
concerns, rendering it infeasible for internal
interlopers to correlate the users' authentic
identities with their digital wallets. Finally, the
effectiveness and reliability of the scheme are
demonstrated through simulation experiments and
discussions of security.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liao:2023:IBF,
author = "Wei-Shun Liao and Ou Zhao and Keren Li and Hikaru
Kawasaki and Takeshi Matsumura",
title = "Implementation of In-Band Full-Duplex Using Software
Defined Radio with Adaptive Filter-Based
Self-Interference Cancellation",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "360",
day = "03",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110360",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/360",
abstract = "For next generation wireless communication systems,
high throughput, low latency, and large user
accommodation are popular and important required
characteristics. To achieve these requirements for next
generation wireless communication systems, an in-band
full-duplex (IBFD) communication system is one of the
possible candidate technologies. However, to realize
IBFD systems, there is an essential problem that there
exists a large self-interference (SI) due to the
simultaneous signal transmission and reception in the
IBFD systems. Therefore, to implement the IBFD system,
it is necessary to realize a series of effective SI
cancellation processes. In this study, we implemented a
prototype of SI cancellation processes with our
designed antenna, analog circuit, and digital
cancellation function using an adaptive filter. For
system implementation, we introduce software-defined
radio (SDR) devices in this study. By using SDR
devices, which can be customized by users, the
evaluations of complicated wireless access systems like
IBFD can be realized easily. Besides the validation
stage of system practicality, the system development
can be more effective by using SDR devices. Therefore,
we utilize SDR devices to implement the proposed IBFD
system and conduct experiments to evaluate its
performance. The results show that the SI cancellation
effect can reach nearly 100 dB with 10$-$3 order
bit error rate (BER) after signal demodulation. From
the experiment results, it can be seen obviously that
the implemented prototype can effectively cancel the
large amount of SI and obtain satisfied digital
demodulation results, which validates the effectiveness
of the developed system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Poltronieri:2023:RLV,
author = "Filippo Poltronieri and Cesare Stefanelli and Mauro
Tortonesi and Mattia Zaccarini",
title = "Reinforcement Learning vs. Computational Intelligence:
Comparing Service Management Approaches for the Cloud
Continuum",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "359",
day = "31",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110359",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/359",
abstract = "Modern computing environments, thanks to the advent of
enabling technologies such as Multi-access Edge
Computing (MEC), effectively represent a Cloud
Continuum, a capillary network of computing resources
that extend from the Edge of the network to the Cloud,
which enables a dynamic and adaptive service fabric.
Efficiently coordinating resource allocation,
exploitation, and management in the Cloud Continuum
represents quite a challenge, which has stimulated
researchers to investigate innovative solutions based
on smart techniques such as Reinforcement Learning and
Computational Intelligence. In this paper, we make a
comparison of different optimization algorithms and a
first investigation of how they can perform in this
kind of scenario. Specifically, this comparison
included the Deep Q-Network, Proximal Policy
Optimization, Genetic Algorithms, Particle Swarm
Optimization, Quantum-inspired Particle Swarm
Optimization, Multi-Swarm Particle Optimization, and
the Grey-Wolf Optimizer. We demonstrate how all
approaches can solve the service management problem
with similar performance---with a different sample
efficiency---if a high number of samples can be
evaluated for training and optimization. Finally, we
show that, if the scenario conditions change,
Deep-Reinforcement-Learning-based approaches can
exploit the experience built during training to adapt
service allocation according to the modified
conditions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ridolfi:2023:IEF,
author = "Lorenzo Ridolfi and David Naseh and Swapnil Sadashiv
Shinde and Daniele Tarchi",
title = "Implementation and Evaluation of a Federated Learning
Framework on {Raspberry PI} Platforms for {IoT} {6G}
Applications",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "358",
day = "31",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110358",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/358",
abstract = "With the advent of 6G technology, the proliferation of
interconnected devices necessitates a robust, fully
connected intelligence network. Federated Learning (FL)
stands as a key distributed learning technique, showing
promise in recent advancements. However, the
integration of novel Internet of Things (IoT)
applications and virtualization technologies has
introduced diverse and heterogeneous devices into
wireless networks. This diversity encompasses
variations in computation, communication, storage
resources, training data, and communication modes among
connected nodes. In this context, our study presents a
pivotal contribution by analyzing and implementing FL
processes tailored for 6G standards. Our work defines a
practical FL platform, employing Raspberry Pi devices
and virtual machines as client nodes, with a Windows PC
serving as a parameter server. We tackle the image
classification challenge, implementing the FL model via
PyTorch, augmented by the specialized FL library,
Flower. Notably, our analysis delves into the impact of
computational resources, data availability, and heating
issues across heterogeneous device sets. Additionally,
we address knowledge transfer and employ pre-trained
networks in our FL performance evaluation. This
research underscores the indispensable role of
artificial intelligence in IoT scenarios within the 6G
landscape, providing a comprehensive framework for FL
implementation across diverse and heterogeneous
devices.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cai:2023:TSF,
author = "Weihong Cai and Fengxi Duan",
title = "Task Scheduling for Federated Learning in Edge Cloud
Computing Environments by Using Adaptive-Greedy Dingo
Optimization Algorithm and Binary Salp Swarm
Algorithm",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "357",
day = "30",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110357",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/357",
abstract = "With the development of computationally intensive
applications, the demand for edge cloud computing
systems has increased, creating significant challenges
for edge cloud computing networks. In this paper, we
consider a simple three-tier computational model for
multiuser mobile edge computing (MEC) and introduce two
major problems of task scheduling for federated
learning in MEC environments: (1) the transmission
power allocation (PA) problem, and (2) the dual
decision-making problems of joint request offloading
and computational resource scheduling (JRORS). At the
same time, we factor in server pricing and task
completion, in order to improve the user-friendliness
and fairness in scheduling decisions. The solving of
these problems simultaneously ensures both scheduling
efficiency and system quality of service (QoS), to
achieve a balance between efficiency and user
satisfaction. Then, we propose an adaptive greedy dingo
optimization algorithm (AGDOA) based on greedy policies
and parameter adaptation to solve the PA problem and
construct a binary salp swarm algorithm (BSSA) that
introduces binary coding to solve the discrete JRORS
problem. Finally, simulations were conducted to verify
the better performance compared to the traditional
algorithms. The proposed algorithm improved the
convergence speed of the algorithm in terms of
scheduling efficiency, improved the system response
rate, and found solutions with a lower energy
consumption. In addition, the search results had a
higher fairness and system welfare in terms of system
quality of service.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Qahtani:2023:MAC,
author = "Elham {Al Qahtani} and Yousra Javed and Sarah Tabassum
and Lipsarani Sahoo and Mohamed Shehab",
title = "Managing Access to Confidential Documents: a Case
Study of an Email Security Tool",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "356",
day = "28",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110356",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/356",
abstract = "User adoption and usage of end-to-end encryption tools
is an ongoing research topic. A subset of such tools
allows users to encrypt confidential emails, as well as
manage their access control using features such as the
expiration time, disabling forwarding, persistent
protection, and watermarking. Previous studies have
suggested that protective attitudes and behaviors could
improve the adoption of new security technologies.
Therefore, we conducted a user study on 19 participants
to understand their perceptions of an email security
tool and how they use it to manage access control to
confidential information such as medical, tax, and
employee information if sent via email. Our results
showed that the participants' first impression upon
receiving an end-to-end encrypted email was that it
looked suspicious, especially when received from an
unknown person. After the participants were informed
about the importance of the investigated tool, they
were comfortable sharing medical, tax, and employee
information via this tool. Regarding access control
management of the three types of confidential
information, the expiration time and disabling
forwarding were most useful for the participants in
preventing unauthorized and continued access. While the
participants did not understand how the persistent
protection feature worked, many still chose to use it,
assuming it provided some extra layer of protection to
confidential information and prevented unauthorized
access. Watermarking was the least useful feature for
the participants, as many were unsure of its usage. Our
participants were concerned about data leaks from
recipients' devices if they set a longer expiration
date, such as a year. We provide the practical
implications of our findings.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kyriakos:2023:BIT,
author = "Christos Kyriakos and Manolis Vavalis",
title = "Business Intelligence through Machine Learning from
Satellite Remote Sensing Data",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "355",
day = "27",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110355",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/355",
abstract = "Several cities have been greatly affected by economic
crisis, unregulated gentrification, and the pandemic,
resulting in increased vacancy rates. Abandoned
buildings have various negative implications on their
neighborhoods, including an increased chance of fire
and crime and a drastic reduction in their monetary
value. This paper focuses on the use of satellite data
and machine learning to provide insights for businesses
and policymakers within Greece and beyond. Our
objective is two-fold: to provide a comprehensive
literature review on recent results concerning the
opportunities offered by satellite images for business
intelligence and to design and implement an open-source
software system for the detection of abandoned or
disused buildings based on nighttime lights and
built-up area indices. Our preliminary experimentation
provides promising results that can be used for
location intelligence and beyond.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{ElGaabouri:2023:SLR,
author = "Ismail {El Gaabouri} and Mohamed Senhadji and Mostafa
Belkasmi and Brahim {El Bhiri}",
title = "A Systematic Literature Review on Authentication and
Threat Challenges on {RFID} Based {NFC} Applications",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "354",
day = "27",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110354",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/354",
abstract = "The Internet of Things (IoT) concept is tremendously
applied in our current daily lives. The IoT involves
Radio Frequency Identification (RFID) as a part of the
infrastructure that helps with the data gathering from
different types of sensors. In general, security
worries have increased significantly as these types of
technologies have become more common. For this reason,
manifold realizations and studies have been carried out
to address this matter. In this work, we tried to
provide a thorough analysis of the cryptography-based
solutions for RFID cards (MIFARE cards as a case study)
by performing a Systematic Literature Review (SLR) to
deliver the up-to-date trends and outlooks on this
topic.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Baras:2023:IEM,
author = "Nikolaos Baras and Antonios Chatzisavvas and Dimitris
Ziouzios and Ioannis Vanidis and Minas Dasygenis",
title = "Improving the Efficiency of Modern Warehouses Using
Smart Battery Placement",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "353",
day = "26",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110353",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/353",
abstract = "In the ever-evolving landscape of warehousing, the
integration of unmanned ground vehicles (UGVs) has
profoundly revolutionized operational efficiency.
Despite this advancement, a key determinant of UGV
productivity remains its energy management and battery
placement strategies. While many studies explored
optimizing the pathways within warehouses and
determining ideal power station locales, there remains
a gap in addressing the dynamic needs of
energy-efficient UGVs operating in tandem. The current
literature largely focuses on static designs, often
overlooking the challenges of multi-UGV scenarios. This
paper introduces a novel algorithm based on affinity
propagation (AP) for smart battery and charging station
placement in modern warehouses. The idea of the
proposed algorithm is to divide the initial area into
multiple sub-areas based on their traffic, and then
identify the optimal battery location within each
sub-area. A salient feature of this algorithm is its
adeptness at determining the most strategic battery
station placements, emphasizing uninterrupted
operations and minimized downtimes. Through extensive
evaluations in a synthesized realistic setting, our
results underscore the algorithm's proficiency in
devising enhanced solutions within feasible time
constraints, paving the way for more energy-efficient
and cohesive UGV-driven warehouse systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yu:2023:LAS,
author = "Liangkun Yu and Xiang Sun and Rana Albelaihi and Chen
Yi",
title = "Latency-Aware Semi-Synchronous Client Selection and
Model Aggregation for Wireless Federated Learning",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "352",
day = "26",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110352",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/352",
abstract = "Federated learning (FL) is a collaborative
machine-learning (ML) framework particularly suited for
ML models requiring numerous training samples, such as
Convolutional Neural Networks (CNNs), Recurrent Neural
Networks (RNNs), and Random Forest, in the context of
various applications, e.g., next-word prediction and
eHealth. FL involves various clients participating in
the training process by uploading their local models to
an FL server in each global iteration. The server
aggregates these models to update a global model. The
traditional FL process may encounter bottlenecks, known
as the straggler problem, where slower clients delay
the overall training time. This paper introduces the
Latency-awarE Semi-synchronous client Selection and
mOdel aggregation for federated learNing (LESSON)
method. LESSON allows clients to participate at
different frequencies: faster clients contribute more
frequently, therefore mitigating the straggler problem
and expediting convergence. Moreover, LESSON provides a
tunable trade-off between model accuracy and
convergence rate by setting varying deadlines.
Simulation results show that LESSON outperforms two
baseline methods, namely FedAvg and FedCS, in terms of
convergence speed and maintains higher model accuracy
compared to FedCS.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lim:2023:NRM,
author = "Shueh-Ting Lim and Lee-Yeng Ong and Meng-Chew Leow",
title = "New {RFI} Model for Behavioral Audience Segmentation
in {Wi-Fi} Advertising System",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "351",
day = "26",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110351",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/351",
abstract = "In this technological era, businesses tend to place
advertisements via the medium of Wi-Fi advertising to
expose their brands and products to the public. Wi-Fi
advertising offers a platform for businesses to
leverage their marketing strategies to achieve desired
goals, provided they have a thorough understanding of
their audience's behaviors. This paper aims to
formulate a new RFI (recency, frequency, and interest)
model that is able to analyze the behavior of the
audience towards the advertisement. The audience's
interest is measured based on the relationship between
their total view duration on an advertisement and its
corresponding overall click received. With the help of
a clustering algorithm to perform the dynamic
segmentation, the patterns of the audience behaviors
are then being interpreted by segmenting the audience
based on their engagement behaviors. In the
experiments, two different Wi-Fi advertising attributes
are tested to prove the new RFI model is applicable to
effectively interpret the audience engagement behaviors
with the proposed dynamic characteristics range table.
The weak and strongly engaged behavioral
characteristics of the segmented behavioral patterns of
the audience, such as in a one-time audience, are
interpreted successfully with the
dynamic-characteristics range table.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Francia:2023:DMC,
author = "Alberto Francia and Stefano Mariani and Giuseppe
Adduce and Sandro Vecchiarelli and Franco Zambonelli",
title = "Digital Management of Competencies in {Web 3.0}: The
{C-Box\reg} Approach",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "350",
day = "26",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110350",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/350",
abstract = "Management of competencies is a crucial concern for
both learners and workers as well as for training
institutions and companies. For the former, it allows
users to track and certify the acquired skills to apply
for positions; for the latter, it enables better
organisation of business processes. However, currently,
most software systems for competency management adopted
by the industry are either organisation-centric or
centralised: that is, they either lock-in students and
employees wishing to export their competencies
elsewhere, or they require users' trust and for users
to give up privacy (to store their personal data) while
being prone to faults. In this paper, we propose a
user-centric, fully decentralised competency management
system enabling verifiable, secure, and robust
management of competencies digitalised as Open Badges
via notarization on a public blockchain. This way,
whoever acquires the competence or achievement retains
full control over it and can disclose his/her own
digital certifications only when needed and to the
extent required, migrate them across storage platforms,
and let anyone verify the integrity and validity of
such certifications independently of any centralised
organisation. The proposed solution is based on C-Box
{\reg}, an existing application for the management of
digital competencies that has been improved to fully
support models, standards, and technologies of the
so-called Web 3.0 vision---a global effort by major web
organisations to ``give the web back to the people'',
pushing for maximum decentralisation of control and
user-centric data ownership.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Paasche:2023:FSA,
author = "Simon Paasche and Sven Groppe",
title = "A Finite State Automaton for Green Data Validation in
a Real-World Smart Manufacturing Environment with
Special Regard to Time-Outs and Overtaking",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "349",
day = "26",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110349",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/349",
abstract = "Since data are the gold of modern business, companies
put a huge effort into collecting internal and external
information, such as process, supply chain, or customer
data. To leverage the full potential of gathered
information, data have to be free of errors and
corruptions. Thus, the impacts of data quality and data
validation approaches become more and more relevant. At
the same time, the impact of information and
communication technologies has been increasing for
several years. This leads to increasing energy
consumption and the associated emission of
climate-damaging gases such as carbon dioxide (CO 2 ).
Since these gases cause serious problems (e.g., climate
change) and lead to climate targets not being met, it
is a major goal for companies to become climate
neutral. Our work focuses on quality aspects in smart
manufacturing lines and presents a finite automaton to
validate an incoming stream of manufacturing data.
Through this process, we aim to achieve a sustainable
use of manufacturing resources. In the course of this
work, we aim to investigate possibilities to implement
data validation in resource-saving ways. Our automaton
enables the detection of errors in a continuous data
stream and reports discrepancies directly. By making
inconsistencies visible and annotating affected data
sets, we are able to increase the overall data quality.
Further, we build up a fast feedback loop, allowing us
to quickly intervene and remove sources of
interference. Through this fast feedback, we expect a
lower consumption of material resources on the one hand
because we can intervene in case of error and optimize
our processes. On the other hand, our automaton
decreases the immaterial resources needed, such as the
required energy consumption for data validation, due to
more efficient validation steps. We achieve the more
efficient validation steps by the already-mentioned
automaton structure. Furthermore, we reduce the
response time through additional recognition of
overtaking data records. In addition, we implement an
improved check for complex inconsistencies. Our
experimental results show that we are able to
significantly reduce memory usage and thus decrease the
energy consumption for our data validation task.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Serodio:2023:ESI,
author = "Carlos Ser{\^o}dio and Jos{\'e} Cunha and Guillermo
Candela and Santiago Rodriguez and Xos{\'e} Ram{\'o}n
Sousa and Frederico Branco",
title = "The {6G} Ecosystem as Support for {IoE} and Private
Networks: Vision, Requirements, and Challenges",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "348",
day = "25",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110348",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/348",
abstract = "The emergence of the sixth generation of cellular
systems (6G) signals a transformative era and ecosystem
for mobile communications, driven by demands from
technologies like the internet of everything (IoE), V2X
communications, and factory automation. To support this
connectivity, mission-critical applications are
emerging with challenging network requirements. The
primary goals of 6G include providing sophisticated and
high-quality services, extremely reliable and
further-enhanced mobile broadband (feMBB), low-latency
communication (ERLLC), long-distance and high-mobility
communications (LDHMC), ultra-massive machine-type
communications (umMTC), extremely low-power
communications (ELPC), holographic communications, and
quality of experience (QoE), grounded in incorporating
massive broad-bandwidth machine-type (mBBMT), mobile
broad-bandwidth and low-latency (MBBLL), and massive
low-latency machine-type (mLLMT) communications. In
attaining its objectives, 6G faces challenges that
demand inventive solutions, incorporating AI,
softwarization, cloudification, virtualization, and
slicing features. Technologies like network function
virtualization (NFV), network slicing, and
software-defined networking (SDN) play pivotal roles in
this integration, which facilitates efficient resource
utilization, responsive service provisioning, expanded
coverage, enhanced network reliability, increased
capacity, densification, heightened availability,
safety, security, and reduced energy consumption. It
presents innovative network infrastructure concepts,
such as resource-as-a-service (RaaS) and
infrastructure-as-a-service (IaaS), featuring
management and service orchestration mechanisms. This
includes nomadic networks, AI-aware networking
strategies, and dynamic management of diverse network
resources. This paper provides an in-depth survey of
the wireless evolution leading to 6G networks,
addressing future issues and challenges associated with
6G technology to support V2X environments considering
presenting + challenges in architecture, spectrum, air
interface, reliability, availability, density,
flexibility, mobility, and security.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kljaic:2023:OCC,
author = "Zdenko Kljai{\'c} and Danijel Pavkovi{\'c} and Mihael
Cipek and Maja Trstenjak and Tomislav Josip
Mlinari{\'c} and Mladen Niksi{\'c}",
title = "An Overview of Current Challenges and Emerging
Technologies to Facilitate Increased Energy Efficiency,
Safety, and Sustainability of Railway Transport",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "11",
pages = "347",
day = "25",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15110347",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/11/347",
abstract = "This article presents a review of cutting-edge
technologies poised to shape the future of railway
transportation systems, focusing on enhancing their
intelligence, safety, and environmental sustainability.
It illustrates key aspects of the
energy-transport-information/communication system nexus
as a framework for future railway systems development.
Initially, we provide a review of the existing
challenges within the realm of railway transportation.
Subsequently, we delve into the realm of emerging
propulsion technologies, which are pivotal for ensuring
the sustainability of transportation. These include
innovative solutions such as alternative fuel-based
systems, hydrogen fuel cells, and energy storage
technologies geared towards harnessing kinetic energy
and facilitating power transfer. In the following
section, we turn our attention to emerging information
and telecommunication systems, including Long-Term
Evolution (LTE) and fifth generation New Radio (5G NR)
networks tailored for railway applications.
Additionally, we delve into the integral role played by
the Industrial Internet of Things (Industrial IoT) in
this evolving landscape. Concluding our analysis, we
examine the integration of information and
communication technologies and remote sensor networks
within the context of Industry 4.0. This leveraging of
information pertaining to transportation infrastructure
promises to bolster energy efficiency, safety, and
resilience in the transportation ecosystem.
Furthermore, we examine the significance of the smart
grid in the realm of railway transport, along with the
indispensable resources required to bring forth the
vision of energy-smart railways.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Nguyen:2023:HHE,
author = "Duy Tung Khanh Nguyen and Dung Hoang Duong and Willy
Susilo and Yang-Wai Chow and The Anh Ta",
title = "{HeFUN}: Homomorphic Encryption for Unconstrained
Secure Neural Network Inference",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "407",
day = "18",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120407",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/407",
abstract = "Homomorphic encryption (HE) has emerged as a pivotal
technology for secure neural network inference (SNNI),
offering privacy-preserving computations on encrypted
data. Despite active developments in this field,
HE-based SNNI frameworks are impeded by three inherent
limitations. Firstly, they cannot evaluate non-linear
functions such as ReLU, the most widely adopted
activation function in neural networks. Secondly, the
permitted number of homomorphic operations on
ciphertexts is bounded, consequently limiting the depth
of neural networks that can be evaluated. Thirdly, the
computational overhead associated with HE is
prohibitively high, particularly for deep neural
networks. In this paper, we introduce a novel paradigm
designed to address the three limitations of HE-based
SNNI. Our approach is an interactive approach that is
solely based on HE, called iLHE. Utilizing the idea of
iLHE, we present two protocols: ReLU, which facilitates
the direct evaluation of the ReLU function on encrypted
data, tackling the first limitation, and HeRefresh,
which extends the feasible depth of neural network
computations and mitigates the computational overhead,
thereby addressing the second and third limitations.
Based on HeReLU and HeRefresh protocols, we build a new
framework for SNNI, named HeFUN. We prove that our
protocols and the HeFUN framework are secure in the
semi-honest security model. Empirical evaluations
demonstrate that HeFUN surpasses current HE-based SNNI
frameworks in multiple aspects, including security,
accuracy, the number of communication rounds, and
inference latency. Specifically, for a convolutional
neural network with four layers on the MNIST dataset,
HeFUN achieves 99.16\% accuracy with an inference
latency of 1.501 s, surpassing the popular HE-based
framework CryptoNets proposed by Gilad-Bachrach, which
achieves 98.52\% accuracy with an inference latency of
3.479 s.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ogata:2023:DSA,
author = "Keigo Ogata and Satoshi Fujita",
title = "Decentralized Storage with Access Control and Data
Persistence for e-Book Stores",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "406",
day = "18",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120406",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/406",
abstract = "The e-book services we use today have a serious
drawback in that we will no longer be able to read the
books we have purchased when the service is terminated.
One way to solve this problem is to build a
decentralized system that does not depend on a specific
company or organization by combining smart contracts
running on the Ethereum blockchain and distributed
storage such as an IPFS. However, a simple combination
of existing technologies does not make the stored
e-book data persistent, so the risk of purchased
e-books becoming unreadable remains. In this paper, we
propose a decentralized distributed storage called
d-book-repository, which has both access management
function and data durability for purchased e-books.
This system uses NFTs as access rights to realize
strict access control by preventing clients who do not
have NFTs from downloading e-book data. In addition,
e-book data stored on storage nodes in the distributed
storage is divided into shards using Reed--Solomon
codes, and each storage node stores only a single
shard, thereby preventing the creation of nodes that
can restore the entire content from locally stored
data. The storage of each shard is not handled by a
single node but by a group of nodes, and the shard is
propagated to all nodes in the group using the gossip
protocol, where erasure codes are utilized to increase
the resilience against node departure. Furthermore, an
incentive mechanism to encourage participation as a
storage node is implemented using smart contracts. We
built a prototype of the proposed system on AWS and
evaluated its performance. The results showed that both
downloading and uploading 100 MB of e-book data
(equivalent to one comic book) were completed within 10
s using an instance type of m5.xlarge. This value is
only 1.3 s longer for downloading and 2.2 s longer for
uploading than the time required for a simple
download/upload without access control, confirming that
the overhead associated with the proposed method is
sufficiently small.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Adeke:2023:SNT,
author = "James Msughter Adeke and Guangjie Liu and Junjie Zhao
and Nannan Wu and Hafsat Muhammad Bashir",
title = "Securing Network Traffic Classification Models against
Adversarial Examples Using Derived Variables",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "405",
day = "16",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120405",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/405",
abstract = "Machine learning (ML) models are essential to securing
communication networks. However, these models are
vulnerable to adversarial examples (AEs), in which
malicious inputs are modified by adversaries to produce
the desired output. Adversarial training is an
effective defense method against such attacks but
relies on access to a substantial number of AEs, a
prerequisite that entails significant computational
resources and the inherent limitation of poor
performance on clean data. To address these problems,
this study proposes a novel approach to improve the
robustness of ML-based network traffic classification
models by integrating derived variables (DVars) into
training. Unlike adversarial training, our approach
focuses on enhancing training using DVars, introducing
randomness into the input data. DVars are generated
from the baseline dataset and significantly improve the
resilience of the model to AEs. To evaluate the
effectiveness of DVars, experiments were conducted
using the CSE-CIC-IDS2018 dataset and three
state-of-the-art ML-based models: decision tree (DT),
random forest (RF), and k-neighbors (KNN). The results
show that DVars can improve the accuracy of KNN under
attack from 0.45\% to 0.84\% for low-intensity attacks
and from 0.32\% to 0.66\% for high-intensity attacks.
Furthermore, both DT and RF achieve a significant
increase in accuracy when subjected to attack of
different intensity. Moreover, DVars are
computationally efficient, scalable, and do not require
access to AEs.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Panwar:2023:BAE,
author = "Arvind Panwar and Manju Khari and Sanjay Misra and
Urvashi Sugandh",
title = "Blockchain in Agriculture to Ensure Trust,
Effectiveness, and Traceability from Farm Fields to
Groceries",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "404",
day = "16",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120404",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/404",
abstract = "Despite its status as one of the most ancient sectors
worldwide, agriculture continues to be a fundamental
cornerstone of the global economy. Nevertheless, it
faces obstacles such as a lack of trust, difficulties
in tracking, and inefficiencies in managing the supply
chain. This article examines the potential of
blockchain technology (BCT) to alter the agricultural
industry by providing a decentralized, transparent, and
unchangeable solution to meet the difficulties it
faces. The initial discussion provides an overview of
the challenges encountered by the agricultural
industry, followed by a thorough analysis of BCT,
highlighting its potential advantages. Following that,
the article explores other agricultural uses for
blockchain technology, such as managing supply chains,
verifying products, and processing payments. In
addition, this paper examines the constraints and
challenges related to the use of blockchain technology
in agriculture, including issues such as scalability,
legal frameworks, and interoperability. This paper
highlights the potential of BCT to transform the
agricultural industry by offering a transparent and
secure platform for managing the supply chain.
Nevertheless, it emphasizes the need for involving
stakeholders, having clear legislation, and possessing
technical skills in order to achieve effective
implementation. This work utilizes a systematic
literature review using the PRISMA technique and
applies meta-analysis as the research methodology,
enabling a thorough investigation of the present
information available. The results emphasize the
significant and positive effect of BCT on agriculture,
emphasizing the need for cooperative endeavors among
governments, industry pioneers, and technology
specialists to encourage its extensive implementation
and contribute to the advancement of a sustainable and
resilient food system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alsamiri:2023:FLI,
author = "Jadil Alsamiri and Khalid Alsubhi",
title = "Federated Learning for Intrusion Detection Systems in
{Internet} of Vehicles: a General Taxonomy,
Applications, and Future Directions",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "403",
day = "14",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120403",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/403",
abstract = "In recent years, the Internet of Vehicles (IoV) has
garnered significant attention from researchers and
automotive industry professionals due to its expanding
range of applications and services aimed at enhancing
road safety and driver/passenger comfort. However, the
massive amount of data spread across this network makes
securing it challenging. The IoV network generates,
collects, and processes vast amounts of valuable and
sensitive data that intruders can manipulate. An
intrusion detection system (IDS) is the most typical
method to protect such networks. An IDS monitors
activity on the road to detect any sign of a security
threat and generates an alert if a security anomaly is
detected. Applying machine learning methods to large
datasets helps detect anomalies, which can be utilized
to discover potential intrusions. However, traditional
centralized learning algorithms require gathering data
from end devices and centralizing it for training on a
single device. Vehicle makers and owners may not
readily share the sensitive data necessary for training
the models. Granting a single device access to enormous
volumes of personal information raises significant
privacy concerns, as any system-related problems could
result in massive data leaks. To alleviate these
problems, more secure options, such as Federated
Learning (FL), must be explored. A decentralized
machine learning technique, FL allows model training on
client devices while maintaining user data privacy.
Although FL for IDS has made significant progress, to
our knowledge, there has been no comprehensive survey
specifically dedicated to exploring the applications of
FL for IDS in the IoV environment, similar to
successful systems research in deep learning. To
address this gap, we undertake a well-organized
literature review on IDSs based on FL in an IoV
environment. We introduce a general taxonomy to
describe the FL systems to ensure a coherent structure
and guide future research. Additionally, we identify
the relevant state of the art in FL-based intrusion
detection within the IoV domain, covering the years
from FL's inception in 2016 through 2023. Finally, we
identify challenges and future research directions
based on the existing literature.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Nkemeni:2023:ECR,
author = "Valery Nkemeni and Fabien Mieyeville and Pierre
Tsafack",
title = "Energy Consumption Reduction in Wireless Sensor
Network-Based Water Pipeline Monitoring Systems via
Energy Conservation Techniques",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "402",
day = "14",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120402",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/402",
abstract = "In wireless sensor network-based water pipeline
monitoring (WWPM) systems, a vital requirement emerges:
the achievement of low energy consumption. This primary
goal arises from the fundamental necessity to ensure
the sustained operability of sensor nodes over extended
durations, all without the need for frequent battery
replacement. Given that sensor nodes in such
applications are typically battery-powered and often
physically inaccessible, maximizing energy efficiency
by minimizing unnecessary energy consumption is of
vital importance. This paper presents an experimental
study that investigates the impact of a hybrid
technique, incorporating distributed computing,
hierarchical sensing, and duty cycling, on the energy
consumption of a sensor node in prolonging the lifespan
of a WWPM system. A custom sensor node is designed
using the ESP32 MCU and nRF24L01+ transceiver.
Hierarchical sensing is implemented through the use of
LSM9DS1 and ADXL344 accelerometers, distributed
computing through the implementation of a distributed
Kalman filter, and duty cycling through the
implementation of interrupt-enabled sleep/wakeup
functionality. The experimental results reveal that
combining distributed computing, hierarchical sensing
and duty cycling reduces energy consumption by a factor
of eight compared to the lone implementation of
distributed computing.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Spyrou:2023:DDS,
author = "Evangelos D. Spyrou and Ioannis Tsoulos and
Chrysostomos Stylios",
title = "Distributed Denial of Service Classification for
Software-Defined Networking Using Grammatical
Evolution",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "401",
day = "13",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120401",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/401",
abstract = "Software-Defined Networking (SDN) stands as a pivotal
paradigm in network implementation, exerting a profound
influence on the trajectory of technological
advancement. The critical role of security within SDN
cannot be overstated, with distributed denial of
service (DDoS) emerging as a particularly disruptive
threat, capable of causing large-scale disruptions.
DDoS operates by generating malicious traffic that
mimics normal network activity, leading to service
disruptions. It becomes imperative to deploy mechanisms
capable of distinguishing between benign and malicious
traffic, serving as the initial line of defense against
DDoS challenges. In addressing this concern, we propose
the utilization of traffic classification as a
foundational strategy for combatting DDoS. By
categorizing traffic into malicious and normal streams,
we establish a crucial first step in the development of
effective DDoS mitigation strategies. The deleterious
effects of DDoS extend to the point of potentially
overwhelming networked servers, resulting in service
failures and SDN server downtimes. To investigate and
address this issue, our research employs a dataset
encompassing both benign and malicious traffic within
the SDN environment. A set of 23 features is harnessed
for classification purposes, forming the basis for a
comprehensive analysis and the development of robust
defense mechanisms against DDoS in SDN. Initially, we
compare GenClass with three common classification
methods, namely the Bayes, K-Nearest Neighbours (KNN),
and Random Forest methods. The proposed solution
improves the average class error, demonstrating 6.58\%
error as opposed to the Bayes method error of 32.59\%,
KNN error of 18.45\%, and Random Forest error of
30.70\%. Moreover, we utilize classification procedures
based on three methods based on grammatical evolution,
which are applied to the aforementioned data. In
particular, in terms of average class error, GenClass
exhibits 6.58\%, while NNC and FC2GEN exhibit average
class errors of 12.51\% and 15.86\%, respectively.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wu:2023:SBB,
author = "Lang Wu and Weijian Ruan and Jinhui Hu and Yaobin He",
title = "A Survey on Blockchain-Based Federated Learning",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "400",
day = "12",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120400",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/400",
abstract = "Federated learning (FL) and blockchains exhibit
significant commonality, complementarity, and alignment
in various aspects, such as application domains,
architectural features, and privacy protection
mechanisms. In recent years, there have been notable
advancements in combining these two technologies,
particularly in data privacy protection, data sharing
incentives, and computational performance. Although
there are some surveys on blockchain-based federated
learning (BFL), these surveys predominantly focus on
the BFL framework and its classifications, yet lack
in-depth analyses of the pivotal issues addressed by
BFL. This work aims to assist researchers in
understanding the latest research achievements and
development directions in the integration of FL with
blockchains. Firstly, we introduced the relevant
research in FL and blockchain technology and
highlighted the existing shortcomings of FL. Next, we
conducted a comparative analysis of existing BFL
frameworks, delving into the significant problems in
the realm of FL that the combination of blockchain and
FL addresses. Finally, we summarized the application
prospects of BFL technology in various domains such as
the Internet of Things, Industrial Internet of Things,
Internet of Vehicles, and healthcare services, as well
as the challenges that need to be addressed and future
research directions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ravi:2023:AGI,
author = "Niranjan Ravi and Mohamed El-Sharkawy",
title = "Addressing the Gaps of {IoU} Loss in {3D} Object
Detection with {IIoU}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "399",
day = "11",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120399",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/399",
abstract = "Three-dimensional object detection involves estimating
the dimensions, orientations, and locations of 3D
bounding boxes. Intersection of Union (IoU) loss
measures the overlap between predicted 3D box and
ground truth 3D bounding boxes. The localization task
uses smooth-L1 loss with IoU to estimate the object's
location, and the classification task identifies the
object/class category inside each 3D bounding box.
Localization suffers a performance gap in cases where
the predicted and ground truth boxes overlap
significantly less or do not overlap, indicating the
boxes are far away, and in scenarios where the boxes
are inclusive. Existing axis-aligned IoU losses suffer
performance drop in cases of rotated 3D bounding boxes.
This research addresses the shortcomings in bounding
box regression problems of 3D object detection by
introducing an Improved Intersection Over Union (IIoU)
loss. The proposed loss function's performance is
experimented on LiDAR-based and Camera-LiDAR-based
fusion methods using the KITTI dataset.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ali:2023:ETN,
author = "Shrouk A. Ali and Shaimaa Ahmed Elsaid and Abdelhamied
A. Ateya and Mohammed ElAffendi and Ahmed A. Abd
El-Latif",
title = "Enabling Technologies for Next-Generation Smart
Cities: a Comprehensive Review and Research
Directions",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "398",
day = "09",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120398",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/398",
abstract = "The concept of smart cities, which aim to enhance the
quality of urban life through innovative technologies
and policies, has gained significant momentum in recent
years. As we approach the era of next-generation smart
cities, it becomes crucial to explore the key enabling
technologies that will shape their development. This
work reviews the leading technologies driving the
future of smart cities. The work begins by introducing
the main requirements of different smart city
applications; then, the enabling technologies are
presented. This work highlights the transformative
potential of the Internet of things (IoT) to facilitate
data collection and analysis to improve urban
infrastructure and services. As a complementary
technology, distributed edge computing brings
computational power closer to devices, reducing the
reliance on centralized data centers. Another key
technology is virtualization, which optimizes resource
utilization, enabling multiple virtual environments to
run efficiently on shared hardware. Software-defined
networking (SDN) emerges as a pivotal technology that
brings flexibility and scalability to smart city
networks, allowing for dynamic network management and
resource allocation. Artificial intelligence (AI) is
another approach for managing smart cities by enabling
predictive analytics, automation, and smart decision
making based on vast amounts of data. Lastly, the
blockchain is introduced as a promising approach for
smart cities to achieve the required security. The
review concludes by identifying potential research
directions to address the challenges and complexities
brought about by integrating these key enabling
technologies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hernandez-Suarez:2023:MAI,
author = "Aldo Hernandez-Suarez and Gabriel Sanchez-Perez and
Linda Karina Toscano-Medina and Hector Manuel
Perez-Meana and Jose Portillo-Portillo and Jesus
Olivares-Mercado",
title = "Methodological Approach for Identifying {Websites}
with Infringing Content via Text Transformers and Dense
Neural Networks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "397",
day = "09",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120397",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/397",
abstract = "The rapid evolution of the Internet of Everything
(IoE) has significantly enhanced global connectivity
and multimedia content sharing, simultaneously
escalating the unauthorized distribution of multimedia
content, posing risks to intellectual property rights.
In 2022 alone, about 130 billion accesses to
potentially non-compliant websites were recorded,
underscoring the challenges for industries reliant on
copyright-protected assets. Amidst prevailing
uncertainties and the need for technical and
AI-integrated solutions, this study introduces two
pivotal contributions. First, it establishes a novel
taxonomy aimed at safeguarding and identifying
IoE-based content infringements. Second, it proposes an
innovative architecture combining IoE components with
automated sensors to compile a dataset reflective of
potential copyright breaches. This dataset is analyzed
using a Bidirectional Encoder Representations from
Transformers-based advanced Natural Language Processing
(NLP) algorithm, further fine-tuned by a dense neural
network (DNN), achieving a remarkable 98.71\% accuracy
in pinpointing websites that violate copyright.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gomez:2023:PPF,
author = "Javier Gomez and Jose Jaime Camacho-Escoto and Luis
Orozco-Barbosa and Diego Rodriguez-Torres",
title = "{PROFEE}: a Probabilistic-Feedback Based Speed Rate
Adaption for {IEEE 802.11bc}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "396",
day = "09",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120396",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/396",
abstract = "WiFi is a widely used wireless technology for data
transmission. WiFi can also play a crucial role in
simultaneously broadcasting content to multiple devices
in multimedia transmission for venues such as
classrooms, theaters, and stadiums, etc. Broadcasting
allows for the efficient dissemination of information
to all devices connected to the network, and it becomes
crucial to ensure that the WiFi network has sufficient
capacity to transmit broadcast multimedia content
without interruptions or delays. However, using WiFi
for broadcasting presents challenges that can impact
user experience, specifically the difficulty of
obtaining real-time feedback from potentially hundreds
or thousands of users due to potential collisions of
feedback messages. This work focuses on providing
accurate feedback to the Access Point about the
percentage of users not receiving broadcast traffic
correctly so it can adjust its Modulation and Coding
Scheme (MCS) while transmitting broadcast multimedia
content to many users. The proposed method is comprised
of two sequential algorithms. In order to reduce the
probability of a collision after transmitting each
message, an algorithm searches for the best probability
value for users to transmit ACK/NACK messages,
depending on whether messages are received correctly or
not. This feedback allows the Access Point to estimate
the number of STAs correctly/incorrectly receiving the
messages being transmitted. A second algorithm uses
this estimation so the Access Point can select the best
MCS while maintaining the percentage of users not
receiving broadcast content correctly within acceptable
margins, thus providing users with the best possible
content quality. We implemented the proposed method in
the ns-3 simulator, and the results show it yields
quick, reliable feedback to the Access Point that was
then able to adjust to the best possible MCS in only a
few seconds, regardless of the user density and
dimensions of the scenario.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2023:LGB,
author = "Zuopeng Li and Hengshuai Ju and Zepeng Ren",
title = "A Learning Game-Based Approach to Task-Dependent Edge
Resource Allocation",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "395",
day = "07",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120395",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/395",
abstract = "The existing research on dependent task offloading and
resource allocation assumes that edge servers can
provide computational and communication resources free
of charge. This paper proposes a two-stage resource
allocation method to address this issue. In the first
stage, users incentivize edge servers to provide
resources. We formulate the incentive problem in this
stage as a multivariate Stackelberg game, which takes
into account both computational and communication
resources. In addition, we also analyze the uniqueness
of the Stackelberg equilibrium under information
sharing conditions. Considering the privacy issues of
the participants, the research is extended to scenarios
without information sharing, where the multivariable
game problem is modeled as a partially observable
Markov decision process (POMDP). In order to obtain the
optimal incentive decision in this scenario, a
reinforcement learning algorithm based on the learning
game is designed. In the second stage, we propose a
greedy-based deep reinforcement learning algorithm that
is aimed at minimizing task execution time by
optimizing resource and task allocation strategies.
Finally, the simulation results demonstrate that the
algorithm designed for non-information sharing
scenarios can effectively approximate the theoretical
Stackelberg equilibrium, and its performance is found
to be better than that of the other three benchmark
methods. After the allocation of resources and
sub-tasks by the greedy-based deep reinforcement
learning algorithm, the execution delay of the
dependent task is significantly lower than that in
local processing.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sabatucci:2023:EDP,
author = "Luca Sabatucci and Agnese Augello and Giuseppe
Caggianese and Luigi Gallo",
title = "Envisioning Digital Practices in the Metaverse: a
Methodological Perspective",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "394",
day = "06",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120394",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/394",
abstract = "Researchers are exploring methods that exploit digital
twins as all-purpose abstractions for sophisticated
modelling and simulation, bringing elements of the real
world into the virtual realm. Digital twins are
essential elements of the digital transformation of
society, which mostly benefit manufacturing, smart
cities, healthcare contexts, and in general systems
that include humans in the loop. As the metaverse
concept continues to evolve, the line separating the
virtual and the real will progressively fade away.
Considering the metaverse's goal to emulate our social
reality, it becomes essential to examine the aspects
that characterise real-world interaction practices and
explicitly model both physical and social contexts.
While the unfolding metaverse may reshape these
practices in distinct ways from their real-world
counterparts, our position is that it is essential to
incorporate social theories into the modelling
processes of digital twins within the metaverse. In
this work, we discuss our perspective by introducing a
digital practice model inspired by the theory of social
practice. We illustrate this model by exploiting the
scenario of a virtual grocery shop designed to help
older adults reduce their social isolation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Poleto:2023:ISA,
author = "Thiago Poleto and Thyago Celso Cavalcante Nepomuceno
and Victor Diogho Heuer de Carvalho and Ligiane
Cristina Braga de Oliveira Friaes and Rodrigo Cleiton
Paiva de Oliveira and Ciro Jos{\'e} Jardim Figueiredo",
title = "Information Security Applications in Smart Cities: a
Bibliometric Analysis of Emerging Research",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "393",
day = "01",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120393",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/393",
abstract = "This paper aims to analyze the intellectual structure
and research fronts in application information security
in smart cities to identify research boundaries,
trends, and new opportunities in the area. It applies
bibliometric analyses to identify the main authors and
their influences on information security and the smart
city area. Moreover, this analysis focuses on journals
indexed in Scopus databases. The results indicate that
there is an opportunity for further advances in the
adoption of information security policies in government
institutions. Moreover, the production indicators
presented herein are useful for the planning and
implementation of information security policies and the
knowledge of the scientific community about smart
cities. The bibliometric analysis provides support for
the visualization of the leading research technical
collaboration networks among authors, co-authors,
countries, and research areas. The methodology offers a
broader view of the application information security in
smart city areas and makes it possible to assist new
research that may contribute to further advances. The
smart cities topic has been receiving much attention in
recent years, but to the best of our knowledge, there
is no research on reporting new possibilities for
advances. Therefore, this article may contribute to an
emerging body of literature that explores the nature of
application information security and smart cities
research productivity to assist researchers in better
understanding the current emerging of the area.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lopez-Ardao:2023:RAI,
author = "Jos{\'e} Carlos L{\'o}pez-Ardao and Miguel
Rodr{\'\i}guez-P{\'e}rez and Sergio
Herrer{\'\i}a-Alonso",
title = "Recent Advances in Information-Centric Networks
{(ICNs)}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "392",
day = "01",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120392",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/392",
abstract = "This paper aims to analyze the intellectual structure
and research fronts in application information security
in smart cities to identify research boundaries,
trends, and new opportunities in the area. It applies
bibliometric analyses to identify the main authors and
their influences on information security and the smart
city area. Moreover, this analysis focuses on journals
indexed in Scopus databases. The results indicate that
there is an opportunity for further advances in the
adoption of information security policies in government
institutions. Moreover, the production indicators
presented herein are useful for the planning and
implementation of information security policies and the
knowledge of the scientific community about smart
cities. The bibliometric analysis provides support for
the visualization of the leading research technical
collaboration networks among authors, co-authors,
countries, and research areas. The methodology offers a
broader view of the application information security in
smart city areas and makes it possible to assist new
research that may contribute to further advances. The
smart cities topic has been receiving much attention in
recent years, but to the best of our knowledge, there
is no research on reporting new possibilities for
advances. Therefore, this article may contribute to an
emerging body of literature that explores the nature of
application information security and smart cities
research productivity to assist researchers in better
understanding the current emerging of the area.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pashazadeh:2023:CSE,
author = "Ali Pashazadeh and Giovanni Nardini and Giovanni
Stea",
title = "A Comprehensive Survey Exploring the Multifaceted
Interplay between Mobile Edge Computing and Vehicular
Networks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "391",
day = "30",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120391",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/391",
abstract = "In recent years, the need for computation-intensive
applications in mobile networks requiring more storage,
powerful processors, and real-time responses has risen
substantially. Vehicular networks play an important
role in this ecosystem, as they must support multiple
services, such as traffic monitoring or sharing of data
involving different aspects of the vehicular traffic.
Moreover, new resource-hungry applications have been
envisaged, such as autonomous driving or in-cruise
entertainment, hence making the demand for computation
and storage resources one of the most important
challenges in vehicular networks. In this context,
Mobile Edge Computing (MEC) has become the key
technology to handle these problems by providing
cloud-like capabilities at the edge of mobile networks
to support delay-sensitive and computation-intensive
tasks. In the meantime, researchers have envisaged use
of onboard vehicle resources to extend the computing
capabilities of MEC systems. This paper presents a
comprehensive review of the most recent works related
to MEC-assisted vehicular networks, as well as
vehicle-assisted MEC systems. We illustrate the MEC
system architecture and discuss its deployment in
vehicular environments, as well as the key technologies
to realize this integration. After that, we review the
recent literature by identifying three different areas,
i.e.: (i) MEC providing additional resources to
vehicles (e.g., for task offloading); (ii) MEC enabling
innovative vehicular applications (e.g., platooning),
and (iii) vehicular networks providing additional
resources to MEC systems. Finally, we discuss open
challenges and future research directions, addressing
the possible interplays between MEC systems and
vehicular networks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gao:2023:IBE,
author = "Lei Gao and Xiaoyong Zhu",
title = "{ICN}-Based Enhanced Content Delivery for {CDN}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "390",
day = "30",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120390",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/390",
abstract = "With the rapid growth of internet traffic, the
traditional host-to-host TCP/IP architecture is subject
to many service limitations faced with content-oriented
applications. Various novel network architectures have
been proposed to solve these limitations, among which
Information-Centric Networking (ICN) is one of the most
prominent. ICN features the decoupling of content
(service) from the physical devices storing (providing)
it through location-independent naming, and offers
inherent enhancement to network performance, such as
multicast and in-network caching. ICN in-network
caching has been extensively studied, and we believe
that it may also be the main incentive for ISPs to
deploy ICN. A CDN (content delivery network) is a
typical content-oriented network paradigm that aims to
provide the fast delivery of content. In this paper, we
leverage the advantages of the in-network caching of
ICN to enhance the content delivery efficiency of CDN
by integrating ICN as a service. First, we present our
design of a content delivery network enhanced with ICN,
called IECDN. Additionally, we formulate a mathematical
model to optimize the performance of our proposed
design and conduct a series of evaluations. The results
indicate that our proposed design provides significant
performance gains while reducing bandwidth consumption
and shows better resilience to traffic surge.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ren:2023:KDB,
author = "Yingying Ren and Ryan D. Restivo and Wenkai Tan and
Jian Wang and Yongxin Liu and Bin Jiang and Huihui Wang
and Houbing Song",
title = "Knowledge Distillation-Based {GPS} Spoofing Detection
for Small {UAV}",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "389",
day = "30",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120389",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/389",
abstract = "As a core component of small unmanned aerial vehicles
(UAVs), GPS is playing a critical role in providing
localization for UAV navigation. UAVs are an important
factor in the large-scale deployment of the Internet of
Things (IoT) and cyber--physical systems (CPS).
However, GPS is vulnerable to spoofing attacks that can
mislead a UAV to fly into a sensitive area and threaten
public safety and private security. The conventional
spoofing detection methods need too much overhead,
which stops efficient detection from working in a
computation-constrained UAV and provides an efficient
response to attacks. In this paper, we propose a novel
approach to obtain a lightweight detection model in the
UAV system so that GPS spoofing attacks can be detected
from a long distance. With long-short term memory
(LSTM), we propose a lightweight detection model on the
ground control stations, and then we distill it into a
compact size that is able to run in the control system
of the UAV with knowledge distillation. The
experimental results show that our lightweight
detection algorithm runs in UAV systems reliably and
can achieve good performance in GPS spoofing
detection.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Severino:2023:PHN,
author = "Ricardo Severino and Jos{\'e} Sim{\~a}o and Nuno Datia
and Ant{\'o}nio Serrador",
title = "Protecting Hybrid {ITS} Networks: a Comprehensive
Security Approach",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "388",
day = "30",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120388",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/388",
abstract = "Cooperative intelligent transport systems (C-ITS)
continue to be developed to enhance transportation
safety and sustainability. However, the communication
of vehicle-to-everything (V2X) systems is inherently
open, leading to vulnerabilities that attackers can
exploit. This represents a threat to all road users, as
security failures can lead to privacy violations or
even fatalities. Moreover, a high fatality rate is
correlated with soft-mobility road users. Therefore,
when developing C-ITS systems, it is important to
broaden the focus beyond connected vehicles to include
soft-mobility users and legacy vehicles. This work
presents a new approach developed in the context of
emerging hybrid networks, combining intelligent
transport systems operating in 5.9 GHz (ITS-G5) and
radio-mobile cellular technologies. Two protocols were
implemented and evaluated to introduce security
guarantees (such as privacy and integrity) in
communications within the developed C-ITS hybrid
environment. As a result, this work securely integrates
G5-connected ITS stations and soft-mobility users
through a smartphone application via cellular networks.
Commercial equipment was used for this goal, including
on-board and roadside units. Computational,
transmission and end-to-end latency were used to assess
the system's performance. Implemented protocols
introduce an additional 11\% end-to-end latency in
hybrid communications. Moreover, workflows employing
hybrid communications impose, on average, an extra
28.29 ms of end-to-end latency. The proposal shows
promise, as it reaches end-to-end times below the
latency requirements imposed in most C-ITS use cases.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fouzar:2023:SVC,
author = "Youcef Fouzar and Ahmed Lakhssassi and Ramakrishna
Mundugar",
title = "Secure Video Communication Using Multi-Equation
Multi-Key Hybrid Cryptography",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "387",
day = "29",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120387",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/387",
abstract = "The safeguarding of intellectual property and
maintaining privacy for video content are closely
linked to the effectiveness of security protocols
employed in internet streaming platforms. The
inadequate implementation of security measures by
content providers has resulted in security breaches
within entertainment applications, hence causing a
reduction in the client base. This research aimed to
enhance the security measures employed for video
content by implementing a multi-key approach for
encryption and decryption processes. The aforementioned
objective was successfully accomplished through the use
of hybrid methodologies, the production of dynamic
keys, and the implementation of user-attribute-based
techniques. The main aim of the study was to improve
the security measures associated with the process of
generating video material. The proposed methodology
integrates a system of mathematical equations and a
pseudorandom key within its execution. This novel
approach significantly augments the degree of security
the encryption mechanism provides. The proposed
methodology utilises a set of mathematical equations
that are randomly employed to achieve encryption. Using
a random selection procedure contributes to the overall
enhancement of the system's security. The suggested
methodology entails the division of the video into
smaller entities known as chunks. Following this, every
segment is subjected to encryption using unique keys
that are produced dynamically in real-time. The
proposed methodology is executed via Android platforms.
The transmitter application is tasked with the
responsibility of facilitating the streaming of the
video content, whereas the receiver application serves
the purpose of presenting the video to the user. A
careful study was conducted to compare and contrast the
suggested method with other similar methods that were
already in use. The results of the study strongly
support the safety and dependability of the procedure
that was made available.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ashraf:2023:LPP,
author = "Zeeshan Ashraf and Zahid Mahmood and Muddesar Iqbal",
title = "Lightweight Privacy-Preserving Remote User
Authentication and Key Agreement Protocol for
Next-Generation {IoT}-Based Smart Healthcare",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "386",
day = "29",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120386",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/386",
abstract = "The advancement and innovations in wireless
communication technologies including the Internet of
Things have massively changed the paradigms of
health-based services. In particular, during the
COVID-19 pandemic, the trends of working from home have
been promoted. Wireless body area network technology
frameworks help sufferers in remotely obtaining
scientific remedies from physicians through the
Internet without paying a visit to the clinics. IoT
sensor nodes are incorporated into the clinical device
to allow health workers to consult the patients'
fitness conditions in real time. Insecure wireless
communication channels make unauthorized access to
fitness-related records and manipulation of IoT sensor
nodes attached to the patient's bodies possible, as a
result of security flaws. As a result, IoT-enabled
devices are threatened by a number of well-known
attacks, including impersonation, replay,
man-in-the-middle, and denial-of-service assaults.
Modern authentication schemes do solve these issues,
but they frequently involve challenging mathematical
concepts that raise processing and transmission costs.
In this paper, we propose a lightweight, secure, and
efficient symmetric key exchange algorithm and remote
user authentication scheme. Our research proposal
presents a successful privacy-protecting method for
remote users and provides protection against known
attacks. When compared to conventional options, this
technique significantly reduces calculation costs by up
to 37.68\% and transmission costs by up to 32.55\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2023:TRC,
author = "Hongyu Liu and Hong Ni and Rui Han",
title = "A Transmission Rate Control Method for Active
Congestion Reduction Based on Network Node Bandwidth
Allocation",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "385",
day = "29",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120385",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/385",
abstract = "The control of transmission rates is currently a major
topic in network research, as it plays a significant
role in determining network performance. Traditional
network design principles suggest that network nodes
should only be responsible for forwarding data, while
the sending node should manage control. However,
sending nodes often lack information about network
resources and must use slow-start algorithms to
increase the transmission rate, potentially leading to
wasted bandwidth and network congestion. Furthermore,
incorrect judgments about network congestion by sending
nodes may further reduce network throughput. The
emergence of new Internet architectures, such as
information-centric networks (ICNn), has empowered
network nodes with more capabilities, including
computation and caching. This paper proposes a method
for transmission rate control that actively avoids
congestion through network node bandwidth allocation.
The sending, network, and receiving nodes each
calculate the available transmission rate, and the
sending node negotiates with the other nodes through a
rate negotiation message to obtain the maximum
transmission rate possible given the current state of
the network. The network nodes notify the sending node
to adjust the transmission rate to adapt to changes in
the network through a rate adjustment message.
Simulation experiments show that the proposed method is
better than traditional methods in reducing network
congestion, providing a stable transmission rate,
increasing the network throughput capacity, and
improving performance in high-latency and
high-bandwidth networks. Additionally, the proposed
transmission rate control method is fairer than
traditional methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kobza:2023:EBE,
author = "Ondrej Kobza and David Herel and Jan Cuhel and Tommaso
Gargiani and Jan Pichl and Petr Marek and Jakub Konrad
and Jan Sedivy",
title = "Enhancements in {BlenderBot 3}: Expanding Beyond a
Singular Model Governance and Boosting Generational
Performance",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "384",
day = "28",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120384",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/384",
abstract = "This paper provides a pioneering examination and
enhancement of generative chat models, with a specific
focus on the BlenderBot 3 model. Through meticulous
interaction with a diverse set of human participants,
we dissected the fundamental components of these
models, unveiling several deficiencies, including
long-term memory and entity recognition. Leveraging
these insights, we engineered refined, streamlined
iterations, culminating in a chatbot that transcends
the capabilities of all existing models. Our work
follows Occam's razor principle and proves that, for
tasks with relatively low complexity, using large
overparameterized models instead of smaller ones does
not bring significant benefits but increases latency,
which may result in a lowered overall user experience.
In upholding our commitment to transparency and the
progression of shared knowledge, we have made our
improved model universally accessible through
open-source distribution.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gkonis:2023:SIE,
author = "Panagiotis Gkonis and Anastasios Giannopoulos and
Panagiotis Trakadas and Xavi Masip-Bruin and Francesco
D'Andria",
title = "A Survey on {IoT}-Edge-Cloud Continuum Systems:
Status, Challenges, Use Cases, and Open Issues",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "383",
day = "28",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120383",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/383",
abstract = "The rapid growth in the number of interconnected
devices on the Internet (referred to as the Internet of
Things---IoT), along with the huge volume of data that
are exchanged and processed, has created a new
landscape in network design and operation. Due to the
limited battery size and computational capabilities of
IoT nodes, data processing usually takes place on
external devices. Since latency minimization is a key
concept in modern-era networks, edge servers that are
in close proximity to IoT nodes gather and process
related data, while in some cases data offloading in
the cloud might have to take place. The interconnection
of a vast number of heterogeneous IoT devices with the
edge servers and the cloud, where the IoT, edge, and
cloud converge to form a computing continuum, is also
known as the IoT-edge-cloud (IEC) continuum. Several
key challenges are associated with this new computing
systems' architectural approach, including (i) the
design of connection and programming protocols aimed at
properly manipulating a huge number of heterogeneous
devices over diverse infrastructures; (ii) the design
of efficient task offloading algorithms aimed at
optimizing services execution; (iii) the support for
security and privacy enhancements during data transfer
to deal with the existent and even unforeseen attacks
and threats landscape; (iv) scalability, flexibility,
and reliability guarantees to face the expected
mobility for IoT systems; and (v) the design of optimal
resource allocation mechanisms to make the most out of
the available resources. These challenges will become
even more significant towards the new era of
sixth-generation (6G) networks, which will be based on
the integration of various cutting-edge heterogeneous
technologies. Therefore, the goal of this survey paper
is to present all recent developments in the field of
IEC continuum systems, with respect to the
aforementioned deployment challenges. In the same
context, potential limitations and future challenges
are highlighted as well. Finally, indicative use cases
are also presented from an IEC continuum perspective.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Marin:2023:RBT,
author = "Oana Marin and Tudor Cioara and Liana Toderean and Dan
Mitrea and Ionut Anghel",
title = "Review of Blockchain Tokens Creation and Valuation",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "382",
day = "27",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120382",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/382",
abstract = "Blockchain and tokens are relatively new research
areas insufficiently explored from both technical and
economic perspectives. Even though tokens provide
benefits such as easier market access, increased
liquidity, lower transaction costs, and automated
transactional process, their valuation and price
determination are still challenging due to factors such
as a lack of intrinsic value, volatility, and
regulation making trading risky. In this paper, we
address this knowledge gap by reviewing the existing
literature on token creation and valuation to identify
and document the factors affecting their valuation,
investment, and founding, as well as the most promising
domains of applicability. The study follows the PRISMA
methodology and uses the Web of Science database,
defining clear research questions and objective
inclusion criteria for the articles. We discuss token
technical development, including creating, issuing, and
managing tokens on an Ethereum blockchain using smart
contracts. The study revealed several key factors that
significantly impact the field of tokenomics: demand
and supply, social incentives, market conditions,
macroeconomics, collective behavior, speculation, and
inclusion in index funds. The most relevant use cases
of blockchain and tokens are related to the
digitization of virtual and physical assets,
accountability, and traceability usual in smart grids
or supply chains management, social governance, and art
and gamification including metaverse.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Nadal:2023:MSD,
author = "Laia Nadal and Mumtaz Ali and Francisco Javier
V{\'\i}lchez and Josep Maria F{\`a}brega and Michela
Svaluto Moreolo",
title = "The Multiband over Spatial Division Multiplexing
Sliceable Transceiver for Future Optical Networks",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "381",
day = "27",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120381",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/381",
abstract = "In the last 15 years, global data traffic has been
doubling approximately every 2--3 years, and there is a
strong indication that this pattern will persist.
Hence, also driven by the emergence of new applications
and services expected within the 6G era, new
transmission systems and technologies should be
investigated to enhance network capacity and achieve
increased bandwidth, improved spectral efficiency, and
greater flexibility to effectively accommodate all the
expected data traffic. In this paper, an innovative
transmission solution based on multiband (MB) over
spatial division multiplexing (SDM) sliceable
bandwidth/bitrate variable transceiver (S-BVT) is
implemented and assessed in relation to the provision
of sustainable capacity scaling. MB transmission
(S+C+L) over 25.4 km of 19-cores multicore fibre (MCF)
is experimentally assessed and demonstrated achieving
an aggregated capacity of 119.1 Gb/s at 4.62 $ \times $
{10$-$3} bit error rate (BER). The proposed modular
sliceable transceiver architecture arises as a suitable
option towards achieving 500 Tb/s per fibre
transmission, by further enabling more slices covering
all the available S+C+L spectra and the 19 cores of the
MCF.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Musa:2023:ORA,
author = "Abubakar Ahmad Musa and Adamu Hussaini and Cheng Qian
and Yifan Guo and Wei Yu",
title = "Open Radio Access Networks for Smart {IoT} Systems:
State of Art and Future Directions",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "380",
day = "27",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120380",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/380",
abstract = "The Internet of Things (IoT) constitutes a vast
network comprising various components such as physical
devices, vehicles, buildings, and other items equipped
with sensors, actuators, and software. These components
are interconnected, facilitating the collection and
exchange of copious data across networked
communications. IoT empowers extensive monitoring and
control over a myriad of objects, enabling them to
gather and disseminate data that bolster applications,
thereby enhancing the system's capacity for informed
decision making, environmental surveillance, and
autonomous inter-object interaction, all without the
need for direct human involvement. These systems have
achieved seamless connectivity requirements using the
next-generation wireless network infrastructures (5G,
6G, etc.), while their diverse reliability and quality
of service (QoS) requirements across various domains
require more efficient solutions. Open RAN (O-RAN),
i.e., open radio open access network (RAN), promotes
flexibility and intelligence in the next-generation
RAN. This article reviews the applications of O-RAN in
supporting the next-generation smart world IoT systems
by conducting a thorough survey. We propose a generic
problem space, which consists of (i) IoT Systems:
transportation, industry, healthcare, and energy; (ii)
targets: reliable communication, real-time analytics,
fault tolerance, interoperability, and integration; and
(iii) artificial intelligence and machine learning
(AI/ML): reinforcement learning (RL), deep neural
networks (DNNs), etc. Furthermore, we outline future
research directions concerning robust and scalable
solutions, interoperability and standardization,
privacy, and security. We present a taxonomy to unveil
the security threats to emerge from the O-RAN-assisted
IoT systems and the feasible directions to move this
research forward.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Marin-Vega:2023:ERX,
author = "Humberto Mar{\'\i}n-Vega and Giner Alor-Hern{\'a}ndez
and Maritza Bustos-L{\'o}pez and Ignacio
L{\'o}pez-Mart{\'\i}nez and Norma Leticia
Hern{\'a}ndez-Chaparro",
title = "Extended Reality {(XR)} Engines for Developing
Gamified Apps and Serious Games: a Scoping Review",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "379",
day = "27",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120379",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/379",
abstract = "Extended Reality (XR) is an emerging technology that
enables enhanced interaction between the real world and
virtual environments. In this study, we conduct a
scoping review of XR engines for developing gamified
apps and serious games. Our study revolves around four
aspects: (1) existing XR game engines, (2) their
primary features, (3) supported serious game
attributes, and (4) supported learning activities. We
used the Preferred Reporting Items for Systematic
Reviews and Meta-Analyses (PRISMA) model to conduct the
scoping review, which included 40 primary studies
published between 2019 and 2023. Our findings help us
understand how current XR engines support the
development of XR-enriched serious games and gamified
apps for specific learning activities. Additionally,
based on our findings, we suggest a set of
pre-established game attributes that could be commonly
supported by all XR game engines across the different
game categories proposed by Lameras. Hence, this
scoping review can help developers (1) select important
game attributes for their new games and (2) choose the
game engine that provides the most support to these
attributes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mangi:2023:SMC,
author = "Fawad Ali Mangi and Guoxin Su and Minjie Zhang",
title = "Statistical Model Checking in Process Mining: a
Comprehensive Approach to Analyse Stochastic
Processes",
journal = j-FUTURE-INTERNET,
volume = "15",
number = "12",
pages = "378",
day = "26",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi15120378",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Dec 23 05:04:14 MST 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/15/12/378",
abstract = "The study of business process analysis and
optimisation has attracted significant scholarly
interest in the recent past, due to its integral role
in boosting organisational performance. A specific area
of focus within this broader research field is process
mining (PM). Its purpose is to extract knowledge and
insights from event logs maintained by information
systems, thereby discovering process models and
identifying process-related issues. On the other hand,
statistical model checking (SMC) is a verification
technique used to analyse and validate properties of
stochastic systems that employs statistical methods and
random sampling to estimate the likelihood of a
property being satisfied. In a seamless business
setting, it is essential to validate and verify process
models. The objective of this paper is to apply the SMC
technique in process mining for the verification and
validation of process models with stochastic behaviour
and large state space, where probabilistic model
checking is not feasible. We propose a novel
methodology in this research direction that integrates
SMC and PM by formally modelling discovered and
replayed process models and apply statistical methods
to estimate the results. The methodology facilitates an
automated and proficient evaluation of the extent to
which a process model aligns with user requirements and
assists in selecting the optimal model. We demonstrate
the effectiveness of our methodology with a case study
of a loan application process performed in a financial
institution that deals with loan applications submitted
by customers. The case study highlights our
methodology's capability to identify the performance
constraints of various process models and aid
enhancement efforts.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ramzan:2024:BCB,
author = "Muhammad Sher Ramzan and Anees Asghar and Ata Ullah
and Fawaz Alsolami and Iftikhar Ahmad",
title = "A Bee Colony-Based Optimized Searching Mechanism in
the {Internet of Things}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "35",
day = "22",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010035",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/35",
abstract = "The Internet of Things (IoT) consists of complex and
dynamically aggregated elements or smart entities that
need decentralized supervision for data exchanging
throughout different networks. The artificial bee
colony (ABC) is utilized in optimization problems for
the big data in IoT, cloud and central repositories.
The main limitation during the searching mechanism is
that every single food site is compared with every
other food site to find the best solution in the
neighboring regions. In this way, an extensive number
of redundant comparisons are required, which results in
a slower convergence rate, greater time consumption and
increased delays. This paper presents a solution to
optimize search operations with an enhanced ABC (E-ABC)
approach. The proposed algorithm compares the best food
sites with neighboring sites to exclude poor sources.
It achieves an efficient mechanism, where the number of
redundant comparisons is decreased during the searching
mechanism of the employed bee phase and the onlooker
bee phase. The proposed algorithm is implemented in a
replication scenario to validate its performance in
terms of the mean objective function values for
different functions, as well as the probability of
availability and the response time. The results prove
the superiority of the E-ABC in contrast to its
counterparts.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2024:IIH,
author = "Jui-Chuan Liu and Heng-Xiao Chi and Ching-Chun Chang
and Chin-Chen Chang",
title = "An Innovative Information Hiding Scheme Based on
Block-Wise Pixel Reordering",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "34",
day = "22",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010034",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/34",
abstract = "Information has been uploaded and downloaded through
the Internet, day in and day out, ever since we
immersed ourselves in the Internet. Data security has
become an area demanding high attention, and one of the
most efficient techniques for protecting data is data
hiding. In recent studies, it has been shown that the
indices of a codebook can be reordered to hide secret
bits. The hiding capacity of the codeword index
reordering scheme increases when the size of the
codebook increases. Since the codewords in the codebook
are not modified, the visual performance of compressed
images is retained. We propose a novel scheme making
use of the fundamental principle of the codeword index
reordering technique to hide secret data in encrypted
images. By observing our experimental results, we can
see that the obtained embedding capacity of 197,888 is
larger than other state-of-the-art schemes. Secret data
can be extracted when a receiver owns a data hiding
key, and the image can be recovered when a receiver
owns an encryption key.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Daousis:2024:OPS,
author = "Spyridon Daousis and Nikolaos Peladarinos and
Vasileios Cheimaras and Panagiotis Papageorgas and
Dimitrios D. Piromalis and Radu Adrian Munteanu",
title = "Overview of Protocols and Standards for Wireless
Sensor Networks in Critical Infrastructures",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "33",
day = "21",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010033",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/33",
abstract = "This paper highlights the crucial role of wireless
sensor networks (WSNs) in the surveillance and
administration of critical infrastructures (CIs),
contributing to their reliability, security, and
operational efficiency. It starts by detailing the
international significance and structural aspects of
these infrastructures, mentions the market tension in
recent years in the gradual development of wireless
networks for industrial applications, and proceeds to
categorize WSNs and examine the protocols and standards
of WSNs in demanding environments like critical
infrastructures, drawing on the recent literature. This
review concentrates on the protocols and standards
utilized in WSNs for critical infrastructures, and it
concludes by identifying a notable gap in the
literature concerning quality standards for equipment
used in such infrastructures.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Khazane:2024:HRM,
author = "Hassan Khazane and Mohammed Ridouani and Fatima
Salahdine and Naima Kaabouch",
title = "A Holistic Review of Machine Learning Adversarial
Attacks in {IoT} Networks",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "32",
day = "19",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010032",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/32",
abstract = "With the rapid advancements and notable achievements
across various application domains, Machine Learning
(ML) has become a vital element within the Internet of
Things (IoT) ecosystem. Among these use cases is IoT
security, where numerous systems are deployed to
identify or thwart attacks, including intrusion
detection systems (IDSs), malware detection systems
(MDSs), and device identification systems (DISs).
Machine Learning-based (ML-based) IoT security systems
can fulfill several security objectives, including
detecting attacks, authenticating users before they
gain access to the system, and categorizing suspicious
activities. Nevertheless, ML faces numerous challenges,
such as those resulting from the emergence of
adversarial attacks crafted to mislead classifiers.
This paper provides a comprehensive review of the body
of knowledge about adversarial attacks and defense
mechanisms, with a particular focus on three prominent
IoT security systems: IDSs, MDSs, and DISs. The paper
starts by establishing a taxonomy of adversarial
attacks within the context of IoT. Then, various
methodologies employed in the generation of adversarial
attacks are described and classified within a
two-dimensional framework. Additionally, we describe
existing countermeasures for enhancing IoT security
against adversarial attacks. Finally, we explore the
most recent literature on the vulnerability of three
ML-based IoT security systems to adversarial attacks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fan:2024:IPS,
author = "Zhengyang Fan and Wanru Li and Kathryn Blackmond
Laskey and Kuo-Chu Chang",
title = "Investigation of Phishing Susceptibility with
Explainable Artificial Intelligence",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "31",
day = "17",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010031",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/31",
abstract = "Phishing attacks represent a significant and growing
threat in the digital world, affecting individuals and
organizations globally. Understanding the various
factors that influence susceptibility to phishing is
essential for developing more effective strategies to
combat this pervasive cybersecurity challenge. Machine
learning has become a prevalent method in the study of
phishing susceptibility. Most studies in this area have
taken one of two approaches: either they explore
statistical associations between various factors and
susceptibility, or they use complex models such as deep
neural networks to predict phishing behavior. However,
these approaches have limitations in terms of providing
practical insights for individuals to avoid future
phishing attacks and delivering personalized
explanations regarding their susceptibility to
phishing. In this paper, we propose a machine-learning
approach that leverages explainable artificial
intelligence techniques to examine the influence of
human and demographic factors on susceptibility to
phishing attacks. The machine learning model yielded an
accuracy of 78\%, with a recall of 71\%, and a
precision of 57\%. Our analysis reveals that
psychological factors such as impulsivity and
conscientiousness, as well as appropriate online
security habits, significantly affect an individual's
susceptibility to phishing attacks. Furthermore, our
individualized case-by-case approach offers
personalized recommendations on mitigating the risk of
falling prey to phishing exploits, considering the
specific circumstances of each individual.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Qu:2024:ISF,
author = "Jiantao Qu and Chunyu Qi and He Meng",
title = "An Imbalanced Sequence Feature Extraction Approach for
the Detection of {LTE-R} Cells with Degraded
Communication Performance",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "30",
day = "16",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010030",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/30",
abstract = "Within the Shuo Huang Railway Company (Suning, China )
the long-term evolution for railways (LTE-R) network
carries core wireless communication services for
trains. The communication performance of LTE-R cells
directly affects the operational safety of the trains.
Therefore, this paper proposes a novel detection method
for LTE-R cells with degraded communication
performance. Considering that the number of LTE-R cells
with degraded communication performance and that of
normal cells are extremely imbalanced and that the
communication performance indicator data for each cell
are sequence data, we propose a feature extraction
neural network structure for imbalanced sequences,
based on shapelet transformation and a convolutional
neural network (CNN). Then, to train the network, we
set the optimization objective based on the Fisher
criterion. Finally, using a two-stage training method,
we obtain a neural network model that can distinguish
LTE-R cells with degraded communication performance
from normal cells at the feature level. Experiments on
a real-world dataset show that the proposed method can
realize the accurate detection of LTE-R cells with
degraded communication performance and has high
practical application value.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ivanov:2024:CLM,
author = "Valeriy Ivanov and Maxim Tereshonok",
title = "Cross-Layer Methods for Ad Hoc Networks --- Review and
Classification",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "29",
day = "16",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010029",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/29",
abstract = "The OSI model used to be a common network model for
years. In the case of ad hoc networks with dynamic
topology and difficult radio communications conditions,
gradual departure is happening from the classical kind
of OSI network model with a clear delineation of layers
(physical, channel, network, transport, application) to
the cross-layer approach. The layers of the network
model in ad hoc networks strongly influence each other.
Thus, the cross-layer approach can improve the
performance of an ad hoc network by jointly developing
protocols using interaction and collaborative
optimization of multiple layers. The existing
cross-layer methods classification is too complicated
because it is based on the whole manifold of network
model layer combinations, regardless of their
importance. In this work, we review ad hoc network
cross-layer methods, propose a new useful
classification of cross-layer methods, and show future
research directions in the development of ad hoc
network cross-layer methods. The proposed
classification can help to simplify the goal-oriented
cross-layer protocol development.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{DeMedeiros:2024:CCA,
author = "Kyle DeMedeiros and Chan Young Koh and Abdeltawab
Hendawi",
title = "Clustering on the {Chicago Array of} Things: Spotting
Anomalies in the {Internet of Things} Records",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "28",
day = "16",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010028",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/28",
abstract = "The Chicago Array of Things (AoT) is a robust dataset
taken from over 100 nodes over four years. Each node
contains over a dozen sensors. The array contains a
series of Internet of Things (IoT) devices with
multiple heterogeneous sensors connected to a
processing and storage backbone to collect data from
across Chicago, IL, USA. The data collected include
meteorological data such as temperature, humidity, and
heat, as well as chemical data like CO 2 concentration,
PM2.5, and light intensity. The AoT sensor network is
one of the largest open IoT systems available for
researchers to utilize its data. Anomaly detection (AD)
in IoT and sensor networks is an important tool to
ensure that the ever-growing IoT ecosystem is protected
from faulty data and sensors, as well as from attacking
threats. Interestingly, an in-depth analysis of the
Chicago AoT for anomaly detection is rare. Here, we
study the viability of the Chicago AoT dataset to be
used in anomaly detection by utilizing clustering
techniques. We utilized K-Means, DBSCAN, and
Hierarchical DBSCAN (H-DBSCAN) to determine the
viability of labeling an unlabeled dataset at the
sensor level. The results show that the clustering
algorithm best suited for this task varies based on the
density of the anomalous readings and the variability
of the data points being clustered; however, at the
sensor level, the K-Means algorithm, though simple, is
better suited for the task of determining specific,
at-a-glance anomalies than the more complex DBSCAN and
HDBSCAN algorithms, though it comes with drawbacks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Feng:2024:SFC,
author = "Xu Feng and Mengyang He and Lei Zhuang and Yanrui Song
and Rumeng Peng",
title = "Service Function Chain Deployment Algorithm Based on
Deep Reinforcement Learning in Space--Air--Ground
Integrated Network",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "27",
day = "16",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010027",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/27",
abstract = "SAGIN is formed by the fusion of ground networks and
aircraft networks. It breaks through the limitation of
communication, which cannot cover the whole world,
bringing new opportunities for network communication in
remote areas. However, many heterogeneous devices in
SAGIN pose significant challenges in terms of
end-to-end resource management, and the limited
regional heterogeneous resources also threaten the QoS
for users. In this regard, this paper proposes a
hierarchical resource management structure for SAGIN,
named SAGIN-MEC, based on a SDN, NFV, and MEC, aiming
to facilitate the systematic management of
heterogeneous network resources. Furthermore, to
minimize the operator deployment costs while ensuring
the QoS, this paper formulates a resource scheduling
optimization model tailored to SAGIN scenarios to
minimize energy consumption. Additionally, we propose a
deployment algorithm, named DRL-G, which is based on
heuristics and DRL, aiming to allocate heterogeneous
network resources within SAGIN effectively.
Experimental results showed that SAGIN-MEC can reduce
the end-to-end delay by 6--15 ms compared to the
terrestrial edge network, and compared to other
algorithms, the DRL-G algorithm can improve the service
request reception rate by up to 20\%. In terms of
energy consumption, it reduces the average energy
consumption by 4.4\% compared to the PG algorithm.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Moreno-Cabanillas:2024:DCS,
author = "Andrea Moreno-Cabanillas and Elizabet Castillero-Ostio
and Antonio Castillo-Esparcia",
title = "Digital Communication and Social Organizations: an
Evaluation of the Communication Strategies of the
Most-Valued {NGOs} Worldwide",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "26",
day = "13",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010026",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/26",
abstract = "The communication of organizations with their
audiences has undergone changes thanks to the Internet.
Non-Governmental Organizations (NGOs), as influential
groups, are no exception, as much of their activism
takes place through grassroots digital lobbying. The
consolidation of Web 2.0 has not only provided social
organizations with a new and powerful tool for
disseminating information but also brought about
significant changes in the relationship between
nonprofit organizations and their diverse audiences.
This has facilitated and improved interaction between
them. The purpose of this article is to analyze the
level of interactivity implemented on the websites of
leading NGOs worldwide and their presence on social
networks, with the aim of assessing whether these
influential groups are moving towards more dialogic
systems in relation to their audience. The results
reveal that NGOs have a high degree of interactivity in
the tools used to present and disseminate information
on their websites. However, not all maintain the same
level of interactivity in the resources available for
interaction with Internet users, as very few have high
interactivity regarding bidirectional resources. It was
concluded that international non-governmental
organizations still suffer from certain shortcomings in
the strategic management of digital communication on
their web platforms, while, on the other hand, a strong
presence can be noted on the most-popular social
networks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tseng:2024:CTD,
author = "Chinyang Henry Tseng and Woei-Jiunn Tsaur and Yueh-Mao
Shen",
title = "Classification Tendency Difference Index Model for
Feature Selection and Extraction in Wireless Intrusion
Detection",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "25",
day = "12",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010025",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/25",
abstract = "In detecting large-scale attacks, deep neural networks
(DNNs) are an effective approach based on high-quality
training data samples. Feature selection and feature
extraction are the primary approaches for data quality
enhancement for high-accuracy intrusion detection.
However, their enhancement root causes usually present
weak relationships to the differences between normal
and attack behaviors in the data samples. Thus, we
propose a Classification Tendency Difference Index
(CTDI) model for feature selection and extraction in
intrusion detection. The CTDI model consists of three
indexes: Classification Tendency Frequency Difference
(CTFD), Classification Tendency Membership Difference
(CTMD), and Classification Tendency Distance Difference
(CTDD). In the dataset, each feature has many feature
values (FVs). In each FV, the normal and attack samples
indicate the FV classification tendency, and CTDI shows
the classification tendency differences between the
normal and attack samples. CTFD is the frequency
difference between the normal and attack samples. By
employing fuzzy C means (FCM) to establish the normal
and attack clusters, CTMD is the membership difference
between the clusters, and CTDD is the distance
difference between the cluster centers. CTDI calculates
the index score in each FV and summarizes the scores of
all FVs in the feature as the feature score for each of
the three indexes. CTDI adopts an Auto Encoder for
feature extraction to generate new features from the
dataset and calculate the three index scores for the
new features. CTDI sorts the original and new features
for each of the three indexes to select the best
features. The selected CTDI features indicate the best
classification tendency differences between normal and
attack samples. The experiment results demonstrate that
the CTDI features achieve better detection accuracy as
classified by DNN for the Aegean WiFi Intrusion Dataset
than their related works, and the detection
enhancements are based on the improved classification
tendency differences in the CTDI features.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rasheed:2024:BBI,
author = "Sana Rasheed and Soulla Louca",
title = "Blockchain-Based Implementation of National Census as
a Supplementary Instrument for Enhanced Transparency,
Accountability, Privacy, and Security",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "24",
day = "11",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010024",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/24",
abstract = "A national population census is instrumental in
offering a holistic view of a country's progress,
directly influencing policy formulation and strategic
planning. Potential flaws in the census system can have
detrimental impacts on national development. Our prior
research has pinpointed various deficiencies in current
census methodologies, including inadequate population
coverage, racial and ethnic discrimination, and
challenges related to data privacy, security, and
distribution. This study aims to address the ``missing
persons'' challenge in the national census population
and housing system. The integration of blockchain
technology emerges as a promising solution for
addressing these identified issues, enhancing the
integrity and efficacy of census processes. Building
upon our earlier research which examined the national
census system of Pakistan, we propose an architecture
design incorporating Hyperledger Fabric, performing
system sizing for the entire nation count. The
Blockchain-Based Implementation of National Census as a
Supplementary Instrument for Enhanced Transparency,
Accountability, Privacy, and Security (BINC-TAPS) seeks
to provide a robust, transparent, scalable, immutable,
and tamper-proof solution for conducting national
population and housing censuses, while also fostering
socio-economic advancements. This paper presents a
comprehensive overview of our research, with a primary
focus on the implementation of the blockchain-based
proposed solution, including prototype testing and the
resulting outcomes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Galis:2024:FSI,
author = "Alex Galis",
title = "Future Sustainable {Internet} Energy-Defined
Networking",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "23",
day = "09",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010023",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/23",
abstract = "This paper presents a comprehensive set of design
methods for making future Internet networking fully
energy-aware and sustainably minimizing and managing
the energy footprint. It includes (a) 41 energy-aware
design methods, grouped into Service Operations
Support, Management Operations Support, Compute
Operations Support, Connectivity/Forwarding Operations
Support, Traffic Engineering Methods, Architectural
Support for Energy Instrumentation, and Network
Configuration; (b) energy consumption models and energy
metrics are identified and specified. It specifies the
requirements for energy-defined network compliance,
which include energy-measurable network devices with
the support of several control messages: registration,
discovery, provisioning, discharge, monitoring,
synchronization, flooding, performance, and pushback.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Elkhodr:2024:NSI,
author = "Mahmoud Elkhodr and Samiya Khan and Ergun Gide",
title = "A Novel Semantic {IoT} Middleware for Secure Data
Management: Blockchain and {AI}-Driven Context
Awareness",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "22",
day = "07",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010022",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/22",
abstract = "In the modern digital landscape of the Internet of
Things (IoT), data interoperability and heterogeneity
present critical challenges, particularly with the
increasing complexity of IoT systems and networks.
Addressing these challenges, while ensuring data
security and user trust, is pivotal. This paper
proposes a novel Semantic IoT Middleware (SIM) for
healthcare. The architecture of this middleware
comprises the following main processes: data
generation, semantic annotation, security encryption,
and semantic operations. The data generation module
facilitates seamless data and event sourcing, while the
Semantic Annotation Component assigns structured
vocabulary for uniformity. SIM adopts blockchain
technology to provide enhanced data security, and its
layered approach ensures robust interoperability and
intuitive user-centric operations for IoT systems. The
security encryption module offers data protection, and
the semantic operations module underpins data
processing and integration. A distinctive feature of
this middleware is its proficiency in service
integration, leveraging semantic descriptions augmented
by user feedback. Additionally, SIM integrates
artificial intelligence (AI) feedback mechanisms to
continuously refine and optimise the middleware's
operational efficiency.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ali:2024:CSA,
author = "G. G. Md. Nawaz Ali and Mohammad Nazmus Sadat and Md
Suruz Miah and Sameer Ahmed Sharief and Yun Wang",
title = "A Comprehensive Study and Analysis of the Third
Generation Partnership {Project}'s {5G} New Radio for
Vehicle-to-Everything Communication",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "21",
day = "06",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010021",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/21",
abstract = "Recently, the Third Generation Partnership Project
(3GPP) introduced new radio (NR) technology for
vehicle-to-everything (V2X) communication to enable
delay-sensitive and bandwidth-hungry applications in
vehicular communication. The NR system is strategically
crafted to complement the existing long-term evolution
(LTE) cellular-vehicle-to-everything (C-V2X)
infrastructure, particularly to support advanced
services such as the operation of automated vehicles.
It is widely anticipated that the fifth-generation (5G)
NR system will surpass LTE C-V2X in terms of achieving
superior performance in scenarios characterized by high
throughput, low latency, and enhanced reliability,
especially in the context of congested traffic
conditions and a diverse range of vehicular
applications. This article will provide a comprehensive
literature review on vehicular communications from
dedicated short-range communication (DSRC) to NR V2X.
Subsequently, it delves into a detailed examination of
the challenges and opportunities inherent in NR V2X
technology. Finally, we proceed to elucidate the
process of creating and analyzing an open-source 5G NR
V2X module in network simulation-3 (ns-3) and then
demonstrate the NR V2X performance in terms of
different key performance indicators implemented
through diverse operational scenarios.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2024:JBF,
author = "Lidong Liu and Shidang Li and Mingsheng Wei and
Jinsong Xu and Bencheng Yu",
title = "Joint Beam-Forming Optimization for
Active-{RIS}-Assisted {Internet-of-Things} Networks
with {SWIPT}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "20",
day = "06",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010020",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/20",
abstract = "Network energy resources are limited in communication
systems, which may cause energy shortages in mobile
devices at the user end. Active Reconfigurable
Intelligent Surfaces (A-RIS) not only have phase
modulation properties but also enhance the signal
strength; thus, they are expected to solve the energy
shortage problem experience at the user end in 6G
communications. In this paper, a resource allocation
algorithm for maximizing the sum of harvested energy is
proposed for an active RIS-assisted Simultaneous
Wireless Information and Power Transfer (SWIPT) system
to solve the problem of low performance of harvested
energy for users due to multiplicative fading. First,
in the active RIS-assisted SWIPT system using a power
splitting architecture to achieve information and
energy co-transmission, the joint resource allocation
problem is constructed with the objective function of
maximizing the sum of the collected energy of all
users, under the constraints of signal-to-noise ratio,
active RIS and base station transmit power, and power
splitting factors. Second, the considered non-convex
problem can be turned into a standard convex problem by
using alternating optimization, semi-definite
relaxation, successive convex approximation, penalty
function, etc., and then an alternating iterative
algorithm for harvesting energy is proposed. The
proposed algorithm splits the problem into two
sub-problems and then performs iterative optimization
separately, and then the whole is alternately optimized
to obtain the optimal solution. Simulation results show
that the proposed algorithm improves the performance by
45.2\% and 103.7\% compared to the passive RIS
algorithm and the traditional without-RIS algorithm,
respectively, at the maximum permissible transmitting
power of 45 dBm at the base station.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhang:2024:PPO,
author = "Chen Zhang and Celimuge Wu and Min Lin and Yangfei Lin
and William Liu",
title = "Proximal Policy Optimization for Efficient
{D2D-Assisted} Computation Offloading and Resource
Allocation in Multi-Access Edge Computing",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "19",
day = "02",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010019",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/19",
abstract = "In the advanced 5G and beyond networks, multi-access
edge computing (MEC) is increasingly recognized as a
promising technology, offering the dual advantages of
reducing energy utilization in cloud data centers while
catering to the demands for reliability and real-time
responsiveness in end devices. However, the inherent
complexity and variability of MEC networks pose
significant challenges in computational offloading
decisions. To tackle this problem, we propose a
proximal policy optimization (PPO)-based
Device-to-Device (D2D)-assisted computation offloading
and resource allocation scheme. We construct a
realistic MEC network environment and develop a Markov
decision process (MDP) model that minimizes time loss
and energy consumption. The integration of a D2D
communication-based offloading framework allows for
collaborative task offloading between end devices and
MEC servers, enhancing both resource utilization and
computational efficiency. The MDP model is solved using
the PPO algorithm in deep reinforcement learning to
derive an optimal policy for offloading and resource
allocation. Extensive comparative analysis with three
benchmarked approaches has confirmed our scheme's
superior performance in latency, energy consumption,
and algorithmic convergence, demonstrating its
potential to improve MEC network operations in the
context of emerging 5G and beyond technologies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kochetkova:2024:CQS,
author = "Irina Kochetkova and Kseniia Leonteva and Ibram
Ghebrial and Anastasiya Vlaskina and Sofia Burtseva and
Anna Kushchazli and Konstantin Samouylov",
title = "Controllable Queuing System with Elastic Traffic and
Signals for Resource Capacity Planning in {5G} Network
Slicing",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "18",
day = "31",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010018",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/18",
abstract = "Fifth-generation (5G) networks provide network slicing
capabilities, enabling the deployment of multiple
logically isolated network slices on a single
infrastructure platform to meet specific requirements
of users. This paper focuses on modeling and analyzing
resource capacity planning and reallocation for network
slicing, specifically between two providers
transmitting elastic traffic, such during as web
browsing. A controller determines the need for resource
reallocation and plans new resource capacity
accordingly. A Markov decision process is employed in a
controllable queuing system to find the optimal
resource capacity for each provider. The reward
function incorporates three network slicing principles:
maximum matching for equal resource partitioning,
maximum share of signals resulting in resource
reallocation, and maximum resource utilization. To
efficiently compute the optimal resource capacity
planning policy, we developed an iterative algorithm
that begins with maximum resource utilization as the
starting point. Through numerical demonstrations, we
show the optimal policy and metrics of resource
reallocation for two services: web browsing and bulk
data transfer. The results highlight fast convergence
within three iterations and the effectiveness of the
balanced three-principle approach in resource capacity
planning for 5G network slicing.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Asano:2024:ITT,
author = "Mizuki Asano and Takumi Miyoshi and Taku Yamazaki",
title = "{Internet-of-Things} Traffic Analysis and Device
Identification Based on Two-Stage Clustering in Smart
Home Environments",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "17",
day = "31",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010017",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/17",
abstract = "Smart home environments, which consist of various
Internet of Things (IoT) devices to support and improve
our daily lives, are expected to be widely adopted in
the near future. Owing to a lack of awareness regarding
the risks associated with IoT devices and challenges in
replacing or the updating their firmware, adequate
security measures have not been implemented. Instead,
IoT device identification methods based on traffic
analysis have been proposed. Since conventional methods
process and analyze traffic data simultaneously, bias
in the occurrence rate of traffic patterns has a
negative impact on the analysis results. Therefore,
this paper proposes an IoT traffic analysis and device
identification method based on two-stage clustering in
smart home environments. In the first step, traffic
patterns are extracted by clustering IoT traffic at a
local gateway located in each smart home and
subsequently sent to a cloud server. In the second
step, the cloud server extracts common traffic units to
represent IoT traffic by clustering the patterns
obtained in the first step. Two-stage clustering can
reduce the impact of data bias, because each cluster
extracted in the first clustering is summarized as one
value and used as a single data point in the second
clustering, regardless of the occurrence rate of
traffic patterns. Through the proposed two-stage
clustering method, IoT traffic is transformed into time
series vector data that consist of common unit patterns
and can be identified based on time series
representations. Experiments using public IoT traffic
datasets indicated that the proposed method could
identify 21 IoTs devices with an accuracy of 86.9\%.
Therefore, we can conclude that traffic analysis using
two-stage clustering is effective for improving the
clustering quality, device identification, and
implementation in distributed environments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Misirli:2024:AMM,
author = "Javid Misirli and Emiliano Casalicchio",
title = "An Analysis of Methods and Metrics for Task Scheduling
in Fog Computing",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "16",
day = "30",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010016",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/16",
abstract = "The Internet of Things (IoT) uptake brought a paradigm
shift in application deployment. Indeed, IoT
applications are not centralized in cloud data centers,
but the computation and storage are moved close to the
consumers, creating a computing continuum between the
edge of the network and the cloud. This paradigm shift
is called fog computing, a concept introduced by Cisco
in 2012. Scheduling applications in this decentralized,
heterogeneous, and resource-constrained environment is
challenging. The task scheduling problem in fog
computing has been widely explored and addressed using
many approaches, from traditional operational research
to heuristics and machine learning. This paper aims to
analyze the literature on task scheduling in fog
computing published in the last five years to classify
the criteria used for decision-making and the technique
used to solve the task scheduling problem. We propose a
taxonomy of task scheduling algorithms, and we identify
the research gaps and challenges.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Achkouty:2024:RIQ,
author = "Fouad Achkouty and Richard Chbeir and Laurent Gallon
and Elio Mansour and Antonio Corral",
title = "Resource Indexing and Querying in Large Connected
Environments",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "15",
day = "30",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010015",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/15",
abstract = "The proliferation of sensor and actuator devices in
Internet of things (IoT) networks has garnered
significant attention in recent years. However, the
increasing number of IoT devices, and the corresponding
resources, has introduced various challenges,
particularly in indexing and querying. In essence,
resource management has become more complex due to the
non-uniform distribution of related devices and their
limited capacity. Additionally, the diverse demands of
users have further complicated resource indexing. This
paper proposes a distributed resource indexing and
querying algorithm for large connected environments,
specifically designed to address the challenges posed
by IoT networks. The algorithm considers both the
limited device capacity and the non-uniform
distribution of devices, acknowledging that devices
cannot store information about the entire environment.
Furthermore, it places special emphasis on uncovered
zones, to reduce the response time of queries related
to these areas. Moreover, the algorithm introduces
different types of queries, to cater to various user
needs, including fast queries and urgent queries
suitable for different scenarios. The effectiveness of
the proposed approach was evaluated through extensive
experiments covering index creation, coverage, and
query execution, yielding promising and insightful
results.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Serghini:2024:DCN,
author = "Omar Serghini and Hayat Semlali and Asmaa Maali and
Abdelilah Ghammaz and Salvatore Serrano",
title = "{1-D} Convolutional Neural Network-Based Models for
Cooperative Spectrum Sensing",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "14",
day = "29",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010014",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/14",
abstract = "Spectrum sensing is an essential function of cognitive
radio technology that can enable the reuse of available
radio resources by so-called secondary users without
creating harmful interference with licensed users. The
application of machine learning techniques to spectrum
sensing has attracted considerable interest in the
literature. In this contribution, we study cooperative
spectrum sensing in a cognitive radio network where
multiple secondary users cooperate to detect a primary
user. We introduce multiple cooperative spectrum
sensing schemes based on a deep neural network, which
incorporate a one-dimensional convolutional neural
network and a long short-term memory network. The
primary objective of these schemes is to effectively
learn the activity patterns of the primary user. The
scenario of an imperfect transmission channel is
considered for service messages to demonstrate the
robustness of the proposed model. The performance of
the proposed methods is evaluated with the receiver
operating characteristic curve, the probability of
detection for various SNR levels and the computational
time. The simulation results confirm the effectiveness
of the bidirectional long short-term memory-based
method, surpassing the performance of the other
proposed schemes and the current state-of-the-art
methods in terms of detection probability, while
ensuring a reasonable online detection time.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kabamba:2024:VLO,
author = "Herve M. Kabamba and Matthew Khouzam and Michel R.
Dagenais",
title = "{Vnode}: Low-Overhead Transparent Tracing of {{\tt
Node.js}}-Based Microservice Architectures",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "13",
day = "29",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010013",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/java2020.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/13",
abstract = "Tracing serves as a key method for evaluating the
performance of microservices-based architectures, which
are renowned for their scalability, resource
efficiency, and high availability. Despite their
advantages, these architectures often pose unique
debugging challenges that necessitate trade-offs,
including the burden of instrumentation overhead. With
Node.js emerging as a leading development environment
recognized for its rapidly growing ecosystem, there is
a pressing need for innovative performance debugging
approaches that reduce the telemetry data collection
efforts and the overhead incurred by the environment's
instrumentation. In response, we introduce a new
approach designed for transparent tracing and
performance debugging of microservices in cloud
settings. This approach is centered around our newly
developed Internal Transparent Tracing and Context
Reconstruction (ITTCR) technique. ITTCR is adept at
correlating internal metrics from various distributed
trace files to reconstruct the intricate execution
contexts of microservices operating in a Node.js
environment. Our method achieves transparency by
directly instrumenting the Node.js virtual machine,
enabling the collection and analysis of trace events in
a transparent manner. This process facilitates the
creation of visualization tools, enhancing the
understanding and analysis of microservice performance
in cloud environments. Compared to other methods, our
approach incurs an overhead of approximately 5\% on the
system for the trace collection infrastructure while
exhibiting minimal utilization of system resources
during analysis execution. Experiments demonstrate that
our technique scales well with very large trace files
containing huge numbers of events and performs analyses
in very acceptable timeframes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2024:EEP,
author = "Xiu Li and Aron Henriksson and Martin Duneld and Jalal
Nouri and Yongchao Wu",
title = "Evaluating Embeddings from Pre-Trained Language Models
and Knowledge Graphs for Educational Content
Recommendation",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "12",
day = "29",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010012",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/12",
abstract = "Educational content recommendation is a cornerstone of
AI-enhanced learning. In particular, to facilitate
navigating the diverse learning resources available on
learning platforms, methods are needed for
automatically linking learning materials, e.g., in
order to recommend textbook content based on exercises.
Such methods are typically based on semantic textual
similarity (STS) and the use of embeddings for text
representation. However, it remains unclear what types
of embeddings should be used for this task. In this
study, we carry out an extensive empirical evaluation
of embeddings derived from three different types of
models: (i) static embeddings trained using a
concept-based knowledge graph, (ii) contextual
embeddings from a pre-trained language model, and (iii)
contextual embeddings from a large language model
(LLM). In addition to evaluating the models
individually, various ensembles are explored based on
different strategies for combining two models in an
early vs. late fusion fashion. The evaluation is
carried out using digital textbooks in Swedish for
three different subjects and two types of exercises.
The results show that using contextual embeddings from
an LLM leads to superior performance compared to the
other models, and that there is no significant
improvement when combining these with static embeddings
trained using a knowledge graph. When using embeddings
derived from a smaller language model, however, it
helps to combine them with knowledge graph embeddings.
The performance of the best-performing model is high
for both types of exercises, resulting in a mean
Recall@3 of 0.96 and 0.95 and a mean MRR of 0.87 and
0.86 for quizzes and study questions, respectively,
demonstrating the feasibility of using STS based on
text embeddings for educational content recommendation.
The ability to link digital learning materials in an
unsupervised manner---relying only on readily available
pre-trained models---facilitates the development of
AI-enhanced learning.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bagheri:2024:SGS,
author = "Nasour Bagheri and Ygal Bendavid and Masoumeh Safkhani
and Samad Rostampour",
title = "Smart Grid Security: a {PUF}-Based Authentication and
Key Agreement Protocol",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "9",
day = "28",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010009",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/9",
abstract = "A smart grid is an electricity network that uses
advanced technologies to facilitate the exchange of
information and electricity between utility companies
and customers. Although most of the technologies
involved in such grids have reached maturity, smart
meters---as connected devices---introduce new security
challenges. To overcome this significant obstacle to
grid modernization, safeguarding privacy has emerged as
a paramount concern. In this paper, we begin by
evaluating the security levels of recently proposed
authentication methods for smart meters. Subsequently,
we introduce an enhanced protocol named PPSG, designed
for smart grids, which incorporates physical unclonable
functions (PUF) and an elliptic curve cryptography
(ECC) module to address the vulnerabilities identified
in previous approaches. Our security analysis,
utilizing a real-or-random (RoR) model, demonstrates
that PPSG effectively mitigates the weaknesses found in
prior methods. To assess the practicality of PPSG, we
conduct simulations using an Arduino UNO board,
measuring computation, communication, and energy costs.
Our results, including a processing time of 153 ms, a
communication cost of 1376 bits, and an energy
consumption of 13.468 mJ, align with the requirements
of resource-constrained devices within smart grids.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Toman:2024:LAS,
author = "Patrick Toman and Nalini Ravishanker and Nathan Lally
and Sanguthevar Rajasekaran",
title = "Latent Autoregressive Student- t Prior Process Models
to Assess Impact of Interventions in Time Series",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "8",
day = "28",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010008",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/8",
abstract = "With the advent of the ``Internet of Things'' (IoT),
insurers are increasingly leveraging remote sensor
technology in the development of novel insurance
products and risk management programs. For example,
Hartford Steam Boiler's (HSB) IoT freeze loss program
uses IoT temperature sensors to monitor indoor
temperatures in locations at high risk of water-pipe
burst (freeze loss) with the goal of reducing
insurances losses via real-time monitoring of the
temperature data streams. In the event these monitoring
systems detect a potentially risky temperature
environment, an alert is sent to the end-insured
(business manager, tenant, maintenance staff, etc.),
prompting them to take remedial action by raising
temperatures. In the event that an alert is sent and
freeze loss occurs, the firm is not liable for any
damages incurred by the event. For the program to be
effective, there must be a reliable method of verifying
if customers took appropriate corrective action after
receiving an alert. Due to the program's scale, direct
follow up via text or phone calls is not possible for
every alert event. In addition, direct feedback from
customers is not necessarily reliable. In this paper,
we propose the use of a non-linear, auto-regressive
time series model, coupled with the time series
intervention analysis method known as causal impact, to
directly evaluate whether or not a customer took action
directly from IoT temperature streams. Our method
offers several distinct advantages over other methods
as it is (a) readily scalable with continued program
growth, (b) entirely automated, and (c) inherently less
biased than human labelers or direct customer response.
We demonstrate the efficacy of our method using a
sample of actual freeze alert events from the freeze
loss program.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2024:UUB,
author = "Qiang Liu and Rui Han and Yang Li",
title = "Utilizing User Bandwidth Resources in
Information-Centric Networking through Blockchain-Based
Incentive Mechanism",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "11",
day = "28",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010011",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/11",
abstract = "Idle bandwidth resources are inefficiently distributed
among different users. Currently, the utilization of
user bandwidth resources mostly relies on traditional
IP networks, implementing relevant techniques at the
application layer, which creates scalability issues and
brings additional system overheads. Information-Centric
Networking (ICN), based on the idea of separating
identifiers and locators, offers the potential to
aggregate idle bandwidth resources from a network layer
perspective. This paper proposes a method for utilizing
user bandwidth resources in ICN; specifically, we treat
the use of user bandwidth resources as a service and
assign service IDs (identifiers), and when network
congestion (the network nodes are overloaded) occurs,
the traffic can be routed to the user side for
forwarding through the ID/NA (Network Address)
cooperative routing mechanism of ICN, thereby improving
the scalability of ICN transmission and the utilization
of underlying network resources. To enhance the
willingness of users to contribute idle bandwidth
resources, we establish a secure and trustworthy
bandwidth trading market using blockchain technology.
We also design an incentive mechanism based on the
Proof-of-Network-Contribution (PoNC) consensus
algorithm; users can ``mine'' by forwarding packets.
The experimental results show that utilizing idle
bandwidth can significantly improve the scalability of
ICN transmission under experimental conditions,
bringing a maximum throughput improvement of 19.4\% and
reducing the packet loss rate. Compared with existing
methods, using ICN technology to aggregate idle
bandwidth for network transmission will have a more
stable and lower latency, and it brings a maximum
utilization improvement of 13.7\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Santonicola:2024:ACA,
author = "Emanuele Santonicola and Ennio Andrea Adinolfi and
Simone Coppola and Francesco Pascale",
title = "Automotive Cybersecurity Application Based on
{CARDIAN}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "10",
day = "28",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010010",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/10",
abstract = "Nowadays, a vehicle can contain from 20 to 100 ECUs,
which are responsible for ordering, controlling and
monitoring all the components of the vehicle itself.
Each of these units can also send and receive
information to other units on the network or
externally. For most vehicles, the controller area
network (CAN) is the main communication protocol and
system used to build their internal network.
Technological development, the growing integration of
devices and the numerous advances in the field of
connectivity have allowed the vehicle to become
connected, and the flow of information exchanged
between the various ECUs (electronic control units)
becomes increasingly important and varied. Furthermore,
the vehicle itself is capable of exchanging information
with other vehicles, with the surrounding environment
and with the Internet. As shown by the CARDIAN project,
this type of innovation allows the user an increasingly
safe and varied driving experience, but at the same
time, it introduces a series of vulnerabilities and
dangers due to the connection itself. The job of making
the vehicle safe therefore becomes critical. In recent
years, it has been demonstrated in multiple ways how
easy it is to compromise the safety of a vehicle and
its passengers by injecting malicious messages into the
CAN network present inside the vehicle itself. The
purpose of this article is the construction of a system
that, integrated within the vehicle network, is able to
effectively recognize any type of intrusion and
tampering.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhao:2024:DID,
author = "Yadi Zhao and Lei Yan and Jian Wu and Ximing Song",
title = "Design and Implementation of a Digital Twin System for
Log Rotary Cutting Optimization",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "7",
day = "25",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010007",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/7",
abstract = "To address the low level of intelligence and low
utilization of logs in current rotary cutting
equipment, this paper proposes a digital twin-based
system for optimizing the rotary cutting of logs using
a five-dimensional model of digital twins. The system
features a log perception platform to capture
three-dimensional point cloud data, outlining the logs'
contours. Utilizing the Delaunay3D algorithm, this
model performs a three-dimensional reconstruction of
the log point cloud, constructing a precise digital
twin. Feature information is extracted from the point
cloud using the least squares method. Processing
parameters, determined through the kinematic model, are
verified in rotary cutting simulations via Bool
operations. The system's efficacy has been
substantiated through experimental validation,
demonstrating its capability to output specific
processing schemes for irregular logs and to verify
these through simulation. This approach notably
improves log recovery rates, decreasing volume error
from 12.8\% to 2.7\% and recovery rate error from
23.5\% to 5.7\% The results validate the efficacy of
the proposed digital twin system in optimizing the
rotary cutting process, demonstrating its capability
not only to enhance the utilization rate of log
resources but also to improve the economic efficiency
of the factory, thereby facilitating industrial
development.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2024:TTD,
author = "Jing Liu and Xuesong Hai and Keqin Li",
title = "{TDLearning}: Trusted Distributed Collaborative
Learning Based on Blockchain Smart Contracts",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "1",
pages = "6",
day = "25",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16010006",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/1/6",
abstract = "Massive amounts of data drive the performance of deep
learning models, but in practice, data resources are
often highly dispersed and bound by data privacy and
security concerns, making it difficult for multiple
data sources to share their local data directly. Data
resources are difficult to aggregate effectively,
resulting in a lack of support for model training. How
to collaborate between data sources in order to
aggregate the value of data resources is therefore an
important research question. However, existing
distributed-collaborative-learning architectures still
face serious challenges in collaborating between nodes
that lack mutual trust, with security and trust issues
seriously affecting the confidence and willingness of
data sources to participate in collaboration.
Blockchain technology provides trusted distributed
storage and computing, and combining it with
collaboration between data sources to build trusted
distributed-collaborative-learning architectures is an
extremely valuable research direction for application.
We propose a trusted distributed-collaborative-learning
mechanism based on blockchain smart contracts. Firstly,
the mechanism uses blockchain smart contracts to define
and encapsulate collaborative behaviours, relationships
and norms between distributed collaborative nodes.
Secondly, we propose a model-fusion method based on
feature fusion, which replaces the direct sharing of
local data resources with distributed-model
collaborative training and organises distributed data
resources for distributed collaboration to improve
model performance. Finally, in order to verify the
trustworthiness and usability of the proposed
mechanism, on the one hand, we implement formal
modelling and verification of the smart contract by
using Coloured Petri Net and prove that the mechanism
satisfies the expected trustworthiness properties by
verifying the formal model of the smart contract
associated with the mechanism. On the other hand, the
model-fusion method based on feature fusion is
evaluated in different datasets and collaboration
scenarios, while a typical collaborative-learning case
is implemented for a comprehensive analysis and
validation of the mechanism. The experimental results
show that the proposed mechanism can provide a trusted
and fair collaboration infrastructure for
distributed-collaboration nodes that lack mutual trust
and organise decentralised data resources for
collaborative model training to develop effective
global models.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Khan:2024:EED,
author = "Muhammad Nafees Ulfat Khan and Weiping Cao and Zhiling
Tang and Ata Ullah and Wanghua Pan",
title = "Energy-Efficient {De}-Duplication Mechanism for
Healthcare Data Aggregation in {IoT}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "66",
day = "19",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020066",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/66",
abstract = "The rapid development of the Internet of Things (IoT)
has opened the way for transformative advances in
numerous fields, including healthcare. IoT-based
healthcare systems provide unprecedented opportunities
to gather patients' real-time data and make appropriate
decisions at the right time. Yet, the deployed sensors
generate normal readings most of the time, which are
transmitted to Cluster Heads (CHs). Handling these
voluminous duplicated data is quite challenging. The
existing techniques have high energy consumption,
storage costs, and communication costs. To overcome
these problems, in this paper, an innovative
Energy-Efficient Fuzzy Data Aggregation System
(EE-FDAS) has been presented. In it, at the first
level, it is checked that sensors either generate
normal or critical readings. In the first case,
readings are converted to Boolean digit 0. This reduced
data size takes only 1 digit which considerably reduces
energy consumption. In the second scenario, sensors
generating irregular readings are transmitted in their
original 16 or 32-bit form. Then, data are aggregated
and transmitted to respective CHs. Afterwards, these
data are further transmitted to Fog servers, from where
doctors have access. Lastly, for later usage, data are
stored in the cloud server. For checking the
proficiency of the proposed EE-FDAS scheme, extensive
simulations are performed using NS-2.35. The results
showed that EE-FDAS has performed well in terms of
aggregation factor, energy consumption, packet drop
rate, communication, and storage cost.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bellavista:2024:IID,
author = "Paolo Bellavista and Giuseppe {Di Modica}",
title = "{IoTwins}: Implementing Distributed and Hybrid Digital
Twins in Industrial Manufacturing and Facility
Management Settings",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "65",
day = "17",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020065",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/65",
abstract = "A Digital Twin (DT) refers to a virtual representation
or digital replica of a physical object, system,
process, or entity. This concept involves creating a
detailed, real-time digital counterpart that mimics the
behavior, characteristics, and attributes of its
physical counterpart. DTs have the potential to improve
efficiency, reduce costs, and enhance decision-making
by providing a detailed, real-time understanding of the
physical systems they represent. While this technology
is finding application in numerous fields, such as
energy, healthcare, and transportation, it appears to
be a key component of the digital transformation of
industries fostered by the fourth Industrial revolution
(Industry 4.0). In this paper, we present the research
results achieved by IoTwins, a European research
project aimed at investigating opportunities and issues
of adopting DTs in the fields of industrial
manufacturing and facility management. Particularly, we
discuss a DT model and a reference architecture for use
by the research community to implement a platform for
the development and deployment of industrial DTs in the
cloud continuum. Guided by the devised architectures'
principles, we implemented an open platform and a
development methodology to help companies build
DT-based industrial applications and deploy them in the
so-called Edge/Cloud continuum. To prove the research
value and the usability of the implemented platform, we
discuss a simple yet practical development use case.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Matsuoka:2024:OOP,
author = "Ryo Matsuoka and Koichi Kobayashi and Yuh Yamashita",
title = "Online Optimization of Pickup and Delivery Problem
Considering Feasibility",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "64",
day = "17",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020064",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/64",
abstract = "A pickup and delivery problem by multiple agents has
many applications, such as food delivery service and
disaster rescue. In this problem, there are cases where
fuels must be considered (e.g., the case of using
drones as agents). In addition, there are cases where
demand forecasting should be considered (e.g., the case
where a large number of orders are carried by a small
number of agents). In this paper, we consider an online
pickup and delivery problem considering fuel and demand
forecasting. First, the pickup and delivery problem
with fuel constraints is formulated. The information on
demand forecasting is included in the cost function.
Based on the orders, the agents' paths (e.g., the paths
from stores to customers) are calculated. We suppose
that the target area is given by an undirected graph.
Using a given graph, several constraints such as the
moves and fuels of the agents are introduced. This
problem is reduced to a mixed integer linear
programming (MILP) problem. Next, in online
optimization, the MILP problem is solved depending on
the acceptance of orders. Owing to new orders, the
calculated future paths may be changed. Finally, by
using a numerical example, we present the effectiveness
of the proposed method.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Shi:2024:SIB,
author = "Haohan Shi and Xiyu Shi and Safak Dogan",
title = "Speech Inpainting Based on Multi-Layer Long Short-Term
Memory Networks",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "63",
day = "17",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020063",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/63",
abstract = "Audio inpainting plays an important role in addressing
incomplete, damaged, or missing audio signals,
contributing to improved quality of service and overall
user experience in multimedia communications over the
Internet and mobile networks. This paper presents an
innovative solution for speech inpainting using Long
Short-Term Memory (LSTM) networks, i.e., a restoring
task where the missing parts of speech signals are
recovered from the previous information in the time
domain. The lost or corrupted speech signals are also
referred to as gaps. We regard the speech inpainting
task as a time-series prediction problem in this
research work. To address this problem, we designed
multi-layer LSTM networks and trained them on different
speech datasets. Our study aims to investigate the
inpainting performance of the proposed models on
different datasets and with varying LSTM layers and
explore the effect of multi-layer LSTM networks on the
prediction of speech samples in terms of perceived
audio quality. The inpainted speech quality is
evaluated through the Mean Opinion Score (MOS) and a
frequency analysis of the spectrogram. Our proposed
multi-layer LSTM models are able to restore up to 1 s
of gaps with high perceptual audio quality using the
features captured from the time domain only.
Specifically, for gap lengths under 500 ms, the MOS can
reach up to 3--4, and for gap lengths ranging between
500 ms and 1 s, the MOS can reach up to 2--3. In the
time domain, the proposed models can proficiently
restore the envelope and trend of lost speech signals.
In the frequency domain, the proposed models can
restore spectrogram blocks with higher similarity to
the original signals at frequencies less than 2.0 kHz
and comparatively lower similarity at frequencies in
the range of 2.0 kHz--8.0 kHz.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Calcagno:2024:MOD,
author = "Salvatore Calcagno and Andrea Calvagna and Emiliano
Tramontana and Gabriella Verga",
title = "Merging Ontologies and Data from Electronic Health
Records",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "62",
day = "17",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020062",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/62",
abstract = "The Electronic Health Record (EHR) is a system for
collecting and storing patient medical records as data
that can be mechanically accessed, hence facilitating
and assisting the medical decision-making process. EHRs
exist in several formats, and each format lists
thousands of keywords to classify patients data. The
keywords are specific and are medical jargon; hence,
data classification is very accurate. As the keywords
constituting the formats of medical records express
concepts by means of specific jargon without
definitions or references, their proper use is left to
clinicians and could be affected by their background,
hence the interpretation of data could become slow or
less accurate than that desired. This article presents
an approach that accurately relates data in EHRs to
ontologies in the medical realm. Thanks to ontologies,
clinicians can be assisted when writing or analysing
health records, e.g., our solution promptly suggests
rigorous definitions for scientific terms, and
automatically connects data spread over several parts
of EHRs. The first step of our approach consists of
converting selected data and keywords from several EHR
formats into a format easier to parse, then the second
step is merging the extracted data with specialised
medical ontologies. Finally, enriched versions of the
medical data are made available to professionals. The
proposed approach was validated by taking samples of
medical records and ontologies in the real world. The
results have shown both versatility on handling data,
precision of query results, and appropriate suggestions
for relations among medical records.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Papenfuss:2024:EEE,
author = "Dennis Papenfu{\ss} and Bennet Gerlach and Stefan
Fischer and Mohamed Ahmed Hail",
title = "Enhancing Energy Efficiency in {IoT-NDN} via Parameter
Optimization",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "61",
day = "16",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020061",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/61",
abstract = "The IoT encompasses objects, sensors, and everyday
items not typically considered computers. IoT devices
are subject to severe energy, memory, and computation
power constraints. Employing NDN for the IoT is a
recent approach to accommodate these issues. To gain a
deeper insight into how different network parameters
affect energy consumption, analyzing a range of
parameters using hyperparameter optimization seems
reasonable. The experiments from this work's
ndnSIM-based hyperparameter setup indicate that the
data packet size has the most significant impact on
energy consumption, followed by the caching scheme,
caching strategy, and finally, the forwarding strategy.
The energy footprint of these parameters is orders of
magnitude apart. Surprisingly, the packet request
sequence influences the caching parameters' energy
footprint more than the graph size and topology.
Regarding energy consumption, the results indicate that
data compression may be more relevant than expected,
and caching may be more significant than the forwarding
strategy. The framework for ndnSIM developed in this
work can be used to simulate NDN networks more
efficiently. Furthermore, the work presents a valuable
basis for further research on the effect of specific
parameter combinations not examined before.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Qu:2024:MTO,
author = "Qian Qu and Mohsen Hatami and Ronghua Xu and Deeraj
Nagothu and Yu Chen and Xiaohua Li and Erik Blasch and
Erika Ardiles-Cruz and Genshe Chen",
title = "The Microverse: a Task-Oriented Edge-Scale Metaverse",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "60",
day = "13",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020060",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/60",
abstract = "Over the past decade, there has been a remarkable
acceleration in the evolution of smart cities and
intelligent spaces, driven by breakthroughs in
technologies such as the Internet of Things (IoT),
edge--fog--cloud computing, and machine learning
(ML)/artificial intelligence (AI). As society begins to
harness the full potential of these smart environments,
the horizon brightens with the promise of an immersive,
interconnected 3D world. The forthcoming paradigm shift
in how we live, work, and interact owes much to
groundbreaking innovations in augmented reality (AR),
virtual reality (VR), extended reality (XR),
blockchain, and digital twins (DTs). However, realizing
the expansive digital vista in our daily lives is
challenging. Current limitations include an incomplete
integration of pivotal techniques, daunting bandwidth
requirements, and the critical need for
near-instantaneous data transmission, all impeding the
digital VR metaverse from fully manifesting as
envisioned by its proponents. This paper seeks to delve
deeply into the intricacies of the immersive,
interconnected 3D realm, particularly in applications
demanding high levels of intelligence. Specifically,
this paper introduces the microverse, a task-oriented,
edge-scale, pragmatic solution for smart cities. Unlike
all-encompassing metaverses, each microverse instance
serves a specific task as a manageable digital twin of
an individual network slice. Each microverse enables
on-site/near-site data processing, information fusion,
and real-time decision-making within the
edge--fog--cloud computing framework. The microverse
concept is verified using smart public safety
surveillance (SPSS) for smart communities as a case
study, demonstrating its feasibility in practical smart
city applications. The aim is to stimulate discussions
and inspire fresh ideas in our community, guiding us as
we navigate the evolving digital landscape of smart
cities to embrace the potential of the metaverse.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fu:2024:DTB,
author = "Tianjie Fu and Peiyu Li and Chenke Shi and Youzhu
Liu",
title = "Digital-Twin-Based Monitoring System for Slab
Production Process",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "59",
day = "13",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020059",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/59",
abstract = "The growing demand for high-quality steel across
various industries has led to an increasing need for
superior-grade steel. The quality of slab ingots is a
pivotal factor influencing the final quality of steel
production. However, the current level of intelligence
in the steelmaking industry's processes is relatively
insufficient. Consequently, slab ingot quality
inspection is characterized by high-temperature risks
and imprecision. The positional accuracy of quality
detection is inadequate, and the precise quantification
of slab ingot production and quality remains
challenging. This paper proposes a digital twin
(DT)-based monitoring system for the slab ingot
production process that integrates DT technology with
slab ingot process detection. A neural network is
introduced for defect identification to ensure precise
defect localization and efficient recognition.
Concurrently, environmental production factors are
considered, leading to the introduction of a defect
prediction module. The effectiveness of this system is
validated through experimental verification.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Adesokan:2024:COC,
author = "Adedamola Adesokan and Rowan Kinney and Eirini Eleni
Tsiropoulou",
title = "{CROWDMATCH}: Optimizing Crowdsourcing Matching
through the Integration of Matching Theory and
Coalition Games",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "58",
day = "11",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020058",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/58",
abstract = "This paper tackles the challenges inherent in
crowdsourcing dynamics by introducing the CROWDMATCH
mechanism. Aimed at enabling crowdworkers to
strategically select suitable crowdsourcers while
contributing information to crowdsourcing tasks,
CROWDMATCH considers incentives, information
availability and cost, and the decisions of fellow
crowdworkers to model the utility functions for both
the crowdworkers and the crowdsourcers. Specifically,
the paper presents an initial Approximate CROWDMATCH
mechanism grounded in matching theory principles,
eliminating externalities from crowdworkers' decisions
and enabling each entity to maximize its utility.
Subsequently, the Accurate CROWDMATCH mechanism is
introduced, which is initiated by the outcome of the
Approximate CROWDMATCH mechanism, and coalition
game-theoretic principles are employed to refine the
matching process by accounting for externalities. The
paper's contributions include the introduction of the
CROWDMATCH system model, the development of both
Approximate and Accurate CROWDMATCH mechanisms, and a
demonstration of their superior performance through
comprehensive simulation results. The mechanisms'
scalability in large-scale crowdsourcing systems and
operational advantages are highlighted, distinguishing
them from existing methods and highlighting their
efficacy in empowering crowdworkers in crowdsourcer
selection.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bellaj:2024:DMM,
author = "Mohammed Bellaj and Najib Naja and Abdellah Jamali",
title = "Distributed Mobility Management Support for
Low-Latency Data Delivery in Named Data Networking for
{UAVs}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "57",
day = "10",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020057",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/57",
abstract = "Named Data Networking (NDN) has emerged as a promising
architecture to overcome the limitations of the
conventional Internet Protocol (IP) architecture,
particularly in terms of mobility, security, and data
availability. However, despite the advantages it
offers, producer mobility management remains a
significant challenge for NDN, especially for moving
vehicles and emerging technologies such as Unmanned
Aerial Vehicles (UAVs), known for their high-speed and
unpredictable movements, which makes it difficult for
NDN to maintain seamless communication. To solve this
mobility problem, we propose a Distributed Mobility
Management Scheme (DMMS) to support UAV mobility and
ensure low-latency content delivery in NDN
architecture. DMMS utilizes decentralized Anchors to
forward proactively the consumer's Interest packets
toward the producer's predicted location when handoff
occurs. Moreover, it introduces a new forwarding
approach that combines the standard and location-based
forwarding strategy to improve forwarding efficiency
under producer mobility without changing the network
structure. Using a realistic scenario, DMMS is
evaluated and compared against two well-known
solutions, namely MAP-ME and Kite, using the ndnSIM
simulations. We demonstrate that DMMS achieves better
results compared to Kite and MAP-ME solutions in terms
of network cost and consumer quality-of-service
metrics.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Khalil:2024:SON,
author = "Ayman Khalil and Besma Zeddini",
title = "A Secure Opportunistic Network with Efficient Routing
for Enhanced Efficiency and Sustainability",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "56",
day = "08",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020056",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/56",
abstract = "The intersection of cybersecurity and opportunistic
networks has ushered in a new era of innovation in the
realm of wireless communications. In an increasingly
interconnected world, where seamless data exchange is
pivotal for both individual users and organizations,
the need for efficient, reliable, and sustainable
networking solutions has never been more pressing.
Opportunistic networks, characterized by intermittent
connectivity and dynamic network conditions, present
unique challenges that necessitate innovative
approaches for optimal performance and sustainability.
This paper introduces a groundbreaking paradigm that
integrates the principles of cybersecurity with
opportunistic networks. At its core, this study
presents a novel routing protocol meticulously designed
to significantly outperform existing solutions
concerning key metrics such as delivery probability,
overhead ratio, and communication delay. Leveraging
cybersecurity's inherent strengths, our protocol not
only fortifies the network's security posture but also
provides a foundation for enhancing efficiency and
sustainability in opportunistic networks. The
overarching goal of this paper is to address the
inherent limitations of conventional opportunistic
network protocols. By proposing an innovative routing
protocol, we aim to optimize data delivery, minimize
overhead, and reduce communication latency. These
objectives are crucial for ensuring seamless and timely
information exchange, especially in scenarios where
traditional networking infrastructures fall short. By
large-scale simulations, the new model proves its
effectiveness in the different scenarios, especially in
terms of message delivery probability, while ensuring
reasonable overhead and latency.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2024:AIS,
author = "Meng Li and Jiqiang Liu and Yeping Yang",
title = "Automated Identification of Sensitive Financial Data
Based on the Topic Analysis",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "55",
day = "08",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020055",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/55",
abstract = "Data governance is an extremely important protection
and management measure throughout the entire life cycle
of data. However, there are still data governance
issues, such as data security risks, data privacy
breaches, and difficulties in data management and
access control. These problems lead to a risk of data
breaches and abuse. Therefore, the security
classification and grading of data has become an
important task to accurately identify sensitive data
and adopt appropriate maintenance and management
measures with different sensitivity levels. This work
started from the problems existing in the current data
security classification and grading work, such as
inconsistent classification and grading standards,
difficult data acquisition and sorting, and weak
semantic information of data fields, to find the
limitations of the current methods and the direction
for improvement. The automatic identification method of
sensitive financial data proposed in this paper is
based on topic analysis and was constructed by
incorporating Jieba word segmentation, word frequency
statistics, the skip-gram model, K-means clustering,
and other technologies. Expert assistance was sought to
select appropriate keywords for enhanced accuracy. This
work used the descriptive text library and real
business data of a Chinese financial institution for
training and testing to further demonstrate its
effectiveness and usefulness. The evaluation indicators
illustrated the effectiveness of this method in the
classification of data security. The proposed method
addressed the challenge of sensitivity level division
in texts with limited semantic information, which
overcame the limitations on model expansion across
different domains and provided an optimized application
model. All of the above pointed out the direction for
the real-time updating of the method.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kenyeres:2024:MTM,
author = "Martin Kenyeres and Ivana Budinsk{\'a} and Ladislav
Hluch{\'y} and Agostino Poggi",
title = "Modern Trends in Multi-Agent Systems",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "54",
day = "08",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020054",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/54",
abstract = "Data governance is an extremely important protection
and management measure throughout the entire life cycle
of data. However, there are still data governance
issues, such as data security risks, data privacy
breaches, and difficulties in data management and
access control. These problems lead to a risk of data
breaches and abuse. Therefore, the security
classification and grading of data has become an
important task to accurately identify sensitive data
and adopt appropriate maintenance and management
measures with different sensitivity levels. This work
started from the problems existing in the current data
security classification and grading work, such as
inconsistent classification and grading standards,
difficult data acquisition and sorting, and weak
semantic information of data fields, to find the
limitations of the current methods and the direction
for improvement. The automatic identification method of
sensitive financial data proposed in this paper is
based on topic analysis and was constructed by
incorporating Jieba word segmentation, word frequency
statistics, the skip-gram model, K-means clustering,
and other technologies. Expert assistance was sought to
select appropriate keywords for enhanced accuracy. This
work used the descriptive text library and real
business data of a Chinese financial institution for
training and testing to further demonstrate its
effectiveness and usefulness. The evaluation indicators
illustrated the effectiveness of this method in the
classification of data security. The proposed method
addressed the challenge of sensitivity level division
in texts with limited semantic information, which
overcame the limitations on model expansion across
different domains and provided an optimized application
model. All of the above pointed out the direction for
the real-time updating of the method.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cafaro:2024:SAF,
author = "Massimo Cafaro and Italo Epicoco and Marco Pulimeno",
title = "State-of-the-Art Future {Internet} Technology in
{Italy} 2022--2023",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "53",
day = "06",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020053",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/53",
abstract = "Data governance is an extremely important protection
and management measure throughout the entire life cycle
of data. However, there are still data governance
issues, such as data security risks, data privacy
breaches, and difficulties in data management and
access control. These problems lead to a risk of data
breaches and abuse. Therefore, the security
classification and grading of data has become an
important task to accurately identify sensitive data
and adopt appropriate maintenance and management
measures with different sensitivity levels. This work
started from the problems existing in the current data
security classification and grading work, such as
inconsistent classification and grading standards,
difficult data acquisition and sorting, and weak
semantic information of data fields, to find the
limitations of the current methods and the direction
for improvement. The automatic identification method of
sensitive financial data proposed in this paper is
based on topic analysis and was constructed by
incorporating Jieba word segmentation, word frequency
statistics, the skip-gram model, K-means clustering,
and other technologies. Expert assistance was sought to
select appropriate keywords for enhanced accuracy. This
work used the descriptive text library and real
business data of a Chinese financial institution for
training and testing to further demonstrate its
effectiveness and usefulness. The evaluation indicators
illustrated the effectiveness of this method in the
classification of data security. The proposed method
addressed the challenge of sensitivity level division
in texts with limited semantic information, which
overcame the limitations on model expansion across
different domains and provided an optimized application
model. All of the above pointed out the direction for
the real-time updating of the method.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mukhopadhyay:2024:QAI,
author = "Adwitiya Mukhopadhyay and Aryadevi Remanidevi Devidas
and Venkat P. Rangan and Maneesha Vinodini Ramesh",
title = "A {QoS}-Aware {IoT} Edge Network for Mobile
Telemedicine Enabling In-Transit Monitoring of
Emergency Patients",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "52",
day = "06",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020052",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/52",
abstract = "Addressing the inadequacy of medical facilities in
rural communities and the high number of patients
affected by ailments that need to be treated
immediately is of prime importance for all countries.
The various recent healthcare emergency situations
bring out the importance of telemedicine and demand
rapid transportation of patients to nearby hospitals
with available resources to provide the required
medical care. Many current healthcare facilities and
ambulances are not equipped to provide real-time risk
assessment for each patient and dynamically provide the
required medical interventions. This work proposes an
IoT-based mobile medical edge (IM 2 E) node to be
integrated with wearable and portable devices for the
continuous monitoring of emergency patients transported
via ambulances and it delves deeper into the existing
challenges, such as (a) a lack of a simplified patient
risk scoring system, (b) the need for architecture that
enables seamless communication for dynamically varying
QoS requirements, and (c)the need for context-aware
knowledge regarding the effect of end-to-end delay and
the packet loss ratio (PLR) on the real-time monitoring
of health risks in emergency patients. The proposed
work builds a data path selection model to identify the
most effective path through which to route the data
packets in an effective manner. The signal-to-noise
interference ratio and the fading in the path are
chosen to analyze the suitable path for data
transmission.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lin:2024:OSA,
author = "Ming-Yen Lin and Ping-Chun Wu and Sue-Chen Hsueh",
title = "Optimizing Session-Aware Recommenders: a Deep Dive
into {GRU}-Based Latent Interaction Integration",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "51",
day = "01",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020051",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/51",
abstract = "This study introduces session-aware recommendation
models, leveraging GRU (Gated Recurrent Unit) and
attention mechanisms for advanced latent interaction
data integration. A primary advancement is enhancing
latent context, a critical factor for boosting
recommendation accuracy. We address the existing
models' rigidity by dynamically blending short-term
(most recent) and long-term (historical) preferences,
moving beyond static period definitions. Our
approaches, pre-combination (LCII-Pre) and
post-combination (LCII-Post), with fixed (Fix) and
flexible learning (LP) weight configurations, are
thoroughly evaluated. We conducted extensive
experiments to assess our models' performance on public
datasets such as Amazon and MovieLens 1M. Notably, on
the MovieLens 1M dataset, LCII-Pre Fix achieved a
1.85\% and 2.54\% higher Recall@20 than II-RNN and
BERT4Rec +st+TSA, respectively. On the Steam dataset,
LCII-Post LP outperformed these models by 18.66\% and
5.5\%. Furthermore, on the Amazon dataset, LCII showed
a 2.59\% and 1.89\% improvement in Recall@20 over
II-RNN and CAII. These results affirm the significant
enhancement our models bring to session-aware
recommendation systems, showcasing their potential for
both academic and practical applications in the
field.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kumar:2024:ESC,
author = "Pradeep Kumar and Guo-Liang Shih and Bo-Lin Guo and
Siva Kumar Nagi and Yibeltal Chanie Manie and Cheng-Kai
Yao and Michael Augustine Arockiyadoss and Peng-Chun
Peng",
title = "Enhancing Smart City Safety and Utilizing {AI} Expert
Systems for Violence Detection",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "50",
day = "31",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020050",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/50",
abstract = "Violent attacks have been one of the hot issues in
recent years. In the presence of closed-circuit
televisions (CCTVs) in smart cities, there is an
emerging challenge in apprehending criminals, leading
to a need for innovative solutions. In this paper, the
propose a model aimed at enhancing real-time emergency
response capabilities and swiftly identifying
criminals. This initiative aims to foster a safer
environment and better manage criminal activity within
smart cities. The proposed architecture combines an
image-to-image stable diffusion model with violence
detection and pose estimation approaches. The diffusion
model generates synthetic data while the object
detection approach uses YOLO v7 to identify violent
objects like baseball bats, knives, and pistols,
complemented by MediaPipe for action detection.
Further, a long short-term memory (LSTM) network
classifies the action attacks involving violent
objects. Subsequently, an ensemble consisting of an
edge device and the entire proposed model is deployed
onto the edge device for real-time data testing using a
dash camera. Thus, this study can handle violent
attacks and send alerts in emergencies. As a result,
our proposed YOLO model achieves a mean average
precision (MAP) of 89.5\% for violent attack detection,
and the LSTM classifier model achieves an accuracy of
88.33\% for violent action classification. The results
highlight the model's enhanced capability to accurately
detect violent objects, particularly in effectively
identifying violence through the implemented artificial
intelligence system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Saadatfar:2024:NDG,
author = "Hamid Saadatfar and Hamid Gholampour Ahangar and Javad
Hassannataj Joloudari",
title = "A New Dynamic Game-Based Pricing Model for Cloud
Environment",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "49",
day = "31",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020049",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/49",
abstract = "Resource pricing in cloud computing has become one of
the main challenges for cloud providers. The challenge
is determining a fair and appropriate price to satisfy
users and resource providers. To establish a
justifiable price, it is imperative to take into
account the circumstances and requirements of both the
provider and the user. This research tries to provide a
pricing mechanism for cloud computing based on game
theory. The suggested approach considers three aspects:
the likelihood of faults, the interplay among virtual
machines, and the amount of energy used, in order to
determine a justifiable price. In the game that is
being proposed, the provider is responsible for
determining the price of the virtual machine that can
be made available to the user on each physical machine.
The user, on the other hand, has the authority to
choose between the virtual machines that are offered in
order to run their application. The whole game is
implemented as a function of the resource broker
component. The proposed mechanism is simulated and
evaluated using the CloudSim simulator. Its performance
is compared with several previous recent mechanisms.
The results indicate that the suggested mechanism has
successfully identified a more rational price for both
the user and the provider, consequently enhancing the
overall profitability of the cloud system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Assiri:2024:EPA,
author = "Azizah Assiri and Hassen Sallay",
title = "Efficient Privacy-Aware Forwarding for Enhanced
Communication Privacy in Opportunistic Mobile Social
Networks",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "48",
day = "31",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020048",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/48",
abstract = "Opportunistic mobile social networks (OMSNs) have
become increasingly popular in recent years due to the
rise of social media and smartphones. However, message
forwarding and sharing social information through
intermediary nodes on OMSNs raises privacy concerns as
personal data and activities become more exposed.
Therefore, maintaining privacy without limiting
efficient social interaction is a challenging task.
This paper addresses this specific problem of
safeguarding user privacy during message forwarding by
integrating a privacy layer on the state-of-the-art
OMSN routing decision models that empowers users to
control their message dissemination. Mainly, we present
three user-centric privacy-aware forwarding modes
guiding the selection of the next hop in the forwarding
path based on social metrics such as common friends and
exchanged messages between OMSN nodes. More
specifically, we define different social relationship
strengths approximating real-world scenarios (familiar,
weak tie, stranger) and trust thresholds to give users
choices on trust levels for different social contexts
and guide the routing decisions. We evaluate the
privacy enhancement and network performance through
extensive simulations using ONE simulator for several
routing schemes (Epidemic, Prophet, and Spray and Wait)
and different movement models (random way, bus, and
working day). We demonstrate that our modes can enhance
privacy by up to 45\% in various network scenarios, as
measured by the reduction in the likelihood of
unintended message propagation, while keeping the
message-delivery process effective and efficient.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gkontzis:2024:EUR,
author = "Andreas F. Gkontzis and Sotiris Kotsiantis and
Georgios Feretzakis and Vassilios S. Verykios",
title = "Enhancing Urban Resilience: Smart City Data Analyses,
Forecasts, and Digital Twin Techniques at the
Neighborhood Level",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "47",
day = "30",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020047",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/47",
abstract = "Smart cities, leveraging advanced data analytics,
predictive models, and digital twin techniques, offer a
transformative model for sustainable urban development.
Predictive analytics is critical to proactive planning,
enabling cities to adapt to evolving challenges.
Concurrently, digital twin techniques provide a virtual
replica of the urban environment, fostering real-time
monitoring, simulation, and analysis of urban systems.
This study underscores the significance of real-time
monitoring, simulation, and analysis of urban systems
to support test scenarios that identify bottlenecks and
enhance smart city efficiency. This paper delves into
the crucial roles of citizen report analytics,
prediction, and digital twin technologies at the
neighborhood level. The study integrates extract,
transform, load (ETL) processes, artificial
intelligence (AI) techniques, and a digital twin
methodology to process and interpret urban data streams
derived from citizen interactions with the city's
coordinate-based problem mapping platform. Using an
interactive GeoDataFrame within the digital twin
methodology, dynamic entities facilitate simulations
based on various scenarios, allowing users to
visualize, analyze, and predict the response of the
urban system at the neighborhood level. This approach
reveals antecedent and predictive patterns, trends, and
correlations at the physical level of each city area,
leading to improvements in urban functionality,
resilience, and resident quality of life.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Corda:2024:CAB,
author = "Erica Corda and Silvia M. Massa and Daniele Riboni",
title = "Context-Aware Behavioral Tips to Improve Sleep Quality
via Machine Learning and Large Language Models",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "46",
day = "30",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020046",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/46",
abstract = "As several studies demonstrate, good sleep quality is
essential for individuals' well-being, as a lack of
restoring sleep may disrupt different physical, mental,
and social dimensions of health. For this reason, there
is increasing interest in tools for the monitoring of
sleep based on personal sensors. However, there are
currently few context-aware methods to help individuals
to improve their sleep quality through behavior change
tips. In order to tackle this challenge, in this paper,
we propose a system that couples machine learning
algorithms and large language models to forecast the
next night's sleep quality, and to provide
context-aware behavior change tips to improve sleep. In
order to encourage adherence and to increase trust, our
system includes the use of large language models to
describe the conditions that the machine learning
algorithm finds harmful to sleep health, and to explain
why the behavior change tips are generated as a
consequence. We develop a prototype of our system,
including a smartphone application, and perform
experiments with a set of users. Results show that our
system's forecast is correlated to the actual sleep
quality. Moreover, a preliminary user study suggests
that the use of large language models in our system is
useful in increasing trust and engagement.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Aftowicz:2024:NPU,
author = "Marcin Aftowicz and Ievgen Kabin and Zoya Dyka and
Peter Langend{\"o}rfer",
title = "Non-Profiled Unsupervised Horizontal Iterative Attack
against Hardware Elliptic Curve Scalar Multiplication
Using Machine Learning",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "45",
day = "29",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020045",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/45",
abstract = "While IoT technology makes industries, cities, and
homes smarter, it also opens the door to security
risks. With the right equipment and physical access to
the devices, the attacker can leverage side-channel
information, like timing, power consumption, or
electromagnetic emanation, to compromise cryptographic
operations and extract the secret key. This work
presents a side channel analysis of a cryptographic
hardware accelerator for the Elliptic Curve Scalar
Multiplication operation, implemented in a
Field-Programmable Gate Array and as an
Application-Specific Integrated Circuit. The presented
framework consists of initial key extraction using a
state-of-the-art statistical horizontal attack and is
followed by regularized Artificial Neural Networks,
which take, as input, the partially incorrect key
guesses from the horizontal attack and correct them
iteratively. The initial correctness of the horizontal
attack, measured as the fraction of correctly extracted
bits of the secret key, was improved from 75\% to 98\%
by applying the iterative learning.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kempelis:2024:CVM,
author = "Arturs Kempelis and Inese Polaka and Andrejs Romanovs
and Antons Patlins",
title = "Computer Vision and Machine Learning-Based Predictive
Analysis for Urban Agricultural Systems",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "44",
day = "28",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020044",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/44",
abstract = "Urban agriculture presents unique challenges,
particularly in the context of microclimate monitoring,
which is increasingly important in food production.
This paper explores the application of convolutional
neural networks (CNNs) to forecast key sensor
measurements from thermal images within this context.
This research focuses on using thermal images to
forecast sensor measurements of relative air humidity,
soil moisture, and light intensity, which are integral
to plant health and productivity in urban farming
environments. The results indicate a higher accuracy in
forecasting relative air humidity and soil moisture
levels, with Mean Absolute Percentage Errors (MAPEs)
within the range of 10--12\%. These findings correlate
with the strong dependency of these parameters on
thermal patterns, which are effectively extracted by
the CNNs. In contrast, the forecasting of light
intensity proved to be more challenging, yielding lower
accuracy. The reduced performance is likely due to the
more complex and variable factors that affect light in
urban environments. The insights gained from the higher
predictive accuracy for relative air humidity and soil
moisture may inform targeted interventions for urban
farming practices, while the lower accuracy in light
intensity forecasting highlights the need for further
research into the integration of additional data
sources or hybrid modeling approaches. The conclusion
suggests that the integration of these technologies can
significantly enhance the predictive maintenance of
plant health, leading to more sustainable and efficient
urban farming practices. However, the study also
acknowledges the challenges in implementing these
technologies in urban agricultural models.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gonzalez-Ambriz:2024:SGB,
author = "Sergio Jes{\'u}s Gonz{\'a}lez-Ambriz and Rolando
Menchaca-M{\'e}ndez and Sergio Alejandro
Pinacho-Castellanos and Mario Eduardo
Rivero-{\'A}ngeles",
title = "A Spectral Gap-Based Topology Control Algorithm for
Wireless Backhaul Networks",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "43",
day = "26",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020043",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/43",
abstract = "This paper presents the spectral gap-based topology
control algorithm (SGTC) for wireless backhaul
networks, a novel approach that employs the Laplacian
Spectral Gap (LSG) to find expander-like graphs that
optimize the topology of the network in terms of
robustness, diameter, energy cost, and network entropy.
The latter measures the network's ability to promote
seamless traffic offloading from the Macro Base
Stations to smaller cells by providing a high diversity
of shortest paths connecting all the stations. Given
the practical constraints imposed by cellular
technologies, the proposed algorithm uses simulated
annealing to search for feasible network topologies
with a large LSG. Then, it computes the Pareto front of
the set of feasible solutions found during the
annealing process when considering robustness,
diameter, and entropy as objective functions. The
algorithm's result is the Pareto efficient solution
that minimizes energy cost. A set of experimental
results shows that by optimizing the LSG, the proposed
algorithm simultaneously optimizes the set of desirable
topological properties mentioned above. The results
also revealed that generating networks with good
spectral expansion is possible even under the
restrictions imposed by current wireless technologies.
This is a desirable feature because these networks have
strong connectivity properties even if they do not have
a large number of links.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Karras:2024:TAB,
author = "Aristeidis Karras and Anastasios Giannaros and
Christos Karras and Leonidas Theodorakopoulos and
Constantinos S. Mammassis and George A. Krimpas and
Spyros Sioutas",
title = "{TinyML} Algorithms for Big Data Management in
Large-Scale {IoT} Systems",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "42",
day = "25",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020042",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/42",
abstract = "In the context of the Internet of Things (IoT), Tiny
Machine Learning (TinyML) and Big Data, enhanced by
Edge Artificial Intelligence, are essential for
effectively managing the extensive data produced by
numerous connected devices. Our study introduces a set
of TinyML algorithms designed and developed to improve
Big Data management in large-scale IoT systems. These
algorithms, named TinyCleanEDF, EdgeClusterML,
CompressEdgeML, CacheEdgeML, and TinyHybridSenseQ,
operate together to enhance data processing, storage,
and quality control in IoT networks, utilizing the
capabilities of Edge AI. In particular, TinyCleanEDF
applies federated learning for Edge-based data cleaning
and anomaly detection. EdgeClusterML combines
reinforcement learning with self-organizing maps for
effective data clustering. CompressEdgeML uses neural
networks for adaptive data compression. CacheEdgeML
employs predictive analytics for smart data caching,
and TinyHybridSenseQ concentrates on data quality
evaluation and hybrid storage strategies. Our
experimental evaluation of the proposed techniques
includes executing all the algorithms in various
numbers of Raspberry Pi devices ranging from one to
ten. The experimental results are promising as we
outperform similar methods across various evaluation
metrics. Ultimately, we anticipate that the proposed
algorithms offer a comprehensive and efficient approach
to managing the complexities of IoT, Big Data, and Edge
AI.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Nitu:2024:BLB,
author = "Melania Nitu and Mihai Dascalu",
title = "Beyond Lexical Boundaries: {LLM}-Generated Text
Detection for {Romanian} Digital Libraries",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "41",
day = "25",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020041",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/41",
abstract = "Machine-generated content reshapes the landscape of
digital information; hence, ensuring the authenticity
of texts within digital libraries has become a
paramount concern. This work introduces a corpus of
approximately 60 k Romanian documents, including
human-written samples as well as generated texts using
six distinct Large Language Models (LLMs) and three
different generation methods. Our robust experimental
dataset covers five domains, namely books, news, legal,
medical, and scientific publications. The exploratory
text analysis revealed differences between
human-authored and artificially generated texts,
exposing the intricacies of lexical diversity and
textual complexity. Since Romanian is a less-resourced
language requiring dedicated detectors on which
out-of-the-box solutions do not work, this paper
introduces two techniques for discerning
machine-generated texts. The first method leverages a
Transformer-based model to categorize texts as human or
machine-generated, while the second method extracts and
examines linguistic features, such as identifying the
top textual complexity indices via Kruskal--Wallis mean
rank and computes burstiness, which are further fed
into a machine-learning model leveraging an extreme
gradient-boosting decision tree. The methods show
competitive performance, with the first technique's
results outperforming the second one in two out of five
domains, reaching an F1 score of 0.96. Our study also
includes a text similarity analysis between
human-authored and artificially generated texts,
coupled with a SHAP analysis to understand which
linguistic features contribute more to the classifier's
decision.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hossain:2024:HAI,
author = "Mahmud Hossain and Golam Kayas and Ragib Hasan and
Anthony Skjellum and Shahid Noor and S. M. Riazul
Islam",
title = "A Holistic Analysis of {Internet of Things} {(IoT)}
Security: Principles, Practices, and New Perspectives",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "40",
day = "24",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020040",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/40",
abstract = "Driven by the rapid escalation of its utilization, as
well as ramping commercialization, Internet of Things
(IoT) devices increasingly face security threats. Apart
from denial of service, privacy, and safety concerns,
compromised devices can be used as enablers for
committing a variety of crime and e-crime. Despite
ongoing research and study, there remains a significant
gap in the thorough analysis of security challenges,
feasible solutions, and open secure problems for IoT.
To bridge this gap, we provide a comprehensive overview
of the state of the art in IoT security with a critical
investigation-based approach. This includes a detailed
analysis of vulnerabilities in IoT-based systems and
potential attacks. We present a holistic review of the
security properties required to be adopted by IoT
devices, applications, and services to mitigate IoT
vulnerabilities and, thus, successful attacks.
Moreover, we identify challenges to the design of
security protocols for IoT systems in which constituent
devices vary markedly in capability (such as storage,
computation speed, hardware architecture, and
communication interfaces). Next, we review existing
research and feasible solutions for IoT security. We
highlight a set of open problems not yet addressed
among existing security solutions. We provide a set of
new perspectives for future research on such issues
including secure service discovery, on-device
credential security, and network anomaly detection. We
also provide directions for designing a forensic
investigation framework for IoT infrastructures to
inspect relevant criminal cases, execute a cyber
forensic process, and determine the facts about a given
incident. This framework offers a means to better
capture information on successful attacks as part of a
feedback mechanism to thwart future vulnerabilities and
threats. This systematic holistic review will both
inform on current challenges in IoT security and
ideally motivate their future resolution.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lopes:2024:VTP,
author = "Ricardo Lopes and Marcello Trovati and Ella Pereira",
title = "Volumetric Techniques for Product Routing and Loading
Optimisation in {Industry 4.0}: a Review",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "39",
day = "24",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020039",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/39",
abstract = "Industry 4.0 has become a crucial part in the majority
of processes, components, and related modelling, as
well as predictive tools that allow a more efficient,
automated and sustainable approach to industry. The
availability of large quantities of data, and the
advances in IoT, AI, and data-driven frameworks, have
led to an enhanced data gathering, assessment, and
extraction of actionable information, resulting in a
better decision-making process. Product picking and its
subsequent packing is an important area, and has drawn
increasing attention for the research community.
However, depending of the context, some of the related
approaches tend to be either highly mathematical, or
applied to a specific context. This article aims to
provide a survey on the main methods, techniques, and
frameworks relevant to product packing and to highlight
the main properties and features that should be further
investigated to ensure a more efficient and optimised
approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ma:2024:RSS,
author = "Min Ma and Shanrong Liu and Shufei Wang and Shengnan
Shi",
title = "Refined Semi-Supervised Modulation Classification:
Integrating Consistency Regularization and
Pseudo-Labeling Techniques",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "38",
day = "23",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020038",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/38",
abstract = "Automatic modulation classification (AMC) plays a
crucial role in wireless communication by identifying
the modulation scheme of received signals, bridging
signal reception and demodulation. Its main challenge
lies in performing accurate signal processing without
prior information. While deep learning has been applied
to AMC, its effectiveness largely depends on the
availability of labeled samples. To address the
scarcity of labeled data, we introduce a novel
semi-supervised AMC approach combining consistency
regularization and pseudo-labeling. This method
capitalizes on the inherent data distribution of
unlabeled data to supplement the limited labeled data.
Our approach involves a dual-component objective
function for model training: one part focuses on the
loss from labeled data, while the other addresses the
regularized loss for unlabeled data, enhanced through
two distinct levels of data augmentation. These
combined losses concurrently refine the model
parameters. Our method demonstrates superior
performance over established benchmark algorithms, such
as decision trees (DTs), support vector machines
(SVMs), pi-models, and virtual adversarial training
(VAT). It exhibits a marked improvement in the
recognition accuracy, particularly when the proportion
of labeled samples is as low as 1--4\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pokhrel:2024:DME,
author = "Shiva Raj Pokhrel and Jonathan Kua and Deol Satish and
Sebnem Ozer and Jeff Howe and Anwar Walid",
title = "{DDPG-MPCC}: an Experience Driven Multipath
Performance Oriented Congestion Control",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "2",
pages = "37",
day = "23",
month = jan,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16020037",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:35 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/2/37",
abstract = "We introduce a novel multipath data transport approach
at the transport layer referred to as ` Deep
Deterministic Policy Gradient for Multipath
Performance-oriented Congestion Control ' (DDPG-MPCC),
which leverages deep reinforcement learning to enhance
congestion management in multipath networks. Our method
combines DDPG with online convex optimization to
optimize fairness and performance in simultaneously
challenging multipath internet congestion control
scenarios. Through experiments by developing kernel
implementation, we show how DDPG-MPCC performs compared
to the state-of-the-art solutions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Norbu:2024:FAT,
author = "Tenzin Norbu and Joo Yeon Park and Kok Wai Wong and
Hui Cui",
title = "Factors Affecting Trust and Acceptance for Blockchain
Adoption in Digital Payment Systems: a Systematic
Review",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "106",
day = "21",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030106",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/106",
abstract = "Blockchain technology has become significant for
financial sectors, especially digital payment systems,
offering enhanced security, transparency, and
efficiency. However, there is limited research on the
factors influencing user trust in and acceptance of
blockchain adoption in digital payment systems. This
systematic review provides insight into the key factors
impacting consumers' perceptions and behaviours towards
embracing blockchain technology. A total of 1859
studies were collected, with 48 meeting the criteria
for comprehensive analysis. The results showed that
security, privacy, transparency, and regulation are the
most significant factors influencing trust for
blockchain adoption. The most influential factors
identified in the Unified Theory of Acceptance and Use
of Technology (UTAUT) model include performance
expectancy, effort expectancy, social influence, and
facilitating conditions. Incorporating a trust and
acceptance model could be a viable approach to tackling
obstacles and ensuring the successful integration of
blockchain technology into digital payment systems.
Understanding these factors is crucial for creating a
favourable atmosphere for adopting blockchain
technology in digital payments. User-perspective
research on blockchain adoption in digital payment
systems is still insufficient, and this aspect still
requires further investigation. Blockchain adoption in
digital payment systems has not been sufficiently
conducted from the user's perspective, and there is a
scope for it to be carried out. This review aims to
shed light on the factors of trust in and acceptance of
blockchain adoption in digital payment systems so that
the full potential of blockchain technology can be
realised. Understanding these factors and their
intricate connections is imperative in fostering a
conducive environment for the widespread acceptance of
blockchain technology in digital payments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jiang:2024:UCM,
author = "Shui Jiang and Yanning Ge and Xu Yang and Wencheng
Yang and Hui Cui",
title = "{UAV} Control Method Combining Reptile
Meta-Reinforcement Learning and Generative Adversarial
Imitation Learning",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "105",
day = "20",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030105",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/105",
abstract = "Reinforcement learning (RL) is pivotal in empowering
Unmanned Aerial Vehicles (UAVs) to navigate and make
decisions efficiently and intelligently within complex
and dynamic surroundings. Despite its significance, RL
is hampered by inherent limitations such as low sample
efficiency, restricted generalization capabilities, and
a heavy reliance on the intricacies of reward function
design. These challenges often render single-method RL
approaches inadequate, particularly in the context of
UAV operations where high costs and safety risks in
real-world applications cannot be overlooked. To
address these issues, this paper introduces a novel RL
framework that synergistically integrates meta-learning
and imitation learning. By leveraging the Reptile
algorithm from meta-learning and Generative Adversarial
Imitation Learning (GAIL), coupled with state
normalization techniques for processing state data,
this framework significantly enhances the model's
adaptability. It achieves this by identifying and
leveraging commonalities across various tasks, allowing
for swift adaptation to new challenges without the need
for complex reward function designs. To ascertain the
efficacy of this integrated approach, we conducted
simulation experiments within both two-dimensional
environments. The empirical results clearly indicate
that our GAIL-enhanced Reptile method surpasses
conventional single-method RL algorithms in terms of
training efficiency. This evidence underscores the
potential of combining meta-learning and imitation
learning to surmount the traditional barriers faced by
reinforcement learning in UAV trajectory planning and
decision-making processes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Miguel:2024:UCV,
author = "Joaquim Miguel and Pedro Mendon{\c{c}}a and Agnelo
Quelhas and Jo{\~a}o M. L. P. Caldeira and Vasco N. G.
J. Soares",
title = "Using Computer Vision to Collect Information on
Cycling and Hiking Trails Users",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "104",
day = "20",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030104",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/104",
abstract = "Hiking and cycling have become popular activities for
promoting well-being and physical activity. Portugal
has been investing in hiking and cycling trail
infrastructures to boost sustainable tourism. However,
the lack of reliable data on the use of these trails
means that the times of greatest affluence or the type
of user who makes the most use of them are not
recorded. These data are of the utmost importance to
the managing bodies, with which they can adjust their
actions to improve the management, maintenance,
promotion, and use of the infrastructures for which
they are responsible. The aim of this work is to
present a review study on projects, techniques, and
methods that can be used to identify and count the
different types of users on these trails. The most
promising computer vision techniques are identified and
described: YOLOv3-Tiny, MobileNet-SSD V2, and
FasterRCNN with ResNet-50. Their performance is
evaluated and compared. The results observed can be
very useful for proposing future prototypes. The
challenges, future directions, and research
opportunities are also discussed.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Moreno-Vozmediano:2024:IRO,
author = "Rafael Moreno-Vozmediano and Rub{\'e}n S. Montero and
Eduardo Huedo and Ignacio M. Llorente",
title = "Intelligent Resource Orchestration for {5G} Edge
Infrastructures",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "103",
day = "19",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030103",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/103",
abstract = "The adoption of edge infrastructure in 5G environments
stands out as a transformative technology aimed at
meeting the increasing demands of latency-sensitive and
data-intensive applications. This research paper
presents a comprehensive study on the intelligent
orchestration of 5G edge computing infrastructures. The
proposed Smart 5G Edge-Cloud Management Architecture,
built upon an OpenNebula foundation, incorporates a
ONEedge5G experimental component, which offers
intelligent workload forecasting and infrastructure
orchestration and automation capabilities, for optimal
allocation of virtual resources across diverse edge
locations. The research evaluated different forecasting
models, based both on traditional statistical
techniques and machine learning techniques, comparing
their accuracy in CPU usage prediction for a dataset of
virtual machines (VMs). Additionally, an integer linear
programming formulation was proposed to solve the
optimization problem of mapping VMs to physical servers
in distributed edge infrastructure. Different
optimization criteria such as minimizing server usage,
load balancing, and reducing latency violations were
considered, along with mapping constraints.
Comprehensive tests and experiments were conducted to
evaluate the efficacy of the proposed architecture.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zu:2024:SMS,
author = "Lijun Zu and Wenyu Qi and Hongyi Li and Xiaohua Men
and Zhihui Lu and Jiawei Ye and Liang Zhang",
title = "{UP-SDCG}: a Method of Sensitive Data Classification
for Collaborative Edge Computing in Financial Cloud
Environment",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "102",
day = "18",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030102",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/102",
abstract = "The digital transformation of banks has led to a
paradigm shift, promoting the open sharing of data and
services with third-party providers through APIs, SDKs,
and other technological means. While data sharing
brings personalized, convenient, and enriched services
to users, it also introduces security risks, including
sensitive data leakage and misuse, highlighting the
importance of data classification and grading as the
foundational pillar of security. This paper presents a
cloud-edge collaborative banking data open application
scenario, focusing on the critical need for an accurate
and automated sensitive data classification and
categorization method. The regulatory outpost module
addresses this requirement, aiming to enhance the
precision and efficiency of data classification.
Firstly, regulatory policies impose strict requirements
concerning data protection. Secondly, the sheer volume
of business and the complexity of the work situation
make it impractical to rely on manual experts, as they
incur high labor costs and are unable to guarantee
significant accuracy. Therefore, we propose a scheme
UP-SDCG for automatically classifying and grading
financially sensitive structured data. We developed a
financial data hierarchical classification library.
Additionally, we employed library augmentation
technology and implemented a synonym discrimination
model. We conducted an experimental analysis using
simulation datasets, where UP-SDCG achieved precision
surpassing 95\%, outperforming the other three
comparison models. Moreover, we performed real-world
testing in financial institutions, achieving good
detection results in customer data, supervision, and
additional in personally sensitive information,
aligning with application goals. Our ongoing work will
extend the model's capabilities to encompass
unstructured data classification and grading,
broadening the scope of application.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pozzebon:2024:EFC,
author = "Alessandro Pozzebon",
title = "Edge and Fog Computing for the {Internet of Things}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "101",
day = "16",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030101",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/101",
abstract = "Over the last years few years, the number of
interconnected devices within the context of Internet
of Things (IoT) has rapidly grown; some statistics
state that the total number of IoT-connected devices in
2023 has reached the groundbreaking number of 17
billion [\ldots{}]",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kalyani:2024:ASD,
author = "Yogeswaranathan Kalyani and Liam Vorster and Rebecca
Whetton and Rem Collier",
title = "Application Scenarios of Digital Twins for Smart Crop
Farming through Cloud--Fog--Edge Infrastructure",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "100",
day = "16",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030100",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/100",
abstract = "In the last decade, digital twin (DT) technology has
received considerable attention across various domains,
such as manufacturing, smart healthcare, and smart
cities. The digital twin represents a digital
representation of a physical entity, object, system, or
process. Although it is relatively new in the
agricultural domain, it has gained increasing attention
recently. Recent reviews of DTs show that this
technology has the potential to revolutionise
agriculture management and activities. It can also
provide numerous benefits to all agricultural
stakeholders, including farmers, agronomists,
researchers, and others, in terms of making decisions
on various agricultural processes. In smart crop
farming, DTs help simulate various farming tasks like
irrigation, fertilisation, nutrient management, and
pest control, as well as access real-time data and
guide farmers through `what-if' scenarios. By utilising
the latest technologies, such as cloud--fog--edge
computing, multi-agent systems, and the semantic web,
farmers can access real-time data and analytics. This
enables them to make accurate decisions about
optimising their processes and improving efficiency.
This paper presents a proposed architectural framework
for DTs, exploring various potential application
scenarios that integrate this architecture. It also
analyses the benefits and challenges of implementing
this technology in agricultural environments.
Additionally, we investigate how cloud--fog--edge
computing contributes to developing decentralised,
real-time systems essential for effective management
and monitoring in agriculture.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Quarati:2024:LOG,
author = "Alfonso Quarati and Riccardo Albertoni",
title = "Linked Open Government Data: Still a Viable Option for
Sharing and Integrating Public Data?",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "99",
day = "15",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030099",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/99",
abstract = "Linked Data (LD) principles, when applied to Open
Government Data (OGD), aim to make government data
accessible and interconnected, unlocking its full
potential and facilitating widespread reuse. As a
modular and scalable solution to fragmented government
data, Linked Open Government Data (LOGD) improve
citizens' understanding of government functions while
promoting greater data interoperability, ultimately
leading to more efficient government processes.
However, despite promising developments in the early
2010s, including the release of LOGD datasets by some
government agencies, and studies and methodological
proposals by numerous scholars, a cursory examination
of government websites and portals suggests that
interest in this technology has gradually waned. Given
the initial expectations surrounding LOGD, this paper
goes beyond a superficial analysis and provides a
deeper insight into the evolution of interest in LOGD
by raising questions about the extent to which the
dream of LD has influenced the reality of OGD and
whether it remains sustainable.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{BinSaif:2024:ESD,
author = "Muhammad {Bin Saif} and Sara Migliorini and Fausto
Spoto",
title = "Efficient and Secure Distributed Data Storage and
Retrieval Using Interplanetary File System and
Blockchain",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "98",
day = "15",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030098",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/98",
abstract = "Blockchain technology has been successfully applied in
recent years to promote the immutability, traceability,
and authenticity of previously collected and stored
data. However, the amount of data stored in the
blockchain is usually limited for economic and
technological issues. Namely, the blockchain usually
stores only a fingerprint of data, such as the hash of
data, while full, raw information is stored off-chain.
This is generally enough to guarantee immutability and
traceability, but misses to support another important
property, that is, data availability. This is
particularly true when a traditional, centralized
database is chosen for off-chain storage. For this
reason, many proposals try to properly combine
blockchain with decentralized IPFS storage. However,
the storage of data on IPFS could pose some privacy
problems. This paper proposes a solution that properly
combines blockchain, IPFS, and encryption techniques to
guarantee immutability, traceability, availability, and
data privacy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{LeuchAlencar:2024:DFI,
author = "Ancilon {Leuch Alencar} and Marcelo {Dornbusch Lopes}
and Anita Maria {da Rocha Fernandes} and Julio Cesar
{Santos dos Anjos} and Juan Francisco {De Paz Santana}
and Valderi Reis {Quietinho Leithardt}",
title = "Detection of Forged Images Using a Combination of
Passive Methods Based on Neural Networks",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "97",
day = "14",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030097",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/97",
abstract = "In the current era of social media, the proliferation
of images sourced from unreliable origins underscores
the pressing need for robust methods to detect forged
content, particularly amidst the rapid evolution of
image manipulation technologies. Existing literature
delineates two primary approaches to image manipulation
detection: active and passive. Active techniques
intervene preemptively, embedding structures into
images to facilitate subsequent authenticity
verification, whereas passive methods analyze image
content for traces of manipulation. This study presents
a novel solution to image manipulation detection by
leveraging a multi-stream neural network architecture.
Our approach harnesses three convolutional neural
networks (CNNs) operating on distinct data streams
extracted from the original image. We have developed a
solution based on two passive detection methodologies.
The system utilizes two separate streams to extract
specific data subsets, while a third stream processes
the unaltered image. Each net independently processes
its respective data stream, capturing diverse facets of
the image. The outputs from these nets are then fused
through concatenation to ascertain whether the image
has undergone manipulation, yielding a comprehensive
detection framework surpassing the efficacy of its
constituent methods. Our work introduces a unique
dataset derived from the fusion of four publicly
available datasets, featuring organically manipulated
images that closely resemble real-world scenarios. This
dataset offers a more authentic representation than
other state-of-the-art methods that use algorithmically
generated datasets based on image patches. By
encompassing genuine manipulation scenarios, our
dataset enhances the model's ability to generalize
across varied manipulation techniques, thereby
improving its performance in real-world settings. After
training, the merged approach obtained an accuracy of
89.59\% in the set of validation images, significantly
higher than the model trained with only unaltered
images, which obtained 78.64\%, and the two other
models trained using images with a feature selection
method applied to enhance inconsistencies that obtained
68.02\% for Error-Level Analysis images and 50.70\% for
the method using Discrete Wavelet Transform. Moreover,
our proposed approach exhibits reduced accuracy
variance compared to alternative models, underscoring
its stability and robustness across diverse datasets.
The approach outlined in this work needs to provide
information about the specific location or type of
tempering, which limits its practical applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Xing:2024:MIS,
author = "Mengchi Xing and Haojiang Deng and Rui Han",
title = "A Method for {5G--ICN} Seamless Mobility Support Based
on Router Buffered Data",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "96",
day = "13",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030096",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/96",
abstract = "The 5G core network adopts a Control and User Plane
Separation (CUPS) architecture to meet the challenges
of low-latency business requirements. In this
architecture, a balance between management costs and
User Experience (UE) is achieved by moving User Plane
Function (UPF) to the edge of the network. However,
cross-UPF handover during communication between the UE
and the remote server will cause TCP/IP session
interruption and affect continuity of delay-sensitive
real-time communication continuity. Information-Centric
Networks (ICNs) separate identity and location, and
their ability to route based on identity can
effectively handle mobility. Therefore, based on the
5G-ICN architecture, we propose a seamless mobility
support method based on router buffered data (BDMM),
making full use of the ICN's identity-based routing
capabilities to solve the problem of UE cross-UPF
handover affecting business continuity. BDMM also uses
the ICN router data buffering capabilities to reduce
packet loss during handovers. We design a dynamic
buffer resource allocation strategy (DBRAS) that can
adjust the buffer resource allocation results in time
according to network traffic changes and business types
to solve the problem of unreasonable buffer resource
allocation. Finally, experimental results show that our
method outperforms other methods in terms of average
packet delay, weighted average packet loss rate, and
network overhead. In addition, our method also has good
performance in average handover delay.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lai:2024:PFL,
author = "Ying-Hsun Lai and Shin-Yeh Chen and Wen-Chi Chou and
Hua-Yang Hsu and Han-Chieh Chao",
title = "Personalized Federated Learning with Adaptive Feature
Extraction and Category Prediction in Non-{IID}
Datasets",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "95",
day = "11",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030095",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/95",
abstract = "Federated learning trains a neural network model using
the client's data to maintain the benefits of
centralized model training while maintaining their
privacy. However, if the client data are not
independently and identically distributed (non-IID)
because of different environments, the accuracy of the
model may suffer from client drift during training
owing to discrepancies in each client's data. This
study proposes a personalized federated learning
algorithm based on the concept of multitask learning to
divide each client model into two layers: a feature
extraction layer and a category prediction layer. The
feature extraction layer maps the input data to a
low-dimensional feature vector space. Furthermore, the
parameters of the neural network are aggregated with
those of other clients using an adaptive method. The
category prediction layer maps low-dimensional feature
vectors to the label sample space, with its parameters
remaining unaffected by other clients to maintain
client uniqueness. The proposed personalized federated
learning method produces faster learning model
convergence rates and higher accuracy rates for the
non-IID datasets in our experiments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yao:2024:DIO,
author = "Yu Yao and Quan Qian",
title = "Dynamic Industrial Optimization: a Framework
Integrates Online Machine Learning for Processing
Parameters Design",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "94",
day = "10",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030094",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/94",
abstract = "We develop the online process parameter design (OPPD)
framework for efficiently handling streaming data
collected from industrial automation equipment. This
framework integrates online machine learning, concept
drift detection and Bayesian optimization techniques.
Initially, concept drift detection mitigates the impact
of anomalous data on model updates. Data without
concept drift are used for online model training and
updating, enabling accurate predictions for the next
processing cycle. Bayesian optimization is then
employed for inverse optimization and process parameter
design. Within OPPD, we introduce the online
accelerated support vector regression (OASVR) algorithm
for enhanced computational efficiency and model
accuracy. OASVR simplifies support vector regression,
boosting both speed and durability. Furthermore, we
incorporate a dynamic window mechanism to regulate the
training data volume for adapting to real-time demands
posed by diverse online scenarios. Concept drift
detection uses the EI-kMeans algorithm, and the
Bayesian inverse design employs an upper confidence
bound approach with an adaptive learning rate. Applied
to single-crystal fabrication, the OPPD framework
outperforms other models, with an RMSE of 0.12, meeting
precision demands in production.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Almudayni:2024:IIM,
author = "Ziyad Almudayni and Ben Soh and Alice Li",
title = "{IMBA}: {IoT}-Mist Bat-Inspired Algorithm for
Optimising Resource Allocation in {IoT} Networks",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "93",
day = "08",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030093",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/93",
abstract = "The advent of the Internet of Things (IoT) has
revolutionised our interaction with the environment,
facilitating seamless connections among sensors,
actuators, and humans. Efficient task scheduling stands
as a cornerstone in maximising resource utilisation and
ensuring timely task execution in IoT systems. The
implementation of efficient task scheduling
methodologies can yield substantial enhancements in
productivity and cost-effectiveness for IoT
infrastructures. To that end, this paper presents the
IoT-mist bat-inspired algorithm (IMBA), designed
specifically to optimise resource allocation in IoT
environments. IMBA's efficacy lies in its ability to
elevate user service quality through enhancements in
task completion rates, load distribution, network
utilisation, processing time, and power efficiency.
Through comparative analysis, IMBA demonstrates
superiority over traditional methods, such as fuzzy
logic and round-robin algorithms, across all
performance metrics.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Giannakoulopoulos:2024:UEF,
author = "Andreas Giannakoulopoulos and Minas Pergantis and
Aristeidis Lamprogeorgos",
title = "User Experience, Functionality and Aesthetics
Evaluation in an Academic Multi-Site {Web} Ecosystem",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "92",
day = "08",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030092",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/92",
abstract = "The present study focuses on using qualitative and
quantitative data to evaluate the functionality, user
experience (UX), and aesthetic approach offered by an
academic multi-site Web ecosystem consisting of
multiple interconnected websites. Large entities in
various industry fields often have the need for an
elaborate Web presence. In an effort to address the
challenges posed by this need specifically in the field
of academia, the authors developed, over a period of
many years, a multi-site ecosystem within the Ionian
University, which focuses on interconnectivity and a
collaborative approach to academic content management.
This system, known as ``Publish@Ionio'', uses a
singular content management infrastructure to allow for
the creation of content for different websites that
share both information and resources while at the same
time allowing for individual variations in both
functionality and aesthetics. The ecosystem was
evaluated through quantitative data from its operation
and qualitative feedback from a focus-group interview
with experts, including website editors and
administrative staff. The collected data were used to
assess the strengths and weaknesses of the multi-site
approach based on the actions and needs of the
individuals in charge of generating content. The study
led to conclusions on the advantages that
interoperability offers in terms of digital and human
resource management, the benefits of a unified
aesthetic approach that allows for variability, and the
necessity of collaborative content management tools
that are tailored to the content's nature.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Femminella:2024:IIT,
author = "Mauro Femminella and Gianluca Reali",
title = "Implementing {Internet of Things} Service Platforms
with Network Function Virtualization Serverless
Technologies",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "91",
day = "08",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030091",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/91",
abstract = "The need for adaptivity and scalability in
telecommunication systems has led to the introduction
of a software-based approach to networking, in which
network functions are virtualized and implemented in
software modules, based on network function
virtualization (NFV) technologies. The growing demand
for low latency, efficiency, flexibility and security
has placed some limitations on the adoption of these
technologies, due to some problems of traditional
virtualization solutions. However, the introduction of
lightweight virtualization approaches is paving the way
for new and better infrastructures for implementing
network functions. This article discusses these new
virtualization solutions and shows a proposal, based on
serverless computing, that uses them to implement
container-based virtualized network functions for the
delivery of advanced Internet of Things (IoT) services.
It includes open source software components to
implement both the virtualization layer, implemented
through Firecracker, and the runtime environment, based
on Kata containers. A set of experiments shows that the
proposed approach is fast, in order to boost new
network functions, and more efficient than some
baseline solutions, with minimal resource footprint.
Therefore, it is an excellent candidate to implement
NFV functions in the edge deployment of serverless
services for the IoT.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Toivonen:2024:VAH,
author = "Heidi Toivonen and Francesco Lelli",
title = "The Varieties of Agency in Human--Smart Device
Relationships: The Four Agency Profiles",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "90",
day = "07",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030090",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/90",
abstract = "This paper investigates how users of smart devices
attribute agency both to themselves and to their
devices. Statistical analyses, tag cloud analysis, and
sentiment analysis were applied on survey data
collected from 587 participants. As a result of a
preliminary factorial analysis, two independent
constructs of agency emerged: (i) user agency and (ii)
device agency. These two constructs received further
support from a sentiment analysis and a tag cloud
analysis conducted on the written responses provided in
a survey. We also studied how user agency and device
agency relate to various background variables, such as
the user's professional knowledge of smart devices. We
present a new preliminary model, where the two agency
constructs are used to conceptualize agency in
human--smart device relationships in a matrix composed
of a controller, collaborator, detached, and victim.
Our model with the constructs of user agency and device
agency fosters a richer understanding of the users'
experiences in their interactions with devices. The
results could facilitate designing interfaces that
better take into account the users' views of their own
capabilities as well as the capacities of their
devices; the findings can assist in tackling challenges
such as the feeling of lacking agency experienced by
technologically savvy users.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{ElDebeiki:2024:APP,
author = "Mostafa {El Debeiki} and Saba Al-Rubaye and Adolfo
Perrusqu{\'\i}a and Christopher Conrad and Juan
Alejandro Flores-Campos",
title = "An Advanced Path Planning and {UAV} Relay System:
Enhancing Connectivity in Rural Environments",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "89",
day = "06",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030089",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/89",
abstract = "The use of unmanned aerial vehicles (UAVs) is
increasing in transportation applications due to their
high versatility and maneuverability in complex
environments. Search and rescue is one of the most
challenging applications of UAVs due to the
non-homogeneous nature of the environmental and
communication landscapes. In particular, mountainous
areas pose difficulties due to the loss of connectivity
caused by large valleys and the volumes of hazardous
weather. In this paper, the connectivity issue in
mountainous areas is addressed using a path planning
algorithm for UAV relay. The approach is based on two
main phases: (1) the detection of areas of interest
where the connectivity signal is poor, and (2) an
energy-aware and resilient path planning algorithm that
maximizes the coverage links. The approach uses a
viewshed analysis to identify areas of visibility
between the areas of interest and the cell-towers. This
allows the construction of a blockage map that prevents
the UAV from passing through areas with no coverage,
whilst maximizing the coverage area under energy
constraints and hazardous weather. The proposed
approach is validated under open-access datasets of
mountainous zones, and the obtained results confirm the
benefits of the proposed approach for communication
networks in remote and challenging environments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lightbody:2024:DIS,
author = "Dominic Lightbody and Duc-Minh Ngo and Andriy Temko
and Colin C. Murphy and Emanuel Popovici",
title = "{Dragon\_Pi}: {IoT} Side-Channel Power Data Intrusion
Detection Dataset and Unsupervised Convolutional
Autoencoder for Intrusion Detection",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "88",
day = "05",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030088",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/88",
abstract = "The growth of the Internet of Things (IoT) has led to
a significant rise in cyber attacks and an expanded
attack surface for the average consumer. In order to
protect consumers and infrastructure, research into
detecting malicious IoT activity must be of the highest
priority. Security research in this area has two key
issues: the lack of datasets for training artificial
intelligence (AI)-based intrusion detection models and
the fact that most existing datasets concentrate only
on one type of network traffic. Thus, this study
introduces Dragon\_Pi, an intrusion detection dataset
designed for IoT devices based on side-channel power
consumption data. Dragon\_Pi comprises a collection of
normal and under-attack power consumption traces from
separate testbeds featuring a DragonBoard 410c and a
Raspberry Pi. Dragon\_Slice is trained on this dataset;
it is an unsupervised convolutional autoencoder (CAE)
trained exclusively on held-out normal slices from
Dragon\_Pi for anomaly detection. The Dragon\_Slice
network has two iterations in this study. The original
achieves 0.78 AUC without post-processing and 0.876 AUC
with post-processing. A second iteration of
Dragon\_Slice, utilising dropout to further impede the
CAE's ability to reconstruct anomalies, outperforms the
original network with a raw AUC of 0.764 and a
post-processed AUC of 0.89.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Warch:2024:ATG,
author = "Dominik Warch and Patrick Stellbauer and Pascal Neis",
title = "Advanced Techniques for Geospatial Referencing in
Online Media Repositories",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "87",
day = "01",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030087",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/87",
abstract = "In the digital transformation era, video media
libraries' untapped potential is immense, restricted
primarily by their non-machine-readable nature and
basic search functionalities limited to standard
metadata. This study presents a novel multimodal
methodology that utilizes advances in artificial
intelligence, including neural networks, computer
vision, and natural language processing, to extract and
geocode geospatial references from videos. Leveraging
the geospatial information from videos enables semantic
searches, enhances search relevance, and allows for
targeted advertising, particularly on mobile platforms.
The methodology involves a comprehensive process,
including data acquisition from ARD Mediathek, image
and text analysis using advanced machine learning
models, and audio and subtitle processing with
state-of-the-art linguistic models. Despite challenges
like model interpretability and the complexity of
geospatial data extraction, this study's findings
indicate significant potential for advancing the
precision of spatial data analysis within video
content, promising to enrich media libraries with more
navigable, contextually rich content. This advancement
has implications for user engagement, targeted
services, and broader urban planning and cultural
heritage applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Loh:2024:THS,
author = "Peter K. K. Loh and Aloysius Z. Y. Lee and Vivek
Balachandran",
title = "Towards a Hybrid Security Framework for Phishing
Awareness Education and Defense",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "86",
day = "01",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030086",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/86",
abstract = "The rise in generative Artificial Intelligence (AI)
has led to the development of more sophisticated
phishing email attacks, as well as an increase in
research on using AI to aid the detection of these
advanced attacks. Successful phishing email attacks
severely impact businesses, as employees are usually
the vulnerable targets. Defense against such attacks,
therefore, requires realizing defense along both
technological and human vectors. Security hardening
research work along the technological vector is few and
focuses mainly on the use of machine learning and
natural language processing to distinguish between
machine- and human-generated text. Common existing
approaches to harden security along the human vector
consist of third-party organized training programmes,
the content of which needs to be updated over time.
There is, to date, no reported approach that provides
both phishing attack detection and progressive end-user
training. In this paper, we present our contribution,
which includes the design and development of an
integrated approach that employs AI-assisted and
generative AI platforms for phishing attack detection
and continuous end-user education in a hybrid security
framework. This framework supports
scenario-customizable and evolving user education in
dealing with increasingly advanced phishing email
attacks. The technological design and functional
details for both platforms are presented and discussed.
Performance tests showed that the phishing attack
detection sub-system using the Convolutional Neural
Network (CNN) deep learning model architecture achieved
the best overall results: above 94\% accuracy, above
95\% precision, and above 94\% recall.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alrubayyi:2024:STP,
author = "Hadeel Alrubayyi and Moudy Sharaf Alshareef and
Zunaira Nadeem and Ahmed M. Abdelmoniem and Mona
Jaber",
title = "Security Threats and Promising Solutions Arising from
the Intersection of {AI} and {IoT}: a Study of {IoMT}
and {IoET} Applications",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "85",
day = "29",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030085",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/85",
abstract = "The hype of the Internet of Things as an enabler for
intelligent applications and related promise for
ushering accessibility, efficiency, and quality of
service is met with hindering security and data privacy
concerns. It follows that such IoT systems, which are
empowered by artificial intelligence, need to be
investigated with cognisance of security threats and
mitigation schemes that are tailored to their specific
constraints and requirements. In this work, we present
a comprehensive review of security threats in IoT and
emerging countermeasures with a particular focus on
malware and man-in-the-middle attacks. Next, we
elaborate on two use cases: the Internet of Energy
Things and the Internet of Medical Things. Innovative
artificial intelligence methods for automating energy
theft detection and stress levels are first detailed,
followed by an examination of contextual security
threats and privacy breach concerns. An artificial
immune system is employed to mitigate the risk of
malware attacks, differential privacy is proposed for
data protection, and federated learning is harnessed to
reduce data exposure.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Harnes:2024:SAT,
author = "H{\aa}kon Harnes and Donn Morrison",
title = "{SoK}: Analysis Techniques for {WebAssembly}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "84",
day = "29",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030084",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/84",
abstract = "WebAssembly is a low-level bytecode language that
enables high-level languages like C, C++, and Rust to
be executed in the browser at near-native performance.
In recent years, WebAssembly has gained widespread
adoption and is now natively supported by all modern
browsers. Despite its benefits, WebAssembly has
introduced significant security challenges, primarily
due to vulnerabilities inherited from memory-unsafe
source languages. Moreover, the use of WebAssembly
extends beyond traditional web applications to smart
contracts on blockchain platforms, where
vulnerabilities have led to significant financial
losses. WebAssembly has also been used for malicious
purposes, like cryptojacking, where website visitors'
hardware resources are used for crypto mining without
their consent. To address these issues, several
analysis techniques for WebAssembly binaries have been
proposed. This paper presents a systematic review of
these analysis techniques, focusing on vulnerability
analysis, cryptojacking detection, and smart contract
security. The analysis techniques are categorized into
static, dynamic, and hybrid methods, evaluating their
strengths and weaknesses based on quantitative data.
Our findings reveal that static techniques are
efficient but may struggle with complex binaries, while
dynamic techniques offer better detection at the cost
of increased overhead. Hybrid approaches, which merge
the strengths of static and dynamic methods, are not
extensively used in the literature and emerge as a
promising direction for future research. Lastly, this
paper identifies potential future research directions
based on the state of the current literature.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Saleem:2024:EET,
author = "Gulshan Saleem and Usama Ijaz Bajwa and Rana Hammad
Raza and Fan Zhang",
title = "Edge-Enhanced {TempoFuseNet}: a Two-Stream Framework
for Intelligent Multiclass Video Anomaly Recognition in
{5G} and {IoT} Environments",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "83",
day = "29",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030083",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/83",
abstract = "Surveillance video analytics encounters unprecedented
challenges in 5G and IoT environments, including
complex intra-class variations, short-term and
long-term temporal dynamics, and variable video
quality. This study introduces Edge-Enhanced
TempoFuseNet, a cutting-edge framework that
strategically reduces spatial resolution to allow the
processing of low-resolution images. A dual upscaling
methodology based on bicubic interpolation and an
encoder--bank--decoder configuration is used for
anomaly classification. The two-stream architecture
combines the power of a pre-trained Convolutional
Neural Network (CNN) for spatial feature extraction
from RGB imagery in the spatial stream, while the
temporal stream focuses on learning short-term temporal
characteristics, reducing the computational burden of
optical flow. To analyze long-term temporal patterns,
the extracted features from both streams are combined
and routed through a Gated Recurrent Unit (GRU) layer.
The proposed framework (TempoFuseNet) outperforms the
encoder--bank--decoder model in terms of performance
metrics, achieving a multiclass macro average accuracy
of 92.28\%, an F1-score of 69.29\%, and a false
positive rate of 4.41\%. This study presents a
significant advancement in the field of video anomaly
recognition and provides a comprehensive solution to
the complex challenges posed by real-world surveillance
scenarios in the context of 5G and IoT.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Xu:2024:MLS,
author = "Hanyue Xu and Kah Phooi Seng and Jeremy Smith and Li
Minn Ang",
title = "Multi-Level Split Federated Learning for Large-Scale
{AIoT} System Based on Smart Cities",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "82",
day = "28",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030082",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/82",
abstract = "In the context of smart cities, the integration of
artificial intelligence (AI) and the Internet of Things
(IoT) has led to the proliferation of AIoT systems,
which handle vast amounts of data to enhance urban
infrastructure and services. However, the collaborative
training of deep learning models within these systems
encounters significant challenges, chiefly due to data
privacy concerns and dealing with communication latency
from large-scale IoT devices. To address these issues,
multi-level split federated learning (multi-level SFL)
has been proposed, merging the benefits of split
learning (SL) and federated learning (FL). This
framework introduces a novel multi-level aggregation
architecture that reduces communication delays,
enhances scalability, and addresses system and
statistical heterogeneity inherent in large AIoT
systems with non-IID data distributions. The
architecture leverages the Message Queuing Telemetry
Transport (MQTT) protocol to cluster IoT devices
geographically and employs edge and fog computing
layers for initial model parameter aggregation.
Simulation experiments validate that the multi-level
SFL outperforms traditional SFL by improving model
accuracy and convergence speed in large-scale, non-IID
environments. This paper delineates the proposed
architecture, its workflow, and its advantages in
enhancing the robustness and scalability of AIoT
systems in smart cities while preserving data
privacy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2024:SEE,
author = "Yushan Li and Satoshi Fujita",
title = "A Synergistic {Elixir-EDA-MQTT} Framework for Advanced
Smart Transportation Systems",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "81",
day = "28",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030081",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/81",
abstract = "This paper proposes a novel event-driven architecture
for enhancing edge-based vehicular systems within smart
transportation. Leveraging the inherent real-time,
scalable, and fault-tolerant nature of the Elixir
language, we present an innovative architecture
tailored for edge computing. This architecture employs
MQTT for efficient event transport and utilizes
Elixir's lightweight concurrency model for distributed
processing. Robustness and scalability are further
ensured through the EMQX broker. We demonstrate the
effectiveness of our approach through two smart
transportation case studies: a traffic light system for
dynamically adjusting signal timing, and a cab dispatch
prototype designed for high concurrency and real-time
data processing. Evaluations on an Apple M1 chip reveal
consistently low latency responses below 5 ms and
efficient multicore utilization under load. These
findings showcase the system's robust throughput and
multicore programming capabilities, confirming its
suitability for real-time, distributed edge computing
applications in smart transportation. Therefore, our
work suggests that integrating Elixir with an
event-driven model represents a promising approach for
developing scalable, responsive applications in edge
computing. This opens avenues for further exploration
and adoption of Elixir in addressing the evolving
demands of edge-based smart transportation systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kim:2024:TDL,
author = "Haedam Kim and Suhyun Park and Hyemin Hong and Jieun
Park and Seongmin Kim",
title = "A Transferable Deep Learning Framework for Improving
the Accuracy of {Internet of Things} Intrusion
Detection",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "80",
day = "28",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030080",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/80",
abstract = "As the size of the IoT solutions and services market
proliferates, industrial fields utilizing IoT devices
are also diversifying. However, the proliferation of
IoT devices, often intertwined with users' personal
information and privacy, has led to a continuous surge
in attacks targeting these devices. However,
conventional network-level intrusion detection systems
with pre-defined rulesets are gradually losing their
efficacy due to the heterogeneous environments of IoT
ecosystems. To address such security concerns,
researchers have utilized ML-based network-level
intrusion detection techniques. Specifically, transfer
learning has been dedicated to identifying unforeseen
malicious traffic in IoT environments based on
knowledge distillation from the rich source domain data
sets. Nevertheless, since most IoT devices operate in
heterogeneous but small-scale environments, such as
home networks, selecting adequate source domains for
learning proves challenging. This paper introduces a
framework designed to tackle this issue. In instances
where assessing an adequate data set through
pre-learning using transfer learning is non-trivial,
our proposed framework advocates the selection of a
data set as the source domain for transfer learning.
This selection process aims to determine the
appropriateness of implementing transfer learning,
offering the best practice in such scenarios. Our
evaluation demonstrates that the proposed framework
successfully chooses a fitting source domain data set,
delivering the highest accuracy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pellegrino:2024:MHL,
author = "Mattia Pellegrino and Gianfranco Lombardo and George
Adosoglou and Stefano Cagnoni and Panos M. Pardalos and
Agostino Poggi",
title = "A Multi-Head {LSTM} Architecture for Bankruptcy
Prediction with Time Series Accounting Data",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "79",
day = "27",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030079",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/79",
abstract = "With the recent advances in machine learning (ML),
several models have been successfully applied to
financial and accounting data to predict the likelihood
of companies' bankruptcy. However, time series have
received little attention in the literature, with a
lack of studies on the application of deep learning
sequence models such as Recurrent Neural Networks
(RNNs) and the recent Attention-based models in
general. In this research work, we investigated the
application of Long Short-Term Memory (LSTM) networks
to exploit time series of accounting data for
bankruptcy prediction. The main contributions of our
work are the following: (a) We proposed a multi-head
LSTM that models each financial variable in a time
window independently and compared it with a
single-input LSTM and other traditional ML models. The
multi-head LSTM outperformed all the other models. (b)
We identified the optimal time series length for
bankruptcy prediction to be equal to 4 years of
accounting data. (c) We made public the dataset we used
for the experiments which includes data from 8262
different public companies in the American stock market
generated in the period between 1999 and 2018.
Furthermore, we proved the efficacy of the multi-head
LSTM model in terms of fewer false positives and the
better division of the two classes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Salariseddigh:2024:DIF,
author = "Mohammad Javad Salariseddigh and Ons Dabbabi and
Christian Deppe and Holger Boche",
title = "Deterministic {$K$}-Identification for Future
Communication Networks: The Binary Symmetric Channel
Results",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "78",
day = "26",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030078",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/78",
abstract = "Numerous applications of the Internet of Things (IoT)
feature an event recognition behavior where the
established Shannon capacity is not authorized to be
the central performance measure. Instead, the
identification capacity for such systems is considered
to be an alternative metric, and has been developed in
the literature. In this paper, we develop deterministic
K-identification (DKI) for the binary symmetric channel
(BSC) with and without a Hamming weight constraint
imposed on the codewords. This channel may be of use
for IoT in the context of smart system technologies,
where sophisticated communication models can be reduced
to a BSC for the aim of studying basic information
theoretical properties. We derive inner and outer
bounds on the DKI capacity of the BSC when the size of
the goal message set K may grow in the codeword length
n. As a major observation, we find that, for
deterministic encoding, assuming that K grows
exponentially in n, i.e., K=2n{\kappa}, where {\kappa}
is the identification goal rate, then the number of
messages that can be accurately identified grows
exponentially in n, i.e., 2nR, where R is the DKI
coding rate. Furthermore, the established inner and
outer bound regions reflects impact of the input
constraint (Hamming weight) and the channel statistics,
i.e., the cross-over probability.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Almani:2024:EVV,
author = "Dimah Almani and Tim Muller and Xavier Carpent and
Takahito Yoshizawa and Steven Furnell",
title = "Enabling Vehicle-to-Vehicle Trust in Rural Areas: an
Evaluation of a Pre-Signature Scheme for
Infrastructure-Limited Environments",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "3",
pages = "77",
day = "26",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16030077",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Wed Apr 10 09:47:36 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/3/77",
abstract = "This research investigates the deployment and
effectiveness of the novel Pre-Signature scheme,
developed to allow for up-to-date reputation being
available in Vehicle-to-Vehicle (V2V) communications in
rural landscapes, where the communications
infrastructure is limited. We discuss how existing
standards and specifications can be adjusted to
incorporate the Pre-Signature scheme to disseminate
reputation. Addressing the unique challenges posed by
sparse or irregular Roadside Units (RSUs) coverage in
these areas, the study investigates the implications of
such environmental factors on the integrity and
reliability of V2V communication networks. Using the
widely used SUMO traffic simulation tool, we create and
simulate real-world rural scenarios. We have conducted
an in-depth performance evaluation of the Pre-Signature
scheme under the typical infrastructural limitations
encountered in rural scenarios. Our findings
demonstrate the scheme's usefulness in scenarios with
variable or constrained RSUs access. Furthermore, the
relationships between the three variables,
communication range, amount of RSUs, and degree of
home-to-vehicle connectivity overnight, are studied,
offering an exhaustive analysis of the determinants
influencing V2V communication efficiency in rural
contexts. The important findings are (1) that access to
accurate Reputation Values increases with all three
variables and (2) the necessity of Pre-Signatures
decreases if the amount and range of RSUs increase to
high numbers. Together, these findings imply that areas
with a low degree of adoption of RSUs (typically rural
areas) benefit the most from our approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhang:2024:MCM,
author = "Bing Zhang and Hui Li and Shuai Zhang and Jing Sun and
Ning Wei and Wenhong Xu and Huan Wang",
title = "Multi-Constraint and Multi-Policy Path Hopping Active
Defense Method Based on {SDN}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "143",
day = "22",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040143",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/143",
abstract = "Path hopping serves as an active defense mechanism in
network security, yet it encounters challenges like a
restricted path switching space, the recurrent use of
similar paths and vital nodes, a singular triggering
mechanism for path switching, and fixed hopping
intervals. This paper introduces an active defense
method employing multiple constraints and strategies
for path hopping. A depth-first search (DFS) traversal
is utilized to compute all possible paths between
nodes, thereby broadening the path switching space
while simplifying path generation complexity.
Subsequently, constraints are imposed on residual
bandwidth, selection periods, path similitude, and
critical nodes to reduce the likelihood of reusing
similar paths and crucial nodes. Moreover, two path
switching strategies are formulated based on the
weights of residual bandwidth and critical nodes, along
with the calculation of path switching periods. This
facilitates adaptive switching of path hopping paths
and intervals, contingent on the network's residual
bandwidth threshold, in response to diverse attack
scenarios. Simulation outcomes illustrate that this
method, while maintaining normal communication
performance, expands the path switching space
effectively, safeguards against eavesdropping and
link-flooding attacks, enhances path switching
diversity and unpredictability, and fortifies the
network's resilience against malicious attacks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lin:2024:EFO,
author = "Hsin-Tung Lin and Chih-Yu Wen",
title = "Edge Federated Optimization for Heterogeneous Data",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "142",
day = "22",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040142",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/142",
abstract = "This study focuses on optimizing federated learning in
heterogeneous data environments. We implement the
FedProx and a baseline algorithm (i.e., the FedAvg)
with advanced optimization strategies to tackle non-IID
data issues in distributed learning. Model freezing and
pruning techniques are explored to showcase the
effective operations of deep learning models on
resource-constrained edge devices. Experimental results
show that at a pruning rate of 10\%, the FedProx with
structured pruning in the MIT-BIH and ST databases
achieved the best F1 scores, reaching 96.01\% and
77.81\%, respectively, which achieves a good balance
between system efficiency and model accuracy compared
to those of the FedProx with the original
configuration, reaching F1 scores of 66.12\% and
89.90\%, respectively. Similarly, with layer freezing
technique, unstructured pruning method, and a pruning
rate of 20\%, the FedAvg algorithm effectively balances
classification performance and degradation of pruned
model accuracy, achieving F1 scores of 88.75\% and
72.75\%, respectively, compared to those of the FedAvg
with the original configuration, reaching 56.82\% and
85.80\%, respectively. By adopting model optimization
strategies, a practical solution is developed for
deploying complex models in edge federated learning,
vital for its efficient implementation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2024:CLA,
author = "Zuopeng Li and Hengshuai Ju and Zepeng Ren",
title = "Correction: {Li} et al. {A Learning Game-Based
Approach to Task-Dependent Edge Resource Allocation.
Future Internet 2023, {\bf 15}, 395}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "141",
day = "22",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040141",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/141",
abstract = "This study focuses on optimizing federated learning in
heterogeneous data environments. We implement the
FedProx and a baseline algorithm (i.e., the FedAvg)
with advanced optimization strategies to tackle non-IID
data issues in distributed learning. Model freezing and
pruning techniques are explored to showcase the
effective operations of deep learning models on
resource-constrained edge devices. Experimental results
show that at a pruning rate of 10\%, the FedProx with
structured pruning in the MIT-BIH and ST databases
achieved the best F1 scores, reaching 96.01\% and
77.81\%, respectively, which achieves a good balance
between system efficiency and model accuracy compared
to those of the FedProx with the original
configuration, reaching F1 scores of 66.12\% and
89.90\%, respectively. Similarly, with layer freezing
technique, unstructured pruning method, and a pruning
rate of 20\%, the FedAvg algorithm effectively balances
classification performance and degradation of pruned
model accuracy, achieving F1 scores of 88.75\% and
72.75\%, respectively, compared to those of the FedAvg
with the original configuration, reaching 56.82\% and
85.80\%, respectively. By adopting model optimization
strategies, a practical solution is developed for
deploying complex models in edge federated learning,
vital for its efficient implementation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2024:SSU,
author = "Yuze Liu and Weihong Wu and Ying Wang and Jiang Liu
and Fan Yang",
title = "{SUDC}: Synchronous Update with the Division and
Combination of {SRv6} Policy",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "140",
day = "22",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040140",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/140",
abstract = "With the expansion of network scale, new network
services are emerging. Segment Routing over IPv6 (SRv6)
can meet the diverse needs of more new services due to
its excellent scalability and programmability. In the
intelligent 6-Generation (6G) scenario, frequent SRv6
Traffic Engineering (TE) policy updates will result in
the serious problem of unsynchronized updates across
routers. Existing solutions suffer from issues such as
long update cycles or large data overhead. To optimize
the policy-update process, this paper proposes a scheme
called Synchronous Update with the Division and
Combination of SRv6 Policy (SUDC). Based on the
characteristics of the SRv6 TE policy, SUDC divides the
policies and introduces Bit Index Explicit Replication
IPv6 Encapsulation (BIERv6) to multicast the policy
blocks derived from policy dividing. The contribution
of this paper is to propose the policy-dividing and
combination mechanism and the policy-dividing
algorithm. The simulation results demonstrate that
compared with the existing schemes, the update overhead
and update cycle of SUDC are reduced by 46.71\% and
46.6\%, respectively. The problem of unsynchronized
updates across routers has been further improved.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rahman:2024:CRM,
author = "Md Motiur Rahman and Deepti Gupta and Smriti Bhatt and
Shiva Shokouhmand and Miad Faezipour",
title = "A Comprehensive Review of Machine Learning Approaches
for Anomaly Detection in Smart Homes: Experimental
Analysis and Future Directions",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "139",
day = "19",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040139",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/139",
abstract = "Detecting anomalies in human activities is
increasingly crucial today, particularly in nuclear
family settings, where there may not be constant
monitoring of individuals' health, especially the
elderly, during critical periods. Early anomaly
detection can prevent from attack scenarios and
life-threatening situations. This task becomes notably
more complex when multiple ambient sensors are deployed
in homes with multiple residents, as opposed to
single-resident environments. Additionally, the
availability of datasets containing anomalies
representing the full spectrum of abnormalities is
limited. In our experimental study, we employed eight
widely used machine learning and two deep learning
classifiers to identify anomalies in human activities.
We meticulously generated anomalies, considering all
conceivable scenarios. Our findings reveal that the
Gated Recurrent Unit (GRU) excels in accurately
classifying normal and anomalous activities, while the
na{\"\i}ve Bayes classifier demonstrates relatively
poor performance among the ten classifiers considered.
We conducted various experiments to assess the impact
of different training--test splitting ratios, along
with a five-fold cross-validation technique, on the
performance. Notably, the GRU model consistently
outperformed all other classifiers under both
conditions. Furthermore, we offer insights into the
computational costs associated with these classifiers,
encompassing training and prediction phases. Extensive
ablation experiments conducted in this study underscore
that all these classifiers can effectively be deployed
for anomaly detection in two-resident homes.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lemmi:2024:SBE,
author = "Laura Lemmi and Carlo Puliafito and Antonio Virdis and
Enzo Mingozzi",
title = "{SRv6}-Based Edge Service Continuity in {5G} Mobile
Networks",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "138",
day = "19",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040138",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/138",
abstract = "Ensuring compliance with the stringent latency
requirements of edge services requires close
cooperation between the network and computing
components. Within mobile 5G networks, the nomadic
behavior of users may impact the performance of edge
services, prompting the need for workload migration
techniques. These techniques allow services to follow
users by moving between edge nodes. This paper
introduces an innovative approach for edge service
continuity by integrating Segment Routing over IPv6
(SRv6) into the 5G core data plane alongside the ETSI
multi-access edge computing (MEC) architecture. Our
approach maintains compatibility with non-SRv6 5G
network components. We use SRv6 for packet steering and
Software-Defined Networking (SDN) for dynamic network
configuration. Leveraging the SRv6 Network Programming
paradigm, we achieve lossless workload migration by
implementing a packet buffer as a virtual network
function. Our buffer may be dynamically allocated and
configured within the network. We test our proposed
solution on a small-scale testbed consisting of an Open
Network Operating System (ONOS) SDN controller and a
core network made of P4 BMv2 switches, emulated using
Mininet. A comparison with a non-SRv6 alternative that
uses IPv6 routing shows the higher scalability and
flexibility of our approach in terms of the number of
rules to be installed and time required for
configuration.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kampourakis:2024:SDS,
author = "Vyron Kampourakis and Georgios Michail Makrakis and
Constantinos Kolias",
title = "From Seek-and-Destroy to Split-and-Destroy: Connection
Partitioning as an Effective Tool against Low-Rate
{DoS} Attacks",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "137",
day = "19",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040137",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/137",
abstract = "Low-rate Denial of Service (LDoS) attacks are today
considered one of the biggest threats against modern
data centers and industrial infrastructures. Unlike
traditional Distributed Denial of Service (DDoS)
attacks that are mainly volumetric, LDoS attacks
exhibit a very small network footprint, and therefore
can easily elude standard detection and defense
mechanisms. This work introduces a defense strategy
that may prove particularly effective against attacks
that are based on long-lived connections, an inherent
trait of LDoS attacks. Our approach is based on
iteratively partitioning the active connections of a
victim server across a number of replica servers, and
then re-evaluating the health status of each replica
instance. At its core, this approach relies on live
migration and containerization technologies. The main
advantage of the proposed approach is that it can
discover and isolate malicious connections with
virtually no information about the type and
characteristics of the performed attack. Additionally,
while the defense takes place, there is little to no
indication of the fact to the attacker. We assess
various rudimentary schemes to quantify the scalability
of our approach. The results from the simulations
indicate that it is possible to save the vast majority
of the benign connections (80\%) in less than 5 min.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2024:COB,
author = "Yazhi Liu and Pengfei Zhong and Zhigang Yang and Wei
Li and Siwei Li",
title = "Computation Offloading Based on a Distributed Overlay
Network Cache-Sharing Mechanism in Multi-Access Edge
Computing",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "136",
day = "19",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040136",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/136",
abstract = "Multi-access edge computing (MEC) enhances service
quality for users and reduces computational overhead by
migrating workloads and application data to the network
edge. However, current solutions for task offloading
and cache replacement in edge scenarios are constrained
by factors such as communication bandwidth, wireless
network coverage, and limited storage capacity of edge
devices, making it challenging to achieve high cache
reuse and lower system energy consumption. To address
these issues, a framework leveraging cooperative edge
servers deployed in wireless access networks across
different geographical regions is designed.
Specifically, we propose the Distributed Edge Service
Caching and Offloading (DESCO) network architecture and
design a decentralized resource-sharing algorithm based
on consistent hashing, named Cache Chord. Subsequently,
based on DESCO and aiming to minimize overall user
energy consumption while maintaining user latency
constraints, we introduce the real-time computation
offloading (RCO) problem and transform RCO into a
multi-player static game, prove the existence of Nash
equilibrium solutions, and solve it using a
multi-dimensional particle swarm optimization
algorithm. Finally, simulation results demonstrate that
the proposed solution reduces the average energy
consumption by over 27\% in the DESCO network compared
to existing algorithms.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wilson:2024:BEP,
author = "Stanly Wilson and Kwabena Adu-Duodu and Yinhao Li and
Ringo Sham and Mohammed Almubarak and Yingli Wang and
Ellis Solaiman and Charith Perera and Rajiv Ranjan and
Omer Rana",
title = "Blockchain-Enabled Provenance Tracking for Sustainable
Material Reuse in Construction Supply Chains",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "135",
day = "17",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040135",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/135",
abstract = "The growing complexity of construction supply chains
and the significant impact of the construction industry
on the environment demand an understanding of how to
reuse and repurpose materials. In response to this
critical challenge, research gaps that are significant
in promoting material circularity are described.
Despite its potential, the use of blockchain technology
in construction faces challenges in verifiability,
scalability, privacy, and interoperability. We propose
a novel multilayer blockchain framework to enhance
provenance tracking and data retrieval to enable a
reliable audit trail. The framework utilises a
privacy-centric solution that combines decentralised
and centralised storage, security, and privacy.
Furthermore, the framework implements access control to
strengthen security and privacy, fostering transparency
and information sharing among the stakeholders. These
contributions collectively lead to trusted material
circularity in a built environment. The implementation
framework aims to create a prototype for blockchain
applications in construction supply chains.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jiang:2024:LDT,
author = "Yuning Jiang and Wei Wang and Jianguo Ding and Xin Lu
and Yanguo Jing",
title = "Leveraging Digital Twin Technology for Enhanced
Cybersecurity in Cyber--Physical Production Systems",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "134",
day = "17",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040134",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/134",
abstract = "The convergence of cyber and physical systems through
cyber--physical systems (CPSs) has been integrated into
cyber--physical production systems (CPPSs), leading to
a paradigm shift toward intelligent manufacturing.
Despite the transformative benefits that CPPS provides,
its increased connectivity exposes manufacturers to
cyber-attacks through exploitable vulnerabilities. This
paper presents a novel approach to CPPS security
protection by leveraging digital twin (DT) technology
to develop a comprehensive security model. This model
enhances asset visibility and supports prioritization
in mitigating vulnerable components through DT-based
virtual tuning, providing quantitative assessment
results for effective mitigation. Our proposed DT
security model also serves as an advanced simulation
environment, facilitating the evaluation of CPPS
vulnerabilities across diverse attack scenarios without
disrupting physical operations. The practicality and
effectiveness of our approach are illustrated through
its application in a human--robot collaborative
assembly system, demonstrating the potential of DT
technology.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2024:SDS,
author = "Bowen Liu and Qiang Tang",
title = "Secure Data Sharing in Federated Learning through
Blockchain-Based Aggregation",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "133",
day = "15",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040133",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/133",
abstract = "In this paper, we explore the realm of federated
learning (FL), a distributed machine learning (ML)
paradigm, and propose a novel approach that leverages
the robustness of blockchain technology. FL, a concept
introduced by Google in 2016, allows multiple entities
to collaboratively train an ML model without the need
to expose their raw data. However, it faces several
challenges, such as privacy concerns and malicious
attacks (e.g., data poisoning attacks). Our paper
examines the existing EIFFeL framework, a protocol for
decentralized real-time messaging in continuous
integration and delivery pipelines, and introduces an
enhanced scheme that leverages the trustworthy nature
of blockchain technology. Our scheme eliminates the
need for a central server and any other third party,
such as a public bulletin board, thereby mitigating the
risks associated with the compromise of such third
parties.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ahuja:2024:SST,
author = "Rohit Ahuja and Sahil Chugh and Raman Singh",
title = "{SeedChain}: A Secure and Transparent
Blockchain-Driven Framework to Revolutionize the Seed
Supply Chain",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "132",
day = "15",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040132",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/132",
abstract = "Farming is a major sector required for any nation to
become self-sustainable. Quality seeds heavily
influence the effectiveness of farming. Seeds
cultivated by breeders pass through several entities in
order to reach farmers. The existing seed supply chain
is opaque and intractable, which not only hinders the
growth of crops but also makes the life of a farmer
miserable. Blockchain has been widely employed to
enable fair and secure transactions between farmers and
buyers, but concerns related to transparency and
traceability in the seed supply chain, counterfeit
seeds, middlemen involvement, and inefficient processes
in the agricultural ecosystem have not received enough
attention. To address these concerns, a
blockchain-based solution is proposed that brings
breeders, farmers, warehouse owners, transporters, and
food corporations to a single platform to enhance
transparency, traceability, and trust among trust-less
parties. A smart contract updates the status of seeds
from a breeder from submitted to approved. Then, a
non-fungible token (NFT) corresponding to approved
seeds is minted for the breeder, which records the date
of cultivation and its owner (breeder). The NFT enables
farmers to keep track of seeds right from the date of
their cultivation and their owner, which helps them to
make better decisions about picking seeds from the
correct owner. Farmers directly interact with
warehouses to purchase seeds, which removes the need
for middlemen and improves the trust among trust-less
entities. Furthermore, a tender for the transportation
of seeds is auctioned on the basis of the priority
location~ locp, Score, and bid\_amount of every
transporter, which provides a fair chance to every
transporter to restrict the monopoly of a single
transporter. The proposed system achieves immutability,
decentralization, and efficiency inherently from the
blockchain. We implemented the proposed scheme and
deployed it on the Ethereum network. Smart contracts
deployed over the Ethereum network interact with
React-based web pages. The analysis and results of the
proposed model indicate that it is viable and secure,
as well as superior to the current seed supply chain
system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2024:CCM,
author = "Wei Li and Mengzhen Ren and Yazhi Liu and Chenyu Li
and Hui Qian and Zhenyou Zhang",
title = "Congestion Control Mechanism Based on Backpressure
Feedback in Data Center Networks",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "131",
day = "15",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040131",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/131",
abstract = "In order to solve the congestion problem caused by the
dramatic growth of traffic in data centers, many
end-to-end congestion controls have been proposed to
respond to congestion in one round-trip time (RTT). In
this paper, we propose a new congestion control
mechanism based on backpressure feedback (BFCC), which
is designed with the primary goal of switch-to-switch
congestion control to resolve congestion in a one-hop
RTT. This approach utilizes a programmable data plane
to continuously monitor network congestion in real time
and identify real-congested flows. In addition, it
employs targeted flow control through backpressure
feedback. We validate the feasibility of this mechanism
on BMV2, a programmable virtual switch based on
programming protocol-independent packet processors
(P4). Simulation results demonstrate that BFCC greatly
enhances flow completion times (FCTs) compared to other
end-to-end congestion control mechanisms. It achieves
1.2--2 $ \times $ faster average completion times than
other mechanisms.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Todoli-Ferrandis:2024:PMI,
author = "David Todoli-Ferrandis and Javier Silvestre-Blanes and
V{\'\i}ctor Sempere-Pay{\'a} and Salvador
Santonja-Climent",
title = "Polling Mechanisms for Industrial {IoT} Applications
in Long-Range Wide-Area Networks",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "130",
day = "12",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040130",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/130",
abstract = "LoRaWAN is a low-power wide-area network (LPWAN)
technology that is well suited for industrial IoT
(IIoT) applications. One of the challenges of using
LoRaWAN for IIoT is the need to collect data from a
large number of devices. Polling is a common way to
collect data from devices, but it can be inefficient
for LoRaWANs, which are designed for low data rates and
long battery life. LoRaWAN devices operating in two
specific modes can receive messages from a gateway even
when they are not sending data themselves. This allows
the gateway to send commands to devices at any time,
without having to wait for them to check for messages.
This paper proposes various polling mechanisms for
industrial IoT applications in LoRaWANs and presents
specific considerations for designing efficient polling
mechanisms in the context of industrial IoT
applications leveraging LoRaWAN technology.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Koukis:2024:AAD,
author = "Georgios Koukis and Konstantina Safouri and Vassilis
Tsaoussidis",
title = "All about Delay-Tolerant Networking {(DTN)}
Contributions to Future {Internet}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "129",
day = "09",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040129",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/129",
abstract = "Although several years have passed since its first
introduction, the significance of Delay-Tolerant
Networking (DTN) remains evident, particularly in
challenging environments where traditional networks
face operational limitations such as disrupted
communication or high latency. This survey paper aims
to explore the diverse array of applications where DTN
technologies have proven successful, with a focus on
emerging and novel application paradigms. In
particular, we focus on the contributions of DTN in the
Future Internet, including its contribution to space
applications, smart cities and the Internet of Things,
but also to underwater communications. We also discuss
its potential to be used jointly with
information-centric networks to change the internet
communication paradigm in the future.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{He:2024:SEA,
author = "Peixiong He and Yi Zhou and Xiao Qin",
title = "A Survey on Energy-Aware Security Mechanisms for the
{Internet of Things}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "128",
day = "08",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040128",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/128",
abstract = "The Internet of Things (IoT) employs sensors and the
Internet for information exchange, enabling intelligent
identification, monitoring, and management, which has
deeply impacted various sectors such as power, medical
care, and security, transforming social activities and
lifestyles. Regrettably, IoT systems suffer from two
main challenges, namely sustainability and security.
Hence, pondering how to enhance sustainable and
energy-efficient practices for IoT systems to mitigate
risks becomes a worthwhile endeavor. To address this
issue, we conduct a survey of energy-aware security
mechanisms in the Internet of Things. Specifically, we
examine the challenges that IoT is facing in terms of
energy efficiency and security, and we inspect current
energy-saving and privacy-preserving technologies for
IoT systems. Moreover, we delineate a vision for the
future of IoT, emphasizing energy-aware security
mechanisms. Finally, we outline the challenges
encountered in achieving energy-aware security
mechanisms, as well as the direction of future
research. Motivated by this study, we envision
advancements in the IoT that not only harness the
benefits of science and technology but also enhance the
security and safety of our data.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wei:2024:MWM,
author = "Zhongcheng Wei and Yanhu Dong",
title = "Multi-{WiIR}: Multi-User Identity Legitimacy
Authentication Based on {WiFi} Device",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "127",
day = "08",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040127",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/127",
abstract = "With the proliferation of WiFi devices, WiFi-based
identification technology has garnered attention in the
security domain and has demonstrated initial success.
Nonetheless, when untrained illegitimate users appear,
the classifier tends to categorize them as if they were
trained users. In response to this issue, researchers
have proposed identity legitimacy authentication
systems to identify illicit users, albeit only
applicable to individual users. In this article, we
propose a multi-user legitimacy authentication system
based on WiFi, termed Multi-WiIR. Leveraging WiFi
signals, the system captures users' walking patterns to
ascertain their legitimacy. The core concept entails
training a multi-branch deep neural network, designated
WiIR-Net, for feature extraction of individual users.
Binary classifiers are then applied to each user, and
legitimacy is established by comparing the model's
output to predefined thresholds, thus facilitating
multi-user legitimacy authentication. Moreover, the
study experimentally investigated the impact of the
number of legitimate individuals on accuracy rates. The
results demonstrated that The Multi-WiIR system showed
commendable performance with low latency, being capable
of conducting legitimacy recognition in scenarios
involving up to four users, with an accuracy rate
reaching 85.11\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Maier:2024:MMS,
author = "Florian Maier and Markus Weinberger",
title = "Metaverse Meets Smart Cities --- Applications,
Benefits, and Challenges",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "126",
day = "08",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040126",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/126",
abstract = "The metaverse aims to merge the virtual and real
worlds. The target is to generate a virtual community
where social components play a crucial role and combine
different areas such as entertainment, work, shopping,
and services. This idea is explicitly appealing in the
context of smart cities. The metaverse offers
digitalization approaches and can strengthen citizens'
social community. While the existing literature covers
the exemplary potential of smart city metaverse
applications, this study aims to provide a
comprehensive overview of the potential and already
implemented metaverse applications in the context of
cities and municipalities. In addition, challenges
related to these applications are identified. The study
combines literature reviews and expert interviews to
ensure a broad overview. Forty-eight smart city
metaverse applications from eleven areas were
identified, and actual projects from eleven cities
demonstrate the current state of development. Still,
further research should evaluate the benefits of the
various applications and find strategies to overcome
the identified challenges.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Balaskas:2024:PYD,
author = "Stefanos Balaskas and Georgia Kotsari and Maria
Rigou",
title = "Perspectives of Young Digital Natives on Digital
Marketing: Exploring Annoyance and Effectiveness with
Eye-Tracking Analysis",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "125",
day = "08",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040125",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/125",
abstract = "Currently, there are a wide range of approaches to
deploying digital ads, with advanced technologies now
being harnessed to craft advertising that is engaging
and even tailored to personal interests and
preferences, yet potentially distracting and
irritating. This research seeks to evaluate
contemporary digital advertising methods by assessing
how annoying they are to users, particularly when they
distract users from intended tasks or cause delays in
regular online activities. To pursue this, an
eye-tracking study was conducted, with 51 participants
navigating a specially designed website featuring seven
distinct types of advertisements without a specific
content to avoid the effect of ad content on the
collected data. Participants were asked to execute
specific information-seeking tasks during the
experiment and afterwards to report if they recalled
seeing each ad and the degree of annoyance by each ad
type. Ad effectiveness is assessed by eye-tracking
metrics (time to first fixation, average fixation
duration, dwell time, fixation count, and revisit
count) depicting how appealing an ad is as a marketing
stimulus. Findings indicated that pop-ups, ads with
content reorganization, and non-skippable videos ranked
as the most annoying forms of advertising. Conversely,
in-content ads without content reorganization, banners,
and right rail ads were indicated as less intrusive
options, seeming to strike a balance between
effectiveness and user acceptance.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2024:TAH,
author = "Haibo Liu and Yang Liao and Changting Shi and Jing
Shen",
title = "Task Allocation of Heterogeneous Multi-Unmanned
Systems Based on Improved Sheep Flock Optimization
Algorithm",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "124",
day = "07",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040124",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/124",
abstract = "The objective of task allocation in unmanned systems
is to complete tasks at minimal costs. However, the
current algorithms employed for coordinating multiple
unmanned systems in task allocation tasks frequently
converge to local optima, thus impeding the
identification of the best solutions. To address these
challenges, this study builds upon the sheep flock
optimization algorithm (SFOA) by preserving individuals
eliminated during the iterative process within a prior
knowledge set, which is continuously updated. During
the reproduction phase of the algorithm, this prior
knowledge is utilized to guide the generation of new
individuals, preventing their rapid reconvergence to
local optima. This approach aids in reducing the
frequency at which the algorithm converges to local
optima, continually steering the algorithm towards the
global optimum and thereby enhancing the efficiency of
task allocation. Finally, various task scenarios are
presented to evaluate the performances of various
algorithms. The results show that the algorithm
proposed in this paper is more likely than other
algorithms to escape from local optima and find the
global optimum.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Baskar:2024:MCB,
author = "Premalatha Baskar and Prakasam Periasamy",
title = "Minimum-Cost-Based Neighbour Node Discovery Scheme for
Fault Tolerance under {IoT}-Fog Networks",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "123",
day = "03",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040123",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/123",
abstract = "The exponential growth in data traffic in the real
world has drawn attention to the emerging computing
technique called Fog Computing (FC) for offloading
tasks in fault-free environments. This is a promising
computing standard that offers higher computing
benefits with a reduced cost, higher flexibility, and
increased availability. With the increased number of
tasks, the occurrence of faults increases and affects
the offloading of tasks. A suitable mechanism is
essential to rectify the faults that occur in the Fog
network. In this research, the fault-tolerance (FT)
mechanism is proposed based on cost optimization and
fault minimization. Initially, the faulty nodes are
identified based on the remaining residual energy with
the proposed Priority Task-based Fault-Tolerance (PTFT)
mechanism. The Minimum-Cost Neighbour Candidate Node
Discovery (MCNCND) algorithm is proposed to discover
the neighbouring candidate Fog access node that can
replace the faulty Fog node. The Replication and
Pre-emptive Forwarding (RPF) algorithm is proposed to
forward the task information to the new candidate Fog
access node for reliable transmission. These proposed
mechanisms are simulated, analysed, and compared with
existing FT methods. It is observed that the proposed
FT mechanism improves the utilization of an active
number of Fog access nodes. It also saved a residual
energy of 1.55 J without replicas, compared to the 0.85
J of energy that is used without the FT method.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Singh:2024:SBS,
author = "Radheshyam Singh and Leo Mendiboure and Jos{\'e} Soler
and Michael St{\"u}bert Berger and Tidiane Sylla and
Marion Berbineau and Lars Dittmann",
title = "{SDN}-Based Secure Common Emergency Service for
Railway and Road Co-Existence Scenarios",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "122",
day = "02",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040122",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/122",
abstract = "In the near future, there will be a greater emphasis
on sharing network resources between roads and railways
to improve transportation efficiency and reduce
infrastructure costs. This could enable the development
of global Cooperative Intelligent Transport Systems
(C-ITSs). In this paper, a software-defined networking
(SDN)-based common emergency service is developed and
validated for a railway and road telecommunication
shared infrastructure. Along with this, the developed
application is capable of reducing the chances of
distributed denial-of-service (DDoS) situations. A
level-crossing scenario is considered to demonstrate
the developed solution where railway tracks are
perpendicular to the roads. Two cases are considered to
validate and analyze the developed SDN application for
common emergency scenarios. In case 1, no
cross-communication is available between the road and
railway domains. In this case, emergency message
distribution is carried out by the assigned emergency
servers with the help of the SDN controller. In case 2,
nodes (cars and trains) are defined with two wireless
interfaces, and one interface is reserved for emergency
data communication. To add the DDoS resiliency to the
developed system the messaging behavior of each node is
observed and if an abnormality is detected, packets are
dropped to avoid malicious activity.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Su:2024:RSC,
author = "Bing Su and Jiwu Liang",
title = "Research on Secure Community Opportunity Network Based
on Trust Model",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "121",
day = "01",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040121",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/121",
abstract = "With the innovation of wireless communication
technology and the surge of data in mobile networks,
traditional routing strategies need to be improved.
Given the shortcomings of existing opportunistic
routing strategies in transmission performance and
security, this paper proposes a community opportunistic
routing decision-making method based on the trust
model. This algorithm calculates the node's trust value
through the node's historical forwarding behavior and
then calculates the node's trust value based on the
trust model. Thresholds and trust attenuation divide
dynamic security communities. For message forwarding,
nodes in the security community are prioritized as
next-hop relay nodes, thus ensuring that message
delivery is always in a safe and reliable environment.
On this basis, better relay nodes are further selected
for message forwarding based on the node centrality,
remaining cache space, and remaining energy,
effectively improving the message forwarding
efficiency. Through node trust value and community
cooperation, safe and efficient data transmission is
achieved, thereby improving the transmission
performance and security of the network. Through
comparison of simulation and opportunistic network
routing algorithms, compared with traditional methods,
this strategy has the highest transmission success rate
of 81\% with slightly increased routing overhead, and
this algorithm has the lowest average transmission
delay.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Agusti-Torra:2024:MBC,
author = "Anna Agust{\'\i}-Torra and Marc Ferr{\'e}-Mancebo and
Gabriel David Orozco-Urrutia and David
Rinc{\'o}n-Rivera and David Remondo",
title = "A Microservices-Based Control Plane for Time-Sensitive
Networking",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "120",
day = "01",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040120",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/120",
abstract = "Time-Sensitive Networking (TSN) aims to provide
deterministic communications over Ethernet. The main
characteristics of TSN are bounded latency and very
high reliability, thus complying with the strict
requirements of industrial communications or automotive
applications, to name a couple of examples. In order to
achieve this goal, TSN defines several scheduling
algorithms, among them the Time-Aware Shaper (TAS),
which is based on time slots and Gate Control Lists
(GCLs). The configuration of network elements to
allocate time slots, paths, and GCLs is laborious, and
has to be updated promptly and in a dynamic way, as new
data flows arrive or disappear. The IEEE 802.1Qcc
standard provides the basis to design a TSN control
plane to face these challenges, following the
Software-Defined Networking (SDN) paradigm. However,
most of the current SDN/TSN control plane solutions are
monolithic applications designed to run on dedicated
servers, and do not provide the required flexibility to
escalate when facing increasing service requests. This
work presents {\mu} TSN-CP, an SDN/TSN
microservices-based control plane, based on the
802.1Qcc standard. Our architecture leverages the
advantages of microservices, enabling the control plane
to scale up or down in response to varying workloads
dynamically. We achieve enhanced flexibility and
resilience by breaking down the control plane into
smaller, independent microservices. The performance of
{\mu} TSN-CP is evaluated in a real environment with
TSN switches, and various integer linear problem
solvers, running over different computing platforms.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2024:MAD,
author = "Huiting Wang and Yazhi Liu and Wei Li and Zhigang
Yang",
title = "Multi-Agent Deep Reinforcement Learning-Based
Fine-Grained Traffic Scheduling in Data Center
Networks",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "119",
day = "31",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040119",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/119",
abstract = "In data center networks, when facing challenges such
as traffic volatility, low resource utilization, and
the difficulty of a single traffic scheduling strategy
to meet demands, it is necessary to introduce
intelligent traffic scheduling mechanisms to improve
network resource utilization, optimize network
performance, and adapt to the traffic scheduling
requirements in a dynamic environment. This paper
proposes a fine-grained traffic scheduling scheme based
on multi-agent deep reinforcement learning (MAFS). This
approach utilizes In-Band Network Telemetry to collect
real-time network states on the programmable data
plane, establishes the mapping relationship between
real-time network state information and the forwarding
efficiency on the control plane, and designs a
multi-agent deep reinforcement learning algorithm to
calculate the optimal routing strategy under the
current network state. The experimental results
demonstrate that compared to other traffic scheduling
methods, MAFS can effectively enhance network
throughput. It achieves a 1.2 $ \times $ better average
throughput and achieves a 1.4--1.7 $ \times $ lower
packet loss rate.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Aldaoud:2024:DSM,
author = "Manar Aldaoud and Dawood Al-Abri and Medhat Awadalla
and Firdous Kausar",
title = "Data Structure and Management Protocol to Enhance Name
Resolving in Named Data Networking",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "118",
day = "30",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040118",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/118",
abstract = "Named Data Networking (NDN) is a future Internet
architecture that requires an Inter-Domain Routing
(IDR) to route its traffic globally. Address resolution
is a vital component of any IDR system that relies on a
Domain Name System (DNS) resolver to translate domain
names into their IP addresses in TCP/IP networks. This
paper presents a novel two-element solution to enhance
name-to-delivery location resolution in NDN networks,
consisting of (1) a mapping table data structure and a
searching mechanism and (2) a management protocol to
automatically populate and modify the mapping table.
The proposed solution is implemented and tested on the
Peer Name Provider Server (PNPS) mapping table, and its
performance is compared with two other algorithms:
component and character tries. The findings show a
notable enhancement in the operational speed of the
mapping table when utilizing the proposed data
structure. For instance, the insertion process is 37
times faster compared to previous algorithms.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tang:2024:CSW,
author = "Maolin Tang and Wei Li",
title = "Continuous Space Wireless Communication Tower
Placement by Hybrid Simulated Annealing",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "117",
day = "29",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040117",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/117",
abstract = "Wireless communication tower placement arises in many
real-world applications. This paper investigates a new
emerging wireless communication tower placement
problem, namely, continuous space wireless
communication tower placement. Unlike existing wireless
communication tower placement problems, which are
discrete computational problems, this new wireless
communication tower placement problem is a continuous
space computational problem. In this paper, we
formulate the new wireless communication tower
placement problem and propose a hybrid simulated
annealing algorithm that can take advantage of the
powerful exploration capacity of simulated annealing
and the strong exploitation capacity of a local
optimization procedure. We also demonstrate through
experiments the effectiveness of this hybridization
technique and the good performance and scalability of
the hybrid simulated annulling in this paper.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dhamala:2024:PEG,
author = "Binita Kusum Dhamala and Babu R. Dawadi and Pietro
Manzoni and Baikuntha Kumar Acharya",
title = "Performance Evaluation of Graph Neural Network-Based
{RouteNet} Model with Attention Mechanism",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "116",
day = "29",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040116",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/116",
abstract = "Graph representation is recognized as an efficient
method for modeling networks, precisely illustrating
intricate, dynamic interactions within various entities
of networks by representing entities as nodes and their
relationships as edges. Leveraging the advantage of the
network graph data along with deep learning
technologies specialized for analyzing graph data,
Graph Neural Networks (GNNs) have revolutionized the
field of computer networking by effectively handling
structured graph data and enabling precise predictions
for various use cases such as performance modeling,
routing optimization, and resource allocation. The
RouteNet model, utilizing a GNN, has been effectively
applied in determining Quality of Service (QoS)
parameters for each source-to-destination pair in
computer networks. However, a prevalent issue in the
current GNN model is their struggle with generalization
and capturing the complex relationships and patterns
within network data. This research aims to enhance the
predictive power of GNN-based models by enhancing the
original RouteNet model by incorporating an attention
layer into its architecture. A comparative analysis is
conducted to evaluate the performance of the Modified
RouteNet model against the Original RouteNet model. The
effectiveness of the added attention layer has been
examined to determine its impact on the overall model
performance. The outcomes of this research contribute
to advancing GNN-based network performance prediction,
addressing the limitations of existing models, and
providing reliable frameworks for predicting network
delay.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dolhopolov:2024:IFG,
author = "Anton Dolhopolov and Arnaud Castelltort and Anne
Laurent",
title = "Implementing Federated Governance in Data Mesh
Architecture",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "115",
day = "29",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040115",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/115",
abstract = "Analytical data platforms have been used for decades
to improve organizational performance. Starting from
the data warehouses used primarily for structured data
processing, through the data lakes oriented for raw
data storage and post-hoc data analyses, to the data
lakehouses---a combination of raw storage and business
intelligence pre-processing for improving the
platform's efficacy. But in recent years, a new
architecture called Data Mesh has emerged. The main
promise of this architecture is to remove the barriers
between operational and analytical teams in order to
boost the overall value extraction from the big data. A
number of attempts have been made to formalize and
implement it in existing projects. Although being
defined as a socio-technical paradigm, data mesh still
lacks the technology support to enable its widespread
adoption. To overcome this limitation, we propose a new
view of the platform requirements alongside the formal
governance definition that we believe can help in the
successful adoption of the data mesh. It is based on
fundamental aspects such as decentralized data domains
and federated computational governance. In addition, we
also present a blockchain-based implementation of a
mesh platform as a practical validation of our
theoretical proposal. Overall, this article
demonstrates a novel research direction for information
system decentralization technologies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kalgaonkar:2024:NAB,
author = "Priyank Kalgaonkar and Mohamed El-Sharkawy",
title = "{NeXtFusion}: Attention-Based Camera-Radar Fusion
Network for Improved Three-Dimensional Object Detection
and Tracking",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "4",
pages = "114",
day = "28",
month = mar,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16040114",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Sat Apr 27 07:28:50 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/4/114",
abstract = "Accurate perception is crucial for autonomous vehicles
(AVs) to navigate safely, especially in adverse weather
and lighting conditions where single-sensor networks
(e.g., cameras or radar) struggle with reduced
maneuverability and unrecognizable targets. Deep
Camera-Radar fusion neural networks offer a promising
solution for reliable AV perception under any weather
and lighting conditions. Cameras provide rich semantic
information, while radars act like an X-ray vision,
piercing through fog and darkness. This work proposes a
novel, efficient Camera-Radar fusion network called
NeXtFusion for robust AV perception with an improvement
in object detection accuracy and tracking. Our proposed
approach of utilizing an attention module enhances
crucial feature representation for object detection
while minimizing information loss from multi-modal
data. Extensive experiments on the challenging nuScenes
dataset demonstrate NeXtFusion's superior performance
in detecting small and distant objects compared to
other methods. Notably, NeXtFusion achieves the highest
mAP score (0.473) on the nuScenes validation set,
outperforming competitors like OFT (35.1\% improvement)
and MonoDIS (9.5\% improvement). Additionally,
NeXtFusion demonstrates strong performance in other
metrics like mATE (0.449) and mAOE (0.534),
highlighting its overall effectiveness in 3D object
detection. Furthermore, visualizations of nuScenes data
processed by NeXtFusion further demonstrate its
capability to handle diverse real-world scenarios.
These results suggest that NeXtFusion is a promising
deep fusion network for improving AV perception and
safety for autonomous driving.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kim:2024:VVD,
author = "Young Sook Kim and Seng-Phil Hong and Marko Majer",
title = "Validation of Value-Driven Token Economy: Focus on
Blockchain Content Platform",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "178",
day = "20",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050178",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/178",
abstract = "This study explores the architectural framework of a
value-driven token economy on a blockchain content
platform and critically evaluates the relationship
between blockchain's decentralization and sustainable
economic practices. The existing literature often
glorifies the rapid market expansion of
cryptocurrencies but overlooks how underlying
blockchain technology can fundamentally enhance content
platforms through a more structured user engagement and
equitable reward system. This study proposes a new
token economy architecture by adopting the
triple-bottom -line (TBL) framework and validates its
practicality and effectiveness through an
analytic-hierarchy-process (AHP) survey of industry
experts. The study shows that the most influential
factor in a successful token economy is not profit
maximization but fostering a user-centric community
where engagement and empowerment are prioritized. This
shift can be expected to combine blockchain technology
with meaningful economic innovation by challenging
traditional profit-driven business models and
refocusing on sustainability and user value.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Aggrawal:2024:TCM,
author = "Sakhi Aggrawal and Alejandra J. Magana",
title = "Teamwork Conflict Management Training and Conflict
Resolution Practice via Large Language Models",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "177",
day = "19",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050177",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/177",
abstract = "This study implements a conflict management training
approach guided by principles of transformative
learning and conflict management practice simulated via
an LLM. Transformative learning is more effective when
learners are engaged mentally and behaviorally in
learning experiences. Correspondingly, the conflict
management training approach involved a three-step
procedure consisting of a learning phase, a practice
phase enabled by an LLM, and a reflection phase.
Fifty-six students enrolled in a systems development
course were exposed to the transformative learning
approach to conflict management so they would be better
prepared to address any potential conflicts within
their teams as they approached a semester-long software
development project. The study investigated the
following: (1) How did the training and practice affect
students' level of confidence in addressing conflict?
(2) Which conflict management styles did students use
in the simulated practice? (3) Which strategies did
students employ when engaging with the simulated
conflict? The findings indicate that: (1) 65\% of the
students significantly increased in confidence in
managing conflict by demonstrating collaborative,
compromising, and accommodative approaches; (2) 26\% of
the students slightly increased in confidence by
implementing collaborative and accommodative
approaches; and (3) 9\% of the students did not
increase in confidence, as they were already confident
in applying collaborative approaches. The three most
frequently used strategies for managing conflict were
identifying the root cause of the problem, actively
listening, and being specific and objective in
explaining their concerns.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fiaz:2024:MFP,
author = "Faisal Fiaz and Syed Muhammad Sajjad and Zafar Iqbal
and Muhammad Yousaf and Zia Muhammad",
title = "{MetaSSI}: a Framework for Personal Data Protection,
Enhanced Cybersecurity and Privacy in Metaverse Virtual
Reality Platforms",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "176",
day = "18",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050176",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/176",
abstract = "The Metaverse brings together components of parallel
processing computing platforms, the digital development
of physical systems, cutting-edge machine learning, and
virtual identity to uncover a fully digitalized
environment with equal properties to the real world. It
possesses more rigorous requirements for connection,
including safe access and data privacy, which are
necessary with the advent of Metaverse technology.
Traditional, centralized, and network-centered
solutions fail to provide a resilient identity
management solution. There are multifaceted security
and privacy issues that hinder the secure adoption of
this game-changing technology in contemporary
cyberspace. Moreover, there is a need to dedicate
efforts towards a secure-by-design Metaverse that
protects the confidentiality, integrity, and privacy of
the personally identifiable information (PII) of users.
In this research paper, we propose a logical substitute
for established centralized identity management systems
in compliance with the complexity of the Metaverse.
This research proposes a sustainable Self-Sovereign
Identity (SSI), a fully decentralized identity
management system to mitigate PII leaks and
corresponding cyber threats on all multiverse
platforms. The principle of the proposed framework
ensures that the users are the only custodians and
proprietors of their own identities. In addition, this
article provides a comprehensive approach to the
implementation of the SSI principles to increase
interoperability and trustworthiness in the Metaverse.
Finally, the proposed framework is validated using
mathematical modeling and proved to be stringent and
resilient against modern-day cyber attacks targeting
Metaverse platforms.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Auer:2024:CAC,
author = "Isabel Auer and Stephan Schl{\"o}gl and Gundula
Glowka",
title = "Chatbots in Airport Customer Service --- Exploring Use
Cases and Technology Acceptance",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "175",
day = "17",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050175",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/175",
abstract = "Throughout the last decade, chatbots have gained
widespread adoption across various industries,
including healthcare, education, business, e-commerce,
and entertainment. These types of artificial, usually
cloud-based, agents have also been used in airport
customer service, although there has been limited
research concerning travelers' perspectives on this
rather techno-centric approach to handling inquiries.
Consequently, the goal of the presented study was to
tackle this research gap and explore potential use
cases for chatbots at airports, as well as investigate
travelers' acceptance of said technology. We employed
an extended version of the Technology Acceptance Model
considering Perceived Usefulness, Perceived Ease of
Use, Trust, and Perceived Enjoyment as predictors of
Behavioral Intention, with Affinity for Technology as a
potential moderator. A total of n=191 travelers
completed our survey. The results show that Perceived
Usefulness, Trust, Perceived Ease of Use, and Perceived
Enjoyment positively correlate with the Behavioral
Intention to use a chatbot for airport customer service
inquiries, with Perceived Usefulness showing the
highest impact. Travelers' Affinity for Technology, on
the other hand, does not seem to have any significant
effect.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Nguyen:2024:TSB,
author = "Thi-Hao Nguyen and Van-Hung Le and Huu-Son Do and
Trung-Hieu Te and Van-Nam Phan",
title = "{TQU-SLAM} Benchmark Dataset for Comparative Study to
Build Visual Odometry Based on Extracted Features from
Feature Descriptors and Deep Learning",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "174",
day = "17",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050174",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/174",
abstract = "The problem of data enrichment to train visual SLAM
and VO construction models using deep learning (DL) is
an urgent problem today in computer vision. DL requires
a large amount of data to train a model, and more data
with many different contextual and conditional
conditions will create a more accurate visual SLAM and
VO construction model. In this paper, we introduce the
TQU-SLAM benchmark dataset, which includes 160,631
RGB-D frame pairs. It was collected from the corridors
of three interconnected buildings comprising a length
of about 230 m. The ground-truth data of the TQU-SLAM
benchmark dataset were prepared manually, including
6-DOF camera poses, 3D point cloud data, intrinsic
parameters, and the transformation matrix between the
camera coordinate system and the real world. We also
tested the TQU-SLAM benchmark dataset using the PySLAM
framework with traditional features such as
SHI\_TOMASI, SIFT, SURF, ORB, ORB2, AKAZE, KAZE, and
BRISK and features extracted from DL such as VGG, DPVO,
and TartanVO. The camera pose estimation results are
evaluated, and we show that the ORB2 features have the
best results ( Errd = 5.74 mm), while the ratio of the
number of frames with detected keypoints of the
SHI\_TOMASI feature is the best ( rd=98.97\% ). At the
same time, we also present and analyze the challenges
of the TQU-SLAM benchmark dataset for building visual
SLAM and VO systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ibarra-Hernandez:2024:MLS,
author = "Roilhi F. Ibarra-Hern{\'a}ndez and Francisco R.
Castillo-Soria and Carlos A. Guti{\'e}rrez and Abel
Garc{\'\i}a-Barrientos and Luis Alberto
V{\'a}squez-Toledo and J. Alberto Del-Puerto-Flores",
title = "Machine Learning Strategies for Reconfigurable
Intelligent Surface-Assisted Communication Systems ---
a Review",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "173",
day = "17",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050173",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/173",
abstract = "Machine learning (ML) algorithms have been widely used
to improve the performance of telecommunications
systems, including reconfigurable intelligent surface
(RIS)-assisted wireless communication systems. The RIS
can be considered a key part of the backbone of
sixth-generation (6G) communication mainly due to its
electromagnetic properties for controlling the
propagation of the signals in the wireless channel. The
ML-optimized (RIS)-assisted wireless communication
systems can be an effective alternative to mitigate the
degradation suffered by the signal in the wireless
channel, providing significant advantages in the
system's performance. However, the variety of
approaches, system configurations, and channel
conditions make it difficult to determine the best
technique or group of techniques for effectively
implementing an optimal solution. This paper presents a
comprehensive review of the reported frameworks in the
literature that apply ML and RISs to improve the
overall performance of the wireless communication
system. This paper compares the ML strategies that can
be used to address the RIS-assisted system design. The
systems are classified according to the ML method, the
databases used, the implementation complexity, and the
reported performance gains. Finally, we shed light on
the challenges and opportunities in designing and
implementing future RIS-assisted wireless communication
systems based on ML strategies.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tsoulos:2024:UOT,
author = "Ioannis G. Tsoulos and Alexandros Tzallas and
Evangelos Karvounis",
title = "Using Optimization Techniques in Grammatical
Evolution",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "172",
day = "16",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050172",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/172",
abstract = "The Grammatical Evolution technique has been
successfully applied to a wide range of problems in
various scientific fields. However, in many cases,
techniques that make use of Grammatical Evolution
become trapped in local minima of the objective problem
and fail to reach the optimal solution. One simple
method to tackle such situations is the usage of hybrid
techniques, where local minimization algorithms are
used in conjunction with the main algorithm. However,
Grammatical Evolution is an integer optimization
problem and, as a consequence, techniques should be
formulated that are applicable to it as well. In the
current work, a modified version of the Simulated
Annealing algorithm is used as a local optimization
procedure in Grammatical Evolution. This approach was
tested on the Constructed Neural Networks and a
remarkable improvement of the experimental results was
shown, both in classification data and in data fitting
cases.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2024:SBS,
author = "Na Liu and Wei-Tek Tsai",
title = "{SmartDED}: a Blockchain- and Smart Contract-Based
Digital Electronic Detonator Safety Supervision
System",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "171",
day = "16",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050171",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/171",
abstract = "Digital electronic detonators, as a civil explosive,
are of prime importance for people's life and property
safety in the process of production and operation.
Therefore, the Ministry of Industry and Information
Technology and the Ministry of Public Security of the
People's Republic of China have extremely high
requirements for their essential safety. Existing
schemes are vulnerable to tampering and single points
of failure, which makes tracing unqualified digital
electronic detonators difficult and identifying the
responsibility for digital electronic detonator
accidents hard. This paper presents a digital
electronic detonator safety supervision system based on
a consortium blockchain. To achieve dynamic supply
chain supervision, we propose a novel digital
electronic detonator supervision model together with
three codes in one. We also propose a blockchain-based
system that employs smart contracts to achieve
efficient traceability and ensure security. We
implemented the proposed model using a consortium
blockchain platform and provide the cost. The
evaluation results validate that the proposed system is
efficient.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fath:2024:IIM,
author = "Alireza Fath and Nicholas Hanna and Yi Liu and Scott
Tanch and Tian Xia and Dryver Huston",
title = "Indoor Infrastructure Maintenance Framework Using
Networked Sensors, Robots, and Augmented Reality Human
Interface",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "170",
day = "15",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050170",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/170",
abstract = "Sensing and cognition by homeowners and technicians
for home maintenance are prime examples of
human--building interaction. Damage, decay, and pest
infestation present signals that humans interpret and
then act upon to remedy and mitigate. The maintenance
cognition process has direct effects on sustainability
and economic vitality, as well as the health and
well-being of building occupants. While home
maintenance practices date back to antiquity, they
readily submit to augmentation and improvement with
modern technologies. This paper describes the use of
networked smart technologies embedded with machine
learning (ML) and presented in electronic formats to
better inform homeowners and occupants about safety and
maintenance issues, as well as recommend courses of
remedial action. The demonstrated technologies include
robotic sensing in confined areas, LiDAR scans of
structural shape and deformation, moisture and gas
sensing, water leak detection, network embedded ML, and
augmented reality interfaces with multi-user teaming
capabilities. The sensor information passes through a
private local dynamic network to processors with neural
network pattern recognition capabilities to abstract
the information, which then feeds to humans through
augmented reality and conventional smart device
interfaces. This networked sensor system serves as a
testbed and demonstrator for home maintenance
technologies, for what can be termed Home Maintenance
4.0.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Frattolillo:2024:BSC,
author = "Franco Frattolillo",
title = "Blockchain and Smart Contracts for Digital Copyright
Protection",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "169",
day = "14",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050169",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/169",
abstract = "In a global context characterized by a pressing need
to find a solution to the problem of digital copyright
protection, buyer-seller watermarking protocols based
on asymmetric fingerprinting and adopting a
``buyer-friendly'' approach have proven effective in
addressing such a problem. They can ensure high levels
of usability and security. However, they usually resort
to trusted third parties (TTPs) to guarantee the
protection process, and this is often perceived as a
relevant drawback since TTPs may cause conspiracy or
collusion problems, besides the fact that they are
generally considered as some sort of ``big brother''.
This paper presents a buyer-seller watermarking
protocol that can achieve the right compromise between
usability and security without employing a TTP. The
protocol is built around previous experiences conducted
in the field of protocols based on the buyer-friendly
approach. Its peculiarity consists of exploiting smart
contracts executed within a blockchain to implement
preset and immutable rules that run automatically under
specific conditions without control from some kind of
central authority. The result is a simple, usable, and
secure watermarking protocol able to do without TTPs.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Imran:2024:ERA,
author = "Muhammad Imran and Annalisa Appice and Donato
Malerba",
title = "Evaluating Realistic Adversarial Attacks against
Machine Learning Models for {Windows PE} Malware
Detection",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "168",
day = "12",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050168",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/168",
abstract = "During the last decade, the cybersecurity literature
has conferred a high-level role to machine learning as
a powerful security paradigm to recognise malicious
software in modern anti-malware systems. However, a
non-negligible limitation of machine learning methods
used to train decision models is that adversarial
attacks can easily fool them. Adversarial attacks are
attack samples produced by carefully manipulating the
samples at the test time to violate the model integrity
by causing detection mistakes. In this paper, we
analyse the performance of five realistic target-based
adversarial attacks, namely Extend, Full DOS, Shift,
FGSM padding + slack and GAMMA, against two machine
learning models, namely MalConv and LGBM, learned to
recognise Windows Portable Executable (PE) malware
files. Specifically, MalConv is a Convolutional Neural
Network (CNN) model learned from the raw bytes of
Windows PE files. LGBM is a Gradient-Boosted Decision
Tree model that is learned from features extracted
through the static analysis of Windows PE files.
Notably, the attack methods and machine learning models
considered in this study are state-of-the-art methods
broadly used in the machine learning literature for
Windows PE malware detection tasks. In addition, we
explore the effect of accounting for adversarial
attacks on securing machine learning models through the
adversarial training strategy. Therefore, the main
contributions of this article are as follows: (1) We
extend existing machine learning studies that commonly
consider small datasets to explore the evasion ability
of state-of-the-art Windows PE attack methods by
increasing the size of the evaluation dataset. (2) To
the best of our knowledge, we are the first to carry
out an exploratory study to explain how the considered
adversarial attack methods change Windows PE malware to
fool an effective decision model. (3) We explore the
performance of the adversarial training strategy as a
means to secure effective decision models against
adversarial Windows PE malware files generated with the
considered attack methods. Hence, the study explains
how GAMMA can actually be considered the most effective
evasion method for the performed comparative analysis.
On the other hand, the study shows that the adversarial
training strategy can actually help in recognising
adversarial PE malware generated with GAMMA by also
explaining how it changes model decisions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ye:2024:HSA,
author = "Anjia Ye and Ananda Maiti and Matthew Schmidt and
Scott J. Pedersen",
title = "A Hybrid Semi-Automated Workflow for Systematic and
Literature Review Processes with Large Language Model
Analysis",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "167",
day = "12",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050167",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/167",
abstract = "Systematic reviews (SRs) are a rigorous method for
synthesizing empirical evidence to answer specific
research questions. However, they are labor-intensive
because of their collaborative nature, strict
protocols, and typically large number of documents.
Large language models (LLMs) and their applications
such as gpt-4/ChatGPT have the potential to reduce the
human workload of the SR process while maintaining
accuracy. We propose a new hybrid methodology that
combines the strengths of LLMs and humans using the
ability of LLMs to summarize large bodies of text
autonomously and extract key information. This is then
used by a researcher to make inclusion/exclusion
decisions quickly. This process replaces the typical
manually performed title/abstract screening, full-text
screening, and data extraction steps in an SR while
keeping a human in the loop for quality control. We
developed a semi-automated LLM-assisted (Gemini-Pro)
workflow with a novel innovative prompt development
strategy. This involves extracting three categories of
information including identifier, verifier, and data
field (IVD) from the formatted documents. We present a
case study where our hybrid approach reduced errors
compared with a human-only SR. The hybrid workflow
improved the accuracy of the case study by identifying
6/390 (1.53\%) articles that were misclassified by the
human-only process. It also matched the human-only
decisions completely regarding the rest of the 384
articles. Given the rapid advances in LLM technology,
these results will undoubtedly improve over time.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Patwe:2024:BES,
author = "Sonali Patwe and Sunil B. Mane",
title = "Blockchain-Enabled Secure and Interoperable
Authentication Scheme for Metaverse Environments",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "166",
day = "11",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050166",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/166",
abstract = "The metaverse, which amalgamates physical and virtual
realms for diverse social activities, has been the
focus of extensive application development by
organizations, research institutes, and companies.
However, these applications are often isolated,
employing distinct authentication methods across
platforms. Achieving interoperable authentication is
crucial for when avatars traverse different metaverses
to mitigate security concerns like impersonation,
mutual authentication, replay, and server spoofing. To
address these issues, we propose a blockchain-enabled
secure and interoperable authentication scheme. This
mechanism uniquely identifies users in the physical
world as well as avatars, facilitating seamless
navigation across verses. Our proposal is substantiated
through informal security analyses, employing automated
verification of internet security protocols and
applications (AVISPA), the real-or-random (ROR) model,
and Burrows--Abadi--Needham (BAN) logic and showcasing
effectiveness against a broad spectrum of security
threats. Comparative assessments against similar
schemes demonstrate our solution's superiority in terms
of communication costs, computation costs, and security
features. Consequently, our blockchain-enabled,
interoperable, and secure authentication scheme stands
as a robust solution for ensuring security in metaverse
environments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhang:2024:RIS,
author = "Yuzhu Zhang and Hao Xu",
title = "Reconfigurable-Intelligent-Surface-Enhanced Dynamic
Resource Allocation for the Social {Internet of
Electric Vehicle Charging Networks} with
Causal-Structure-Based Reinforcement Learning",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "165",
day = "11",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050165",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/165",
abstract = "Charging stations and electric vehicle (EV) charging
networks signify a significant advancement in
technology as a frontier application of the Social
Internet of Things (SIoT), presenting both challenges
and opportunities for current 6G wireless networks. One
primary challenge in this integration is limited
wireless network resources, particularly when serving a
large number of users within distributed EV charging
networks in the SIoT. Factors such as congestion during
EV travel, varying EV user preferences, and
uncertainties in decision-making regarding charging
station resources significantly impact system operation
and network resource allocation. To address these
challenges, this paper develops a novel framework
harnessing the potential of emerging technologies,
specifically reconfigurable intelligent surfaces (RISs)
and causal-structure-enhanced asynchronous advantage
actor--critic (A3C) reinforcement learning techniques.
This framework aims to optimize resource allocation,
thereby enhancing communication support within EV
charging networks. Through the integration of RIS
technology, which enables control over electromagnetic
waves, and the application of causal reinforcement
learning algorithms, the framework dynamically adjusts
resource allocation strategies to accommodate evolving
conditions in EV charging networks. An essential aspect
of this framework is its ability to simultaneously meet
real-world social requirements, such as ensuring
efficient utilization of network resources. Numerical
simulation results validate the effectiveness and
adaptability of this approach in improving wireless
network efficiency and enhancing user experience within
the SIoT context. Through these simulations, it becomes
evident that the developed framework offers promising
solutions to the challenges posed by integrating the
SIoT with EV charging networks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhang:2024:PPF,
author = "Yu Zhang and Xiaowei Peng and Hequn Xian",
title = "{pFedBASC}: Personalized Federated Learning with
Blockchain-Assisted Semi-Centralized Framework",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "164",
day = "11",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050164",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/164",
abstract = "As network technology advances, there is an increasing
need for a trusted new-generation information
management system. Blockchain technology provides a
decentralized, transparent, and tamper-proof
foundation. Meanwhile, data islands have become a
significant obstacle for machine learning applications.
Although federated learning (FL) ensures data privacy
protection, server-side security concerns persist.
Traditional methods have employed a blockchain system
in FL frameworks to maintain a tamper-proof global
model database. In this context, we propose a novel
personalized federated learning (pFL) with
blockchain-assisted semi-centralized framework,
pFedBASC. This approach, tailored for the Internet of
Things (IoT) scenarios, constructs a semi-centralized
IoT structure and utilizes trusted network connections
to support FL. We concentrate on designing the
aggregation process and FL algorithm, as well as the
block structure. To address data heterogeneity and
communication costs, we propose a pFL method called
FedHype. In this method, each client is assigned a
compact hypernetwork (HN) alongside a normal target
network (TN) whose parameters are generated by the HN.
Clients pull together other clients' HNs for local
aggregation to personalize their TNs, reducing
communication costs. Furthermore, FedHype can be
integrated with other existing algorithms, enhancing
its functionality. Experimental results reveal that
pFedBASC effectively tackles data heterogeneity issues
while maintaining positive accuracy, communication
efficiency, and robustness.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ma:2024:BBZ,
author = "Zhe Ma and Xuhesheng Chen and Tiejiang Sun and Xukang
Wang and Ying Cheng Wu and Mengjie Zhou",
title = "Blockchain-Based Zero-Trust Supply Chain Security
Integrated with Deep Reinforcement Learning for
Inventory Optimization",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "163",
day = "10",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050163",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/163",
abstract = "Modern supply chain systems face significant
challenges, including lack of transparency, inefficient
inventory management, and vulnerability to disruptions
and security threats. Traditional optimization methods
often struggle to adapt to the complex and dynamic
nature of these systems. This paper presents a novel
blockchain-based zero-trust supply chain security
framework integrated with deep reinforcement learning
(SAC-rainbow) to address these challenges. The
SAC-rainbow framework leverages the Soft Actor--Critic
(SAC) algorithm with prioritized experience replay for
inventory optimization and a blockchain-based
zero-trust mechanism for secure supply chain
management. The SAC-rainbow algorithm learns adaptive
policies under demand uncertainty, while the blockchain
architecture ensures secure, transparent, and traceable
record-keeping and automated execution of supply chain
transactions. An experiment using real-world supply
chain data demonstrated the superior performance of the
proposed framework in terms of reward maximization,
inventory stability, and security metrics. The
SAC-rainbow framework offers a promising solution for
addressing the challenges of modern supply chains by
leveraging blockchain, deep reinforcement learning, and
zero-trust security principles. This research paves the
way for developing secure, transparent, and efficient
supply chain management systems in the face of growing
complexity and security risks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fan:2024:BUB,
author = "Caixiang Fan and Hamzeh Khazaei and Petr Musilek",
title = "{BPET}: a Unified Blockchain-Based Framework for
Peer-to-Peer Energy Trading",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "162",
day = "7",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050162",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/162",
abstract = "Recent years have witnessed a significant dispersion
of renewable energy and the emergence of
blockchain-enabled transactive energy systems. These
systems facilitate direct energy trading among
participants, cutting transmission losses, improving
energy efficiency, and fostering renewable energy
adoption. However, developing such a system is usually
challenging and time-consuming due to the diversity of
energy markets. The lack of a market-agnostic design
hampers the widespread adoption of blockchain-based
peer-to-peer energy trading globally. In this paper, we
propose and develop a novel unified blockchain-based
peer-to-peer energy trading framework, called BPET.
This framework incorporates microservices and
blockchain as the infrastructures and adopts a highly
modular smart contract design so that developers can
easily extend it by plugging in localized energy market
rules and rapidly developing a customized
blockchain-based peer-to-peer energy trading system.
Additionally, we have developed the price formation
mechanisms, e.g., the system marginal price calculation
algorithm and the pool price calculation algorithm, to
demonstrate the extensibility of the BPET framework. To
validate the proposed solution, we have conducted a
comprehensive case study using real trading data from
the Alberta Electric System Operator. The experimental
results confirm the system's capability of processing
energy trading transactions efficiently and effectively
within the Alberta electricity wholesale market.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chen:2024:AEM,
author = "Jieli Chen and Kah Phooi Seng and Li Minn Ang and
Jeremy Smith and Hanyue Xu",
title = "{AI}-Empowered Multimodal Hierarchical Graph-Based
Learning for Situation Awareness on Enhancing Disaster
Responses",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "161",
day = "7",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050161",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/161",
abstract = "Situational awareness (SA) is crucial in disaster
response, enhancing the understanding of the
environment. Social media, with its extensive user
base, offers valuable real-time information for such
scenarios. Although SA systems excel in extracting
disaster-related details from user-generated content, a
common limitation in prior approaches is their emphasis
on single-modal extraction rather than embracing
multi-modalities. This paper proposed a multimodal
hierarchical graph-based situational awareness (MHGSA)
system for comprehensive disaster event classification.
Specifically, the proposed multimodal hierarchical
graph contains nodes representing different disaster
events and the features of the event nodes are
extracted from the corresponding images and acoustic
features. The proposed feature extraction modules with
multi-branches for vision and audio features provide
hierarchical node features for disaster events of
different granularities, aiming to build a
coarse-granularity classification task to constrain the
model and enhance fine-granularity classification. The
relationships between different disaster events in
multi-modalities are learned by graph convolutional
neural networks to enhance the system's ability to
recognize disaster events, thus enabling the system to
fuse complex features of vision and audio. Experimental
results illustrate the effectiveness of the proposed
visual and audio feature extraction modules in
single-modal scenarios. Furthermore, the MHGSA
successfully fuses visual and audio features, yielding
promising results in disaster event classification
tasks.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kaleem:2024:ORP,
author = "Sarah Kaleem and Muhammad Asim and Mohammed El-Affendi
and Muhammad Babar",
title = "Optimizing Requirements Prioritization for {IoT}
Applications Using Extended Analytical Hierarchical
Process and an Advanced Grouping Framework",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "160",
day = "6",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050160",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/160",
abstract = "Effective requirement collection and prioritization
are paramount within the inherently distributed nature
of the Internet of Things (IoT) application. Current
methods typically categorize IoT application
requirements subjectively into inessential, desirable,
and mandatory groups. This often leads to
prioritization challenges, especially when dealing with
requirements of equal importance and when the number of
requirements grows. This increases the complexity of
the Analytical Hierarchical Process (AHP) to O(n2)
dimensions. This research introduces a novel framework
that integrates an enhanced AHP with an advanced
grouping model to address these issues. This integrated
approach mitigates the subjectivity found in
traditional grouping methods and efficiently manages
larger sets of requirements. The framework consists of
two main modules: the Pre-processing Module and the
Prioritization Module. The latter includes three units:
the Grouping Processing Unit (GPU) for initial
classification using a new grouping approach, the
Review Processing Unit (RPU) for post-grouping
assessment, and the AHP Processing Unit (APU) for final
prioritization. This framework is evaluated through a
detailed case study, demonstrating its ability to
effectively streamline requirement prioritization in
IoT applications, thereby enhancing design quality and
operational efficiency.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Althamary:2024:EMT,
author = "Ibrahim Althamary and Rubbens Boisguene and Chih-Wei
Huang",
title = "Enhanced Multi-Task Traffic Forecasting in Beyond {5G}
Networks: Leveraging Transformer Technology and
Multi-Source Data Fusion",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "159",
day = "5",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050159",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/159",
abstract = "Managing cellular networks in the Beyond 5G (B5G) era
is a complex and challenging task requiring advanced
deep learning approaches. Traditional models focusing
on internet traffic (INT) analysis often fail to
capture the rich temporal and spatial contexts
essential for accurate INT predictions. Furthermore,
these models do not account for the influence of
external factors such as weather, news, and social
trends. This study proposes a multi-source CNN-RNN
(MSCR) model that leverages a rich dataset, including
periodic, weather, news, and social data to address
these limitations. This model enables the capture and
fusion of diverse data sources for improved INT
prediction accuracy. An advanced deep learning model,
the transformer-enhanced CNN-RNN (TE-CNN-RNN), has been
introduced. This model is specifically designed to
predict INT data only. This model demonstrates the
effectiveness of transformers in extracting detailed
temporal-spatial features, outperforming conventional
CNN-RNN models. The experimental results demonstrate
that the proposed MSCR and TE-CNN-RNN models outperform
existing state-of-the-art models for traffic
forecasting. These findings underscore the
transformative power of transformers for capturing
intricate temporal-spatial features and the importance
of multi-source data and deep learning techniques for
optimizing cell site management in the B5G era.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zaway:2024:OWC,
author = "Lassaad Zaway and Nader {Ben Amor} and Jalel Ktari and
Mohamed Jallouli and Larbi Chrifi Alaoui and Laurent
Delahoche",
title = "Optimization of Wheelchair Control via Multi-Modal
Integration: Combining Webcam and {EEG}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "158",
day = "3",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050158",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/158",
abstract = "Even though Electric Powered Wheelchairs (EPWs) are a
useful tool for meeting the needs of people with
disabilities, some disabled people find it difficult to
use regular EPWs that are joystick-controlled. Smart
wheelchairs that use Brain--Computer Interface (BCI)
technology present an efficient solution to this
problem. This article presents a cutting-edge
intelligent control wheelchair that is intended to
improve user involvement and security. The suggested
method combines facial expression analysis via a camera
with EEG signal processing using the EMOTIV Insight EEG
dataset. The system generates control commands by
identifying specific EEG patterns linked to facial
expressions such as eye blinking, winking left and
right, and smiling. Simultaneously, the system uses
computer vision algorithms and inertial measurements to
analyze gaze direction in order to establish the user's
intended steering. The outcomes of the experiments
prove that the proposed system is reliable and
efficient in meeting the various requirements of
people, presenting a positive development in the field
of smart wheelchair technology.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dang:2024:RAO,
author = "Tuan-Kiet Dang and Khai-Duy Nguyen and Binh
Kieu-Do-Nguyen and Trong-Thuc Hoang and Cong-Kha Pham",
title = "Realization of Authenticated One-Pass Key
Establishment on {RISC-V} Micro-Controller for {IoT}
Applications",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "157",
day = "3",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050157",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/risc-v.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/157",
abstract = "Internet-of-things networks consist of multiple sensor
devices spread over a wide area. In order to protect
the data from unauthorized access and tampering, it is
essential to ensure secure communication between the
sensor devices and the central server. This security
measure aims to guarantee authenticity,
confidentiality, and data integrity. Unlike traditional
computing systems, sensor node devices are often
limited regarding memory and computing power.
Lightweight communication protocols, such as LoRaWAN,
were introduced to overcome these limitations. However,
despite the lightweight feature, the protocol is
vulnerable to different types of attacks. This proposal
presents a highly secure key establishment protocol
that combines two cryptography schemes: Elliptic Curve
Qu--Vanstone and signcryption key encapsulation. The
protocol provides a method to establish a secure
channel that inherits the security properties of the
two schemes. Also, it allows for fast rekeying with
only one exchange message, significantly reducing the
handshake complexity in low-bandwidth communication. In
addition, the selected schemes complement each other
and share the same mathematical operations in elliptic
curve cryptography. Moreover, with the rise of a
community-friendly platform like RISC-V, we implemented
the protocol on a RISC-V system to evaluate its
overheads regarding the cycle count and execution
time.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Samuel:2024:FCS,
author = "Cyril Naves Samuel and Fran{\c{c}}ois Verdier and
Severine Glock and Patricia Guitton-Ouhamou",
title = "A Fair Crowd-Sourced Automotive Data Monetization
Approach Using Substrate Hybrid Consensus Blockchain",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "156",
day = "30",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050156",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/156",
abstract = "This work presents a private consortium
blockchain-based automotive data monetization
architecture implementation using the Substrate
blockchain framework. Architecture is decentralized
where crowd-sourced data from vehicles are collectively
auctioned ensuring data privacy and security. Smart
Contracts and OffChain worker interactions built along
with the blockchain make it interoperable with external
systems to send or receive data. The work is deployed
in a Kubernetes cloud platform and evaluated on
different parameters like throughput, hybrid consensus
algorithms AuRa and BABE, along with GRANDPA
performance in terms of forks and scalability for
increasing node participants. The hybrid consensus
algorithms are studied in depth to understand the
difference and performance in the separation of block
creation by AuRa and BABE followed by chain
finalization through the GRANDPA protocol.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Boeding:2024:NAT,
author = "Matthew Boeding and Michael Hempel and Hamid Sharif",
title = "Novel Approach towards a Fully Deep Learning-Based
{IoT} Receiver Architecture: From Estimation to
Decoding",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "155",
day = "30",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050155",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/155",
abstract = "As the Internet of Things (IoT) continues to expand,
wireless communication is increasingly widespread
across diverse industries and remote devices. This
includes domains such as Operational Technology in the
Smart Grid. Notably, there is a surge in
resource-constrained devices leveraging wireless
communication, especially with the advances of 5G/6G
technology. Nevertheless, the transmission of wireless
communications demands substantial power and
computational resources, presenting a significant
challenge to these devices and their operations. In
this work, we propose the use of deep learning to
improve the Bit Error Rate (BER) performance of
Orthogonal Frequency Division Multiplexing (OFDM)
wireless receivers. By improving the BER performance of
these receivers, devices can transmit with less power,
thereby improving IoT devices' battery life. The
architecture presented in this paper utilizes a
depthwise Convolutional Neural Network (CNN) for
channel estimation and demodulation, whereas a Graph
Neural Network (GNN) is utilized for Low-Density Parity
Check (LDPC) decoding, tested against a proposed (1998,
1512) LDPC code. Our results show higher performance
than traditional receivers in both isolated tests for
the CNN and GNN, and a combined end-to-end test with
lower computational complexity than other proposed deep
learning models. For BER improvement, our proposed
approach showed a 1 dB improvement for eliminating BER
in QPSK models. Additionally, it improved 16-QAM Rician
BER by five decades, 16-QAM LOS model BER by four
decades, 64-QAM Rician BER by 2.5 decades, and 64-QAM
LOS model BER by three decades.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sprunger:2024:MRP,
author = "John David Sprunger and Alvin Lim and David M. Bevly",
title = "A Method for the Rapid Propagation of Emergency Event
Notifications in a Long Vehicle Convoy",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "154",
day = "29",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050154",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/154",
abstract = "Convoys composed of autonomous vehicles could improve
the transportation and freight industries in several
ways. One of the avenues of improvement is in fuel
efficiency, where the vehicles maintain a close
following distance to each other in order to reduce air
resistance by way of the draft effect. While close
following distances improve fuel efficiency, they also
reduce both the margin of safety and the system's
tolerance to disturbances in relative position. The
system's tolerance to disturbances is known as string
stability, where the error magnitude either grows or
decays as it propagates rearward through the convoy.
One of the major factors in a system's string stability
is its delay in sending state updates to other
vehicles, the most pertinent being a hard braking
maneuver. Both external sensors and vehicle-to-vehicle
communication standards have relatively long delays
between peer vehicle state changes and the information
being actionable by the ego vehicle. The system
presented here, called the Convoy Vehicular Ad Hoc
Network (Convoy VANET), was designed to reliably
propagate emergency event messages with low delay while
maintaining reasonable channel efficiency. It
accomplishes this using a combination of several
techniques, notably relative position-based
retransmission delays. Our results using Network
Simulator 3 (ns3) show the system propagating messages
down a 20-vehicle convoy in less than 100 ms even with
more than a 35\% message loss between vehicles that are
not immediately adjacent. These simulation results show
the potential for this kind of system in situations
where emergency information must be disseminated
quickly in low-reliability wireless environments.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Nunez-Agurto:2024:NTC,
author = "Daniel Nu{\~n}ez-Agurto and Walter Fuertes and Luis
Marrone and Eduardo Benavides-Astudillo and Christian
Coronel-Guerrero and Franklin Perez",
title = "A Novel Traffic Classification Approach by Employing
Deep Learning on Software-Defined Networking",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "153",
day = "29",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050153",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/153",
abstract = "The ever-increasing diversity of Internet applications
and the rapid evolution of network infrastructure due
to emerging technologies have made network management
more challenging. Effective traffic classification is
critical for efficiently managing network resources and
aligning with service quality and security demands. The
centralized controller of software-defined networking
provides a comprehensive network view, simplifying
traffic analysis and offering direct programmability
features. When combined with deep learning techniques,
these characteristics enable the incorporation of
intelligence into networks, leading to optimization and
improved network management and maintenance. Therefore,
this research aims to develop a model for traffic
classification by application types and network attacks
using deep learning techniques to enhance the quality
of service and security in software-defined networking.
The SEMMA method is employed to deploy the model, and
the classifiers are trained with four algorithms,
namely LSTM, BiLSTM, GRU, and BiGRU, using selected
features from two public datasets. These results
underscore the remarkable effectiveness of the GRU
model in traffic classification. Hence, the outcomes
achieved in this research surpass state-of-the-art
methods and showcase the effectiveness of a deep
learning model within a traffic classification in an
SDN environment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jamal:2024:HMA,
author = "Mansoor Jamal and Zaib Ullah and Muddasar Naeem and
Musarat Abbas and Antonio Coronato",
title = "A Hybrid Multi-Agent Reinforcement Learning Approach
for Spectrum Sharing in Vehicular Networks",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "152",
day = "28",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050152",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/152",
abstract = "Efficient spectrum sharing is essential for maximizing
data communication performance in Vehicular Networks
(VNs). In this article, we propose a novel hybrid
framework that leverages Multi-Agent Reinforcement
Learning (MARL), thereby combining both centralized and
decentralized learning approaches. This framework
addresses scenarios where multiple vehicle-to-vehicle
(V2V) links reuse the frequency spectrum preoccupied by
vehicle-to-infrastructure (V2I) links. We introduce the
QMIX technique with the Deep Q Networks (DQNs)
algorithm to facilitate collaborative learning and
efficient spectrum management. The DQN technique uses a
neural network to approximate the Q value function in
high-dimensional state spaces, thus mapping input
states to (action, Q value) tables that facilitate
self-learning across diverse scenarios. Similarly, the
QMIX is a value-based technique for multi-agent
environments. In the proposed model, each V2V agent
having its own DQN observes the environment, receives
observation, and obtains a common reward. The QMIX
network receives Q values from all agents considering
individual benefits and collective objectives. This
mechanism leads to collective learning while V2V agents
dynamically adapt to real-time conditions, thus
improving VNs performance. Our research finding
highlights the potential of hybrid MARL models for
dynamic spectrum sharing in VNs and paves the way for
advanced cooperative learning strategies in vehicular
communication environments. Furthermore, we conducted
an in-depth exploration of the simulation environment
and performance evaluation criteria, thus concluding in
a comprehensive comparative analysis with cutting-edge
solutions in the field. Simulation results show that
the proposed framework efficiently performs against the
benchmark architecture in terms of V2V transmission
probability and V2I peak data transfer.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Aung:2024:EMS,
author = "Aye Nyein Aung and Che-Wei Liao and Jeih-Weih Hung",
title = "Effective Monoaural Speech Separation through
Convolutional Top-Down Multi-View Network",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "151",
day = "28",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050151",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/151",
abstract = "Speech separation, sometimes known as the ``cocktail
party problem'', is the process of separating
individual speech signals from an audio mixture that
includes ambient noises and several speakers. The goal
is to extract the target speech in this complicated
sound scenario and either make it easier to understand
or increase its quality so that it may be used in
subsequent processing. Speech separation on overlapping
audio data is important for many speech-processing
tasks, including natural language processing, automatic
speech recognition, and intelligent personal
assistants. New speech separation algorithms are often
built on a deep neural network (DNN) structure, which
seeks to learn the complex relationship between the
speech mixture and any specific speech source of
interest. DNN-based speech separation algorithms
outperform conventional statistics-based methods,
although they typically need a lot of processing and/or
a larger model size. This study presents a new
end-to-end speech separation network called
ESC-MASD-Net (effective speaker separation through
convolutional multi-view attention and SuDoRM-RF
network), which has relatively fewer model parameters
compared with the state-of-the-art speech separation
architectures. The network is partly inspired by the
SuDoRM-RF++ network, which uses multiple
time-resolution features with downsampling and
resampling for effective speech separation.
ESC-MASD-Net incorporates the multi-view attention and
residual conformer modules into SuDoRM-RF++.
Additionally, the U-Convolutional block in ESC-MASD-Net
is refined with a conformer layer. Experiments
conducted on the WHAM! dataset show that ESC-MASD-Net
outperforms SuDoRM-RF++ significantly in the SI-SDRi
metric. Furthermore, the use of the conformer layer has
also improved the performance of ESC-MASD-Net.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhang:2024:EDI,
author = "Jingzhe Zhang and Tiange Chen and Wenjie Gong and
Jiayue Liu and Jiangjie Chen",
title = "Exploring Data Input Problems in Mixed Reality
Environments: Proposal and Evaluation of Natural
Interaction Techniques",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "150",
day = "27",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050150",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/150",
abstract = "Data input within mixed reality environments poses
significant interaction challenges, notably in
immersive visual analytics applications. This study
assesses five numerical input techniques: three
benchmark methods (Touch-Slider, Keyboard,
Pinch-Slider) and two innovative multimodal techniques
(Bimanual Scaling, Gesture and Voice). An experimental
design was employed to compare these techniques' input
efficiency, accuracy, and user experience across
varying precision and distance conditions. The findings
reveal that multimodal techniques surpass slider
methods in input efficiency yet are comparable to
keyboards; the voice method excels in reducing
cognitive load but falls short in accuracy; and the
scaling method marginally leads in user satisfaction
but imposes a higher physical load. Furthermore, this
study outlines these techniques' pros and cons and
offers design guidelines and future research
directions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Calvagna:2024:BBR,
author = "Andrea Calvagna and Giovanni Marotta and Giuseppe
Pappalardo and Emiliano Tramontana",
title = "A Blockchain-Based Real-Time Power Balancing Service
for Trustless Renewable Energy Grids",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "5",
pages = "149",
day = "26",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16050149",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon May 27 07:17:16 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/5/149",
abstract = "We face a decentralized renewable energy production
scenario, where a large number of small energy
producers, i.e., prosumers, contribute to a common
distributor entity, who resells energy directly to
end-users. A major challenge for the distributor is to
ensure power stability, constantly balancing produced
vs consumed energy flows. In this context, being able
to provide quick restore actions in response to
unpredictable unbalancing events is a must, as
fluctuations are the norm for renewable energy sources.
To this aim, the high scalability and diversity of
sources are crucial requirements for the said balancing
to be actually manageable. In this study, we explored
the challenges and benefits of adopting a
blockchain-based software architecture as a scalable,
trustless interaction platform between prosumers' smart
energy meters and the distributor. Our developed
prototype accomplishes the energy load balancing
service via smart contracts deployed in a real
blockchain network with an increasing number of
simulated prosumers. We show that the blockchain-based
application managed to react in a timely manner to
energy unbalances for up to a few hundred prosumers.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lai:2024:ASR,
author = "Joel Weijia Lai",
title = "Adapting Self-Regulated Learning in an Age of
Generative Artificial Intelligence Chatbots",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "218",
day = "20",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060218",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/218",
abstract = "The increasing use of generative artificial
intelligence (GenAI) has led to a rise in conversations
about how teachers and students should adopt these
tools to enhance the learning process. Self-regulated
learning (SRL) research is important for addressing
this question. A popular form of GenAI is the large
language model chatbot, which allows users to seek
answers to their queries. This article seeks to adapt
current SRL models to understand student learning with
these chatbots. This is achieved by classifying the
prompts supplied by a learner to an educational chatbot
into learning actions and processes using the
process--action library. Subsequently, through process
mining, we can analyze these data to provide valuable
insights for learners, educators, instructional
designers, and researchers into the possible
applications of chatbots for SRL.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chen:2024:ODP,
author = "Shaolong Chen and Yunzi Dai and Liwei Liu and Xinting
Yu",
title = "Optimizing Data Parallelism for {FM}-Based Short-Read
Alignment on the Heterogeneous Non-Uniform Memory
Access Architectures",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "217",
day = "19",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060217",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/217",
abstract = "Sequence alignment is a critical factor in the variant
analysis of genomic research. Since the FM
(Ferrainas--Manzini) index was developed, it has proven
to be a model in a compact format with efficient
pattern matching and high-speed query searching, which
has attracted much research interest in the field of
sequence alignment. Such characteristics make it a
convenient tool for handling large-scale sequence
alignment projects executed with a small memory. In
bioinformatics, the massive success of next-generation
sequencing technology has led to an exponential growth
in genomic data, presenting a computational challenge
for sequence alignment. In addition, the use of a
heterogeneous computing system, composed of various
types of nodes, is prevalent in the field of HPC
(high-performance computing), which presents a
promising solution for sequence alignment. However,
conventional methodologies in short-read alignment are
limited in performance on current heterogeneous
computing infrastructures. Therefore, we developed a
parallel sequence alignment to investigate the
applicability of this approach in NUMA-based
(Non-Uniform Memory Access) heterogeneous architectures
against traditional alignment algorithms. This proposed
work combines the LF (longest-first) distribution
policy with the EP (enhanced partitioning) strategy for
effective load balancing and efficient parallelization
among heterogeneous architectures. The newly proposed
LF-EP-based FM aligner shows excellent efficiency and a
significant improvement over NUMA-based heterogeneous
computing platforms. We provide significantly improved
performance over several popular FM aligners in many
dimensions such as read length, sequence number,
sequence distance, alignment speedup, and result
quality. These resultant evaluation metrics cover the
quality assessment, complexity analysis, and speedup
evaluation of our approach. Utilizing the capabilities
of NUMA-based heterogeneous computing architectures,
our approach effectively provides a convenient solution
for large-scale short-read alignment in the
heterogeneous system.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Harutyunyan:2024:DCA,
author = "Ashot Harutyunyan and Arnak Poghosyan and Tigran
Bunarjyan and Andranik Haroyan and Marine Harutyunyan
and Lilit Harutyunyan and Nelson Baloian",
title = "Discovery of Cloud Applications from Logs",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "216",
day = "18",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060216",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/216",
abstract = "Continuous discovery and update of applications or
their boundaries running in cloud environments in an
automatic way is a highly required function of modern
data center operation solutions. Prior attempts to
address this problem within various products or
projects were/are applying rule-driven approaches or
machine learning techniques on specific types of
data--network traffic as well as property/configuration
data of infrastructure objects, which all have their
drawbacks in effectively identifying roles of those
resources. The current proposal (ADLog) leverages log
data of sources, which contain incomparably richer
contextual information, and demonstrates a reliable way
of discriminating application objects. Specifically,
using native constructs of VMware Aria Operations for
Logs in terms of event types and their distributions,
we group those entities, which then can be potentially
enriched with indicative tags automatically and
recommended for further management tasks and policies.
Our methods differentiate not only diverse kinds of
applications, but also their specific deployments, thus
providing hierarchical representation of the
applications in time and topology. For several
applications under Aria Ops management in our
experimental test bed, we discover those in terms of
similarity behavior of their components with a high
accuracy. The validation of the proposal paves the path
for an AI-driven solution in cloud management
scenarios.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Filho:2024:DTM,
author = "Vitor Hugo dos Santos Filho and Luis Maur{\'\i}cio
Martins de Resende and Joseane Pontes",
title = "Development of a Theoretical Model for Digital Risks
Arising from the Implementation of {Industry 4.0}
({TMR-I4.0})",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "215",
day = "17",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060215",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/215",
abstract = "This study aims to develop a theoretical model for
digital risks arising from implementing Industry 4.0
(represented by the acronym TMR-I4.0). A systematic
literature review was initially conducted using the
Methodi Ordinatio methodology to map the principal
dimensions and digital risks associated with Industry
4.0 in order to achieve this objective. After
completing the nine steps of Methodi, a bibliographic
portfolio with 118 articles was obtained. These
articles were then subjected to content analysis using
QSR Nvivo {\reg} version 10 software to categorize
digital risks. The analysis resulted in the
identification of 9 dimensions and 43 digital risks.
The categorization of these risks allowed the
construction of maps showing the digital risks and
their impacts resulting from the implementation of
Industry 4.0. This study advances the literature by
proposing a comprehensive categorization of digital
risks associated with Industry 4.0, which resulted from
an exhaustive literature review. At the conclusion of
the study, based on the proposed Theoretical Risk Model
for Digital Risks arising from the implementation of
Industry 4.0, a research agenda for future studies will
be proposed, enabling other researchers to further
explore the landscape of digital risks in Industry
4.0.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Nunes:2024:AFM,
author = "Pedro Nunes and Eug{\'e}nio Rocha and Jos{\'e}
Santos",
title = "Adaptive Framework for Maintenance Scheduling Based on
Dynamic Preventive Intervals and Remaining Useful Life
Estimation",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "214",
day = "17",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060214",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/214",
abstract = "Data-based prognostic methods exploit sensor data to
forecast the remaining useful life (RUL) of industrial
settings to optimize the scheduling of maintenance
actions. However, implementing sensors may not be
cost-effective or practical for all components.
Traditional preventive approaches are not based on
sensor data; however, they schedule maintenance at
equally spaced intervals, which is not a cost-effective
approach since the distribution of the time between
failures changes with the degradation state of other
parts or changes in working conditions. This study
introduces a novel framework comprising two maintenance
scheduling strategies. In the absence of sensor data,
we propose a novel dynamic preventive policy that
adjusts intervention intervals based on the most recent
failure data. When sensor data are available, a method
for RUL prediction, designated k-LSTM-GFT, is enhanced
to dynamically account for RUL prediction uncertainty.
The results demonstrate that dynamic preventive
maintenance can yield cost reductions of up to 51.8\%
compared to conventional approaches. The predictive
approach optimizes the exploitation of RUL, achieving
costs that are only 3--5\% higher than the minimum cost
achievable while ensuring the safety of critical
systems since all of the failures are avoided.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fang:2024:LMC,
author = "Cheng Fang and Feifei Liang and Tianchi Li and
Fangheng Guan",
title = "Learning Modality Consistency and Difference
Information with Multitask Learning for Multimodal
Sentiment Analysis",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "213",
day = "17",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060213",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/213",
abstract = "The primary challenge in Multimodal sentiment analysis
(MSA) lies in developing robust joint representations
that can effectively learn mutual information from
diverse modalities. Previous research in this field
tends to rely on feature concatenation to obtain joint
representations. However, these approaches fail to
fully exploit interactive patterns to ensure
consistency and differentiation across different
modalities. To address this limitation, we propose a
novel framework for multimodal sentiment analysis,
named CDML (Consistency and Difference using a
Multitask Learning network). Specifically, CDML uses an
attention mechanism to assign the attention weights of
each modality efficiently. Adversarial training is used
to obtain consistent information between modalities.
Finally, the difference among the modalities is
acquired by the multitask learning framework.
Experiments on two benchmark MSA datasets, CMU-MOSI and
CMU-MOSEI, showcase that our proposed method
outperforms the seven existing approaches by at least
1.3\% for Acc-2 and 1.7\% for F1.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Garg:2024:IIM,
author = "Umang Garg and Santosh Kumar and Aniket Mahanti",
title = "{IMTIBOT}: an Intelligent Mitigation Technique for
{IoT} Botnets",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "212",
day = "17",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060212",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/212",
abstract = "The tremendous growth of the Internet of Things (IoT)
has gained a lot of attention in the global market. The
massive deployment of IoT is also inherent in various
security vulnerabilities, which become easy targets for
hackers. IoT botnets are one type of critical malware
that degrades the performance of the IoT network and is
difficult to detect by end-users. Although there are
several traditional IoT botnet mitigation techniques
such as access control, data encryption, and secured
device configuration, these traditional mitigation
techniques are difficult to apply due to normal traffic
behavior, similar packet transmission, and the
repetitive nature of IoT network traffic. Motivated by
botnet obfuscation, this article proposes an
intelligent mitigation technique for IoT botnets, named
IMTIBoT. Using this technique, we harnessed the
stacking of ensemble classifiers to build an
intelligent system. This stacking classifier technique
was tested using an experimental testbed of IoT nodes
and sensors. This system achieved an accuracy of 0.984,
with low latency.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Qian:2024:IPF,
author = "Jingshi Qian and Jiahe Li and Nobuyoshi Komuro and
Won-Suk Kim and Younghwan Yoo",
title = "Improved Particle Filter in Machine Learning-Based
{BLE} Fingerprinting Method to Reduce Indoor Location
Estimation Errors",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "211",
day = "15",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060211",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/211",
abstract = "Indoor position fingerprint-based location estimation
methods have been widely used by applications on
smartphones. In these localization estimation methods,
it is very popular to use the RSSI (Received Signal
Strength Indication) of signals to represent the
position fingerprint. This paper proposes the design of
a particle filter for reducing the estimation error of
the machine learning-based indoor BLE location
fingerprinting method. Unlike the general particle
filter, taking into account the distance, the proposed
system designs improved likelihood functions,
considering the coordinates based on fingerprint points
using mean and variance of RSSI values, combining the
particle filter with the k-NN (k-Nearest Neighbor)
algorithm to realize the reduction in indoor
positioning error. The initial position is estimated by
the position fingerprinting method based on the machine
learning method. By comparing the fingerprint method
based on k-NN with general particle filter processing,
and the fingerprint estimation method based on only
k-NN or SVM (Support Vector Machine), experiment
results showed that the proposed method has a smaller
minimum error and a better average error than the
conventional method.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2024:RDH,
author = "Xu Wang and Jui-Chuan Liu and Ching-Chun Chang and
Chin-Chen Chang",
title = "Reversible Data Hiding in Encrypted {3D} Mesh Models
Based on Multi-Group Partition and Closest Pair
Prediction",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "210",
day = "15",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060210",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/210",
abstract = "The reversible data hiding scheme in the encrypted
domain is a potential solution to the concerns
regarding user privacy in cloud applications. The 3D
mesh model is an emerging file format and is widely
used in engineering modeling, special effects, and
video games. However, studies on reversible data hiding
in encrypted 3D mesh models are still in the
preliminary stage. In this paper, two novel techniques,
multi-group partition (MGP) and closest pair prediction
(CPP), are proposed to improve performance. The MGP
technique adaptively classifies vertices into reference
and embeddable vertices, while the CPP technique
efficiently predicts embeddable vertices and generates
shorter recovery information to vacate more redundancy
for additional data embedding. Experimental results
indicate that the proposed scheme significantly
improves the embedding rate compared to
state-of-the-art schemes and can be used in real-time
applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhang:2024:AKA,
author = "Jiayi Zhang and Abdelkader Ouda and Raafat Abu-Rukba",
title = "Authentication and Key Agreement Protocol in Hybrid
Edge--Fog--Cloud Computing Enhanced by {5G} Networks",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "209",
day = "14",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060209",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/209",
abstract = "The Internet of Things (IoT) has revolutionized
connected devices, with applications in healthcare,
data analytics, and smart cities. For time-sensitive
applications, 5G wireless networks provide
ultra-reliable low-latency communication (URLLC) and
fog computing offloads IoT processing. Integrating 5G
and fog computing can address cloud computing's
deficiencies, but security challenges remain,
especially in Authentication and Key Agreement aspects
due to the distributed and dynamic nature of fog
computing. This study presents an innovative mutual
Authentication and Key Agreement protocol that is
specifically tailored to meet the security needs of fog
computing in the context of the edge--fog--cloud
three-tier architecture, enhanced by the incorporation
of the 5G network. This study improves security in the
edge--fog--cloud context by introducing a stateless
authentication mechanism and conducting a comparative
analysis of the proposed protocol with well-known
alternatives, such as TLS 1.3, 5G-AKA, and various
handover protocols. The suggested approach has a total
transmission cost of only 1280 bits in the
authentication phase, which is approximately 30\% lower
than other protocols. In addition, the suggested
handover protocol only involves two signaling expenses.
The computational cost for handover authentication for
the edge user is significantly low, measuring 0.243 ms,
which is under 10\% of the computing costs of other
authentication protocols.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cotti:2024:EEU,
author = "Luca Cotti and Davide Guizzardi and Barbara Rita
Barricelli and Daniela Fogli",
title = "Enabling End-User Development in Smart Homes: a
Machine Learning-Powered Digital Twin for Energy
Efficient Management",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "208",
day = "14",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060208",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/208",
abstract = "End-User Development has been proposed over the years
to allow end users to control and manage their Internet
of Things-based environments, such as smart homes. With
End-User Development, end users are able to create
trigger-action rules or routines to tailor the behavior
of their smart homes. However, the scientific research
proposed to date does not encompass methods that
evaluate the suitability of user-created routines in
terms of energy consumption. This paper proposes using
Machine Learning to build a Digital Twin of a smart
home that can predict the energy consumption of smart
appliances. The Digital Twin will allow end users to
simulate possible scenarios related to the creation of
routines. Simulations will be used to assess the
effects of the activation of appliances involved in the
routines under creation and possibly modify them to
save energy consumption according to the Digital Twin's
suggestions.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Soares:2024:TNB,
author = "Rendrikson Soares and Andr{\'e} Ara{\'u}jo",
title = "Towards a New Business Model for Streaming Platforms
Using Blockchain Technology",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "207",
day = "13",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060207",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/207",
abstract = "Streaming platforms have revolutionized the digital
entertainment industry, but challenges and research
opportunities remain to be addressed. One current
concern is the lack of transparency in the business
model of video streaming platforms, which makes it
difficult for content creators to access viewing
metrics and receive payments without the intermediary
of third parties. Additionally, there is no way to
trace payment transactions. This article presents a
computational architecture based on blockchain
technology to enable transparency in audience
management and payments in video streaming platforms.
Smart contracts will define the business rules of the
streaming services, while middleware will integrate the
metadata of the streaming platforms with the proposed
computational solution. The proposed solution has been
validated through data transactions on different
blockchain networks and interviews with content
creators from video streaming platforms. The results
confirm the viability of the proposed solution in
enhancing transparency and auditability in the realm of
audience control services and payments on video
streaming platforms.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bagunaid:2024:VDP,
author = "Wala Bagunaid and Naveen Chilamkurti and Ahmad Salehi
Shahraki and Saeed Bamashmos",
title = "Visual Data and Pattern Analysis for Smart Education:
a Robust {DRL}-Based Early Warning System for Student
Performance Prediction",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "206",
day = "11",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060206",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/206",
abstract = "Artificial Intelligence (AI) and Deep Reinforcement
Learning (DRL) have revolutionised e-learning by
creating personalised, adaptive, and secure
environments. However, challenges such as privacy,
bias, and data limitations persist. E-FedCloud aims to
address these issues by providing more agile,
personalised, and secure e-learning experiences. This
study introduces E-FedCloud, an AI-assisted, adaptive
e-learning system that automates personalised
recommendations and tracking, thereby enhancing student
performance. It employs federated learning-based
authentication to ensure secure and private access for
both course instructors and students. Intelligent
Software Agents (ISAs) evaluate weekly student
engagement using the Shannon Entropy method,
classifying students into either engaged or not-engaged
clusters. E-FedCloud utilises weekly engagement status,
demographic information, and an innovative DRL-based
early warning system, specifically ID2QN, to predict
the performance of not-engaged students. Based on these
predictions, the system categorises students into three
groups: risk of dropping out, risk of scoring lower in
the final exam, and risk of failing the end exam. It
employs a multi-disciplinary ontology graph and an
attention-based capsule network for automated,
personalised recommendations. The system also
integrates performance tracking to enhance student
engagement. Data are securely stored on a blockchain
using the LWEA encryption method.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tan:2024:EES,
author = "Wuzheng Tan and Shenglong Du and Jian Weng",
title = "Enhancing Efficiency and Security in Unbalanced
{PSI-CA} Protocols through Cloud Computing and
Homomorphic Encryption in Mobile Networks",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "205",
day = "7",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060205",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/205",
abstract = "Private Set Intersection Cardinality (PSI-CA) is a
cryptographic method in secure multi-party computation
that allows entities to identify the cardinality of the
intersection without revealing their private data.
Traditional approaches assume similar-sized datasets
and equal computational power, overlooking practical
imbalances. In real-world applications, dataset sizes
and computational capacities often vary, particularly
in Internet of Things and mobile scenarios where device
limitations restrict computational types. Traditional
PSI-CA protocols are inefficient here, as computational
and communication complexities correlate with the size
of larger datasets. Thus, adapting PSI-CA protocols to
these imbalances is crucial. This paper explores
unbalanced scenarios where one party (the receiver) has
a relatively small dataset and limited computational
power, while the other party (the sender) has a large
amount of data and strong computational
capabilities.This paper, based on the concept of
commutative encryption, introduces Cuckoo filter, cloud
computing technology, and homomorphic encryption, among
other technologies, to construct three novel solutions
for unbalanced Private Set Intersection Cardinality
(PSI-CA): an unbalanced PSI-CA protocol based on Cuckoo
filter, an unbalanced PSI-CA protocol based on
single-cloud assistance, and an unbalanced PSI-CA
protocol based on dual-cloud assistance. Depending on
performance and security requirements, different
protocols can be employed for various applications.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alshamari:2024:UEW,
author = "Majed A. Alshamari and Maha M. Althobaiti",
title = "Usability Evaluation of Wearable Smartwatches Using
Customized Heuristics and System Usability Scale
Score",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "204",
day = "6",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060204",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/204",
abstract = "The mobile and wearable nature of smartwatches poses
challenges in evaluating their usability. This paper
presents a study employing customized heuristic
evaluation and use of the system usability scale (SUS)
on four smartwatches, along with their mobile
applications. A total of 11 heuristics were developed
and validated by experts by combining Nielsen's
heuristic and Motti and Caines' heuristics. In this
study, 20 participants used the watches and
participated in the SUS survey. A total of 307
usability issues were reported by the evaluators. The
results of this study show that the Galaxy Watch 5
scored highest in terms of efficiency, ease of use,
features, and battery life compared to the other three
smartwatches and has fewer usability issues. The
results indicate that ease of use, features, and
flexibility are important usability attributes for
future smartwatches. The Galaxy Watch 5 received the
highest SUS score of 87.375. Both evaluation methods
showed no significant differences in results, and
customized heuristics were found to be useful for
smartwatch evaluation.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Orrillo:2024:ERA,
author = "H{\'e}ctor Orrillo and Andr{\'e} Sabino and M{\'a}rio
Marques da Silva",
title = "Evaluation of Radio Access Protocols for {V2X} in {6G}
Scenario-Based Models",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "203",
day = "6",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060203",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/203",
abstract = "The expansion of mobile connectivity with the arrival
of 6G paves the way for the new Internet of Verticals
(6G-IoV), benefiting autonomous driving. This article
highlights the importance of vehicle-to-everything
(V2X) and vehicle-to-vehicle (V2V) communication in
improving road safety. Current technologies such as
IEEE 802.11p and LTE-V2X are being improved, while new
radio access technologies promise more reliable,
lower-latency communications. Moreover, 3GPP is
developing NR-V2X to improve the performance of
communications between vehicles, while IEEE proposes
the 802.11bd protocol, aiming for the greater
interoperability and detection of transmissions between
vehicles. Both new protocols are being developed and
improved to make autonomous driving more efficient.
This study analyzes and compares the performance of the
protocols mentioned, namely 802.11p, 802.11bd, LTE-V2X,
and NR-V2X. The contribution of this study is to
identify the most suitable protocol that meets the
requirements of V2V communications in autonomous
driving. The relevance of V2V communication has driven
intense research in the scientific community. Among the
various applications of V2V communication are
Cooperative Awareness, V2V Unicast Exchange, and V2V
Decentralized Environmental Notification, among others.
To this end, the performance of the Link Layer of these
protocols is evaluated and compared. Based on the
analysis of the results, it can be concluded that
NR-V2X outperforms IEEE 802.11bd in terms of
transmission latency (L) and data rate (DR). In terms
of the packet error rate (PER), it is shown that both
LTE-V2X and NR-V2X exhibit a lower PER compared to IEEE
protocols, especially as the distance between the
vehicles increases. This advantage becomes even more
significant in scenarios with greater congestion and
network interference.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Loor:2024:MSI,
author = "Fernando Loor and Veronica Gil-Costa and Mauricio
Marin",
title = "Metric Space Indices for Dynamic Optimization in a
Peer to Peer-Based Image Classification Crowdsourcing
Platform",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "202",
day = "6",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060202",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/202",
abstract = "Large-scale computer platforms that process users'
online requests must be capable of handling unexpected
spikes in arrival rates. These platforms, which are
composed of distributed components, can be configured
with parameters to ensure both the quality of the
results obtained for each request and low response
times. In this work, we propose a dynamic optimization
engine based on metric space indexing to address this
problem. The engine is integrated into the platform and
periodically monitors performance metrics to determine
whether new configuration parameter values need to be
computed. Our case study focuses on a P2P platform
designed for classifying crowdsourced images related to
natural disasters. We evaluate our approach under
scenarios with high and low workloads, comparing it
against alternative methods based on deep reinforcement
learning. The results show that our approach reduces
processing time by an average of 40\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rodrigues:2024:ICC,
author = "Gabriel Arquelau Pimenta Rodrigues and Andr{\'e} Luiz
Marques Serrano and Guilherme Fay Vergara and Robson de
Oliveira Albuquerque and Georges Daniel Amvame Nze",
title = "Impact, Compliance, and Countermeasures in Relation to
Data Breaches in Publicly Traded {U.S.} Companies",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "201",
day = "5",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060201",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/201",
abstract = "A data breach is the unauthorized disclosure of
sensitive personal data, and it impacts millions of
individuals annually in the United States, as reported
by Privacy Rights Clearinghouse. These breaches
jeopardize the physical safety of the individuals whose
data are exposed and result in substantial economic
losses for the affected companies. To diminish the
frequency and severity of data breaches in the future,
it is imperative to research their causes and explore
preventive measures. In pursuit of this goal, this
study considers a dataset of data breach incidents
affecting companies listed on the New York Stock
Exchange and NASDAQ. This dataset has been augmented
with additional information regarding the targeted
company. This paper employs statistical visualizations
of the data to clarify these incidents and assess their
consequences on the affected companies and individuals
whose data were compromised. We then propose mitigation
controls based on established frameworks such as the
NIST Cybersecurity Framework. Additionally, this paper
reviews the compliance scenario by examining the
relevant laws and regulations applicable to each case,
including SOX, HIPAA, GLBA, and PCI-DSS, and evaluates
the impacts of data breaches on stock market prices. We
also review guidelines for appropriately responding to
data leaks in the U.S., for compliance achievement and
cost reduction. By conducting this analysis, this work
aims to contribute to a comprehensive understanding of
data breaches and empower organizations to safeguard
against them proactively, improving the technical
quality of their basic services. To our knowledge, this
is the first paper to address compliance with data
protection regulations, security controls as
countermeasures, financial impacts on stock prices, and
incident response strategies. Although the discussion
is focused on publicly traded companies in the United
States, it may also apply to public and private
companies worldwide.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Javed:2024:ILM,
author = "Abbas Javed and Amna Ehtsham and Muhammad Jawad and
Muhammad Naeem Awais and Ayyaz-ul-Haq Qureshi and Hadi
Larijani",
title = "Implementation of Lightweight Machine Learning-Based
Intrusion Detection System on {IoT} Devices of Smart
Homes",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "200",
day = "5",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060200",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/200",
abstract = "Smart home devices, also known as IoT devices, provide
significant convenience; however, they also present
opportunities for attackers to jeopardize homeowners'
security and privacy. Securing these IoT devices is a
formidable challenge because of their limited
computational resources. Machine learning-based
intrusion detection systems (IDSs) have been
implemented on the edge and the cloud; however, IDSs
have not been embedded in IoT devices. To address this,
we propose a novel machine learning-based two-layered
IDS for smart home IoT devices, enhancing accuracy and
computational efficiency. The first layer of the
proposed IDS is deployed on a microcontroller-based
smart thermostat, which uploads the data to a website
hosted on a cloud server. The second layer of the IDS
is deployed on the cloud side for classification of
attacks. The proposed IDS can detect the threats with
an accuracy of 99.50\% at cloud level
(multiclassification). For real-time testing, we
implemented the Raspberry Pi 4-based adversary to
generate a dataset for man-in-the-middle (MITM) and
denial of service (DoS) attacks on smart thermostats.
The results show that the XGBoost-based IDS detects
MITM and DoS attacks in 3.51 ms on a smart thermostat
with an accuracy of 97.59\%.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{RuizVinals:2024:MFA,
author = "Carmen {Ruiz Vi{\~n}als} and Marta {Gil
Ib{\'a}{\~n}ez} and Jos{\'e} Luis {Del Olmo Arriaga}",
title = "Metaverse and Fashion: an Analysis of Consumer Online
Interest",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "199",
day = "4",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060199",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/199",
abstract = "Recent studies have demonstrated the value that the
Internet and web applications bring to businesses.
Among other tools are those that enable the analysis
and monitoring of searches, such as Google Trends,
which is currently used by the fashion industry to
guide experiential practices in a context of augmented
reality and/or virtual reality, and even to predict
purchasing behaviours through the metaverse. Data from
this tool provide insight into fashion consumer search
patterns. Understanding and managing this digital tool
is an essential factor in rethinking businesses'
marketing strategies. The aim of this study is to
analyse online user search behaviour by analysing and
monitoring the terms ``metaverse'' and ``fashion'' on
Google Trends. A quantitative descriptive
cross-sectional method was employed. The results show
that there is growing consumer interest in both
concepts on the Internet, despite the lack of
homogeneity in the behaviour of the five Google search
tools.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vasilakopoulos:2024:UAI,
author = "Zisis Vasilakopoulos and Theocharis Tavantzis and
Rafail Promikyridis and Efthimios Tambouris",
title = "The Use of Artificial Intelligence in
{eParticipation}: Mapping Current Research",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "198",
day = "3",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060198",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/198",
abstract = "Electronic Participation (eParticipation) enables
citizens to engage in political and decision-making
processes using information and communication
technologies. As in many other fields, Artificial
Intelligence (AI) has recently started to dictate some
of the realities of eParticipation. As a result, an
increasing number of studies are investigating the use
of AI in eParticipation. The aim of this paper is to
map current research on the use of AI in
eParticipation. Following PRISMA methodology, the
authors identified 235 relevant papers in Web of
Science and Scopus and selected 46 studies for review.
For analysis purposes, an analysis framework was
constructed that combined eParticipation elements
(namely actors, activities, effects, contextual
factors, and evaluation) with AI elements (namely
areas, algorithms, and algorithm evaluation). The
results suggest that certain eParticipation actors and
activities, as well as AI areas and algorithms, have
attracted significant attention from researchers.
However, many more remain largely unexplored. The
findings can be of value to both academics looking for
unexplored research fields and practitioners looking
for empirical evidence on what works and what does
not.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Maher:2024:HEN,
author = "Carol Maher and Kylie A. Dankiw and Ben Singh and
Svetlana Bogomolova and Rachel G. Curtis",
title = "In-Home Evaluation of the Neo Care Artificial
Intelligence Sound-Based Fall Detection System",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "197",
day = "2",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060197",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/197",
abstract = "The Neo Care home monitoring system aims to detect
falls and other events using artificial intelligence.
This study evaluated Neo Care's accuracy and explored
user perceptions through a 12-week in-home trial with
18 households of adults aged 65+ years old at risk of
falls (mean age: 75.3 years old; 67\% female).
Participants logged events that were cross-referenced
with Neo Care logs to calculate sensitivity and
specificity for fall detection and response.
Qualitative interviews gathered in-depth user feedback.
During the trial, 28 falls/events were documented, with
12 eligible for analysis as others occurred outside the
home or when devices were offline. Neo Care was
activated 4939 times---4930 by everyday household
sounds and 9 by actual falls. Fall detection
sensitivity was 75.00\% and specificity 6.80\%. For
responding to falls, sensitivity was 62.50\% and
specificity 17.28\%. Users felt more secure with Neo
Care but identified needs for further calibration to
improve accuracy. Advantages included avoiding
wearables, while key challenges were misinterpreting
noises and occasional technical issues like going
offline. Suggested improvements were visual indicators,
trigger words, and outdoor capability. The study
demonstrated Neo Care's potential with modifications.
Users found it beneficial, but highlighted areas for
improvement. Real-world evaluations and user-centered
design are crucial for healthcare technology
development.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Baabdullah:2024:EFL,
author = "Tahani Baabdullah and Amani Alzahrani and Danda B.
Rawat and Chunmei Liu",
title = "Efficiency of Federated Learning and Blockchain in
Preserving Privacy and Enhancing the Performance of
Credit Card Fraud Detection ({CCFD}) Systems",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "196",
day = "2",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060196",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/196",
abstract = "Increasing global credit card usage has elevated it to
a preferred payment method for daily transactions,
underscoring its significance in global financial
cybersecurity. This paper introduces a credit card
fraud detection (CCFD) system that integrates federated
learning (FL) with blockchain technology. The
experiment employs FL to establish a global learning
model on the cloud server, which transmits initial
parameters to individual local learning models on fog
nodes. With three banks (fog nodes) involved, each bank
trains its learning model locally, ensuring data
privacy, and subsequently sends back updated parameters
to the global learning model. Through the integration
of FL and blockchain, our system ensures privacy
preservation and data protection. We utilize three
machine learning and deep neural network learning
algorithms, RF, CNN, and LSTM, alongside deep
optimization techniques such as ADAM, SGD, and MSGD.
The SMOTE oversampling technique is also employed to
balance the dataset before model training. Our proposed
framework has demonstrated efficiency and effectiveness
in enhancing classification performance and prediction
accuracy.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Volosciuc:2024:GIB,
author = "Cristian Volosciuc and Razvan Bogdan and Bianca
Blajovan and Cristina St{\^a}ngaciu and Marius Marcu",
title = "{GreenLab}, an {IoT}-Based Small-Scale Smart
Greenhouse",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "195",
day = "31",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060195",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/195",
abstract = "In an era of connectivity, the Internet of Things
introduces smart solutions for smart and sustainable
agriculture, bringing alternatives to overcome the food
crisis. Among these solutions, smart greenhouses
support crop and vegetable agriculture regardless of
season and cultivated area by carefully controlling and
managing parameters like temperature, air and soil
humidity, and light. Smart technologies have proven to
be successful tools for increasing agricultural
production at both the macro and micro levels, which is
an important step in streamlining small-scale
agriculture. This paper presents an experimental
Internet of Things-based small-scale greenhouse
prototype as a proof of concept for the benefits of
merging smart sensing, connectivity, IoT, and
mobile-based applications, for growing cultures. Our
proposed solution is cost-friendly and includes a
photovoltaic panel and a buffer battery for reducing
energy consumption costs, while also assuring
functionality during night and cloudy weather and a
mobile application for easy data visualization and
monitoring of the greenhouse.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zhao:2024:RMM,
author = "Rui Zhao and Jutao Hao and Huan Huo",
title = "Research on Multi-Modal Pedestrian Detection and
Tracking Algorithm Based on Deep Learning",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "194",
day = "31",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060194",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/194",
abstract = "In the realm of intelligent transportation, pedestrian
detection has witnessed significant advancements.
However, it continues to grapple with challenging
issues, notably the detection of pedestrians in complex
lighting scenarios. Conventional visible light mode
imaging is profoundly affected by varying lighting
conditions. Under optimal daytime lighting, visibility
is enhanced, leading to superior pedestrian detection
outcomes. Conversely, under low-light conditions,
visible light mode imaging falters due to the
inadequate provision of pedestrian target information,
resulting in a marked decline in detection efficacy. In
this context, infrared light mode imaging emerges as a
valuable supplement, bolstering pedestrian information
provision. This paper delves into pedestrian detection
and tracking algorithms within a multi-modal image
framework grounded in deep learning methodologies.
Leveraging the YOLOv4 algorithm as a foundation,
augmented by a channel stack fusion module, a novel
multi-modal pedestrian detection algorithm tailored for
intelligent transportation is proposed. This algorithm
capitalizes on the fusion of visible and infrared light
mode image features to enhance pedestrian detection
performance amidst complex road environments.
Experimental findings demonstrate that compared to the
Visible-YOLOv4 algorithm, renowned for its high
performance, the proposed Double-YOLOv4-CSE algorithm
exhibits a notable improvement, boasting a 5.0\%
accuracy rate enhancement and a 6.9\% reduction in
logarithmic average missing rate. This research's goal
is to ensure that the algorithm can run smoothly even
on a low configuration 1080 Ti GPU and to improve the
algorithm's coverage at the application layer, making
it affordable and practical for both urban and rural
areas. This addresses the broader research problem
within the scope of smart cities and remote ends with
limited computational power.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Al-Amidie:2024:ESD,
author = "Muthana Al-Amidie and Laith Alzubaidi and Muhammad
Aminul Islam and Derek T. Anderson",
title = "Enhancing Sensor Data Imputation: {OWA}-Based Model
Aggregation for Missing Values",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "193",
day = "31",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060193",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/193",
abstract = "Due to some limitations in the data collection process
caused either by human-related errors or by collection
electronics, sensors, and network connectivity-related
errors, the important values at some points could be
lost. However, a complete dataset is required for the
desired performance of the subsequent applications in
various fields like engineering, data science,
statistics, etc. An efficient data imputation technique
is desired to fill in the missing data values to
achieve completeness within the dataset. The fuzzy
integral is considered one of the most powerful
techniques for multi-source information fusion. It has
a wide range of applications in many real-world
decision-making problems that often require decisions
to be made with partially observable/available
information. To address this problem, algorithms impute
missing data with a representative sample or by
predicting the most likely value given the observed
data. In this article, we take a completely different
approach to the information fusion task in the ordered
weighted averaging (OWA) context. In particular, we
empirically explore for different distributions how the
weights/importance of the missing sources are
distributed across the observed inputs/sources. The
experimental results on the synthetic and real-world
datasets demonstrate the applicability of the proposed
methods.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yang:2024:PCA,
author = "Jindong Yang and Xiran Zhang and Wenhao Chen and Fei
Rong",
title = "{Prophet--CEEMDAN--ARBiLSTM}-Based Model for
Short-Term Load Forecasting",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "192",
day = "31",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060192",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/192",
abstract = "Accurate short-term load forecasting (STLF) plays an
essential role in sustainable energy development.
Specifically, energy companies can efficiently plan and
manage their generation capacity, lessening resource
wastage and promoting the overall efficiency of power
resource utilization. However, existing models cannot
accurately capture the nonlinear features of
electricity data, leading to a decline in the
forecasting performance. To relieve this issue, this
paper designs an innovative load forecasting method,
named Prophet--CEEMDAN--ARBiLSTM, which consists of
Prophet, Complete Ensemble Empirical Mode Decomposition
with Adaptive Noise (CEEMDAN), and the residual
Bidirectional Long Short-Term Memory (BiLSTM) network.
Specifically, this paper firstly employs the Prophet
method to learn cyclic and trend features from input
data, aiming to discern the influence of these features
on the short-term electricity load. Then, the paper
adopts CEEMDAN to decompose the residual series and
yield components with distinct modalities. In the end,
this paper designs the advanced residual BiLSTM
(ARBiLSTM) block as the input of the above extracted
features to obtain the forecasting results. By
conducting multiple experiments on the New England
public dataset, it demonstrates that the
Prophet--CEEMDAN--ARBiLSTM method can achieve better
performance compared with the existing Prophet-based
ones.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ali:2024:HCN,
author = "Mohammad Imran Ali and Shahi Dost and Khurram Shehzad
Khattak and Muhammad Imran Khan and Riaz Muhammad",
title = "Harnessing the Cloud: a Novel Approach to Smart Solar
Plant Monitoring",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "191",
day = "29",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060191",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/191",
abstract = "Renewable Energy Sources (RESs) such as hydro, wind,
and solar are merging as preferred alternatives to
fossil fuels. Among these RESs, solar energy is the
most ideal solution; it is gaining extensive interest
around the globe. However, due to solar energy's
intermittent nature and sensitivity to environmental
parameters (e.g., irradiance, dust, temperature, aging
and humidity), real-time solar plant monitoring is
imperative. This paper's contribution is to compare and
analyze current IoT trends and propose future research
directions. As a result, this will be instrumental in
the development of low-cost, real-time, scalable,
reliable, and power-optimized solar plant monitoring
systems. In this work, a comparative analysis has been
performed on proposed solutions using the existing
literature. This comparative analysis has been
conducted considering five aspects: computer boards,
sensors, communication, servers, and architectural
paradigms. IoT architectural paradigms employed have
been summarized and discussed with respect to
communication, application layers, and storage
capabilities. To facilitate enhanced IoT-based solar
monitoring, an edge computing paradigm has been
proposed. Suggestions are presented for the fabrication
of edge devices and nodes using optimum compute boards,
sensors, and communication modules. Different cloud
platforms have been explored, and it was concluded that
the public cloud platform Amazon Web Services is the
ideal solution. Artificial intelligence-based
techniques, methods, and outcomes are presented, which
can help in the monitoring, analysis, and management of
solar PV systems. As an outcome, this paper can be used
to help researchers and academics develop low-cost,
real-time, effective, scalable, and reliable solar
monitoring systems.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Paxinou:2024:TSA,
author = "Evgenia Paxinou and Georgios Feretzakis and Rozita
Tsoni and Dimitrios Karapiperis and Dimitrios Kalles
and Vassilios S. Verykios",
title = "Tracing Student Activity Patterns in E-Learning
Environments: Insights into Academic Performance",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "190",
day = "29",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060190",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/190",
abstract = "In distance learning educational environments like
Moodle, students interact with their tutors, their
peers, and the provided educational material through
various means. Due to advancements in learning
analytics, students' transitions within Moodle generate
digital trace data that outline learners' self-directed
learning paths and reveal information about their
academic behavior within a course. These learning paths
can be depicted as sequences of transitions between
various states, such as completing quizzes, submitting
assignments, downloading files, and participating in
forum discussions, among others. Considering that a
specific learning path summarizes the students'
trajectory in a course during an academic year, we
analyzed data on students' actions extracted from
Moodle logs to investigate how the distribution of user
actions within different Moodle resources can impact
academic achievements. Our analysis was conducted using
a Markov Chain Model, whereby transition matrices were
constructed to identify steady states, and eigenvectors
were calculated. Correlations were explored between
specific states in users' eigenvectors and their final
grades, which were used as a proxy of academic
performance. Our findings offer valuable insights into
the relationship between student actions, link weight
vectors, and academic performance, in an attempt to
optimize students' learning paths, tutors' guidance,
and course structures in the Moodle environment.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2024:DST,
author = "Dong Wang and Hongji Yang and Hua Zhou",
title = "Dynamic Spatial--Temporal Self-Attention Network for
Traffic Flow Prediction",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "6",
pages = "189",
day = "25",
month = may,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16060189",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Tue Jul 2 10:12:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/6/189",
abstract = "Traffic flow prediction is considered to be one of the
fundamental technologies in intelligent transportation
systems (ITSs) with a tremendous application prospect.
Unlike traditional time series analysis tasks, the key
challenge in traffic flow prediction lies in
effectively modelling the highly complex and dynamic
spatiotemporal dependencies within the traffic data. In
recent years, researchers have proposed various methods
to enhance the accuracy of traffic flow prediction, but
certain issues still persist. For instance, some
methods rely on specific static assumptions, failing to
adequately simulate the dynamic changes in the data,
thus limiting their modelling capacity. On the other
hand, some approaches inadequately capture the
spatiotemporal dependencies, resulting in the omission
of crucial information and leading to unsatisfactory
prediction outcomes. To address these challenges, this
paper proposes a model called the Dynamic
Spatial--Temporal Self-Attention Network (DSTSAN).
Firstly, this research enhances the interaction between
different dimension features in the traffic data
through a feature augmentation module, thereby
improving the model's representational capacity.
Subsequently, the current investigation introduces two
masking matrices: one captures local spatial
dependencies and the other captures global spatial
dependencies, based on the spatial self-attention
module. Finally, the methodology employs a temporal
self-attention module to capture and integrate the
dynamic temporal dependencies of traffic data. We
designed experiments using historical data from the
previous hour to predict traffic flow conditions in the
hour ahead, and the experiments were extensively
compared to the DSTSAN model, with 11 baseline methods
using four real-world datasets. The results demonstrate
the effectiveness and superiority of the proposed
approach.",
acknowledgement = ack-nhfb,
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ruiu:2024:DIE,
author = "Pietro Ruiu and Salvatore Saiu and Enrico Grosso",
title = "Digital Identity in the {EU}: Promoting {eIDAS}
Solutions Based on Biometrics",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "28",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070228",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/228",
abstract = "Today, more than ever before, technological progress
is evolving rapidly, and in the absence of adequate
regulatory frameworks, the big players in the digital
market (the so-called Big Techs) are exploiting
personal data (name, address, telephone numbers) and
private data (political opinions, religious beliefs,
financial information, or health status) in an
uncontrolled manner. A crucial role in this scenario is
played by the weakness of international regulatory
frameworks due to the slow response time of legislators
who are incapable, from a regulatory point of view, of
keeping pace with technological evolution and
responding to the new requirements coming from the
social context, which is increasingly characterized by
the pervasive presence of new technologies, such as
smartphones and wearable devices. At the European
level, the General Data Protection Regulation (GDPR)
and the Regulation on Electronic Identification,
Authentication and Trust Services (eIDAS) have marked a
significant turning point in the regulatory landscape.
However, the mechanisms proposed present clear security
issues, particularly in light of emerging concepts such
as digital identity. Moreover, despite the centrality
of biometric issues within the European regulatory
framework and the practical introduction of biometric
data within electronic national identity (eID) cards,
there are still no efforts to use biometric features
for the identification and authentication of a person
in a digital context. This paper clarifies and
precisely defines the potential impact of
biometric-based digital identity and hypothesizes its
practical use for accessing network-based services and
applications commonly used in daily life. Using the
Italian eID card as a model, an authentication scheme
leveraging biometric data is proposed, ensuring full
compliance with GDPR and eIDAS regulations. The
findings suggest that such a scheme can significantly
improve the security and reliability of electronic
identification systems, promoting broader adoption of
eIDAS solutions.",
acknowledgement = ack-nhfb,
articleno = "228",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Henriques:2024:CAF,
author = "Lucas Henriques and Felipe Prata Lima and Cecilia
Castro",
title = "Combining Advanced Feature-Selection Methods to
Uncover Atypical Energy-Consumption Patterns",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "28",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070229",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/229",
abstract = "Understanding household energy-consumption patterns is
essential for developing effective energy-conservation
strategies. This study aims to identify `out-profiled'
consumers---households that exhibit atypical
energy-usage behaviors---by applying four distinct
feature-selection methodologies. Specifically, we
utilized the chi-square independence test to assess
feature independence, recursive feature elimination
with multinomial logistic regression (RFE-MLR) to
identify optimal feature subsets, random forest (RF) to
determine feature importance, and a combined fuzzy
rough feature selection with fuzzy rough nearest
neighbors (FRFS-FRNN) for handling uncertainty and
imprecision in data. These methods were applied to a
dataset based on a survey of 383 households in Brazil,
capturing various factors such as household size,
income levels, geographical location, and appliance
usage. Our analysis revealed that key features such as
the number of people in the household, heating and air
conditioning usage, and income levels significantly
influence energy consumption. The novelty of our work
lies in the comprehensive application of these advanced
feature-selection techniques to identify atypical
consumption patterns in a specific regional context.
The results showed that households without heating and
air conditioning equipment in medium- or
high-consumption profiles, and those with lower- or
medium-income levels in medium- or high-consumption
profiles, were considered out-profiled. These findings
provide actionable insights for energy providers and
policymakers, enabling the design of targeted
energy-conservation strategies. This study demonstrates
the importance of tailored approaches in promoting
sustainable energy consumption and highlights notable
deviations in energy-use patterns, offering a
foundation for future research and policy
development.",
acknowledgement = ack-nhfb,
articleno = "229",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ahmad:2024:TCI,
author = "Ehsan Ahmad and Brian Larson and Abdulbasid Banga",
title = "Trusted Composition of {Internet of Medical Things}
over Imperfect Networks",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "28",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070230",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/230",
abstract = "The Internet of Medical Things (IoMT) represents a
specialized domain within the Internet of Things,
focusing on medical devices that require regulatory
approval to ensure patient safety. Trusted composition
of IoMT systems aims to ensure high assurance of the
entire composed system, despite potential variability
in the assurance levels of individual components.
Achieving this trustworthiness in IoMT systems,
especially when using less-assured, commercial,
off-the-shelf networks like Ethernet and WiFi, presents
a significant challenge. To address this challenge,
this paper advocates a systematic approach that
leverages the Architecture Analysis \& Design Language
(AADL) along with Behavior Language for Embedded
Systems with Software (BLESS) specification and
implementation. This approach aims to provide high
assurance on critical components through formal
verification, while using less-assured components in a
manner that maintains overall system determinism and
reliability. A clinical case study involving an
automated opioid infusion monitoring IoMT system is
presented to illustrate the application of the proposed
approach. Through this case study, the effectiveness of
the systemic approach in achieving trusted composition
of heterogeneous medical devices over less-assured
networks is demonstrated.",
acknowledgement = ack-nhfb,
articleno = "230",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Stamatopoulos:2024:EAC,
author = "Dionysios Stamatopoulos and Menelaos Katsantonis and
Panagiotis Fouliras and Ioannis Mavridis",
title = "Exploring the Architectural Composition of Cyber
Ranges: a Systematic Review",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "28",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070231",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/231",
abstract = "In light of the ever-increasing complexity of
cyber--physical systems (CPSs) and information
technology networking systems (ITNs), cyber ranges
(CRs) have emerged as a promising solution by providing
theoretical and practical cybersecurity knowledge for
participants' skill improvement toward a safe work
environment. This research adds to the extant
respective literature, exploring the architectural
composition of CRs. It aims to improve the
understanding of their design and how they are
deployed, expanding skill levels in constructing better
CRs. Our research follows the PRISMA methodology
guidelines for transparency, which includes a search
flow of articles based on specific criteria and quality
valuation of selected articles. To extract valuable
research datasets, we identify keyword co-occurrences
that selected articles are concentrated on. In the
context of literature evidence, we identify key
attributes and trends, providing details of CRs
concerning their architectural composition and
underlying infrastructure, along with today's
challenges and future research directions. A total of
102 research articles' qualitative analyses reveal a
lack of adequate architecture examination when CR
elements and services interoperate with other CR
elements and services participating, leading to gaps
that increase the administration burden. We posit that
the results of this study can be leveraged as a
baseline for future enhancements toward the development
of CRs.",
acknowledgement = ack-nhfb,
articleno = "231",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cocco:2024:DTC,
author = "Luisanna Cocco and Roberto Tonelli",
title = "Digital Transformation in the Construction Sector:
Blockchain, {BIM} and {SSI} for a More Sustainable and
Transparent System",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "28",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070232",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/232",
abstract = "This article presents a model built for deep
digitalization in the construction industry and for
making building information modeling achieve a greater
level of transparency, verifiability and effectiveness
for the benefit of all stakeholders. Thanks to
blockchain and the self-sovereign identity paradigm,
the model guarantees data integrity and transaction
reliability, enabling the generation of more efficient
and productive businesses. The model includes a
decentralized application for notarization of the
information flow in building information modeling
processes; the application is implemented and tested on
a local blockchain. The proposed model represents a
so-called digital twin and is, hence, a huge system
that manages all the information flow associated with a
building throughout its life cycle, returning to
individuals the control of their own data. In this
model, all stakeholders operate based on so-called
decentralized identifiers and DID documents, which
store on-chain the fingerprints of the information flow
in a common data environment.",
acknowledgement = ack-nhfb,
articleno = "232",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Pieska:2024:PIN,
author = "Marcus Pieska and Andreas Kassler and Anna Brunstrom
and Veselin Rakocevic and Markus Amend",
title = "Performance Impact of Nested Congestion Control on
Transport-Layer Multipath Tunneling",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "28",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070233",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/233",
abstract = "Multipath wireless access aims to seamlessly aggregate
multiple access networks to increase data rates and
decrease latency. It is currently being standardized
through the ATSSS architectural framework as part of
the fifth-generation (5G) cellular networks. However,
facilitating efficient multi-access communication in
next-generation wireless networks poses several
challenges due to the complex interplay between
congestion control (CC) and packet scheduling. Given
that enhanced ATSSS steering functions for traffic
splitting advocate the utilization of multi-access
tunnels using congestion-controlled multipath network
protocols between user equipment and a proxy,
addressing the issue of nested CC becomes imperative.
In this paper, we evaluate the impact of such nested
congestion control loops on throughput over
multi-access tunnels using the recently introduced
Multipath DCCP (MP-DCCP) tunneling framework. We
evaluate different combinations of endpoint and tunnel
CC algorithms, including BBR, BBRv2, CUBIC, and
NewReno. Using the Cheapest Path First scheduler, we
quantify and analyze the impact of the following on the
performance of tunnel-based multipath: (1) the location
of the multi-access proxy relative to the user; (2) the
bottleneck buffer size, and (3) the choice of the
congestion control algorithms. Furthermore, our
findings demonstrate the superior performance of BBRv2
as a tunnel CC algorithm.",
acknowledgement = ack-nhfb,
articleno = "233",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Qian:2024:SIS,
author = "Mian Qian and Cheng Qian and Guobin Xu and Pu Tian and
Wei Yu",
title = "Smart Irrigation Systems from Cyber--Physical
Perspective: State of Art and Future Directions",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "29",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070234",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/234",
abstract = "Irrigation refers to supplying water to soil through
pipes, pumps, and spraying systems to ensure even
distribution across the field. In traditional farming
or gardening, the setup and usage of an agricultural
irrigation system solely rely on the personal
experience of farmers. The Food and Agriculture
Organization of the United Nations (UN) has projected
that by 2030, developing countries will expand their
irrigated areas by 34\%, while water consumption will
only be up 14\%. This discrepancy highlights the
importance of accurately monitoring water flow and
volume rather than people's rough estimations. The
smart irrigation systems, a key subsystem of smart
agriculture known as the cyber--physical system (CPS)
in the agriculture domain, automate the administration
of water flow, volume, and timing via using
cutting-edge technologies, especially the Internet of
Things (IoT) technology, to solve the challenges. This
study explores a comprehensive three-dimensional
problem space to thoroughly analyze the IoT's
applications in irrigation systems. Our framework
encompasses several critical domains in smart
irrigation systems. These domains include soil science,
sensor technology, communication protocols, data
analysis techniques, and the practical implementations
of automated irrigation systems, such as remote
monitoring, autonomous operation, and intelligent
decision-making processes. Finally, we discuss a few
challenges and outline future research directions in
this promising field.",
acknowledgement = ack-nhfb,
articleno = "234",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sun:2024:PCO,
author = "Enbo Sun and Jiaxuan Han and Yiquan Li and Cheng
Huang",
title = "A Packet Content-Oriented Remote Code Execution Attack
Payload Detection Model",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "2",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070235",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/235",
abstract = "In recent years, various Remote Code Execution
vulnerabilities on the Internet have been exposed
frequently; thus, more and more security researchers
have begun to pay attention to the detection of Remote
Code Execution attacks. In this paper, we focus on
three kinds of common Remote Code Execution attacks:
XML External Entity, Expression Language Injection, and
Insecure Deserialization. We propose a packet
content-oriented Remote Code Execution attack payload
detection model. For the XML External Entity attack, we
propose an algorithm to construct the use-definition
chain of XML entities, and implement detection based on
the integrity of the chain and the behavior of the
chain's tail node. For the Expression Language
Injection and Insecure Deserialization attack, we
extract 34 features to represent the string operation
and the use of sensitive classes/methods in the code,
and then train a machine learning model to implement
detection. At the same time, we build a dataset to
evaluate the effect of the proposed model. The
evaluation results show that the model performs well in
detecting XML External Entity attacks, achieving a
precision of 0.85 and a recall of 0.94. Similarly, the
model performs well in detecting Expression Language
Injection and Insecure Deserialization attacks,
achieving a precision of 0.99 and a recall of 0.88.",
acknowledgement = ack-nhfb,
articleno = "235",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mottura:2024:DAC,
author = "Stefano Mottura",
title = "Does Anyone Care about the Opinion of People on
Participating in a {``Social''} Metaverse? {A} Review
and a Draft Proposal for a Surveying Tool",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "2",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070236",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/236",
abstract = "In recent years, the attention paid to the metaverse
in the scientific world has increased; the hottest
topics include system architecture and enabling
technologies, as well as business, privacy, ethical,
and security issues. On the other side, at the
mainstream level, it is well known that the company
Meta (formerly Facebook) is striving to realize its
interpretation of a ``social'' metaverse. As Meta is a
big leader of social media, it is reasonable to guess
that, in the future, users will participate in a new
social platform, such as that which the company is
building by depicting unlimited and engaging
opportunities. Regardless of Meta, we ask what the
opinion of people is about this possible future
scenario. A literature search of previous works about
this topic has been done; the few results we found were
not properly on topic and showed heterogeneous content.
A survey on interpretations of the metaverse of major
information and communication technologies (ICT)
companies that impact the consumer world was
undertaken; the results show that Meta is the most
prominent company with the mission of building a
''social'' metaverse worldwide. Finally, a draft of a
tool for assessing the predilection of people for a
``social'' metaverse, based on various facets of the
future social platform, is proposed.",
acknowledgement = ack-nhfb,
articleno = "236",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Anton:2024:SBT,
author = "Simon D. Duque Anton",
title = "Software-Bus-Toolchain {(SBT)}: Introducing a
Versatile Method for Quickly Implementing
{(I)IoT}-Scenarios",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "3",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070237",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/237",
abstract = "The Internet of Things (IoT) has become ubiquitous.
IoT devices are applied in a multitude of applications,
e.g., in smart home scenarios, building automation,
smart energy and smart cities, healthcare, and
industrial environments. Fast and efficient
implementation and roll-out of IoT devices is a
critical factor for successs and acceptance of IoT
devices. At the same time, the variety of hardware
platforms that can be used for IoT applications, as
well as the number of IoT orchestration platforms is
increasing. Finding the right combination of tooling
and hardware is not trivial, but essential for building
applications that provide value. In this work, a
Software-Bus-Toolchain (SBT) is introduced that
encapsulates firmware design, data point definition,
and communication protocol usage. Furthermore, an IoT
control platform is provided to control and evaluate
the IoT modules. Thus, using the SBT, solely the
business logic has to be designed, while the
hardware-design is automated to a high degree. Usage of
the Zephyr framework allows the interchange of hardware
modules, while interfaces provide easy adaption of data
points and communication capabilities. The
implementation of interfaces to the IoT-platform as
well as to the communication layer provides a universal
usage of logic and data elements. The SBT is evaluated
in two application scenarios, where its flexible nature
is shown.",
acknowledgement = ack-nhfb,
articleno = "237",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Elallid:2024:EAD,
author = "Badr {Ben Elallid} and Nabil Benamar and Miloud Bagaa
and Yassine Hadjadj-Aoul",
title = "Enhancing Autonomous Driving Navigation Using Soft
Actor-Critic",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "4",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070238",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/238",
abstract = "Autonomous vehicles have gained extensive attention in
recent years, both in academia and industry. For these
self-driving vehicles, decision-making in urban
environments poses significant challenges due to the
unpredictable behavior of traffic participants and
intricate road layouts. While existing decision-making
approaches based on Deep Reinforcement Learning (DRL)
show potential for tackling urban driving situations,
they suffer from slow convergence, especially in
complex scenarios with high mobility. In this paper, we
present a new approach based on the Soft Actor-Critic
(SAC) algorithm to control the autonomous vehicle to
enter roundabouts smoothly and safely and ensure it
reaches its destination without delay. For this, we
introduce a destination vector concatenated with
extracted features using Convolutional Neural Networks
(CNN). To evaluate the performance of our model, we
conducted extensive experiments in the CARLA simulator
and compared it with the Deep Q-Network (DQN) and
Proximal Policy Optimization (PPO) models. Qualitative
results reveal that our model converges rapidly and
achieves a high success rate in scenarios with high
traffic compared to the DQN and PPO models.",
acknowledgement = ack-nhfb,
articleno = "238",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gupta:2024:TAC,
author = "Ragini Gupta and Beitong Tian and Yaohui Wang and
Klara Nahrstedt",
title = "{TWIN-ADAPT}: Continuous Learning for Digital
Twin-Enabled Online Anomaly Classification in
{IoT}-Driven Smart Labs",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "4",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070239",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/239",
abstract = "In the rapidly evolving landscape of scientific
semiconductor laboratories (commonly known as,
cleanrooms), integrated with Internet of Things (IoT)
technology and Cyber-Physical Systems (CPSs), several
factors including operational changes, sensor aging,
software updates and the introduction of new processes
or equipment can lead to dynamic and non-stationary
data distributions in evolving data streams. This
phenomenon, known as concept drift, poses a substantial
challenge for traditional data-driven digital twin
static machine learning (ML) models for anomaly
detection and classification. Subsequently, the drift
in normal and anomalous data distributions over time
causes the model performance to decay, resulting in
high false alarm rates and missed anomalies. To address
this issue, we present TWIN-ADAPT, a continuous
learning model within a digital twin framework designed
to dynamically update and optimize its anomaly
classification algorithm in response to changing data
conditions. This model is evaluated against
state-of-the-art concept drift adaptation models and
tested under simulated drift scenarios using diverse
noise distributions to mimic real-world distribution
shift in anomalies. TWIN-ADAPT is applied to three
critical CPS datasets of Smart Manufacturing Labs (also
known as ``Cleanrooms''): Fumehood, Lithography Unit
and Vacuum Pump. The evaluation results demonstrate
that TWIN-ADAPT's continual learning model for
optimized and adaptive anomaly classification achieves
a high accuracy and F1 score of 96.97\% and 0.97,
respectively, on the Fumehood CPS dataset, showing an
average performance improvement of 0.57\% over the
offline model. For the Lithography and Vacuum Pump
datasets, TWIN-ADAPT achieves an average accuracy of
69.26\% and 71.92\%, respectively, with performance
improvements of 75.60\% and 10.42\% over the offline
model. These significant improvements highlight the
efficacy of TWIN-ADAPT's adaptive capabilities.
Additionally, TWIN-ADAPT shows a very competitive
performance when compared with other benchmark drift
adaptation algorithms. This performance demonstrates
TWIN-ADAPT's robustness across different modalities and
datasets, confirming its suitability for any IoT-driven
CPS framework managing diverse data distributions in
real time streams. Its adaptability and effectiveness
make it a versatile tool for dynamic industrial
settings.",
acknowledgement = ack-nhfb,
articleno = "239",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ostrikova:2024:DSS,
author = "Darya Ostrikova and Elizaveta Golos and Vitalii
Beschastnyi and Egor Machnev and Yuliya Gaidamaka and
Konstantin Samouylov",
title = "Dynamic {SNR}, Spectral Efficiency, and Rate
Characterization in {5G\slash 6G} {mmWave\slash
sub-THz} Systems with Macro- and Micro-Mobilities",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "6",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070240",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/240",
abstract = "The performance of 5G/6G cellular systems operating in
millimeter wave (mmWave, 30--100 GHz) and sub-terahertz
(sub-THz, 100--300 GHz) bands is conventionally
assessed by utilizing the static distributions of user
locations. The rationale is that the use of the beam
tracking procedure allows for keeping the beams of a
base station (BS) and user equipment (UE) aligned at
all times. However, by introducing 3GPP Reduced
Capability (RedCap) UEs utilizing the Radio Resource
Management (RRM) Relaxation procedure, this may no
longer be the case, as UEs are allowed to skip
synchronization signal blocks (SSB) to improve energy
efficiency. Thus, to characterize the performance of
such UEs, methods explicitly accounting for UE mobility
are needed. In this paper, we will utilize the tools of
the stochastic geometry and random walk theory to
derive signal-to-noise ratio (SNR), spectral
efficiency, and rate as an explicit function of time by
accounting for mmWave/sub-THZ specifics, including
realistic directional antenna radiation patterns and
micro- and macro-mobilities causing dynamic antenna
misalignment. Different from other studies in the field
that consider time-averaged performance measures, these
metrics are obtained as an explicit function of time.
Our numerical results illustrate that the
macro-mobility specifies the overall trend of the
time-dependent spectral efficiency, while local
dynamics at 1--3 s scales are mainly governed by
micro-mobility. The difference between spectral
efficiency corresponding to perfectly synchronized UE
and BS antennas and time-dependent spectral efficiency
in a completely desynchronized system is rather
negligible for realistic cell coverages and stays
within approximately 5--10\% for a wide range of system
parameters. These conclusions are not affected by the
utilized antenna array at the BS side. However,
accounting for realistic radiation patterns is critical
for a time-dependent performance analysis of 5G/6G
mmWave/sub-THz systems.",
acknowledgement = ack-nhfb,
articleno = "240",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Siachos:2024:EAI,
author = "Ilias Siachos and Nikos Karacapilidis",
title = "Explainable Artificial Intelligence Methods to Enhance
Transparency and Trust in Digital Deliberation
Settings",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "6",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070241",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/241",
abstract = "Digital deliberation has been steadily growing in
recent years, enabling citizens from different
geographical locations and diverse opinions and
expertise to participate in policy-making processes.
Software platforms aiming to support digital
deliberation usually suffer from information overload,
due to the large amount of feedback that is often
provided. While Machine Learning and Natural Language
Processing techniques can alleviate this drawback,
their complex structure discourages users from trusting
their results. This paper proposes two Explainable
Artificial Intelligence models to enhance transparency
and trust in the modus operandi of the above
techniques, which concern the processes of clustering
and summarization of citizens' feedback that has been
uploaded on a digital deliberation platform.",
acknowledgement = ack-nhfb,
articleno = "241",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Younis:2024:ECN,
author = "Samir A. Younis and Dalia Sobhy and Noha S. Tawfik",
title = "Evaluating Convolutional Neural Networks and Vision
Transformers for Baby Cry Sound Analysis",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "7",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070242",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/242",
abstract = "Crying is a newborn's main way of communicating.
Despite their apparent similarity, newborn cries are
physically generated and have distinct characteristics.
Experienced medical professionals, nurses, and parents
are able to recognize these variations based on their
prior interactions. Nonetheless, interpreting a baby's
cries can be challenging for carers, first-time
parents, and inexperienced paediatricians. This paper
uses advanced deep learning techniques to propose a
novel approach for baby cry classification. This study
aims to accurately classify different cry types
associated with everyday infant needs, including
hunger, discomfort, pain, tiredness, and the need for
burping. The proposed model achieves an accuracy of
98.33\%, surpassing the performance of existing studies
in the field. IoT-enabled sensors are utilized to
capture cry signals in real time, ensuring continuous
and reliable monitoring of the infant's acoustic
environment. This integration of IoT technology with
deep learning enhances the system's responsiveness and
accuracy. Our study highlights the significance of
accurate cry classification in understanding and
meeting the needs of infants and its potential impact
on improving infant care practices. The methodology,
including the dataset, preprocessing techniques, and
architecture of the deep learning model, is described.
The results demonstrate the performance of the proposed
model, and the discussion analyzes the factors
contributing to its high accuracy.",
acknowledgement = ack-nhfb,
articleno = "242",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ahmed:2024:TOB,
author = "Imen Ahmed and Mariem Turki and Mouna Baklouti and
Bouthaina Dammak and Amnah Alshahrani",
title = "Towards an Optimized Blockchain-Based Secure Medical
Prescription-Management System",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "9",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070243",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/243",
abstract = "This work introduces a blockchain-based secure medical
prescription-management system seamlessly integrated
with a dynamic Internet of Things (IoT) framework.
Notably, this integration constitutes a pivotal
challenge in the arena of resource-constrained IoT
devices: energy consumption. The choice of a suitable
blockchain consensus mechanism emerges as the linchpin
in surmounting this hurdle. Thus, this paper conducts a
comprehensive comparison of energy consumption between
two distinct consensus mechanisms: Proof of Work (PoW)
and Quorum-based Byzantine fault tolerance (QBFT).
Furthermore, an assessment of the most energy-efficient
algorithm is performed across multiple networks and
various parameters. This approach ensures the
acquisition of reliable and statistically significant
data, enabling meaningful conclusions to be drawn about
the system's performance in real-world scenarios. The
experimental results show that, compared to the PoW,
the QBFT consensus mechanism reduced the energy
consumption by an average of 5\%. This finding
underscores the significant advantage of QBFT in
addressing the energy consumption challenges posed by
resource-constrained IoT devices. In addition to its
inherent benefits of privacy and block time efficiency,
the Quorum blockchain emerges as a more sustainable
choice for IoT applications due to its lower power
consumption.",
acknowledgement = ack-nhfb,
articleno = "243",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dashkevich:2024:BFS,
author = "Natalia Dashkevich and Steve Counsell and Giuseppe
Destefanis",
title = "Blockchain Financial Statements: Innovating Financial
Reporting, Accounting, and Liquidity Management",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "9",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070244",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/244",
abstract = "The complexity and interconnection within the
financial ecosystem demand innovative solutions to
improve transparency, security, and efficiency in
financial reporting and liquidity management, while
also reducing accounting fraud. This paper presents
Blockchain Financial Statements (BFS), an innovative
accounting system designed to address accounting fraud,
reduce data manipulation, and misrepresentation of
company financial claims, by enhancing availability of
the real-time and tamper-proof accounting data,
underpinned by a verifiable approach to financial
transactions and reporting. The primary goal of this
research is to design, develop, and validate a
blockchain-based accounting prototype---the BFS
system---that can automate transformation of
transactional data, generated by traditional business
activity into comprehensive financial statements.
Incorporating a Design Science Research Methodology
with Domain-Driven Design, this study constructs a BFS
artefact that harmonises accounting standards with
blockchain technology and business orchestration. The
resulting Java implementation of the BFS system
demonstrates successful integration of blockchain
technology into accounting practices, showing potential
in real-time validation of transactions, immutable
record-keeping, and enhancement of transparency and
efficiency of financial reporting. The BFS framework
and implementation signify an advancement in the
application of blockchain technology in accounting. It
offers a functional solution that enhances
transparency, accuracy, and efficiency of financial
transactions between banks and businesses. This
research underlines the necessity for further
exploration into blockchain's potential within
accounting systems, suggesting a promising direction
for future innovations in tamper-evident financial
reporting and liquidity management.",
acknowledgement = ack-nhfb,
articleno = "244",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Qiu:2024:ODE,
author = "Wen Qiu and Xun Shao and Hiroshi Masui and William
Liu",
title = "Optimizing Drone Energy Use for Emergency
Communications in Disasters via Deep Reinforcement
Learning",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "11",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070245",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/245",
abstract = "For a communication control system in a disaster area
where drones (also called unmanned aerial vehicles
(UAVs)) are used as aerial base stations (ABSs), the
reliability of communication is a key challenge for
drones to provide emergency communication services.
However, the effective configuration of UAVs remains a
major challenge due to limitations in their
communication range and energy capacity. In addition,
the relatively high cost of drones and the issue of
mutual communication interference make it impractical
to deploy an unlimited number of drones in a given
area. To maximize the communication services provided
by a limited number of drones to the ground user
equipment (UE) within a certain time frame while
minimizing the drone energy consumption, we propose a
multi-agent proximal policy optimization (MAPPO)
algorithm. Considering the dynamic nature of the
environment, we analyze diverse observation data
structures and design novel objective functions to
enhance the drone performance. We find that, when drone
energy consumption is used as a penalty term in the
objective function, the drones---acting as agents---can
identify the optimal trajectory that maximizes the UE
coverage while minimizing the energy consumption. At
the same time, the experimental results reveal that,
without considering the machine computing power
required for training and convergence time, the
proposed key algorithm demonstrates better performance
in communication coverage and energy saving as compared
with other methods. The average coverage performance is
10 -- 45\% higher than that of the other three methods,
and it can save up to 3\% more energy.",
acknowledgement = ack-nhfb,
articleno = "245",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lazzaro:2024:AAD,
author = "Sara Lazzaro and Francesco Buccafurri",
title = "Achieving Accountability and Data Integrity in Message
Queuing Telemetry Transport Using Blockchain and
Interplanetary File System",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "13",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070246",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/246",
abstract = "Ensuring accountability and integrity in MQTT
communications is important for enabling several IoT
applications. This paper presents a novel approach that
combines blockchain technology and the interplanetary
file system (IPFS) to achieve non-repudiation and data
integrity in the MQTT protocol. Our solution operates
in discrete temporal rounds, during which the broker
constructs a Merkle hash tree (MHT) from the messages
received. Then the broker publishes the root on the
blockchain and the MHT itself on IPFS. This mechanism
guarantees that both publishers and subscribers can
verify the integrity of the message exchanged.
Furthermore, the interactions with the blockchain made
by the publishers and the broker ensure they cannot
deny having sent the exchanged messages. We provide a
detailed security analysis, showing that under standard
assumptions, the proposed solution achieves both data
integrity and accountability. Additionally, we provided
an experimental campaign to study the scalability and
the throughput of the system. Our results show that our
solution scales well with the number of clients.
Furthermore, from our results, it emerges that the
throughput reduction depends on the integrity check
operations. However, since the frequency of these
checks can be freely chosen, we can set it so that the
throughput reduction is negligible. Finally, we
provided a detailed analysis of the costs of our
solution showing that, overall, the execution costs are
relatively low, especially given the critical security
and accountability benefits it guarantees. Furthermore,
our analysis shows that the higher the number of
subscribers in the system, the lower the costs per
client in our solution. Again, this confirms that our
solution does not present any scalability issues.",
acknowledgement = ack-nhfb,
articleno = "246",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vaiani:2024:ERV,
author = "Lorenzo Vaiani and Luca Cagliero and Paolo Garza",
title = "Emotion Recognition from Videos Using Multimodal Large
Language Models",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "13",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070247",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/247",
abstract = "The diffusion of Multimodal Large Language Models
(MLLMs) has opened new research directions in the
context of video content understanding and
classification. Emotion recognition from videos aims to
automatically detect human emotions such as anxiety and
fear. It requires deeply elaborating multiple data
modalities, including acoustic and visual streams.
State-of-the-art approaches leverage transformer-based
architectures to combine multimodal sources. However,
the impressive performance of MLLMs in content
retrieval and generation offers new opportunities to
extend the capabilities of existing emotion
recognizers. This paper explores the performance of
MLLMs in the emotion recognition task in a zero-shot
learning setting. Furthermore, it presents a
state-of-the-art architecture extension based on MLLM
content reformulation. The performance achieved on the
Hume-Reaction benchmark shows that MLLMs are still
unable to outperform the state-of-the-art average
performance but, notably, are more effective than
traditional transformers in recognizing emotions with
an intensity that deviates from the average of the
samples.",
acknowledgement = ack-nhfb,
articleno = "247",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Satkauskas:2024:MAD,
author = "Nerijus Satkauskas and Algimantas Venckauskas",
title = "Multi-Agent Dynamic Fog Service Placement Approach",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "13",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070248",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/248",
abstract = "Fog computing as a paradigm was offered more than a
decade ago to solve Cloud Computing issues. Long
transmission distances, higher data flow, data loss,
latency, and energy consumption lead to providing
services at the edge of the network. But, fog devices
are known for being mobile and heterogenous. Their
resources can be limited, and their availability can be
constantly changing. A service placement optimization
is needed to meet the QoS requirements. We propose a
service placement orchestration, which functions as a
multi-agent system. Fog computing services are
represented by agents that can both work independently
and cooperate. Service placement is being completed by
a two-stage optimization method. Our service placement
orchestrator is distributed, services are discovered
dynamically, resources can be monitored, and
communication messages among fog nodes can be signed
and encrypted as a solution to the weakness of
multi-agent systems due to the lack of monitoring tools
and security.",
acknowledgement = ack-nhfb,
articleno = "248",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Anton-Sancho:2024:UVR,
author = "{\'A}lvaro Ant{\'o}n-Sancho and Pablo
Fern{\'a}ndez-Arias and Edwan Anderson Ariza and Diego
Vergara",
title = "The Use of Virtual Reality in the Countries of the
{Central American Bank for Economic Integration
(CABEI)}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "13",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070249",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/249",
abstract = "In recent years, virtual reality (VR) technologies
have become one of the teaching tools with the greatest
training potential in higher education. Thus, the study
of factors that influence the adoption and valuation of
VR by the educational agents involved is a fruitful
line of research, because it can provide keys to
promote its incorporation. This article compares the
assessments of VR as a teaching technology in higher
education given by professors from countries that are
members of the Central American Bank for Economic
Integration (CABEI) with those of professors from
countries in the Latin American region that are not
members of CABEI. For this purpose, a validated
questionnaire on the perception of VR use was
administered to a sample of 1246 professors from the
entire Latin American region, and their responses were
statistically analyzed. As a result, it was found that
professors from CABEI countries give better ratings to
the usability dimensions of VR and report a lower
number of disadvantages in its use than professors from
countries outside CABEI. However, the increase in the
digital competence of professors in CABEI countries is
more than twice as high as the increase in the
valuation of VR. It follows that there is still much
room for the integration of VR in higher education in
CABEI countries. Furthermore, in CABEI countries there
is a more pronounced gap between professors from
private and public universities with respect to the
above-mentioned ratings than in non-CABEI countries. As
a consequence, some implications and suggestions
derived from the results are reported.",
acknowledgement = ack-nhfb,
articleno = "249",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Adel:2024:WSS,
author = "Amr Adel and Tony Jan",
title = "Watch the Skies: a Study on Drone Attack Vectors,
Forensic Approaches, and Persisting Security
Challenges",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "13",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070250",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/250",
abstract = "In the rapidly evolving landscape of drone technology,
securing unmanned aerial vehicles (UAVs) presents
critical challenges and demands unique solutions. This
paper offers a thorough examination of the security
requirements, threat models, and solutions pertinent to
UAVs, emphasizing the importance of cybersecurity and
drone forensics. This research addresses the unique
requirements of UAV security, outlines various threat
models, and explores diverse solutions to ensure data
integrity. Drone forensics, a field dedicated to the
investigation of security incidents involving UAVs, has
been extensively examined and demonstrates its
relevance in identifying attack origins or establishing
accident causes. This paper further surveys artifacts,
tools, and benchmark datasets that are critical in the
domain of drone forensics, providing a comprehensive
view of current capabilities. Acknowledging the ongoing
challenges in UAV security, particularly given the pace
of technological advancement and complex operational
environments, this study underscores the need for
increased collaboration, updated security protocols,
and comprehensive regulatory frameworks. Ultimately,
this research contributes to a deeper understanding of
UAV cybersecurity and aids in fostering future research
into the secure and reliable operation of drones.",
acknowledgement = ack-nhfb,
articleno = "250",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gao:2024:SGS,
author = "Shaopei Gao and Qiang Liu and Junjie Zeng and Li Li",
title = "{SD-GPSR}: a Software-Defined Greedy Perimeter
Stateless Routing Method Based on Geographic Location
Information",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "17",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070251",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/251",
abstract = "To mitigate the control overhead of Software-Defined
Mobile Ad Hoc Networks (SD-MANETs), this paper proposes
a novel approach, termed Software-Defined Greedy
Perimeter Stateless Routing (SD-GPSR), which integrates
geographical location information. SD-GPSR optimizes
routing functions by decentralizing them within the
data plane of SD-MANET, utilizing the geographic
location information of nodes to enhance routing
efficiency. The controller is primarily responsible for
providing location services and facilitating partial
centralized decision-making. Within the data plane,
nodes employ an enhanced distance and angle-based
greedy forwarding algorithm, denoted as GPSR\_DA, to
efficiently forward data. Additionally, to address the
issue of routing voids in the data plane, we employ the
A* algorithm to compute an optimal routing path that
circumvents such voids. Finally, we conducted a
comparative analysis with several state-of-the-art
approaches. The evaluation experiments demonstrate that
SD-GPSR significantly reduces the control overhead of
the network. Simultaneously, there is a notable
improvement in both end-to-end latency and packet loss
rate across the network.",
acknowledgement = ack-nhfb,
articleno = "251",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kuznetsov:2024:NTE,
author = "Oleksandr Kuznetsov and Emanuele Frontoni and Kateryna
Kuznetsova and Ruslan Shevchuk and Mikolaj Karpinski",
title = "{NFT} Technology for Enhanced Global Digital
Registers: a Novel Approach to Tokenization",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "17",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070252",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/252",
abstract = "In the rapidly evolving field of digital asset
management, centralized and decentralized global
registries have become essential tools for organizing,
tracking, and distributing digital assets. However,
existing systems often face challenges regarding
security, censorship resistance, interoperability,
customizability, and scalability. This research paper
aims to address these gaps by proposing a novel
decentralized global registry system based on
blockchain technology and non-fungible tokens (NFTs).
The research paper makes several key contributions to
the field of digital asset management. First, it
provides a detailed system design for the proposed
decentralized global registry, outlining its
architectural components, functional modules, and
integration with blockchain and NFT technologies.
Second, it offers a thorough comparative analysis of
the advantages and limitations of the proposed system
in relation to existing centralized and decentralized
registries. Finally, the paper presents potential use
cases and practical applications of the proposed system
in various industries, demonstrating its versatility
and adaptability to different contexts and
requirements. In conclusion, this research paper
contributes significantly to the ongoing efforts to
improve digital asset management by presenting a novel,
decentralized global registry system based on
blockchain technology and NFTs. The proposed system
addresses the key limitations of existing solutions and
offers a promising direction for future research and
development in this critical field.",
acknowledgement = ack-nhfb,
articleno = "252",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kaliyaperumal:2024:NHU,
author = "Prabu Kaliyaperumal and Sudhakar Periyasamy and
Manikandan Thirumalaisamy and Balamurugan Balusamy and
Francesco Benedetto",
title = "A Novel Hybrid Unsupervised Learning Approach for
Enhanced Cybersecurity in the {IoT}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "18",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070253",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/253",
abstract = "The proliferation of IoT services has spurred a surge
in network attacks, heightening cybersecurity concerns.
Essential to network defense, intrusion detection and
prevention systems (IDPSs) identify malicious
activities, including denial of service (DoS),
distributed denial of service (DDoS), botnet, brute
force, infiltration, and Heartbleed. This study focuses
on leveraging unsupervised learning for training
detection models to counter these threats effectively.
The proposed method utilizes basic autoencoders (bAEs)
for dimensionality reduction and encompasses a
three-stage detection model: one-class support vector
machine (OCSVM) and deep autoencoder (dAE) attack
detection, complemented by density-based spatial
clustering of applications with noise (DBSCAN) for
attack clustering. Accurately delineated clusters aid
in mapping attack tactics. The MITRE ATT\&CK framework
establishes a ``Cyber Threat Repository'', cataloging
attacks and tactics, enabling immediate response based
on priority. Leveraging preprocessed and unlabeled
normal network traffic data, this approach enables the
identification of novel attacks while mitigating the
impact of imbalanced training data on model
performance. The autoencoder method utilizes
reconstruction error, OCSVM employs a kernel function
to establish a hyperplane for anomaly detection, while
DBSCAN employs a density-based approach to identify
clusters, manage noise, accommodate diverse shapes,
automatically determining cluster count, ensuring
scalability, and minimizing false positives and false
negatives. Evaluated on standard datasets such as
CIC-IDS2017 and CSECIC-IDS2018, the proposed model
outperforms existing state of art methods. Our approach
achieves accuracies exceeding 98\% for the two
datasets, thus confirming its efficacy and
effectiveness for application in efficient intrusion
detection systems.",
acknowledgement = ack-nhfb,
articleno = "253",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yu:2024:HAC,
author = "Rui Yu and Sooyeon Lee and Jingyi Xie and Syed Masum
Billah and John M. Carroll",
title = "Human--{AI} Collaboration for Remote Sighted
Assistance: Perspectives from the {LLM} Era",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "18",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070254",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/254",
abstract = "Remote sighted assistance (RSA) has emerged as a
conversational technology aiding people with visual
impairments (VI) through real-time video chat
communication with sighted agents. We conducted a
literature review and interviewed 12 RSA users to
understand the technical and navigational challenges
faced by both agents and users. The technical
challenges were categorized into four groups: agents'
difficulties in orienting and localizing users,
acquiring and interpreting users' surroundings and
obstacles, delivering information specific to user
situations, and coping with poor network connections.
We also presented 15 real-world navigational
challenges, including 8 outdoor and 7 indoor scenarios.
Given the spatial and visual nature of these
challenges, we identified relevant computer vision
problems that could potentially provide solutions. We
then formulated 10 emerging problems that neither human
agents nor computer vision can fully address alone. For
each emerging problem, we discussed solutions grounded
in human--AI collaboration. Additionally, with the
advent of large language models (LLMs), we outlined how
RSA can integrate with LLMs within a human--AI
collaborative framework, envisioning the future of
visual prosthetics.",
acknowledgement = ack-nhfb,
articleno = "254",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Cui:2024:IDI,
author = "Bo Cui and Yachao Chai and Zhen Yang and Keqin Li",
title = "Intrusion Detection in {IoT} Using Deep Residual
Networks with Attention Mechanisms",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "18",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070255",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/255",
abstract = "Connected devices in IoT systems usually have low
computing and storage capacity and lack uniform
standards and protocols, making them easy targets for
cyberattacks. Implementing security measures like
cryptographic authentication, access control, and
firewalls for IoT devices is insufficient to fully
address the inherent vulnerabilities and potential
cyberattacks within the IoT environment. To improve the
defensive capabilities of IoT systems, some research
has focused on using deep learning techniques to
provide new solutions for intrusion detection systems.
However, some existing deep learning-based intrusion
detection methods suffer from inadequate feature
extraction and insufficient model generalization
capability. To address the shortcomings of existing
detection methods, we propose an intrusion detection
model based on temporal convolutional residual modules.
An attention mechanism is introduced to assess feature
scores and enhance the model's ability to concentrate
on critical features, thereby boosting its detection
performance. We conducted extensive experiments on the
ToN\_IoT dataset and the UNSW-NB15 dataset, and the
proposed model achieves accuracies of 99.55\% and
89.23\% on the ToN\_IoT and UNSW-NB15 datasets,
respectively, with improvements of 0.14\% and 15.3\%
compared with the current state-of-the-art models.
These results demonstrate the superior detection
performance of the proposed model.",
acknowledgement = ack-nhfb,
articleno = "255",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mohideen:2024:BCI,
author = "Mohamed Azarudheen Mohamed Mohideen and Muhammad
Shahroz Nadeem and James Hardy and Haider Ali and Umair
Ullah Tariq and Fariza Sabrina and Muhammad Waqar and
Salman Ahmed",
title = "Behind the Code: Identifying Zero-Day Exploits in
{WordPress}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "19",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070256",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/256",
abstract = "The rising awareness of cybersecurity among
governments and the public underscores the importance
of effectively managing security incidents, especially
zero-day attacks that exploit previously unknown
software vulnerabilities. These zero-day attacks are
particularly challenging because they exploit flaws
that neither the public nor developers are aware of. In
our study, we focused on dynamic application security
testing (DAST) to investigate cross-site scripting
(XSS) attacks. We closely examined 23 popular WordPress
plugins, especially those requiring user or admin
interactions, as these are frequent targets for XSS
attacks. Our testing uncovered previously unknown
zero-day vulnerabilities in three of these plugins.
Through controlled environment testing, we accurately
identified and thoroughly analyzed these XSS
vulnerabilities, revealing their mechanisms, potential
impacts, and the conditions under which they could be
exploited. One of the most concerning findings was the
potential for admin-side attacks, which could lead to
multi-site insider threats. Specifically, we found
vulnerabilities that allow for the insertion of
malicious scripts, creating backdoors that unauthorized
users can exploit. We demonstrated the severity of
these vulnerabilities by employing a keylogger-based
attack vector capable of silently capturing and
extracting user data from the compromised plugins.
Additionally, we tested a zero-click download strategy,
allowing malware to be delivered without any user
interaction, further highlighting the risks posed by
these vulnerabilities. The National Institute of
Standards and Technology (NIST) recognized these
vulnerabilities and assigned them CVE numbers:
CVE-2023-5119 for the Forminator plugin, CVE-2023-5228
for user registration and contact form issues, and
CVE-2023-5955 for another critical plugin flaw. Our
study emphasizes the critical importance of proactive
security measures, such as rigorous input validation,
regular security testing, and timely updates, to
mitigate the risks posed by zero-day vulnerabilities.
It also highlights the need for developers and
administrators to stay vigilant and adopt strong
security practices to defend against evolving
threats.",
acknowledgement = ack-nhfb,
articleno = "256",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Zarie:2024:MBV,
author = "Mira M. Zarie and Abdelhamied A. Ateya and Mohammed S.
Sayed and Mohammed ElAffendi and Mohammad Mahmoud
Abdellatif",
title = "Microservice-Based Vehicular Network for Seamless and
Ultra-Reliable Communications of Connected Vehicles",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "7",
pages = "??--??",
day = "19",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16070257",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:00 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/7/257",
abstract = "The fifth-generation (5G) cellular infrastructure is
expected to bring about the widespread use of connected
vehicles. This technological progress marks the
beginning of a new era in vehicular networks, which
includes a range of different types and services of
self-driving cars and the smooth sharing of information
between vehicles. Connected vehicles have also been
announced as a main use case of the sixth-generation
(6G) cellular, with ultimate requirements beyond the 5G
(B5G) and 6G eras. These networks require full
coverage, extremely high reliability and availability,
very low latency, and significant system adaptability.
The significant specifications set for vehicular
networks pose considerable design and development
challenges. The goals of establishing a latency of 1
millisecond, effectively handling large amounts of data
traffic, and facilitating high-speed mobility are of
utmost importance. To address these difficulties and
meet the demands of upcoming networks, e.g., 6G, it is
necessary to improve the performance of vehicle
networks by incorporating innovative technology into
existing network structures. This work presents
significant enhancements to vehicular networks to
fulfill the demanding specifications by utilizing
state-of-the-art technologies, including distributed
edge computing, e.g., mobile edge computing (MEC) and
fog computing, software-defined networking (SDN), and
microservice. The work provides a novel vehicular
network structure based on micro-services architecture
that meets the requirements of 6G networks. The
required offloading scheme is introduced, and a
handover algorithm is presented to provide seamless
communication over the network. Moreover, a migration
scheme for migrating data between edge servers was
developed. The work was evaluated in terms of latency,
availability, and reliability. The results outperformed
existing traditional approaches, demonstrating the
potential of our approach to meet the demanding
requirements of next-generation vehicular networks.",
acknowledgement = ack-nhfb,
articleno = "257",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Aiche:2024:MTI,
author = "Aicha Aiche and Pierre-Martin Tardif and Mohammed
Erritali",
title = "Modeling Trust in {IoT} Systems for Drinking-Water
Management",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "30",
month = jul,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080273",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/273",
abstract = "This study focuses on trust within water-treatment IoT
plants, examining the collaboration between IoT
devices, control systems, and skilled personnel. The
main aim is to assess the levels of trust between these
different critical elements based on specific criteria
and to emphasize that trust is neither bidirectional
nor transitive. To this end, we have developed a
synthetic database representing the critical elements
in the system, taking into account characteristics such
as accuracy, reliability, and experience. Using a
mathematical model based on the (AHP), we calculated
levels of trust between these critical elements, taking
into account temporal dynamics and the
non-bidirectional nature of trust. Our experiments
included anomalous scenarios, such as sudden
fluctuations in IoT device reliability and significant
variations in staff experience. These variations were
incorporated to assess the robustness of our approach.
The trust levels obtained provide a detailed insight
into the relationships between critical elements,
enhancing our understanding of trust in the context of
water-treatment plants.",
acknowledgement = ack-nhfb,
articleno = "273",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tara:2024:DSO,
author = "Andrei Tara and Hjalmar K. Turesson and Nicolae
Natea",
title = "Dynamic Storage Optimization for Communication between
{AI} Agents",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "1",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080274",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/274",
abstract = "Today, AI is primarily narrow, meaning that each model
or agent can only perform one task or a narrow range of
tasks. However, systems with broad capabilities can be
built by connecting multiple narrow AIs. Connecting
various AI agents in an open, multi-organizational
environment requires a new communication model. Here,
we develop a multi-layered ontology-based communication
framework. Ontology concepts provide semantic
definitions for the agents' inputs and outputs,
enabling them to dynamically identify communication
requirements and build processing pipelines. Critical
is that the ontology concepts are stored on a
decentralized storage medium, allowing fast reading and
writing. The multi-layered design offers flexibility by
dividing a monolithic ontology model into semantic
layers, allowing for the optimization of read and write
latencies. We investigate the impact of this
optimization by benchmarking experiments on three
decentralized storage mediums---IPFS, Tendermint
Cosmos, and Hyperledger Fabric---across a wide range of
configurations. The increased read-write speeds allow
AI agents to communicate efficiently in a decentralized
environment utilizing ontology principles, making it
easier for AI to be used widely in various
applications.",
acknowledgement = ack-nhfb,
articleno = "274",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fiorini:2024:EID,
author = "Francesco Fiorini and Michele Pagano and Rosario
Giuseppe Garroppo and Antonio Osele",
title = "Estimating Interception Density in the {BB84}
Protocol: a Study with a Noisy Quantum Simulator",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "2",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080275",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/275",
abstract = "Quantum computers have the potential to break the
public-key cryptosystems widely used in key exchange
and digital signature applications. To address this
issue, quantum key distribution (QKD) offers a robust
countermeasure against quantum computer attacks. Among
various QKD schemes, BB84 is the most widely used and
studied. However, BB84 implementations are inherently
imperfect, resulting in quantum bit error rates (QBERs)
even in the absence of eavesdroppers. Distinguishing
between QBERs caused by eavesdropping and QBERs due to
channel imperfections is fundamentally infeasible. In
this context, this paper proposes and examines a
practical method for detecting eavesdropping via
partial intercept-and-resend attacks in the BB84
protocol. A key feature of the proposed method is its
consideration of quantum system noise. The efficacy of
this method is assessed by employing the Quantum Solver
library in conjunction with backend simulators inspired
by real quantum machines that model quantum system
noise. The simulation outcomes demonstrate the method's
capacity to accurately estimate the eavesdropper's
interception density in the presence of system noise.
Moreover, the results indicate that the estimation
accuracy of the eavesdropper's interception density in
the presence of system noise is dependent on both the
actual interception density value and the key length.",
acknowledgement = ack-nhfb,
articleno = "275",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kabashkin:2024:AIT,
author = "Igor Kabashkin and Leonid Shoshin",
title = "Artificial Intelligence of Things as New Paradigm in
Aviation Health Monitoring Systems",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "2",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080276",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/276",
abstract = "The integration of artificial intelligence of things
(AIoT) is transforming aviation health monitoring
systems by combining extensive data collection with
advanced analytical capabilities. This study proposes a
framework that enhances predictive accuracy,
operational efficiency, and safety while optimizing
maintenance strategies and reducing costs. Utilizing a
three-tiered cloud architecture, the AIoT system
enables real-time data acquisition from sensors
embedded in aircraft systems, followed by machine
learning algorithms to analyze and interpret the data
for proactive decision-making. This research examines
the evolution from traditional to AIoT-enhanced
monitoring, presenting a comprehensive architecture
integrated with satellite communication and 6G
technology. The mathematical models quantifying the
benefits of increased diagnostic depth through AIoT,
covering aspects such as predictive accuracy, cost
savings, and safety improvements are introduced in this
paper. The findings emphasize the strategic importance
of investing in AIoT technologies to balance cost,
safety, and efficiency in aviation maintenance and
operations, marking a paradigm shift from traditional
health monitoring to proactive health management in
aviation.",
acknowledgement = ack-nhfb,
articleno = "276",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Abella:2024:MLA,
author = "Vincent Abella and Johnfil Initan and Jake Mark Perez
and Philip Virgil Astillo and Jr. Luis Gerardo
Ca{\~n}ete and Gaurav Choudhary",
title = "Machine Learning-Assisted Dynamic Proximity-Driven
Sorting Algorithm for Supermarket Navigation
Optimization: a Simulation-Based Validation",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "2",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080277",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/277",
abstract = "In-store grocery shopping is still widely preferred by
consumers despite the rising popularity of online
grocery shopping. Moreover, hardware-based in-store
navigation systems and shopping list applications such
as Walmart's Store Map, Kroger's Kroger Edge, and
Amazon Go have been developed by supermarkets to
address the inefficiencies in shopping. But even so,
the current systems' cost-effectiveness, optimization
capability, and scalability are still an issue. In
order to address the existing problems, this study
investigates the optimization of grocery shopping by
proposing a proximity-driven dynamic sorting algorithm
with the assistance of machine learning. This research
method provides us with an analysis of the impact and
effectiveness of the two machine learning models or
ML-DProSA variants---agglomerative hierarchical and
affinity propagation clustering algorithms---in
different setups and configurations on the performance
of the grocery shoppers in a simulation environment
patterned from the actual supermarket. The unique
shopping patterns of a grocery shopper and the
proximity of items based on timestamps are utilized in
sorting grocery items, consequently reducing the
distance traveled. Our findings reveal that both
algorithms reduce dwell times for grocery shoppers
compared to having an unsorted grocery shopping list.
Ultimately, this research with the ML-DProSA's
optimization capabilities aims to be the foundation in
providing a mobile application for grocery shopping in
any grocery stores.",
acknowledgement = ack-nhfb,
articleno = "277",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tsikteris:2024:TMT,
author = "Sean Tsikteris and Aisha B. Rahman and Md. Sadman
Siraj and Eirini Eleni Tsiropoulou",
title = "{TRUST-ME}: Trust-Based Resource Allocation and Server
Selection in Multi-Access Edge Computing",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "4",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080278",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/278",
abstract = "Multi-access edge computing (MEC) has attracted the
interest of the research and industrial community to
support Internet of things (IoT) applications by
enabling efficient data processing and minimizing
latency. This paper presents significant contributions
toward optimizing the resource allocation and enhancing
the decision-making process in edge computing
environments. Specifically, the TRUST-ME model is
introduced, which consists of multiple edge servers and
IoT devices, i.e., users, with varied computing tasks
offloaded to the MEC servers. A utility function was
designed to quantify the benefits in terms of latency
and cost for the IoT device while utilizing the MEC
servers' computing capacities. The core innovation of
our work is a novel trust model that was designed to
evaluate the IoT devices' confidence in MEC servers.
This model integrates both direct and indirect trust
and reflects the trustworthiness of the servers based
on the direct interactions and social feedback from
other devices using the same servers. This dual trust
approach helps with accurately gauging the reliability
of MEC services and ensuring more informed decision
making. A reinforcement learning framework based on the
optimistic Q-learning with an upper confidence bounds
action selection algorithm enables the IoT devices to
autonomously select a MEC server to process their
computing tasks. Also, a multilateral bargaining model
is proposed for fair resource allocation of the MEC
servers' computing resources to the users while
accounting for their computing demands. Numerical
simulations demonstrated the operational effectiveness,
convergence, and scalability of the TRUST-ME model,
which was validated through real-world scenarios and
comprehensive comparative evaluations against existing
approaches.",
acknowledgement = ack-nhfb,
articleno = "278",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Albarracin-Acero:2024:VRC,
author = "Diego Alejandro Albarracin-Acero and Fidel Alfonso
Romero-Toledo and Claudia Esperanza Saavedra-Bautista
and Edwan Anderson Ariza-Echeverri",
title = "Virtual Reality in the Classroom: Transforming the
Teaching of Electrical Circuits in the Digital Age",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "5",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080279",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/279",
abstract = "In response to the digital transformation in
education, this study explores the efficacy of virtual
reality (VR) video games in teaching direct current
electrical circuits at a public university in Colombia.
Using a mixed-method action research approach, this
study aimed to design, implement, and evaluate a
VR-based educational strategy to enhance undergraduate
learning experiences. The methodology integrated VR
into the curriculum, facilitating a comparison of this
innovative approach with traditional teaching methods.
The results indicate that the VR strategy significantly
improved students' comprehension of electrical circuits
and increased engagement, demonstrating the utility of
immersive technologies in educational settings.
Challenges such as the need for technological
integration and curriculum adaptation were also
identified. This study concludes that VR video games
can effectively augment electrical engineering
education, offering a model for incorporating advanced
digital tools into higher education curricula. This
approach aligns with ongoing trends in digital
transformation, suggesting significant potential for
broad applications across various educational
contexts.",
acknowledgement = ack-nhfb,
articleno = "279",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tefera:2024:ADM,
author = "Minyechil Alehegn Tefera and Amare Mulatie Dehnaw and
Yibeltal Chanie Manie and Cheng-Kai Yao and Shegaw
Demessie Bogale and Peng-Chun Peng",
title = "Advanced Denoising and Meta-Learning Techniques for
Enhancing Smart Health Monitoring Using Wearable
Sensors",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "5",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080280",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/280",
abstract = "This study introduces a novel meta-learning method to
enhance diabetes detection using wearable sensor
systems in smart health applications. Wearable sensor
technology often needs to operate accurately across a
wide range of users, each characterized by unique
physiological and behavioral patterns. However, the
specific data for a particular application or user
group might be scarce. Moreover, collecting extensive
training data from wearable sensor experiments is
challenging, time-consuming, and expensive. In these
cases, meta-learning can be particularly useful. This
model can quickly adapt to the nuances of new users or
specific applications with minimal data. Therefore, to
solve the need for a huge amount of training data and
to enable the application of artificial intelligence
(AI) in data-scarce scenarios, a meta-learning method
is proposed. This meta-learning model has been
implemented to forecast diabetes, resolve cross-talk
issues, and accurately detect R peaks from overlapping
electrocardiogram (ECG) signals affected by movement
artifacts, poor electrode contact, electrical
interference, or muscle activity. Motion artifacts from
body movements, external conditions such as
temperature, humidity, and electromagnetic
interference, and the inherent quality and calibration
of the sensor can all contribute to noise. Contact
quality between the sensor and the skin, signal
processing errors, power supply variations,
user-generated interference from activities like
talking or exercising, and the materials used in the
wearable device also play significant roles in the
overall noise in wearable sensor data and can
significantly distort the true signal, leading to
erroneous interpretations and potential diagnostic
errors. Furthermore, discrete wavelet transform (DWT)
was also implemented to improve the quality of the data
and enhance the performance of the proposed model. The
demonstrated results confirmed that with only a limited
amount of target data, the proposed meta-learning and
DWT denoising method can adapt more quickly and improve
the detection of diabetes compared to the traditional
method. Therefore, the proposed system is
cost-effective, flexible, faster, and adaptable,
reduces the need for training data, and can enhance the
accuracy of chronic disease detection such as diabetes
for smart health systems.",
acknowledgement = ack-nhfb,
articleno = "280",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Baumgartner:2024:MEB,
author = "Martin Baumgartner and Karl Kreiner and Fabian
Wiesm{\"u}ller and Dieter Hayn and Christian Puelacher
and G{\"u}nter Schreier",
title = "{Masketeer}: an Ensemble-Based Pseudonymization Tool
with Entity Recognition for {German} Unstructured
Medical Free Text",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "6",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080281",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/281",
abstract = "Background: The recent rise of large language models
has triggered renewed interest in medical free text
data, which holds critical information about patients
and diseases. However, medical free text is also highly
sensitive. Therefore, de-identification is typically
required but is complicated since medical free text is
mostly unstructured. With the Masketeer algorithm, we
present an effective tool to de-identify German medical
text. Methods: We used an ensemble of different masking
classes to remove references to identifiable data from
over 35,000 clinical notes in accordance with the HIPAA
Safe Harbor Guidelines. To retain additional context
for readers, we implemented an entity recognition
scheme and corpus-wide pseudonymization. Results: The
algorithm performed with a sensitivity of 0.943 and
specificity of 0.933. Further performance analyses
showed linear runtime complexity (O(n)) with both
increasing text length and corpus size. Conclusions: In
the future, large language models will likely be able
to de-identify medical free text more effectively and
thoroughly than handcrafted rules. However, such
gold-standard de-identification tools based on large
language models are yet to emerge. In the current
absence of such, we hope to provide best practices for
a robust rule-based algorithm designed with expert
domain knowledge.",
acknowledgement = ack-nhfb,
articleno = "281",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bouzidi:2024:EAI,
author = "Abdelaziz Bouzidi and Lala Rajaoarisoa and Luka
Claeys",
title = "Explainable Artificial Intelligence Approach for
Improving Head-Mounted Fault Display Systems",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "6",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080282",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/282",
abstract = "To fully harness the potential of wind turbine systems
and meet high power demands while maintaining top-notch
power quality, wind farm managers run their systems 24
h a day/7 days a week. However, due to the system's
large size and the complex interactions of its many
components operating at high power, frequent critical
failures occur. As a result, it has become increasingly
important to implement predictive maintenance to ensure
the continued performance of these systems. This paper
introduces an innovative approach to developing a
head-mounted fault display system that integrates
predictive capabilities, including deep learning long
short-term memory neural networks model integration,
with anomaly explanations for efficient predictive
maintenance tasks. Then, a 3D virtual model, created
from sampled and recorded data coupled with the deep
neural diagnoser model, is designed. To generate a
transparent and understandable explanation of the
anomaly, we propose a novel methodology to identify a
possible subset of characteristic variables for
accurately describing the behavior of a group of
components. Depending on the presence and risk level of
an anomaly, the parameter concerned is displayed in a
piece of specific information. The system then provides
human operators with quick, accurate insights into
anomalies and their potential causes, enabling them to
take appropriate action. By applying this methodology
to a wind farm dataset provided by Energias De
Portugal, we aim to support maintenance managers in
making informed decisions about inspection,
replacement, and repair tasks.",
acknowledgement = ack-nhfb,
articleno = "282",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Gentile:2024:OVP,
author = "Antonio Francesco Gentile and Davide Macr{\`\i} and
Emilio Greco and Peppino Fazio",
title = "Overlay and Virtual Private Networks Security
Performances Analysis with Open Source Infrastructure
Deployment",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "7",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080283",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/283",
abstract = "Nowadays, some of the most well-deployed
infrastructures are Virtual Private Networks (VPNs) and
Overlay Networks (ONs). They consist of hardware and
software components designed to build private/secure
channels, typically over the Internet. They are
currently among the most reliable technologies for
achieving this objective. VPNs are well-established and
can be patched to address security vulnerabilities,
while overlay networks represent the next-generation
solution for secure communication. In this paper, for
both VPNs and ONs, we analyze some important network
performance components (RTT and bandwidth) while
varying the type of overlay networks utilized for
interconnecting traffic between two or more hosts (in
the same data center, in different data centers in the
same building, or over the Internet). These networks
establish connections between KVM (Kernel-based Virtual
Machine) instances rather than the typical
Docker/LXC/Podman containers. The first analysis aims
to assess network performance as it is, without any
overlay channels. Meanwhile, the second establishes
various channels without encryption and the final
analysis encapsulates overlay traffic via IPsec
(Transport mode), where encrypted channels like VTI are
not already available for use. A deep set of traffic
simulation campaigns shows the obtained performance.",
acknowledgement = ack-nhfb,
articleno = "283",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Tseng:2024:MCI,
author = "Shu-Ming Tseng and Yan-Qi Wang and Yung-Chung Wang",
title = "Multi-Class Intrusion Detection Based on Transformer
for {IoT} Networks Using {CIC-IoT-2023 Dataset}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "8",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080284",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/284",
abstract = "This study uses deep learning methods to explore the
Internet of Things (IoT) network intrusion detection
method based on the CIC-IoT-2023 dataset. This dataset
contains extensive data on real-life IoT environments.
Based on this, this study proposes an effective
intrusion detection method. Apply seven deep learning
models, including Transformer, to analyze network
traffic characteristics and identify abnormal behavior
and potential intrusions through binary and
multivariate classifications. Compared with other
papers, we not only use a Transformer model, but we
also consider the model's performance in the
multi-class classification. Although the accuracy of
the Transformer model used in the binary classification
is lower than that of DNN and CNN + LSTM hybrid models,
it achieves better results in the multi-class
classification. The accuracy of binary classification
of our model is 0.74\% higher than that of papers that
also use Transformer on TON-IOT. In the multi-class
classification, our best-performing model combination
is Transformer, which reaches 99.40\% accuracy. Its
accuracy is 3.8\%, 0.65\%, and 0.29\% higher than the
95.60\%, 98.75\%, and 99.11\% figures recorded in
papers using the same dataset, respectively.",
acknowledgement = ack-nhfb,
articleno = "284",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kareem:2024:SEB,
author = "Yunus Kareem and Djamel Djenouri and Essam Ghadafi",
title = "A Survey on Emerging Blockchain Technology Platforms
for Securing the {Internet of Things}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "8",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080285",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/285",
abstract = "The adoption of blockchain platforms to bolster the
security of Internet of Things (IoT) systems has
attracted significant attention in recent years.
Currently, there is a lack of comprehensive and
systematic survey papers in the literature addressing
these platforms. This paper discusses six of the most
popular emerging blockchain platforms adopted by IoT
systems and analyses their usage in state-of-the-art
works to solve security problems. The platform was
compared in terms of security features and other
requirements. Findings from the study reveal that most
blockchain components contribute directly or indirectly
to IoT security. Blockchain platform components such as
cryptography, consensus mechanism, and hashing are
common ways that security is achieved in all blockchain
platform for IoT. Technologies like Interplanetary File
System (IPFS) and Transport Layer Security (TLS) can
further enhance data and communication security when
used alongside blockchain. To enhance the applicability
of blockchain in resource-constrained IoT environments,
future research should focus on refining cryptographic
algorithms and consensus mechanisms to optimise
performance and security.",
acknowledgement = ack-nhfb,
articleno = "285",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alghamdi:2024:CDF,
author = "Jawaher Alghamdi and Yuqing Lin and Suhuai Luo",
title = "Cross-Domain Fake News Detection Using a Prompt-Based
Approach",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "8",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080286",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/286",
abstract = "The proliferation of fake news poses a significant
challenge in today's information landscape, spanning
diverse domains and topics and undermining traditional
detection methods confined to specific domains. In
response, there is a growing interest in strategies for
detecting cross-domain misinformation. However,
traditional machine learning (ML) approaches often
struggle with the nuanced contextual understanding
required for accurate news classification. To address
these challenges, we propose a novel contextualized
cross-domain prompt-based zero-shot approach utilizing
a pre-trained Generative Pre-trained Transformer (GPT)
model for fake news detection (FND). In contrast to
conventional fine-tuning methods reliant on extensive
labeled datasets, our approach places particular
emphasis on refining prompt integration and
classification logic within the model's framework. This
refinement enhances the model's ability to accurately
classify fake news across diverse domains.
Additionally, the adaptability of our approach allows
for customization across diverse tasks by modifying
prompt placeholders. Our research significantly
advances zero-shot learning by demonstrating the
efficacy of prompt-based methodologies in text
classification, particularly in scenarios with limited
training data. Through extensive experimentation, we
illustrate that our method effectively captures
domain-specific features and generalizes well to other
domains, surpassing existing models in terms of
performance. These findings contribute significantly to
the ongoing efforts to combat fake news dissemination,
particularly in environments with severely limited
training data, such as online platforms.",
acknowledgement = ack-nhfb,
articleno = "286",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Islam:2024:DFV,
author = "Tasin Islam and Alina Miron and Xiaohui Liu and
Yongmin Li",
title = "Dynamic Fashion Video Synthesis from Static Imagery",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "8",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080287",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/287",
abstract = "Online shopping for clothing has become increasingly
popular among many people. However, this trend comes
with its own set of challenges. For example, it can be
difficult for customers to make informed purchase
decisions without trying on the clothes to see how they
move and flow. We address this issue by introducing a
new image-to-video generator called FashionFlow to
generate fashion videos to show how clothing products
move and flow on a person. By utilising a latent
diffusion model and various other components, we are
able to synthesise a high-fidelity video conditioned by
a fashion image. The components include the use of
pseudo-3D convolution, VAE, CLIP, frame interpolator
and attention to generate a smooth video efficiently
while preserving vital characteristics from the
conditioning image. The contribution of our work is the
creation of a model that can synthesise videos from
images. We show how we use a pre-trained VAE decoder to
process the latent space and generate a video. We
demonstrate the effectiveness of our local and global
conditioners, which help preserve the maximum amount of
detail from the conditioning image. Our model is unique
because it produces spontaneous and believable motion
using only one image, while other diffusion models are
either text-to-video or image-to-video using
pre-recorded pose sequences. Overall, our research
demonstrates a successful synthesis of fashion videos
featuring models posing from various angles, showcasing
the movement of the garment. Our findings hold great
promise for improving and enhancing the online fashion
industry's shopping experience.",
acknowledgement = ack-nhfb,
articleno = "287",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Mahbub:2024:FFV,
author = "Khaled Mahbub and Antonio Nehme and Mohammad Patwary
and Marc Lacoste and Sylvain Allio",
title = "{FIVADMI}: a Framework for In-Vehicle Anomaly
Detection by Monitoring and Isolation",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "8",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080288",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/288",
abstract = "Self-driving vehicles have attracted significant
attention in the automotive industry that is heavily
investing to reach the level of reliability needed from
these safety critical systems. Security of in-vehicle
communications is mandatory to achieve this goal. Most
of the existing research to detect anomalies for
in-vehicle communication does not take into account the
low processing power of the in-vehicle Network and ECUs
(Electronic Control Units). Also, these approaches do
not consider system level isolation challenges such as
side-channel vulnerabilities, that may arise due to
adoption of new technologies in the automotive domain.
This paper introduces and discusses the design of a
framework to detect anomalies in in-vehicle
communications, including side channel attacks. The
proposed framework supports real time monitoring of
data exchanges among the components of in-vehicle
communication network and ensures the isolation of the
components in in-vehicle network by deploying them in
Trusted Execution Environments (TEEs). The framework is
designed based on the AUTOSAR open standard for
automotive software architecture and framework. The
paper also discusses the implementation and evaluation
of the proposed framework.",
acknowledgement = ack-nhfb,
articleno = "288",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Carrillo:2024:TSE,
author = "Alexis Carrillo and Mois{\'e}s Betancort",
title = "Testing Stimulus Equivalence in Transformer-Based
Agents",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "9",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080289",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/289",
abstract = "This study investigates the ability of
transformer-based models (TBMs) to form stimulus
equivalence (SE) classes. We employ BERT and GPT as TBM
agents in SE tasks, evaluating their performance across
training structures (linear series, one-to-many and
many-to-one) and relation types (select--reject,
select-only). Our findings demonstrate that both models
performed above mastery criterion in the baseline phase
across all simulations ( n = 12). However, they exhibit
limited success in reflexivity, transitivity, and
symmetry tests. Notably, both models achieved success
only in the linear series structure with select--reject
relations, failing in one-to-many and many-to-one
structures, and all select-only conditions. These
results suggest that TBM may be forming decision rules
based on learned discriminations and reject relations,
rather than responding according to equivalence class
formation. The absence of reject relations appears to
influence their responses and the occurrence of
hallucinations. This research highlights the potential
of SE simulations for: (a) comparative analysis of
learning mechanisms, (b) explainability techniques for
TBM decision-making, and (c) TBM bench-marking
independent of pre-training or fine-tuning. Future
investigations can explore upscaling simulations and
utilize SE tasks within a reinforcement learning
framework.",
acknowledgement = ack-nhfb,
articleno = "289",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Piccardo:2024:BTP,
author = "Giorgio Piccardo and Lorenzo Conti and Alessio
Martino",
title = "Blockchain Technology and Its Potential to Benefit
Public Services Provision: a Short Survey",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "9",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080290",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/290",
abstract = "In the last few years, blockchain has emerged as a
cutting-edge technology whose main advantages are
transparency, traceability, immutability, enhanced
efficiency, and trust, thanks to its decentralized
nature. Although many people still identify blockchain
with cryptocurrencies and the financial sector, it has
many prospective applications beyond digital currency
that can serve as use cases for which traditional
infrastructures have become obsolete. Governments have
started exploring its potential application to public
services provision, as confirmed by the increasing
number of adoption initiatives, projects, and tests. As
the current public administration is often perceived as
slow, bureaucratic, lacking transparency, and failing
to involve citizens in decision-making processes,
blockchain can establish itself as a tool that enables
a process of disintermediation, which can revolutionize
the way in which public services are managed and
provided. In this paper, we will provide a survey of
the main application areas which are likely to benefit
from blockchain implementation, together with examples
of practical implementations carried out by both state
and local governments. Later, we will discuss the main
challenges that may prevent its widespread adoption,
such as government expenditure, technological maturity,
and lack of public awareness. Finally, we will wrap up
by providing indications on future areas of research
for blockchain-based technologies.",
acknowledgement = ack-nhfb,
articleno = "290",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Davidian:2024:ERD,
author = "Matan Davidian and Michael Kiperberg and Natalia
Vanetik",
title = "Early Ransomware Detection with Deep Learning Models",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "11",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080291",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/291",
abstract = "Ransomware is a growing-in-popularity type of malware
that restricts access to the victim's system or data
until a ransom is paid. Traditional detection methods
rely on analyzing the malware's content, but these
methods are ineffective against unknown or zero-day
malware. Therefore, zero-day malware detection
typically involves observing the malware's behavior,
specifically the sequence of application programming
interface (API) calls it makes, such as reading and
writing files or enumerating directories. While
previous studies have used machine learning (ML)
techniques to classify API call sequences, they have
only considered the API call name. This paper
systematically compares various subsets of API call
features, different ML techniques, and context-window
sizes to identify the optimal ransomware classifier.
Our findings indicate that a context-window size of 7
is ideal, and the most effective ML techniques are CNN
and LSTM. Additionally, augmenting the API call name
with the operation result significantly enhances the
classifier's precision. Performance analysis suggests
that this classifier can be effectively applied in
real-time scenarios.",
acknowledgement = ack-nhfb,
articleno = "291",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dassanayake:2024:MAD,
author = "Janith K. Dassanayake and Minxiao Wang and Muhammad Z.
Hameed and Ning Yang",
title = "Multi-Agent Deep-{$Q$} Network-Based Cache Replacement
Policy for Content Delivery Networks",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "14",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080292",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/292",
abstract = "In today's digital landscape, content delivery
networks (CDNs) play a pivotal role in ensuring rapid
and seamless access to online content across the globe.
By strategically deploying a network of edge servers in
close proximity to users, CDNs optimize the delivery of
digital content. One key mechanism involves caching
frequently requested content at these edge servers,
which not only alleviates the load on the source CDN
server but also enhances the overall user experience.
However, the exponential growth in user demands has led
to increased network congestion, subsequently reducing
the cache hit ratio within CDNs. To address this
reduction, this paper presents an innovative approach
for efficient cache replacement in a dynamic caching
environment while maximizing the cache hit ratio via a
cooperative cache replacement policy based on
reinforcement learning. This paper presents an
innovative approach to enhance the performance of CDNs
through an advanced cache replacement policy based on
reinforcement learning. The proposed system model
depicts a mesh network of CDNs, with edge servers
catering to user requests, and a main source CDN
server. The cache replacement problem is initially
modeled as a Markov decision process, and it is
extended to a multi-agent reinforcement learning
problem. We propose a cooperative cache replacement
algorithm based on a multi-agent deep-Q network
(MADQN), where the edge servers cooperatively learn to
efficiently replace the cached content to maximize the
cache hit ratio. Experimental results are presented to
validate the performance of our proposed approach.
Notably, our MADQN policy exhibits superior cache hit
ratios and lower average delays compared to traditional
caching policies.",
acknowledgement = ack-nhfb,
articleno = "292",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Liu:2024:DNO,
author = "Lisi Liu and Zijie Xu and Xiaobin Qu",
title = "Development of a Novel Open Control System
Implementation Method under Industrial {IoT}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "14",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080293",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/293",
abstract = "The closed architecture of modern control systems
impedes them from further development in the
environment of the industrial IoT. The open control
system is proposed to tackle this issue. Numerous open
control prototypes have been proposed, but they do not
reach high openness. According to the definition and
criteria of open control systems, this paper suggests
that the independence between control tasks and the
independence between control tasks and infrastructures
are the keys to the open control system under the
industrial IoT. Through the control domain's formal
description and control task virtualization to deal
with the keys, this paper proposes a new method to
implement open control systems under the industrial
IoT. Specifically, given the hybrid characteristic of
the control domain, a hierarchical semantic formal
based on an extended finite state machine and a
dependency network model with the time property is
designed to describe the control domain. Considering
the infrastructure's heterogeneity in the industrial
IoT, a hybrid virtualization approach based on
containers and WebAssembly is designed to virtualize
control tasks. The proposed open control system
implementation method is illustrated by constructing an
open computer numerical control demonstration and
compared to current open control prototypes.",
acknowledgement = ack-nhfb,
articleno = "293",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fallatah:2024:EMU,
author = "Wesam Fallatah and Joakim K{\"a}vrestad and Steven
Furnell",
title = "Establishing a Model for the User Acceptance of
Cybersecurity Training",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "15",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080294",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/294",
abstract = "Cybersecurity is established as fundamental for
organisations and individuals engaging with digital
technology. A central topic in cybersecurity is user
behaviour, which has been shown to be the root cause or
enabler in a majority of all cyber incidents with a
resultant need to empower users to adopt secure
behaviour. Researchers and practitioners agree that a
crucial step in empowering users to adopt secure
behaviour is training. Subsequently, there are many
different methods for cybersecurity training discussed
in the scientific literature and that are adopted in
practise. However, research suggests that those
training efforts are not effective enough, and one
commonly mentioned reason is user adoption problems. In
essence, users are not engaging with the provided
training to the extent needed to benefit from the
training as expected. While the perception and adoption
of individual training methods are discussed in the
scientific literature, cohesive studies on the factors
that impact user adoption are few and far between. To
that end, this paper focuses on the user acceptance of
cybersecurity training using the technology acceptance
model as a theory base. Based on 22 included
publications, the research provides an overview of the
cybersecurity training acceptance factors that have
been discussed in the existing scientific literature.
The main contributions are a cohesive compilation of
existing knowledge about factors that impact the user
acceptance of cybersecurity training and the
introduction of the CTAM, a cybersecurity training
acceptance model which pinpoints four
factors---regulatory control, worry, apathy, and
trust---that influence users' intention to adopt
cybersecurity training. The results can be used to
guide future research as well as to guide practitioners
implementing cybersecurity training.",
acknowledgement = ack-nhfb,
articleno = "294",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Xie:2024:DGR,
author = "Mingxuan Xie and Tao Zou and Junchen Ye and Bowen Du
and Runhe Huang",
title = "Dynamic Graph Representation Learning for Passenger
Behavior Prediction",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "15",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080295",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/295",
abstract = "Passenger behavior prediction aims to track passenger
travel patterns through historical boarding and
alighting data, enabling the analysis of urban station
passenger flow and timely risk management. This is
crucial for smart city development and public
transportation planning. Existing research primarily
relies on statistical methods and sequential models to
learn from individual historical interactions, which
ignores the correlations between passengers and
stations. To address these issues, this paper proposes
DyGPP, which leverages dynamic graphs to capture the
intricate evolution of passenger behavior. First, we
formalize passengers and stations as heterogeneous
vertices in a dynamic graph, with connections between
vertices representing interactions between passengers
and stations. Then, we sample the historical
interaction sequences for passengers and stations
separately. We capture the temporal patterns from
individual sequences and correlate the temporal
behavior between the two sequences. Finally, we use an
MLP-based encoder to learn the temporal patterns in the
interactions and generate real-time representations of
passengers and stations. Experiments on real-world
datasets confirmed that DyGPP outperformed current
models in the behavior prediction task, demonstrating
the superiority of our model.",
acknowledgement = ack-nhfb,
articleno = "295",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Miao:2024:MBS,
author = "Jinpeng Miao and Dasari Rajasekhar and Shivakant
Mishra and Sanjeet Kumar Nayak and Ramanarayan Yadav",
title = "A Microservice-Based Smart Agriculture System to
Detect Animal Intrusion at the Edge",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "16",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080296",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/296",
abstract = "Smart agriculture stands as a promising domain for
IoT-enabled technologies, with the potential to elevate
crop quality, quantity, and operational efficiency.
However, implementing a smart agriculture system
encounters challenges such as the high latency and
bandwidth consumption linked to cloud computing,
Internet disconnections in rural locales, and the
imperative of cost efficiency for farmers. Addressing
these hurdles, this paper advocates a fog-based smart
agriculture infrastructure integrating edge computing
and LoRa communication. We tackle farmers' prime
concern of animal intrusion by presenting a solution
leveraging low-cost PIR sensors, cameras, and computer
vision to detect intrusions and predict animal
locations using an innovative algorithm. Our system
detects intrusions pre-emptively, identifies intruders,
forecasts their movements, and promptly alerts farmers.
Additionally, we compare our proposed strategy with
other approaches and measure their power consumptions,
demonstrating significant energy savings afforded by
our strategy. Experimental results highlight the
effectiveness, energy efficiency, and
cost-effectiveness of our system compared to
state-of-the-art systems.",
acknowledgement = ack-nhfb,
articleno = "296",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lin:2024:IRS,
author = "Yijie Lin and Jui-Chuan Liu and Ching-Chun Chang and
Chin-Chen Chang",
title = "An Innovative Recompression Scheme for {VQ} Index
Tables",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "19",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080297",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/297",
abstract = "As we move into the digital era, the pace of
technological advancement is accelerating rapidly.
Network traffic often becomes congested during the
transmission of large data volumes. To mitigate this,
data compression plays a crucial role in minimizing
transmitted data. Vector quantization (VQ) stands out
as a potent compression technique where each image
block is encoded independently as an index linked to a
codebook, effectively reducing the bit rate. In this
paper, we introduce a novel scheme for recompressing VQ
indices, enabling lossless restoration of the original
indices during decoding without compromising visual
quality. Our method not only considers pixel
correlations within each image block but also leverages
correlations between neighboring blocks, further
optimizing the bit rate. The experimental results
demonstrated the superior performance of our approach
over existing methods.",
acknowledgement = ack-nhfb,
articleno = "297",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Papageorgiou:2024:SUL,
author = "Eleftheria Papageorgiou and Christos Chronis and
Iraklis Varlamis and Yassine Himeur",
title = "A Survey on the Use of Large Language Models {(LLMs)}
in Fake News",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "19",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080298",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/298",
abstract = "The proliferation of fake news and fake profiles on
social media platforms poses significant threats to
information integrity and societal trust. Traditional
detection methods, including rule-based approaches,
metadata analysis, and human fact-checking, have been
employed to combat disinformation, but these methods
often fall short in the face of increasingly
sophisticated fake content. This review article
explores the emerging role of Large Language Models
(LLMs) in enhancing the detection of fake news and fake
profiles. We provide a comprehensive overview of the
nature and spread of disinformation, followed by an
examination of existing detection methodologies. The
article delves into the capabilities of LLMs in
generating both fake news and fake profiles,
highlighting their dual role as both a tool for
disinformation and a powerful means of detection. We
discuss the various applications of LLMs in text
classification, fact-checking, verification, and
contextual analysis, demonstrating how these models
surpass traditional methods in accuracy and efficiency.
Additionally, the article covers LLM-based detection of
fake profiles through profile attribute analysis,
network analysis, and behavior pattern recognition.
Through comparative analysis, we showcase the
advantages of LLMs over conventional techniques and
present case studies that illustrate practical
applications. Despite their potential, LLMs face
challenges such as computational demands and ethical
concerns, which we discuss in more detail. The review
concludes with future directions for research and
development in LLM-based fake news and fake profile
detection, underscoring the importance of continued
innovation to safeguard the authenticity of online
information.",
acknowledgement = ack-nhfb,
articleno = "298",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Nguyen:2024:LIN,
author = "Kieu Anh Nguyen and Yi-Jia Jiang and Chiao-Shin Huang
and Meng-Hsun Kuo and Walter Chen",
title = "Leveraging {Internet} News-Based Data for Rockfall
Hazard Susceptibility Assessment on Highways",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "21",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080299",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/299",
abstract = "Over three-quarters of Taiwan's landmass consists of
mountainous slopes with steep gradients, leading to
frequent rockfall hazards that obstruct traffic and
cause injuries and fatalities. This study used Google
Alerts to compile internet news on rockfall incidents
along Taiwan's highway system from April 2019 to
February 2024. The locations of these rockfalls were
geolocated using Google Earth and integrated with
geographical, topographical, environmental, geological,
and socioeconomic variables. Employing machine learning
algorithms, particularly the Random Forest algorithm,
we analyzed the potential for rockfall hazards along
roadside slopes. The model achieved an overall accuracy
of 0.8514 on the test dataset, with a sensitivity of
0.8378, correctly identifying 83.8\% of rockfall
locations. Shapley Additive Explanations (SHAP)
analysis highlighted that factors such as slope angle
and distance to geologically sensitive areas are
pivotal in determining rockfall locations. The study
underscores the utility of internet-based data
collection in providing comprehensive coverage of
Taiwan's highway system, and enabled the first broad
analysis of rockfall hazard susceptibility for the
entire highway network. The consistent importance of
topographical and geographical features suggests that
integrating detailed spatial data could further enhance
predictive performance. The combined use of Random
Forest and SHAP analyses offers a robust framework for
understanding and improving predictive models, aiding
in the development of effective strategies for risk
management and mitigation in rockfall-prone areas,
ultimately contributing to safer and more reliable
transportation networks in mountainous regions.",
acknowledgement = ack-nhfb,
articleno = "299",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Lawo:2024:WFB,
author = "Daniel Christian Lawo and Rana Abu Bakar and Abraham
Cano Aguilera and Filippo Cugini and Jos{\'e} Luis
Ima{\~n}a and Idelfonso Tafur Monroy and Juan Jose
Vegas Olmos",
title = "Wireless and Fiber-Based
Post-Quantum-Cryptography-Secured {IPsec} Tunnel",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "21",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080300",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/300",
abstract = "In the near future, commercially accessible quantum
computers are anticipated to revolutionize the world as
we know it. These advanced machines are predicted to
render traditional cryptographic security measures,
deeply ingrained in contemporary communication,
obsolete. While symmetric cryptography methods like AES
can withstand quantum assaults if key sizes are doubled
compared to current standards, asymmetric cryptographic
techniques, such as RSA, are vulnerable to compromise.
Consequently, there is a pressing need to transition
towards post-quantum cryptography (PQC) principles in
order to safeguard our privacy effectively. A challenge
is to include PQC into existing protocols and thus into
the existing communication structure. In this work, we
report on the first experimental IPsec tunnel secured
by the PQC algorithms Falcon, Dilithium, and Kyber. We
deploy our IPsec tunnel in two scenarios. The first
scenario represents a high-performance data center
environment where many machines are interconnected via
high-speed networks. We achieve an IPsec tunnel with an
AES-256 GCM encrypted east--west throughput of 100
Gbit/s line rate. The second scenario shows an IPsec
tunnel between a wireless NVIDIA Jetson and the cloud
that achieves a 0.486 Gbit/s AES-256 GCM encrypted
north--south throughput. This case represents a mobile
device that communicates securely with applications
running in the cloud.",
acknowledgement = ack-nhfb,
articleno = "300",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vasilas:2024:BHS,
author = "Teodora Vasilas and Claudiu Bacila and Remus Brad",
title = "Beat the Heat: Syscall Attack Detection via Thermal
Side Channel",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "21",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080301",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/301",
abstract = "As the complexity and integration of electronic
devices increase, understanding and mitigating
side-channel vulnerabilities will remain a critical
area of cybersecurity research. The new and intriguing
software-based thermal side-channel attacks and
countermeasures use thermal emissions from a device to
extract or defend sensitive information, by reading
information from the built-in thermal sensors via
software. This work extends the Hot-n-Cold anomaly
detection technique, applying it in circumstances much
closer to the real-world computational environments by
detecting irregularities in the Linux command behavior
through CPU temperature monitoring. The novelty of this
approach lies in the introduction of five types of
noise across the CPU, including moving files,
performing extended math computations, playing songs,
and browsing the web while the attack detector is
running. We employed Hot-n-Cold to monitor core
temperatures on three types of CPUs utilizing two
commonly used Linux terminal commands, ls and chmod.
The results show a high correlation, approaching 0.96,
between the original Linux command and a crafted
command, augmented with vulnerable system calls.
Additionally, a Machine Learning algorithm was used to
classify whether a thermal trace is augmented or not,
with an accuracy of up to 88\%. This research
demonstrates the potential for detecting attacks
through thermal sensors even when there are different
types of noise in the CPU, simulating a real-world
scenario.",
acknowledgement = ack-nhfb,
articleno = "301",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Wang:2024:MOD,
author = "Peng Wang and Yonghua Xiong",
title = "A Method to Optimize Deployment of Directional Sensors
for Coverage Enhancement in the Sensing Layer of
{IoT}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "8",
pages = "??--??",
day = "22",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16080302",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Fri Aug 30 06:19:01 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/8/302",
abstract = "Directional sensor networks are a widely used
architecture in the sensing layer of the Internet of
Things (IoT), which has excellent data collection and
transmission capabilities. The coverage hole caused by
random deployment of sensors is the main factor
restricting the quality of data collection in the IoT
sensing layer. Determining how to enhance coverage
performance by repairing coverage holes is a very
challenging task. To this end, we propose a node
deployment optimization method to enhance the coverage
performance of the IoT sensing layer. Firstly, with the
goal of maximizing the effective coverage area, an
improved particle swarm optimization (IPSO) algorithm
is used to solve and obtain the optimal set of sensing
directions. Secondly, we propose a repair path search
method based on the improved sparrow search algorithm
(ISSA), using the minimum exposure path (MEP) found as
the repair path. Finally, a node scheduling algorithm
is designed based on MEP to determine the optimal
deployment location of mobile nodes and achieve
coverage enhancement. The simulation results show that
compared with existing algorithms, the proposed node
deployment optimization method can significantly
improve the coverage rate of the IoT sensing layer and
reduce energy consumption during the redeployment
process.",
acknowledgement = ack-nhfb,
articleno = "302",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vrahatis:2024:GAN,
author = "Aristidis G. Vrahatis and Konstantinos Lazaros and
Sotiris Kotsiantis",
title = "Graph Attention Networks: a Comprehensive Review of
Methods and Applications",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "3",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090318",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/318",
abstract = "Real-world problems often exhibit complex
relationships and dependencies, which can be
effectively captured by graph learning systems. Graph
attention networks (GATs) have emerged as a powerful
and versatile framework in this direction, inspiring
numerous extensions and applications in several areas.
In this review, we present a thorough examination of
GATs, covering both diverse approaches and a wide range
of applications. We examine the principal GAT-based
categories, including Global Attention Networks,
Multi-Layer Architectures, graph-embedding techniques,
Spatial Approaches, and Variational Models.
Furthermore, we delve into the diverse applications of
GATs in various systems such as recommendation systems,
image analysis, medical domain, sentiment analysis, and
anomaly detection. This review seeks to act as a
navigational reference for researchers and
practitioners aiming to emphasize the capabilities and
prospects of GATs.",
acknowledgement = ack-nhfb,
articleno = "318",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Su:2024:WTP,
author = "Guoxin Su and Li Liu",
title = "Workflow Trace Profiling and Execution Time Analysis
in Quantitative Verification",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "3",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090319",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/319",
abstract = "Workflows orchestrate a collection of computing tasks
to form a complex workflow logic. Different from the
traditional monolithic workflow management systems,
modern workflow systems often manifest high throughput,
concurrency and scalability. As service-based systems,
execution time monitoring is an important part of
maintaining the performance for those systems. We
developed a trace profiling approach that leverages
quantitative verification (also known as probabilistic
model checking ) to analyse complex time metrics for
workflow traces. The strength of probabilistic model
checking lies in the ability of expressing various
temporal properties for a stochastic system model and
performing automated quantitative verification. We
employ semi-Makrov chains (SMCs) as the formal model
and consider the first passage times (FPT) measures in
the SMCs. Our approach maintains simple mergeable data
summaries of the workflow executions and computes the
moment parameters for FPT efficiently. We describe an
application of our approach to AWS Step Functions, a
notable workflow web service. An empirical evaluation
shows that our approach is efficient for computer
high-order FPT moments for sizeable workflows in
practice. It can compute up to the fourth moment for a
large workflow model with 10,000 states within 70 s.",
acknowledgement = ack-nhfb,
articleno = "319",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2024:MSM,
author = "Di Li and Zhibang Yang and Siyang Yu and Mingxing Duan
and Shenghong Yang",
title = "A Micro-Segmentation Method Based on {VLAN-VxLAN}
Mapping Technology",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "4",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090320",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/320",
abstract = "As information technology continues to evolve, cloud
data centres have become increasingly prominent as the
preferred infrastructure for data storage and
processing. However, this shift has introduced a new
array of security challenges, necessitating innovative
approaches distinct from traditional network security
architectures. In response, the Zero Trust Architecture
(ZTA) has emerged as a promising solution, with
micro-segmentation identified as a crucial component
for enabling continuous auditing and stringent security
controls. VxLAN technology is widely utilized in data
centres for tenant isolation and virtual machine
interconnection within tenant environments. Despite its
prevalent use, limited research has focused on its
application in micro-segmentation scenarios. To address
this gap, we propose a method that leverages VLAN and
VxLAN many-to-one mapping, requiring that all internal
data centre traffic routes through the VxLAN gateway.
This method can be implemented cost-effectively,
without necessitating business modifications or causing
service disruptions, thereby overcoming the challenges
associated with micro-segmentation deployment.
Importantly, this approach is based on standard public
protocols, making it independent of specific product
brands and enabling a network-centric framework that
avoids software compatibility issues. To assess the
effectiveness of our micro-segmentation approach, we
provide a comprehensive evaluation that includes
network aggregation and traffic visualization. Building
on the implementation of micro-segmentation, we also
introduce an enhanced asset behaviour algorithm. This
algorithm constructs behavioural profiles based on the
historical traffic of internal network assets, enabling
the rapid identification of abnormal behaviours and
facilitating timely defensive actions. Empirical
results demonstrate that our algorithm is highly
effective in detecting anomalous behaviour in intranet
assets, making it a powerful tool for enhancing
security in cloud data centres. In summary, the
proposed approach offers a robust and efficient
solution to the challenges of micro-segmentation in
cloud data centres, contributing to the advancement of
secure and reliable cloud infrastructure.",
acknowledgement = ack-nhfb,
articleno = "320",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bani-Hani:2024:VDC,
author = "Raed M. Bani-Hani and Ahmed S. Shatnawi and Lana
Al-Yahya",
title = "Vulnerability Detection and Classification of
{Ethereum} Smart Contracts Using Deep Learning",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "4",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090321",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/321",
abstract = "Smart contracts are programs that reside and execute
on a blockchain, like any transaction. They are
automatically executed when preprogrammed terms and
conditions are met. Although the smart contract (SC)
must be presented in the blockchain for the integrity
of data and transactions stored within it, it is highly
exposed to several vulnerabilities attackers exploit to
access the data. In this paper, classification and
detection of vulnerabilities targeting smart contracts
are performed using deep learning algorithms over two
datasets containing 12,253 smart contracts. These
contracts are converted into RGB and Grayscale images
and then inserted into Residual Network (ResNet50),
Visual Geometry Group-19 (VGG19), Dense Convolutional
Network (DenseNet201), k-nearest Neighbors (KNN), and
Random Forest (RF) algorithms for binary and
multi-label classification. A comprehensive analysis is
conducted to detect and classify vulnerabilities using
different performance metrics. The performance of these
algorithms was outstanding, accurately classifying
vulnerabilities with high F1 scores and accuracy rates.
For binary classification, RF emerged in RGB images as
the best algorithm based on the highest F1 score of
86.66\% and accuracy of 86.66\%. Moving on to
multi-label classification, VGG19 stood out in RGB
images as the standout algorithm, achieving an
impressive accuracy of 89.14\% and an F1 score of
85.87\%. To the best of our knowledge, and according to
the available literature, this study is the first to
investigate binary classification of vulnerabilities
targeting Ethereum smart contracts, and the
experimental results of the proposed methodology for
multi-label vulnerability classification outperform
existing literature.",
acknowledgement = ack-nhfb,
articleno = "321",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Aslan:2024:SBE,
author = "Lara Aslan and Michal Ptaszynski and Jukka
Jauhiainen",
title = "Are Strong Baselines Enough? False News Detection with
Machine Learning",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "5",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090322",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/322",
abstract = "False news refers to false, fake, or misleading
information presented as real news. In recent years,
there has been a noticeable increase in false news on
the Internet. The goal of this paper was to study the
automatic detection of such false news using machine
learning and natural language processing techniques and
to determine which techniques work the most
effectively. This article first studies what
constitutes false news and how it differs from other
types of misleading information. We also study the
results achieved by other researchers on the same
topic. After building a foundation to understand false
news and the various ways of automatically detecting
it, this article provides its own experiments. These
experiments were carried out on four different
datasets, one that was made just for this article,
using 10 different machine learning methods. The
results of this article were satisfactory and provided
answers to the original research questions set up at
the beginning of this article. This article could
determine from the experiments that passive aggressive
algorithms, support vector machines, and random forests
are the most efficient methods for automatic false news
detection. This article also concluded that more
complex experiments, such as using multiple levels of
identifying false news or detecting computer-generated
false news, require more complex machine learning
models.",
acknowledgement = ack-nhfb,
articleno = "322",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Del-Valle-Soto:2024:EEC,
author = "Carolina Del-Valle-Soto and Ramon A. Brise{\~n}o and
Ramiro Vel{\'a}zquez and Gabriel Guerra-Rosales and
Santiago Perez-Ochoa and Isaac H. Preciado-Bazavilvazo
and Paolo Visconti and Jos{\'e} Varela-Ald{\'a}s",
title = "Enhancing Elderly Care through Low-Cost Wireless
Sensor Networks and Artificial Intelligence: a Study on
Vital Sign Monitoring and Sleep Improvement",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "6",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090323",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/323",
abstract = "This research explores the application of wireless
sensor networks for the non-invasive monitoring of
sleep quality and vital signs in elderly individuals,
addressing significant challenges faced by the aging
population. The study implemented and evaluated WSNs in
home environments, focusing on variables such as
breathing frequency, deep sleep, snoring, heart rate,
heart rate variability (HRV), oxygen saturation, Rapid
Eye Movement (REM sleep), and temperature. The results
demonstrated substantial improvements in key metrics:
68\% in breathing frequency, 68\% in deep sleep, 70\%
in snoring reduction, 91\% in HRV, and 85\% in REM
sleep. Additionally, temperature control was identified
as a critical factor, with higher temperatures
negatively impacting sleep quality. By integrating AI
with WSN data, this study provided personalized health
recommendations, enhancing sleep quality and overall
health. This approach also offered significant support
to caregivers, reducing their burden. This research
highlights the cost-effectiveness and scalability of
WSN technology, suggesting its feasibility for
widespread adoption. The findings represent a
significant advancement in geriatric health monitoring,
paving the way for more comprehensive and integrated
care solutions.",
acknowledgement = ack-nhfb,
articleno = "323",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dritsas:2024:MLB,
author = "Elias Dritsas and Maria Trigka",
title = "Machine Learning for Blockchain and {IoT} Systems in
Smart Cities: a Survey",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "6",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090324",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/324",
abstract = "The integration of machine learning (ML), blockchain,
and the Internet of Things (IoT) in smart cities
represents a pivotal advancement in urban innovation.
This convergence addresses the complexities of modern
urban environments by leveraging ML's data analytics
and predictive capabilities to enhance the intelligence
of IoT systems, while blockchain provides a secure,
decentralized framework that ensures data integrity and
trust. The synergy of these technologies not only
optimizes urban management but also fortifies security
and privacy in increasingly connected cities. This
survey explores the transformative potential of
ML-driven blockchain-IoT ecosystems in enabling
autonomous, resilient, and sustainable smart city
infrastructure. It also discusses the challenges such
as scalability, privacy, and ethical considerations,
and outlines possible applications and future research
directions that are critical for advancing smart city
initiatives. Understanding these dynamics is essential
for realizing the full potential of smart cities, where
technology enhances not only efficiency but also urban
sustainability and resilience.",
acknowledgement = ack-nhfb,
articleno = "324",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Dumitru-Guzu:2024:NFC,
author = "Oana-Mihaela Dumitru-Guzu and Vladeanu Calin and
Robert Kooij",
title = "A Novel Framework for Cross-Cluster Scaling in
Cloud-Native {5G} {NextGen} Core",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "6",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090325",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/325",
abstract = "Cloud-native technologies are widely considered the
ideal candidates for the future of vertical application
development due to their boost in flexibility,
scalability, and especially cost efficiency. Since
multi-site support is paramount for 5G, we employ a
multi-cluster model that scales on demand, shifting the
boundaries of both horizontal and vertical scaling for
shared resources. Our approach is based on the liquid
computing paradigm, which has the benefit of adapting
to the changing environment. Despite being a
decentralized deployment shared across data centers,
the 5G mobile core can be managed as a single cluster
entity running in a public cloud. We achieve this by
following the cloud-native patterns for declarative
configuration based on Kubernetes APIs and on-demand
resource allocation. Moreover, in our setup, we analyze
the offloading of both the Open5GS user and control
plane functions under two different peering scenarios.
A significant improvement in terms of latency and
throughput is achieved for the in-band peering,
considering the traffic between clusters is ensured by
the Liqo control plane through a VPN tunnel. We also
validate three end-to-end network slicing use cases,
showcasing the full 5G core automation and leveraging
the capabilities of Kubernetes multi-cluster
deployments and inter-service monitoring through the
applied service mesh solution.",
acknowledgement = ack-nhfb,
articleno = "325",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Li:2024:PPA,
author = "Lihui Li and Hanwen Deng and Zhongyi Zhai and
Sheng-Lung Peng",
title = "Privacy-Preserving Authentication Based on {PUF} for
{VANETs}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "8",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090326",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/326",
abstract = "The secret key is stored in an ideal tamper-proof
device so that a vehicle can implement a secure
authentication with the road-side units (RSUs) and
other drivers. However, some adversaries can capture
the secret key by physical attacks. To resist physical
attacks, we propose a physical-preserving
authentication based on a physical unclonable function
for vehicular ad hoc networks. In the proposed scheme,
a physical unclonable function is deployed on the
vehicle and the RSU to provide a challenge--response
mechanism. A secret key is only generated by the
challenge--response mechanism when it is needed, which
eliminates the need to store a long-term secret key. As
a result, this prevents secret keys from being captured
by adversaries, improving system security. In addition,
route planning is introduced into the proposed scheme
so that a vehicle can obtain the authentication key of
RSUs on its route before vehicle-to-infrastructure
authentication, which greatly speeds up the
authentication when the vehicle enters the RSUs'
coverage. Furthermore, a detailed analysis demonstrates
that the proposed scheme achieves security objectives
in vehicular ad hoc networks. Ultimately, when
contrasted with similar schemes, the performance
assessment demonstrates that our proposed scheme
surpasses others in terms of computational overhead,
communication overhead and packet loss rate.",
acknowledgement = ack-nhfb,
articleno = "326",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Ruta:2024:ICT,
author = "Michele Ruta and Floriano Scioscia and Giuseppe Loseto
and Agnese Pinto and Corrado Fasciano and Giovanna
Capurso and Eugenio {Di Sciascio}",
title = "{Internet of Conscious Things}: Ontology-Based Social
Capabilities for Smart Objects",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "8",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090327",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/327",
abstract = "Emerging distributed intelligence paradigms for the
Internet of Things (IoT) call for flexible and dynamic
reconfiguration of elementary services, resources and
devices. In order to achieve such capability, this
paper faces complex interoperability and autonomous
decision problems by proposing a thorough framework
based on the integration of the Semantic Web of Things
(SWoT) and Social Internet of Things (SIoT) paradigms.
SWoT enables low-power knowledge representation and
autonomous reasoning at the edge of the network through
carefully optimized inference services and engines.
This layer provides service/resource management and
discovery primitives for a decentralized collaborative
social protocol in the IoT, based on the Linked Data
Notifications (LDN) over Linked Data Platform on
Constrained Application Protocol (LDP-CoAP). The
creation and evolution of friend and follower
relationships between pairs of devices is regulated by
means of novel dynamic models assessing trust as a
usefulness reputation score. The close SWoT-SIoT
integration overcomes the functional limitations of
existing proposals, which focus on either social device
or semantic resource management only. A smart mobility
case study on Plug-in Electric Vehicles (PEVs)
illustrates the benefits of the proposal in pervasive
collaborative scenarios, while experiments show the
computational sustainability of the dynamic
relationship management approach.",
acknowledgement = ack-nhfb,
articleno = "327",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Adarbah:2024:NFE,
author = "Haitham Y. Adarbah and Mehmet Sabir Kiraz and Suleyman
Kardas and Ali H. Al-Bayatti and Hilal M. Y.
Al-Bayatti",
title = "A New Framework for Enhancing {VANETs} through {Layer
2 DLT} Architectures with Multiparty Threshold Key
Management and {PETs}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "9",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090328",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/328",
abstract = "This work proposes a new architectural approach to
enhance the security, privacy, and scalability of
VANETs through threshold key management and Privacy
Enhancing Technologies (PETs), such as homomorphic
encryption and secure multiparty computation,
integrated with Decentralized Ledger Technologies
(DLTs). These advanced mechanisms are employed to
eliminate centralization and protect the privacy of
transferred and processed information in VANETs,
thereby addressing privacy concerns. We begin by
discussing the weaknesses of existing VANET
architectures concerning trust, privacy, and
scalability and then introduce a new architectural
framework that shifts from centralized to decentralized
approaches. This transition applies a decentralized
ledger mechanism to ensure correctness, reliability,
accuracy, and security against various known attacks.
The use of Layer 2 DLTs in our framework enhances key
management, trust distribution, and data privacy,
offering cost and speed advantages over Layer 1 DLTs,
thereby enabling secure vehicle-to-everything (V2X)
communication. The proposed framework is superior to
other frameworks as it improves decentralized trust
management, adopts more efficient PETs, and leverages
Layer 2 DLT for scalability. The integration of
multiparty threshold key management and homomorphic
encryption also enhances data confidentiality and
integrity, thus securing against various existing
cryptographic attacks. Finally, we discuss potential
future developments to improve the security and
reliability of VANETs in the next generation of
networks, including 5G networks.",
acknowledgement = ack-nhfb,
articleno = "328",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rancea:2024:ECH,
author = "Alexandru Rancea and Ionut Anghel and Tudor Cioara",
title = "Edge Computing in Healthcare: Innovations,
Opportunities, and Challenges",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "10",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090329",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/329",
abstract = "Edge computing promising a vision of processing data
close to its generation point, reducing latency and
bandwidth usage compared with traditional cloud
computing architectures, has attracted significant
attention lately. The integration of edge computing in
modern systems takes advantage of Internet of Things
(IoT) devices and can potentially improve the systems'
performance, scalability, privacy, and security with
applications in different domains. In the healthcare
domain, modern IoT devices can nowadays be used to
gather vital parameters and information that can be fed
to edge Artificial Intelligence (AI) techniques able to
offer precious insights and support to healthcare
professionals. However, issues regarding data privacy
and security, AI optimization, and computational
offloading at the edge pose challenges to the adoption
of edge AI. This paper aims to explore the current
state of the art of edge AI in healthcare by using the
Preferred Reporting Items for Systematic Reviews and
Meta-Analyses (PRISMA) methodology and analyzing more
than 70 Web of Science articles. We have defined the
relevant research questions, clear inclusion and
exclusion criteria, and classified the research works
in three main directions: privacy and security,
AI-based optimization methods, and edge offloading
techniques. The findings highlight the many advantages
of integrating edge computing in a wide range of
healthcare use cases requiring data privacy and
security, near real-time decision-making, and efficient
communication links, with the potential to transform
future healthcare services and eHealth applications.
However, further research is needed to enforce new
security-preserving methods and for better
orchestrating and coordinating the load in distributed
and decentralized scenarios.",
acknowledgement = ack-nhfb,
articleno = "329",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Shrestha:2024:FIC,
author = "Shyam Kumar Shrestha and Shiva Raj Pokhrel and
Jonathan Kua",
title = "On the Fairness of {Internet} Congestion Control over
{WiFi} with Deep Reinforcement Learning",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "10",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090330",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/330",
abstract = "For over forty years, TCP has been the main protocol
for transporting data on the Internet. To improve
congestion control algorithms (CCAs), delay bounding
algorithms such as Vegas, FAST, BBR, PCC, and Copa have
been developed. However, despite being designed to
ensure fairness between data flows, these CCAs can
still lead to unfairness and, in some cases, even cause
data flow starvation in WiFi networks under certain
conditions. We propose a new CCA switching solution
that works with existing TCP and WiFi standards. This
solution is offline and uses Deep Reinforcement
Learning (DRL) trained on features such as
noncongestive delay variations to predict and prevent
extreme unfairness and starvation. Our DRL-driven
approach allows for dynamic and efficient CCA
switching. We have tested our design preliminarily in
realistic datasets, ensuring that they support both
fairness and efficiency over WiFi networks, which
requires further investigation and extensive evaluation
before online deployment.",
acknowledgement = ack-nhfb,
articleno = "330",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Moubayed:2024:CED,
author = "Abdallah Moubayed",
title = "A Complete {EDA} and {DL} Pipeline for Softwarized
{5G} Network Intrusion Detection",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "10",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090331",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/331",
abstract = "The rise of 5G networks is driven by increasing
deployments of IoT devices and expanding mobile and
fixed broadband subscriptions. Concurrently, the
deployment of 5G networks has led to a surge in
network-related attacks, due to expanded attack
surfaces. Machine learning (ML), particularly deep
learning (DL), has emerged as a promising tool for
addressing these security challenges in 5G networks. To
that end, this work proposed an exploratory data
analysis (EDA) and DL-based framework designed for 5G
network intrusion detection. The approach aimed to
better understand dataset characteristics, implement a
DL-based detection pipeline, and evaluate its
performance against existing methodologies.
Experimental results using the 5G-NIDD dataset showed
that the proposed DL-based models had extremely high
intrusion detection and attack identification
capabilities (above 99.5\% and outperforming other
models from the literature), while having a reasonable
prediction time. This highlights their effectiveness
and efficiency for such tasks in softwarized 5G
environments.",
acknowledgement = ack-nhfb,
articleno = "331",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Takabatake:2024:TEN,
author = "Wataru Takabatake and Yohei Shibata and Kenji Hoshino
and Tomoaki Ohtsuki",
title = "Time-Efficient Neural-Network-Based Dynamic Area
Optimization Algorithm for High-Altitude Platform
Station Mobile Communications",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "11",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090332",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/332",
abstract = "There is a growing interest in high-altitude platform
stations (HAPSs) as potential telecommunication
infrastructures in the stratosphere, providing direct
communication services to ground-based smartphones.
Enhanced coverage and capacity can be realized in HAPSs
by adopting multicell configurations. To improve the
communication quality, previous studies have
investigated methods based on search algorithms, such
as genetic algorithms (GAs), which dynamically optimize
antenna parameters. However, these methods face hurdles
in swiftly adapting to sudden distribution shifts from
natural disasters or major events due to their high
computational requirements. Moreover, they do not
utilize the previous optimization results, which
require calculations each time. This study introduces a
novel optimization approach based on a neural network
(NN) model that is trained on GA solutions. The simple
model is easy to implement and allows for instantaneous
adaptation to unexpected distribution changes. However,
the NN faces the difficulty of capturing the
dependencies among neighboring cells. To address the
problem, a classifier chain (CC), which chains multiple
classifiers to learn output relationships, is
integrated into the NN. However, the performance of the
CC depends on the output sequence. Therefore, we employ
an ensemble approach to integrate the CCs with
different sequences and select the best solution. The
results of simulations based on distributions in Japan
indicate that the proposed method achieves a total
throughput whose cumulative distribution function (CDF)
is close to that obtained by the GA solutions. In
addition, the results show that the proposed method is
more time-efficient than GA in terms of the total time
required to optimize each user distribution.",
acknowledgement = ack-nhfb,
articleno = "332",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Jiang:2024:TOR,
author = "Guiwen Jiang and Rongxi Huang and Zhiming Bao and
Gaocai Wang",
title = "A Task Offloading and Resource Allocation Strategy
Based on Multi-Agent Reinforcement Learning in Mobile
Edge Computing",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "11",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090333",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/333",
abstract = "Task offloading and resource allocation is a research
hotspot in cloud-edge collaborative computing. Many
existing pieces of research adopted single-agent
reinforcement learning to solve this problem, which has
some defects such as low robustness, large decision
space, and ignoring delayed rewards. In view of the
above deficiencies, this paper constructs a cloud-edge
collaborative computing model, and related task queue,
delay, and energy consumption model, and gives joint
optimization problem modeling for task offloading and
resource allocation with multiple constraints. Then, in
order to solve the joint optimization problem, this
paper designs a decentralized offloading and scheduling
scheme based on ``task-oriented'' multi-agent
reinforcement learning. In this scheme, we present
information synchronization protocols and offloading
scheduling rules and use edge servers as agents to
construct a multi-agent system based on the
Actor--Critic framework. In order to solve delayed
rewards, this paper models the offloading and
scheduling problem as a ``task-oriented'' Markov
decision process. This process abandons the commonly
used equidistant time slot model but uses dynamic and
parallel slots in the step of task processing time.
Finally, an offloading decision algorithm TOMAC-PPO is
proposed. The algorithm applies the proximal policy
optimization to the multi-agent system and combines the
Transformer neural network model to realize the memory
and prediction of network state information.
Experimental results show that this algorithm has
better convergence speed and can effectively reduce the
service cost, energy consumption, and task drop rate
under high load and high failure rates. For example,
the proposed TOMAC-PPO can reduce the average cost by
from 19.4\% to 66.6\% compared to other offloading
schemes under the same network load. In addition, the
drop rate of some baseline algorithms with 50 users can
achieve 62.5\% for critical tasks, while the proposed
TOMAC-PPO only has 5.5\%.",
acknowledgement = ack-nhfb,
articleno = "333",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vergallo:2024:MEC,
author = "Roberto Vergallo and Luca Mainetti",
title = "Measuring the Effectiveness of Carbon-Aware {AI}
Training Strategies in Cloud Instances: a Confirmation
Study",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "13",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090334",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/334",
abstract = "While the massive adoption of Artificial Intelligence
(AI) is threatening the environment, new research
efforts begin to be employed to measure and mitigate
the carbon footprint of both training and inference
phases. In this domain, two carbon-aware training
strategies have been proposed in the literature:
Flexible Start and Pause \& Resume. Such
strategies---natively Cloud-based---use the time
resource to postpone or pause the training algorithm
when the carbon intensity reaches a threshold. While
such strategies have proved to achieve interesting
results on a benchmark of modern models covering
Natural Language Processing (NLP) and computer vision
applications and a wide range of model sizes (up to
6.1B parameters), it is still unclear whether such
results may hold also with different algorithms and in
different geographical regions. In this confirmation
study, we use the same methodology as the
state-of-the-art strategies to recompute the saving in
carbon emissions of Flexible Start and Pause \& Resume
in the Anomaly Detection (AD) domain. Results confirm
their effectiveness in two specific conditions, but the
percentage reduction behaves differently compared with
what is stated in the existing literature.",
acknowledgement = ack-nhfb,
articleno = "334",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Epicoco:2024:PDF,
author = "Italo Epicoco and Marco Pulimeno and Massimo Cafaro",
title = "Parallel and Distributed Frugal Tracking of a
Quantile",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "13",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090335",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/335",
abstract = "In this paper, we deal with the problem of monitoring
network latency. Indeed, latency is a key network
metric related to both network performance and quality
of service, since it directly impacts on the overall
user's experience. High latency leads to unacceptably
slow response times of network services, and may
increase network congestion and reduce the throughput,
in turn disrupting communications and the user's
experience. A common approach to monitoring network
latency takes into account the frequently skewed
distribution of latency values, and therefore specific
quantiles are monitored, such as the 95th, 98th, and
99th percentiles. We present a comparative analysis of
the speed of convergence of the sequential FRUGAL-1U,
FRUGAL-2U, and EASYQUANTILE algorithms and the design
and analysis of parallel, message-passing-based
versions of these algorithms that can be used for
monitoring network latency quickly and accurately.
Distributed versions are also discussed. Extensive
experimental results are provided and discussed as
well.",
acknowledgement = ack-nhfb,
articleno = "335",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yamamoto:2024:IWW,
author = "Yudai Yamamoto and Aoi Fukushima and Shingo
Yamaguchi",
title = "Implementation of White-Hat Worms Using {Mirai} Source
Code and Its Optimization through Parameter Tuning",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "13",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090336",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/336",
abstract = "Mirai, an IoT malware that emerged in 2016, has been
used for large-scale DDoS attacks. The Mirai source
code is publicly available and continues to be a threat
with a variety of variants still in existence. In this
paper, we propose an implementation system for
malicious and white-hat worms created using the Mirai
source code, as well as a general and detailed
implementation method for white-hat worms that is not
limited to the Mirai source code. The white-hat worms
have the function of a secondary infection, in which
the white-hat worm disinfects the malicious worm by
infecting devices already infected by the malicious
worm, and two parameters, the values of which can be
changed to modify the rate at which the white-hat worms
can spread their infection. The values of the
parameters of the best white-hat worm for disinfection
of the malicious botnet and the impact of the value of
each parameter on the disinfection of the malicious
botnet were analyzed in detail. The analysis revealed
that for a white-hat worm to disinfect a malicious
botnet, it must be able to infect at least 80\% of all
devices and maintain that situation for at least 300 s.
Then, by tuning and optimizing the values of the
white-hat worm's parameters, we were able to
successfully eliminate the malicious botnet,
demonstrating the effectiveness of the white-hat
botnet's function of eliminating the malicious
botnet.",
acknowledgement = ack-nhfb,
articleno = "336",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Shahjehan:2024:RMW,
author = "Waleed Shahjehan and Rajkumar Singh Rathore and Syed
Waqar Shah and Mohammad Aljaidi and Ali Safaa Sadiq and
Omprakash Kaiwartya",
title = "A Review on Millimeter-Wave Hybrid Beamforming for
Wireless Intelligent Transport Systems",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "14",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090337",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/337",
abstract = "As the world braces for an era of ubiquitous and
seamless connectivity, hybrid beamforming stands out as
a beacon guiding the evolutionary path of wireless
communication technologies. Several hybrid beamforming
technologies are explored for millimeter-wave
multiple-input multi-output (MIMO) communication. The
aim is to provide a roadmap for hybrid beamforming that
enhances wireless fidelity. In this systematic review,
a detailed literature review of algorithms/techniques
used in hybrid beamforming along with performance
metrics, characteristics, limitations, as well as
performance evaluations are provided to enable
communication compatible with modern Wireless
Intelligent Transport Systems (WITSs). Further, an
in-depth analysis of the mmWave hybrid beamforming
landscape is provided based on user, link, band,
scattering, structure, duplex, carrier, network,
applications, codebook, and reflecting intelligent
surfaces to optimize system design and performance
across diversified user scenarios. Furthermore, the
current research trends for hybrid beamforming are
provided to enable the development of advanced wireless
communication systems with optimized performance and
efficiency. Finally, challenges, solutions, and future
research directions are provided so that this
systematic review can serve as a touchstone for
academics and industry professionals alike. The
systematic review aims to equip researchers with a deep
understanding of the current state of the art and
thereby enable the development of next-generation
communication in WITSs that are not only adept at
coping with contemporary demands but are also
future-proofed to assimilate upcoming trends and
innovations.",
acknowledgement = ack-nhfb,
articleno = "337",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Margariti:2024:TCS,
author = "Spiridoula V. Margariti and Ioannis G. Tsoulos and
Evangelia Kiousi and Eleftherios Stergiou",
title = "Traffic Classification in Software-Defined Networking
Using Genetic Programming Tools",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "19",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090338",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/338",
abstract = "The classification of Software-Defined Networking
(SDN) traffic is an essential tool for network
management, network monitoring, traffic engineering,
dynamic resource allocation planning, and applying
Quality of Service (QoS) policies. The programmability
nature of SDN, the holistic view of the network through
SDN controllers, and the capability for dynamic
adjustable and reconfigurable controllersare fertile
ground for the development of new techniques for
traffic classification. Although there are enough
research works that have studied traffic classification
methods in SDN environments, they have several
shortcomings and gaps that need to be further
investigated. In this study, we investigated traffic
classification methods in SDN using publicly available
SDN traffic trace datasets. We apply a series of
classifiers, such as MLP (BFGS), FC2 (RBF), FC2 (MLP),
Decision Tree, SVM, and GENCLASS, and evaluate their
performance in terms of accuracy, detection rate, and
precision. Of the methods used, GenClass appears to be
more accurate in separating the categories of the
problem than the rest, and this is reflected in both
precision and recall. The key element of the GenClass
method is that it can generate classification rules
programmatically and detect the hidden associations
that exist between the problem features and the desired
classes. However, Genetic Programming-based techniques
require significantly higher execution time compared to
other machine learning techniques. This is most evident
in the feature construction method where at each
generation of the genetic algorithm, a set of learning
models is required to be trained to evaluate the
generated artificial features.",
acknowledgement = ack-nhfb,
articleno = "338",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Shahid:2024:ONP,
author = "Kamal Shahid and Saleem Naseer Ahmad and Syed Tahir
Hussain Rizvi",
title = "Optimizing Network Performance: a Comparative Analysis
of {EIGRP}, {OSPF}, and {BGP} in {IPv6}-Based
Load-Sharing and Link-Failover Systems",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "20",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090339",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/339",
abstract = "The purpose of this study is to evaluate and compare
how well different routing protocols perform in terms
of load sharing, link failover, and overall network
performance. Wireshark was used for packet-level
analysis, VMWare was used for virtualization, GNS3 was
used for network simulation, and Iperf3 was used to
measure network performance parameters. Convergence
time, packet losses, network jitter, and network delay
are the parameters that were selected for assessment.
To examine the behaviors of Open Shortest Path First
(OSPF) and Enhanced Interior Gateway Routing Protocol
(EIGRP) routing protocols in a variety of network
settings, a simulated network environment incorporating
both protocols along with Border Gateway Protocol (BGP)
is created for the research. The setup for the
experiment entails simulating different network
conditions, such as fluctuating traffic loads and
connection failures, to track how the protocols
function in dynamic situations. The efficiency metrics
for OSPF and EIGRP with BGP are measured and evaluated
using the data generated by Wireshark and Iperf3. The
results of this research show that EIGRP has a better
failover convergence time and packet loss percentage as
compared to the OSPF.",
acknowledgement = ack-nhfb,
articleno = "339",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Khanfor:2024:DAI,
author = "Abdullah Khanfor",
title = "Determinants to Adopt Industrial {Internet of Things}
in Small and Medium-Sized Enterprises",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "20",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090340",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/340",
abstract = "The Industrial Internet of Things (IIoT) enhances and
optimizes operations and product quality by reducing
expenses and preserving critical factory components.
The IIoT can also be integrated into the processes of
small and medium-sized enterprises (SMEs). However,
several factors and risks have discouraged SMEs from
adopting the IIoT. This study aims to identify the
factors influencing IIoT adoption and address the
challenges by conducting semi-structured interviews
with experienced stakeholders in SME factories. Group
quotations and thematic analysis indicate essential
themes from these interviews, suggesting two primary
categories, human- and machine-related factors, that
affect implementation. The main human-related factor is
the decision making of high-level management and owners
to implement the IIoT in their plants, which requires
skilled individuals to achieve IIoT solutions.
Machine-related factors present several challenges,
including device compatibility-, device management-,
and data storage-associated issues. Comprehending and
addressing these factors when deploying the IIoT can
ensure successful implementation in SMEs, maximizing
the potential benefits of this technology.",
acknowledgement = ack-nhfb,
articleno = "340",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Silva:2024:EDE,
author = "Lucas Silva and Jos{\'e} Metr{\^o}lho and Fernando
Ribeiro",
title = "Efficient Data Exchange between {WebAssembly}
Modules",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "20",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090341",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/341",
abstract = "In the past two decades, there has been a noticeable
decoupling of machines and operating systems. In this
context, WebAssembly has emerged as a promising
alternative to traditional virtual machines. Originally
designed for execution in web browsers, it has expanded
to executing code in restricted and secure
environments, and it stands out for its rapid startup,
small footprint, and portability. However, WebAssembly
presents significant challenges in data transfer and
the management of interactions with the module. Its
specification requires each module to have its own
memory, resulting in a ``share-nothing'' architecture.
This restriction, combined with the limitations of
importing and exporting functions that only handle
numerical values, and the absence of an application
binary interface (ABI) for sharing more complex data
structures, leads to efficiency problems; these are
exacerbated by the variety of programming languages
that can be compiled and executed in the same
environment. To address this inefficiency, the Karmem
was designed and developed. It includes a new interface
description language (IDL) aimed at facilitating the
definition of data, functions, and relationships
between modules. Additionally, a proprietary
protocol---an optimized ABI for efficient data reading
and minimal decoding cost---was created. A code
generator capable of producing code for various
programming languages was also conceived, ensuring
harmonious interaction with the ABI and the foreign
function interface. Finally, the compact runtime of
Karmem, built atop a WebAssembly runtime, enables
communication between modules and shared memory.
Results of the experiments conducted show that Karmem
represents an innovation in data communication for WASM
in multiple environments and demonstrates the ability
to overcome challenges of efficiency and
interoperability.",
acknowledgement = ack-nhfb,
articleno = "341",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Calle-Cancho:2024:DME,
author = "Jesus Calle-Cancho and Carlos Ca{\~n}ada and Rafael
Pastor-Vargas and Mercedes E. Paoletti and Juan M.
Haut",
title = "Decentralized Mechanism for Edge Node Allocation in
Access Network: an Experimental Evaluation",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "20",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090342",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/342",
abstract = "With the rapid advancement of the Internet of Things
and the emergence of 6G networks in smart city
environments, a growth in the generation of data,
commonly known as big data, is expected to consequently
lead to higher latency. To mitigate this latency,
mobile edge computing has been proposed to alleviate a
portion of the workload from mobile devices by
offloading it to nearby edge servers equipped with
appropriate computational resources. However, existing
solutions often exhibit poor performance when
confronted with complex network topologies. Thus, this
paper introduces a decentralized mechanism aimed at
determining the locations of network edge nodes in such
complex network topologies, characterized by lengthy
execution times. Our proposal provides performance
improvements and offers scalability and flexibility as
networks become more complex. Experimental evaluations
are conducted using the Shanghai Telecom dataset to
validate our proposed approach.",
acknowledgement = ack-nhfb,
articleno = "342",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Reali:2024:AIR,
author = "Gianluca Reali and Mauro Femminella",
title = "Artificial Intelligence to Reshape the Healthcare
Ecosystem",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "20",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090343",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/343",
abstract = "This paper intends to provide the reader with an
overview of the main processes that are introducing
artificial intelligence (AI) into healthcare services.
The first part is organized according to an
evolutionary perspective. We first describe the role
that digital technologies have had in shaping the
current healthcare methodologies and the relevant
foundations for new evolutionary scenarios.
Subsequently, the various evolutionary paths are
illustrated with reference to AI techniques and their
research activities, specifying their degree of
readiness for actual clinical use. The organization of
this paper is based on the interplay three pillars,
namely, algorithms, enabling technologies and
regulations, and healthcare methodologies. Through this
organization we introduce the reader to the main
evolutionary aspects of the healthcare ecosystem, to
associate clinical needs with appropriate
methodologies. We also explore the different aspects
related to the Internet of the future that are not
typically presented in papers that focus on AI, but
that are equally crucial to determine the success of
current research and development activities in
healthcare.",
acknowledgement = ack-nhfb,
articleno = "343",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kobza:2024:ADT,
author = "Ondrej Kobza and David Herel and Jan Cuhel and Tommaso
Gargiani and Petr Marek and Jan Sedivy",
title = "{Alquist 5.0}: Dialogue Trees Meet Generative Models,
a Novel Approach for Enhancing {SocialBot}
Conversations",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "21",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090344",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/344",
abstract = "This article introduces Alquist 5.0, our SocialBot
that was designed for the Alexa Prize SocialBot Grand
Challenge 5. Building upon previous iterations, we
present the integration of our novel neural response
generator (NRG) Barista within a hybrid architecture
that combines traditional predefined dialogues with
advanced neural response generation. We provide a
comprehensive analysis of the current state-of-the-art
NRGs and large language models (LLMs), leveraging these
insights to enhance Barista's capabilities. A key focus
of our development was in ensuring the safety of our
chatbot and implementing robust measures to prevent
profanity and inappropriate content. Additionally, we
incorporated a new search engine to improve information
retrieval and response accuracy. Expanding the
capabilities of our system, we designed Alquist 5.0 to
accommodate multimodal devices, utilizing APL templates
enriched with custom features to deliver an outstanding
conversational experience complemented by an excellent
user interface. This paper offers detailed insights
into the development of Alquist 5.0, which effectively
addresses evolving user demands while preserving its
empathetic and knowledgeable conversational prowess
across a wide range of topics.",
acknowledgement = ack-nhfb,
articleno = "344",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{John:2024:IBR,
author = "Jobish John and Md. Noor-A-Rahim and Aswathi Vijayan
and H. Vincent Poor and Dirk Pesch",
title = "{Industry 4.0} and Beyond: The Role of {5G}, {WiFi 7},
and Time-Sensitive Networking {(TSN)} in Enabling Smart
Manufacturing",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "21",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090345",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/345",
abstract = "This paper explores the role that 5G, WiFi 7, and
Time-Sensitive Networking (TSN) play in driving smart
manufacturing as a fundamental part of the Industry 4.0
vision. It provides an in-depth analysis of each
technology's application in industrial communications,
with a focus on TSN and its key elements that enable
reliable and secure communication in industrial
networks. In addition, this paper includes a
comparative study of these technologies, analyzing them
based on several industrial use cases, supported
secondary applications, industry adoption, and current
market trends. This paper concludes by highlighting the
challenges and future directions for adopting these
technologies in industrial networks and emphasizes
their importance in realizing the Industry 4.0 vision
within the context of smart manufacturing.",
acknowledgement = ack-nhfb,
articleno = "345",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Almutairi:2024:RBT,
author = "Abeer Almutairi and Xavier Carpent and Steven
Furnell",
title = "Recommendation-Based Trust Evaluation Model for the
{Internet of Underwater Things}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "23",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090346",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/346",
abstract = "The Internet of Underwater Things (IoUT) represents an
emerging and innovative field with the potential to
revolutionize underwater exploration and monitoring.
Despite its promise, IoUT faces significant challenges
related to reliability and security, which hinder its
development and deployment. A particularly critical
issue is the establishment of trustworthy communication
networks, necessitating the adaptation and enhancement
of existing models from terrestrial and marine systems
to address the specific requirements of IoUT. This work
explores the problem of dishonest recommendations
within trust modelling systems, a critical issue that
undermines the integrity of trust modelling in IoUT
networks. The unique environmental and operational
constraints of IoUT exacerbate the severity of this
issue, making current detection methods insufficient.
To address this issue, a recommendation evaluation
method that leverages both filtering and weighting
strategies is proposed to enhance the detection of
dishonest recommendations. The model introduces a
filtering technique that combines outlier detection
with deviation analysis to make initial decisions based
on both majority outcomes and personal experiences.
Additionally, a belief function is developed to weight
received recommendations based on multiple criteria,
including freshness, similarity, trustworthiness, and
the decay of trust over time. This multifaceted
weighting strategy ensures that recommendations are
evaluated from different perspectives to capture
deceptive acts that exploit the complex nature of IoUT
to the advantage of dishonest recommenders. To validate
the proposed model, extensive comparative analyses with
existing trust evaluation methods are conducted.
Through a series of simulations, the efficacy of the
model in capturing dishonest recommendation attacks and
improving the accuracy rate of detecting more
sophisticated attack scenarios is demonstrated. These
results highlight the potential of the model to
significantly enhance the trustworthiness of IoUT
establishments.",
acknowledgement = ack-nhfb,
articleno = "346",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bunu:2024:IRP,
author = "Sanusi Mohammad Bunu and Omar Younis Alani and
Mohammad Saraee",
title = "An Improved Routing Protocol for Optimum Quality of
Service in Device-to-Device and Energy Efficiency in
{5G\slash B5G}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "9",
day = "23",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16090347",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Sep 30 08:13:31 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/9/347",
abstract = "Some challenges when implementing the optimized link
state routing (OLSR) protocol on real-life devices and
simulators are unmanageable: link quality, rapid energy
depletion, and high processor loads. The causes of
these challenges are link state processing, unsuitable
multipoint relay (MPR) nodes, and information base
maintenance. This paper proposes a structured,
energy-efficient link sensing and database maintenance
technique. The improved OLSR in the paper replaces the
OLSRv2's HELLO, HELLO, and Topology Control (TC)
message sequence with a new sequence. MPR nodes are not
mandated to broadcast TC messages if the number of
nodes and their OLSRv2 addresses remain unchanged after
subsequent broadcasts or if no node reported 2-hop
symmetric connections. The paper further proposes an
MPR selection technique that considers four parameters:
node battery level, mobility speed, node degree, and
connection to the base station for optimum relay
selection. It combines the four parameters into one
metric to reduce energy dissipation and control routing
overhead. The modifications were implemented in NS-3,
and the simulation results show that our improved OLSR
outperforms the existing OLSR, OLSRv2 and other
improved routing protocols in energy consumption,
routing overhead, the packet delivery ratio and
end-to-end delay, as compared to the related
literature.",
acknowledgement = ack-nhfb,
articleno = "347",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Al-Nidawi:2024:MUO,
author = "Yaarob Al-Nidawi and Haider Tarish Haider and Dhiaa
Halboot Muhsen and Ghadeer Ghazi Shayea",
title = "Multi-User Optimal Load Scheduling of Different
Objectives Combined with Multi-Criteria Decision Making
for Smart Grid",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "29",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100355",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/355",
abstract = "Load balancing between required power demand and the
available generation capacity is the main task of
demand response for a smart grid. Matching between the
objectives of users and utilities is the main gap that
should be addressed in the demand response context. In
this paper, a multi-user optimal load scheduling is
proposed to benefit both utility companies and users.
Different objectives are considered to form a
multi-objective artificial hummingbird algorithm
(MAHA). The cost of energy consumption, peak of load,
and user inconvenience are the main objectives
considered in this work. A hybrid multi-criteria
decision making method is considered to select the
dominance solutions. This approach is based on the
removal effects of criteria (MERECs) and is utilized
for deriving appropriate weights of various criteria.
Next, the Vlse Kriterijumska Optimizacija Kompromisno
Resenje (VIKOR) method is used to find the best
solution of load scheduling from a set of Pareto front
solutions produced by MAHA. Multiple pricing schemes
are applied in this work, namely the time of use (ToU)
and adaptive consumption level pricing scheme (ACLPS),
to test the proposed system with regards to different
pricing rates. Furthermore, non-cooperative and
cooperative users' working schemes are considered to
overcome the issue of making a new peak load time
through shifting the user load from the peak to
off-peak period to realize minimum energy cost. The
results demonstrate 81\% cost savings for the proposed
method with the cooperative mode while using ACLPS and
40\% savings regarding ToU. Furthermore, the peak
saving for the same mode of operation provides about
68\% and 64\% for ACLPs and ToU, respectively. The
finding of this work has been validated against other
related contributions to examine the significance of
the proposed technique. The analyses in this research
have concluded that the presented approach has realized
a remarkable saving for the peak power intervals and
energy cost while maintaining an acceptable range of
the customer inconvenience level.",
acknowledgement = ack-nhfb,
articleno = "355",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Romero:2024:BDG,
author = "Abraham Romero and Roberto Hernandez",
title = "Blockchain-Driven Generalization of Policy Management
for Multiproduct Insurance Companies",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "30",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100356",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/356",
abstract = "This article presents a Blockchain-based solution for
the management of multipolicies in insurance companies,
introducing a standardized policy model to facilitate
streamlined operations and enhance collaboration
between entities. The model ensures uniform policy
management, providing scalability and flexibility to
adapt to new market demands. The solution leverages
Merkle trees for secure data management, with each
policy represented by an independent Merkle tree,
enabling updates and additions without altering
existing policies. The architecture, implemented on a
private Ethereum network using Hyperledger Besu and
Tessera, ensures secure and transparent transactions,
robust dispute resolution, and fraud prevention
mechanisms. The validation phase demonstrated the
model's efficiency in reducing data redundancy and
ensuring the consistency and integrity of policy
information. Additionally, the system's technical
management has been simplified, operational
redundancies have been eliminated, and privacy is
enhanced.",
acknowledgement = ack-nhfb,
articleno = "356",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Peivandizadeh:2024:SKE,
author = "Ali Peivandizadeh and Haitham Y. Adarbah and Behzad
Molavi and Amirhossein Mohajerzadeh and Ali H.
Al-Badi",
title = "A Secure Key Exchange and Authentication Scheme for
Securing Communications in the {Internet of Things}
Environment",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "30",
month = sep,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100357",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/357",
abstract = "In today's advanced network and digital age, the
Internet of Things network is experiencing a
significant growing trend and, due to its wide range of
services and network coverage, has been able to take a
special place in today's technology era. Among the
applications that can be mentioned for this network are
the field of electronic health, smart residential
complexes, and a wide level of connections that have
connected the inner-city infrastructure in a complex
way to make it smart. The notable and critical issue
that exists in this network is the extent of the
elements that make up the network and, due to this, the
strong and massive data exchanges at the network level.
With the increasing deployment of the Internet of
Things, a wide range of challenges arise, especially in
the discussion of establishing network security.
Regarding security concerns, ensuring the
confidentiality of the data being exchanged in the
network, maintaining the privacy of the network nodes,
protecting the identity of the network nodes, and
finally implementing the security policies required to
deal with a wide range of network cyber threats are of
great importance. A fundamental element in the security
of IoT networks is the authentication process, wherein
nodes are required to validate each other's identities
to ensure the establishment of secure communication
channels. Through the enforcement of security
prerequisites, in this study, we suggested a security
protocol focused on reinforcing security
characteristics and safeguarding IoT nodes. By
utilizing the security features provided by Elliptic
Curve Cryptography (ECC) and employing the Elliptic
Curve Diffie--Hellman (ECDH) key-exchange mechanism, we
designed a protocol for authenticating nodes and
establishing encryption keys for every communication
session within the Internet of Things. To substantiate
the effectiveness and resilience of our proposed
protocol in withstanding attacks and network
vulnerabilities, we conducted evaluations utilizing
both formal and informal means. Furthermore, our
results demonstrate that the protocol is characterized
by low computational and communication demands, which
makes it especially well-suited for IoT nodes operating
under resource constraints.",
acknowledgement = ack-nhfb,
articleno = "357",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Yanagida:2024:MMD,
author = "Ryo Yanagida and Saleem Noel Bhatti",
title = "Mobility--Multihoming Duality",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "1",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100358",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/358",
abstract = "In modern Internet-based communication, especially
mobile systems, a mobile node (MN) will commonly have
more than one possibility for Internet Protocol (IP)
connectivity. For example, an MN such as a smartphone
may be associated with an IEEE 802.11 network at a site
while also connected to a cellular base station for 5G.
In such a scenario, the smartphone might only be able
to utilise the IEEE 802.11 network, not making use of
the cellular connectivity simultaneously. Currently, IP
does not allow applications and devices to easily
utilise multiple IP connectivity opportunities ---
multihoming for the MN --- without implementing special
mechanisms to manage them. We demonstrate how the use
of the Identifier Locator Network Protocol (ILNP),
realised as an extension to IPv6, can enable mobility
with multihoming using a duality mechanism that treats
mobility and multihoming as the same logical concept.
We present a network layer solution that does not
require any modification to transport protocols, can be
implemented using existing application programming
interfaces (APIs), and can work for any application. We
have evaluated our approach using an implementation in
Linux and a testbed. The testbed consisted of
commercial equipment to demonstrate that our approach
can be used over existing network infrastructure
requiring only normal unicast routing for IPv6.",
acknowledgement = ack-nhfb,
articleno = "358",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Nayak:2024:IDS,
author = "Nanavath Kiran Singh Nayak and Budhaditya
Bhattacharyya",
title = "An Intrusion Detection System for {5G} {SDN} Network
Utilizing Binarized Deep Spiking Capsule Fire Hawk
Neural Networks and Blockchain Technology",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "3",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100359",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/359",
abstract = "The advent of 5G heralds unprecedented connectivity
with high throughput and low latency for network users.
Software-defined networking (SDN) plays a significant
role in fulfilling these requirements. However, it
poses substantial security challenges due to its
inherent centralized management strategy. Moreover, SDN
confronts limitations in handling malicious traffic
under 5G's extensive data flow. To deal with these
issues, this paper presents a novel intrusion detection
system (IDS) designed for 5G SDN networks, leveraging
the advanced capabilities of binarized deep spiking
capsule fire hawk neural networks (BSHNN) and
blockchain technology, which operates across multiple
layers. Initially, the lightweight encryption algorithm
(LEA) is used at the data acquisition layer to
authenticate mobile users via trusted third parties.
Followed by optimal switch selection using the mud-ring
algorithm in the switch layer, and the data flow rules
are secured by employing blockchain technology
incorporating searchable encryption algorithms within
the blockchain plane. The domain controller layer
utilizes binarized deep spiking capsule fire hawk
neural network (BSHNN) for real-time data packet
classification, while the smart controller layer uses
enhanced adapting hidden attribute-weighted naive bayes
(EAWNB) to identify suspicious packets during data
transmission. The experimental results show that the
proposed technique outperforms the state-of-the-art
approaches in terms of accuracy (98.02\%), precision
(96.40\%), detection rate (96.41\%), authentication
time (16.2 s), throughput, delay, and packet loss
ratio.",
acknowledgement = ack-nhfb,
articleno = "359",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hung:2024:EHT,
author = "Jeih-Weih Hung and Pin-Chen Huang and Li-Yin Li",
title = "Employing {Huber} and {TAP} Losses to Improve
Inter-{SubNet} in Speech Enhancement",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "4",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100360",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/360",
abstract = "In this study, improvements are made to Inter-SubNet,
a state-of-the-art speech enhancement method.
Inter-SubNet is a single-channel speech enhancement
framework that enhances the sub-band spectral model by
integrating global spectral information, such as
cross-band relationships and patterns. Despite the
success of Inter-SubNet, one crucial aspect probably
overlooked by Inter-SubNet is the unequal perceptual
weighting of different spectral regions by the human
ear, as it employs MSE as its loss function. In
addition, MSE loss has a potential convergence concern
for model learning due to gradient explosion. Hence, we
propose further enhancing Inter-SubNet by either
integrating perceptual loss with MSE loss or modifying
MSE loss directly in the learning process. Among
various types of perceptual loss, we adopt the temporal
acoustic parameter (TAP) loss, which provides detailed
estimation for low-level acoustic descriptors, thereby
offering a comprehensive evaluation of speech signal
distortion. In addition, we leverage Huber loss, a
combination of L1 and L2 (MSE) loss, to avoid the
potential convergence issue for the training of
Inter-SubNet. By the evaluation conducted on the
VoiceBank-DEMAND database and task, we see that
Inter-SubNet with the modified loss function reveals
improvements in speech enhancement performance.
Specifically, replacing MSE loss with Huber loss
results in increases of 0.057 and 0.38 in WB-PESQ and
SI-SDR metrics, respectively. Additionally, integrating
TAP loss with MSE loss yields improvements of 0.115 and
0.196 in WB-PESQ and CSIG metrics.",
acknowledgement = ack-nhfb,
articleno = "360",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Calzada:2024:DWR,
author = "Igor Calzada",
title = "Decentralized {Web3} Reshaping {Internet} Governance:
Towards the Emergence of New Forms of
Nation-Statehood?",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "4",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100361",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/361",
abstract = "This article explores how decentralized Web3 is
reshaping Internet governance by enabling the emergence
of new forms of nation-statehood and redefining
traditional concepts of state sovereignty. Based on
fieldwork conducted in Silicon Valley since August
2022, this article systematically addresses the
following research question: How is decentralized Web3
reshaping Internet governance and influencing the rise
in new nation-statehood paradigms? It compares three
emerging paradigms around Web3: (i) Network States
(Srinivasan), envisioning digital entities rooted in
crypto-libertarian principles; (ii) Network
Sovereignties (De Filippi), emphasizing communal
governance aligned with digital commons; and (iii)
Algorithmic Nations (Calzada), drawing on Arendtian
thought and demonstrating how communities --- such as
indigenous and stateless groups, as well as e-diasporas
--- can attain self-determination through data
sovereignty. This article contributes a unique
conceptual analysis of these paradigms based on
fieldwork action research in Silicon Valley, responding
to evolving technologies and their potential to reshape
Internet governance. This article argues that
decentralized Web3 provides a transformative vision for
Internet governance but requires careful evaluation to
ensure that it promotes inclusivity and equity. It
advocates for a hybrid approach that balances global
and local dynamics, emphasizing the need for
solidarity, digital justice, and an internationalist
perspective in shaping future Internet governance
protocols.",
acknowledgement = ack-nhfb,
articleno = "361",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Barbierato:2024:DUI,
author = "Enrico Barbierato and Alice Gatti",
title = "Decoding Urban Intelligence: Clustering and Feature
Importance in Smart Cities",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "5",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100362",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/362",
abstract = "The rapid urbanization trend underscores the need for
effective management of city resources and services,
making the concept of smart cities increasingly
important. This study leverages the IMD Smart City
Index (SCI) dataset to analyze and rank smart cities
worldwide. Our research has a dual objective: first, we
aim to apply a set of unsupervised learning models to
cluster cities based on their smartness indices.
Second, we aim to employ supervised learning models
such as random forest, support vector machines (SVMs),
and others to determine the importance of various
features that contribute to a city's smartness. Our
findings reveal that while smart living was the most
critical factor, with an importance of 0.259014. Smart
mobility and smart environment also played significant
roles, with the importance of 0.170147 and 0.163159,
respectively, in determining a city's smartness. While
the clustering provides insights into the similarities
and groupings among cities, the feature importance
analysis elucidates the critical factors that drive
these classifications. The integration of these two
approaches aims to demonstrate that understanding the
similarities between smart cities is of limited utility
without a clear comprehension of the importance of the
underlying features. This holistic approach provides a
comprehensive understanding of what makes a city
'smart' and offers a robust framework for policymakers
to enhance urban living standards.",
acknowledgement = ack-nhfb,
articleno = "362",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Sim:2024:CWT,
author = "Kyungmin Sim and Honyeong Heo and Haehyun Cho",
title = "Combating {Web} Tracking: Analyzing {Web} Tracking
Technologies for User Privacy",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "5",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100363",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/363",
abstract = "Behind everyday websites, a hidden shadow world tracks
the behavior of Internet users. Web tracking analyzes
online activity based on collected data and delivers
content tailored to users' interests. It gathers vast
amounts of information for various purposes, ranging
from sensitive personal data to seemingly minor details
such as IP addresses, devices, browsing histories,
settings, and preferences. While Web tracking is
largely a legitimate technology, the increase in
illegal user tracking, data breaches, and the unlawful
sale of data has become a growing concern. As a result,
the demand for technologies that can detect and prevent
Web trackers is more important than ever. This paper
provides an overview of Web tracking technologies,
relevant research, and website measurement tools
designed to identify web-based tracking. It also
explores technologies for preventing Web tracking and
discusses potential directions for future research.",
acknowledgement = ack-nhfb,
articleno = "363",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alsmadi:2024:SDC,
author = "Izzat Alsmadi and Iyad Alazzam and Mohammad Al-Ramahi
and Mohammad Zarour",
title = "Stance Detection in the Context of Fake News --- a New
Approach",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "6",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100364",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/364",
abstract = "Online social networks (OSNs) are inundated with an
enormous daily influx of news shared by users
worldwide. Information can originate from any OSN user
and quickly spread, making the task of fact-checking
news both time-consuming and resource-intensive. To
address this challenge, researchers are exploring
machine learning techniques to automate fake news
detection. This paper specifically focuses on detecting
the stance of content producers --- whether they
support or oppose the subject of the content. Our study
aims to develop and evaluate advanced text-mining
models that leverage pre-trained language models
enhanced with meta features derived from headlines and
article bodies. We sought to determine whether
incorporating the cosine distance feature could improve
model prediction accuracy. After analyzing and
assessing several previous competition entries, we
identified three key tasks for achieving high accuracy:
(1) a multi-stage approach that integrates classical
and neural network classifiers, (2) the extraction of
additional text-based meta features from headline and
article body columns, and (3) the utilization of recent
pre-trained embeddings and transformer models.",
acknowledgement = ack-nhfb,
articleno = "364",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hang:2024:LLM,
author = "Ching-Nam Hang and Pei-Duo Yu and Roberto Morabito and
Chee-Wei Tan",
title = "Large Language Models Meet Next-Generation Networking
Technologies: a Review",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "7",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100365",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/365",
abstract = "The evolution of network technologies has
significantly transformed global communication,
information sharing, and connectivity. Traditional
networks, relying on static configurations and manual
interventions, face substantial challenges such as
complex management, inefficiency, and susceptibility to
human error. The rise of artificial intelligence (AI)
has begun to address these issues by automating tasks
like network configuration, traffic optimization, and
security enhancements. Despite their potential,
integrating AI models in network engineering encounters
practical obstacles including complex configurations,
heterogeneous infrastructure, unstructured data, and
dynamic environments. Generative AI, particularly large
language models (LLMs), represents a promising
advancement in AI, with capabilities extending to
natural language processing tasks like translation,
summarization, and sentiment analysis. This paper aims
to provide a comprehensive review exploring the
transformative role of LLMs in modern network
engineering. In particular, it addresses gaps in the
existing literature by focusing on LLM applications in
network design and planning, implementation, analytics,
and management. It also discusses current research
efforts, challenges, and future opportunities, aiming
to provide a comprehensive guide for networking
professionals and researchers. The main goal is to
facilitate the adoption and advancement of AI and LLMs
in networking, promoting more efficient, resilient, and
intelligent network systems.",
acknowledgement = ack-nhfb,
articleno = "365",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Bolanowski:2024:NMD,
author = "Marek Bolanowski and Micha{\l} 'Cmil and Adrian
Starzec",
title = "New Model for Defining and Implementing Performance
Tests",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "10",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100366",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/366",
abstract = "The article proposes a new model for defining and
implementing performance tests used in the process of
designing and operating IT systems. By defining the
objectives, types, topological patterns, and methods of
implementation, a coherent description of the test
preparation and execution is achieved, facilitating the
interpretation of results and enabling straightforward
replication of test scenarios. The model was used to
develop and implement performance tests in a laboratory
environment and in a production system. The proposed
division of the testing process into layers correlated
with the test preparation steps allows to separate
quasi-independent areas, which can be handled by
isolated teams of engineers. Such an approach allows to
accelerate the process of implementation of performance
tests and may affect the optimization of the cost of
their implementation.",
acknowledgement = ack-nhfb,
articleno = "366",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Alharbi:2024:CSM,
author = "Najla Alharbi and Bashayer Alkalifah and Ghaida
Alqarawi and Murad A. Rassam",
title = "Countering Social Media Cybercrime Using Deep
Learning: {Instagram} Fake Accounts Detection",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "11",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100367",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/367",
abstract = "An online social media platform such as Instagram has
become a popular communication channel that millions of
people are using today. However, this media also
becomes an avenue where fake accounts are used to
inflate the number of followers on a targeted account.
Fake accounts tend to alter the concepts of popularity
and influence on the Instagram media platform and
significantly impact the economy, politics, and
society, which is considered cybercrime. This paper
proposes a framework to classify fake and real accounts
on Instagram based on a deep learning approach called
the Long Short-Term Memory (LSTM) network. Experiments
and comparisons with existing machine and deep learning
frameworks demonstrate considerable improvement in the
proposed framework. It achieved a detection accuracy of
97.42\% and 94.21\% on two publicly available Instagram
datasets, with F-measure scores of 92.17\% and 89.55\%,
respectively. Further experiments on the Twitter
dataset reveal the effectiveness of the proposed
framework by achieving an impressive accuracy rate of
99.42\%.",
acknowledgement = ack-nhfb,
articleno = "367",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Fatima:2024:TEF,
author = "Mahawish Fatima and Osama Rehman and Ibrahim M. H.
Rahman and Aisha Ajmal and Simon Jigwan Park",
title = "Towards Ensemble Feature Selection for Lightweight
Intrusion Detection in Resource-Constrained {IoT}
Devices",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "12",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100368",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/368",
abstract = "The emergence of smart technologies and the wide
adoption of the Internet of Things (IoT) have
revolutionized various sectors, yet they have also
introduced significant security challenges due to the
extensive attack surface they present. In recent years,
many efforts have been made to minimize the attack
surface. However, most IoT devices are
resource-constrained with limited processing power,
memory storage, and energy sources. Such devices lack
the sufficient means for running existing
resource-hungry security solutions, which in turn makes
it challenging to secure IoT networks from
sophisticated attacks. Feature Selection (FS)
approaches in Machine Learning enabled Intrusion
Detection Systems (IDS) have gained considerable
attention in recent years for having the potential to
detect sophisticated cyber-attacks while adhering to
the resource limitations issues in IoT networks.
Apropos of that, several researchers proposed
FS-enabled IDS for IoT networks with a focus on
lightweight security solutions. This work presents a
comprehensive study discussing FS-enabled lightweight
IDS tailored for resource-constrained IoT devices, with
a special focus on the emerging Ensemble Feature
Selection (EFS) techniques, portraying a new direction
for the research community to inspect. The research
aims to pave the way for the effective design of
futuristic FS/EFS-enabled lightweight IDS for IoT
networks, addressing the critical need for robust
security measures in the face of resource
limitations.",
acknowledgement = ack-nhfb,
articleno = "368",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Owoh:2024:MDB,
author = "Nsikak Owoh and John Adejoh and Salaheddin
Hosseinzadeh and Moses Ashawa and Jude Osamor and Ayyaz
Qureshi",
title = "Malware Detection Based on {API} Call Sequence
Analysis: a Gated Recurrent Unit--Generative
Adversarial Network Model Approach",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "13",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100369",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/369",
abstract = "Malware remains a major threat to computer systems,
with a vast number of new samples being identified and
documented regularly. Windows systems are particularly
vulnerable to malicious programs like viruses, worms,
and trojans. Dynamic analysis, which involves observing
malware behavior during execution in a controlled
environment, has emerged as a powerful technique for
detection. This approach often focuses on analyzing
Application Programming Interface (API) calls, which
represent the interactions between the malware and the
operating system. Recent advances in deep learning have
shown promise in improving malware detection accuracy
using API call sequence data. However, the potential of
Generative Adversarial Networks (GANs) for this purpose
remains largely unexplored. This paper proposes a novel
hybrid deep learning model combining Gated Recurrent
Units (GRUs) and GANs to enhance malware detection
based on API call sequences from Windows portable
executable files. We evaluate our GRU--GAN model
against other approaches like Bidirectional Long
Short-Term Memory (BiLSTM) and Bidirectional Gated
Recurrent Unit (BiGRU) on multiple datasets. Results
demonstrated the superior performance of our hybrid
model, achieving 98.9\% accuracy on the most
challenging dataset. It outperformed existing models in
resource utilization, with faster training and testing
times and low memory usage.",
acknowledgement = ack-nhfb,
articleno = "369",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Efthymiadis:2024:AOT,
author = "Filippos Efthymiadis and Aristeidis Karras and
Christos Karras and Spyros Sioutas",
title = "Advanced Optimization Techniques for Federated
Learning on Non-{IID} Data",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "13",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100370",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/370",
abstract = "Federated learning enables model training on multiple
clients locally, without the need to transfer their
data to a central server, thus ensuring data privacy.
In this paper, we investigate the impact of
Non-Independent and Identically Distributed (non-IID)
data on the performance of federated training, where we
find a reduction in accuracy of up to 29\% for neural
networks trained in environments with skewed non-IID
data. Two optimization strategies are presented to
address this issue. The first strategy focuses on
applying a cyclical learning rate to determine the
learning rate during federated training, while the
second strategy develops a sharing and pre-training
method on augmented data in order to improve the
efficiency of the algorithm in the case of non-IID
data. By combining these two methods, experiments show
that the accuracy on the CIFAR-10 dataset increased by
about 36\% while achieving faster convergence by
reducing the number of required communication rounds by
5.33 times. The proposed techniques lead to improved
accuracy and faster model convergence, thus
representing a significant advance in the field of
federated learning and facilitating its application to
real-world scenarios.",
acknowledgement = ack-nhfb,
articleno = "370",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Chen:2024:MSD,
author = "Fanghua Chen and Deguang Shang and Gang Zhou and Ke Ye
and Guofang Wu",
title = "Multi-Source Data Fusion for Vehicle Maintenance
Project Prediction",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "14",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100371",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/371",
abstract = "Ensuring road safety is heavily reliant on the
effective maintenance of vehicles. Accurate predictions
of maintenance requirements can substantially reduce
ownership costs for vehicle owners. Consequently, this
field has attracted increasing attention from
researchers in recent years. However, existing studies
primarily focus on predicting a limited number of
maintenance needs, predominantly based solely on
vehicle mileage and driving time. This approach often
falls short, as it does not comprehensively monitor the
overall health condition of vehicles, thus posing
potential safety risks. To address this issue, we
propose a deep fusion network model that utilizes
multi-source data, including vehicle maintenance record
data and vehicle base information data, to provide
comprehensive predictions for vehicle maintenance
projects. To capture the relationships among various
maintenance projects, we create a correlation
representation using the maintenance project
co-occurrence matrix. Furthermore, building on the
correlation representation, we propose a deep fusion
network that employs the attention mechanism to
efficiently merge vehicle mileage and vehicle base
information. Experiments conducted on real data
demonstrate the superior performance of our proposed
model relative to competitive baseline models in
predicting vehicle maintenance projects.",
acknowledgement = ack-nhfb,
articleno = "371",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Otoum:2024:EHD,
author = "Yazan Otoum and Chaosheng Hu and Eyad Haj Said and
Amiya Nayak",
title = "Enhancing Heart Disease Prediction with Federated
Learning and Blockchain Integration",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "14",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100372",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/372",
abstract = "Federated learning offers a framework for developing
local models across institutions while safeguarding
sensitive data. This paper introduces a novel approach
for heart disease prediction using the TabNet model,
which combines the strengths of tree-based models and
deep neural networks. Our study utilizes the
Comprehensive Heart Disease and UCI Heart Disease
datasets, leveraging TabNet's architecture to enhance
data handling in federated environments. Horizontal
federated learning was implemented using the federated
averaging algorithm to securely aggregate model updates
across participants. Blockchain technology was
integrated to enhance transparency and accountability,
with smart contracts automating governance. The
experimental results demonstrate that TabNet achieved
the highest balanced metrics score of 1.594 after 50
epochs, with an accuracy of 0.822 and an epsilon value
of 6.855, effectively balancing privacy and
performance. The model also demonstrated strong
accuracy with only 10 iterations on aggregated data,
highlighting the benefits of multi-source data
integration. This work presents a scalable,
privacy-preserving solution for heart disease
prediction, combining TabNet and blockchain to address
key healthcare challenges while ensuring data
integrity.",
acknowledgement = ack-nhfb,
articleno = "372",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Islam:2024:HSS,
author = "Rafiq {Ul Islam} and Pasquale Mazzei and Claudio
Savaglio",
title = "Healthiness and Safety of Smart Environments through
Edge Intelligence and {Internet of Things}
Technologies",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "14",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100373",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/373",
abstract = "Smart environments exploit rising technologies like
Internet of Things (IoT) and edge intelligence (EI) to
achieve unseen effectiveness and efficiency in every
tasks, including air sanitization. The latter
represents a key preventative measure--made even more
evident by the COVID-19 pandemic--to significantly
reduce disease transmission and create healthier and
safer indoor spaces, for the sake of its occupants.
Therefore, in this paper, we present an IoT-based
system aimed at the continuous monitoring of the air
quality and, through EI techniques, at the proactively
activation of ozone lamps, while ensuring safety in
sanitization. Indeed, these devices ensure extreme
effectiveness in killing viruses and bacteria but, due
to ozone toxicity, they must be properly controlled
with advanced technologies for preventing occupants
from dangerous exposition as well as for ensuring
system reliability, operational efficiency, and
regulatory compliance.",
acknowledgement = ack-nhfb,
articleno = "373",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Manzoor:2024:SSS,
author = "Habib Ullah Manzoor and Attia Shabbir and Ao Chen and
David Flynn and Ahmed Zoha",
title = "A Survey of Security Strategies in Federated Learning:
Defending Models, Data, and Privacy",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "15",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100374",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/374",
abstract = "Federated Learning (FL) has emerged as a
transformative paradigm in machine learning, enabling
decentralized model training across multiple devices
while preserving data privacy. However, the
decentralized nature of FL introduces significant
security challenges, making it vulnerable to various
attacks targeting models, data, and privacy. This
survey provides a comprehensive overview of the defense
strategies against these attacks, categorizing them
into data and model defenses and privacy attacks. We
explore pre-aggregation, in-aggregation, and
post-aggregation defenses, highlighting their
methodologies and effectiveness. Additionally, the
survey delves into advanced techniques such as
homomorphic encryption and differential privacy to
safeguard sensitive information. The integration of
blockchain technology for enhancing security in FL
environments is also discussed, along with incentive
mechanisms to promote active participation among
clients. Through this detailed examination, the survey
aims to inform and guide future research in developing
robust defense frameworks for FL systems.",
acknowledgement = ack-nhfb,
articleno = "374",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Guo:2024:SES,
author = "Xiaotong Guo and Huijie Zhao and Shuwei Shao and
Xudong Li and Baochang Zhang and Na Li",
title = "{SPDepth}: Enhancing Self-Supervised Indoor Monocular
Depth Estimation via Self-Propagation",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "16",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100375",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/375",
abstract = "Due to the existence of low-textured areas in indoor
scenes, some self-supervised depth estimation methods
have specifically designed sparse photometric
consistency losses and geometry-based losses. However,
some of the loss terms cannot supervise all the pixels,
which limits the performance of these methods. Some
approaches introduce an additional optical flow network
to provide dense correspondences supervision, but
overload the loss function. In this paper, we propose
to perform depth self-propagation based on feature
self-similarities, where high-accuracy depths are
propagated from supervised pixels to unsupervised ones.
The enhanced self-supervised indoor monocular depth
estimation network is called SPDepth. Since depth
self-similarities are significant in a local range, a
local window self-attention module is embedded at the
end of the network to propagate depths in a window. The
depth of a pixel is weighted using the feature
correlation scores with other pixels in the same
window. The effectiveness of self-propagation mechanism
is demonstrated in the experiments on the NYU Depth V2
dataset. The root-mean-squared error of SPDepth is
0.585 and the {\delta} 1 accuracy is 77.6\%. Zero-shot
generalization studies are also conducted on the
7-Scenes dataset and provide a more comprehensive
analysis about the application characteristics of
SPDepth.",
acknowledgement = ack-nhfb,
articleno = "375",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kuaban:2024:ITA,
author = "Godlove Suila Kuaban and Valery Nkemeni and Onyeka J.
Nwobodo and Piotr Czekalski and Fabien Mieyeville",
title = "{Internet of Things} Adoption in Technology Ecosystems
Within the Central {African} Region: The Case of
Silicon Mountain",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "16",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100376",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/376",
abstract = "The Internet of Things (IoT) has emerged as a
transformative technology with the potential to
revolutionize various sectors and industries worldwide.
Despite its global significance, the adoption and
implementation of IoT technologies in emerging
technology ecosystems within the Central African region
still need to be studied and explored. This paper
presents a case study of the Silicon Mountain
technology ecosystem, located in Fako division of the
southwest region of Cameroon, focusing on the barriers
and challenges to adopting and integrating IoT
technologies within this emerging tech ecosystem.
Through a survey-based approach, we investigate the
factors influencing IoT adoption in the Silicon
Mountain tech ecosystem, including technological,
economic, social, and regulatory factors. Our study
reveals key insights into the current state of IoT
adoption, opportunities for growth and innovation, and
IoT adoption challenges. Key among the challenges
identified for impeding IoT uptake were issues related
to standardization and financial resources, labor
shortage in the industry, educational and knowledge
gaps, market challenges, government policies, security
and data privacy concerns, and inadequate power supply.
Based on our findings, we provide recommendations for
policymakers, industry stakeholders, and academic
institutions to promote and facilitate the widespread
adoption of IoT technologies in Silicon Mountain and
the Central African region at large.",
acknowledgement = ack-nhfb,
articleno = "376",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Qasim:2024:IET,
author = "Kian Raheem Qasim and Noor M. Naser and Ahmed J.
Jabur",
title = "An {IoT}-Enhanced Traffic Light Control System with
Arduino and {IR} Sensors for Optimized Traffic
Patterns",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "18",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100377",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/377",
abstract = "Traffic lights play an important role in efficient
traffic management, especially in crowded cities.
Optimizing traffic helps to reduce crowding, save time,
and ensure the smooth flow of traffic. Metaheuristic
algorithms have a proven ability to optimize smart
traffic management systems. This paper investigates the
effectiveness of two metaheuristic algorithms: particle
swarm optimization (PSO) and grey wolf optimization
(GWO). In addition, we posit a hybrid PSO-GWO method of
optimizing traffic light control using IoT-enabled data
from sensors. In this study, we aimed to enhance the
movement of traffic, minimize delays, and improve
overall traffic precision. Our results demonstrate that
the hybrid PSO-GWO method outperforms individual PSO
and GWO algorithms, achieving superior traffic movement
precision (0.925173), greater delay reduction
(0.994543), and higher throughput improvement (0.89912)
than standalone methods. PSO excels in reducing wait
times (0.7934), while GWO shows reasonable performance
across a range of metrics. The hybrid approach
leverages the power of both PSO and GWO algorithms,
proving to be the most effective solution for smart
traffic management. This research highlights using
hybrid optimization techniques and IoT (Internet of
Things) in developing traffic control systems.",
acknowledgement = ack-nhfb,
articleno = "377",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Elkhodr:2024:SRM,
author = "Mahmoud Elkhodr and Ketmanto Wangsa and Ergun Gide and
Shakir Karim",
title = "A Systematic Review and Multifaceted Analysis of the
Integration of Artificial Intelligence and Blockchain:
Shaping the Future of {Australian} Higher Education",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "18",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100378",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/378",
abstract = "This study explores the applications and implications
of blockchain technology in the Australian higher
education system, focusing on its integration with
artificial intelligence (AI). By addressing critical
challenges in credential verification, administrative
efficiency, and academic integrity, this integration
aims to enhance the global competitiveness of
Australian higher education institutions. A
comprehensive review of 25 recent research papers
quantifies the benefits, challenges, and prospects of
blockchain adoption in educational settings. Our
findings reveal that 52\% of the reviewed papers focus
on systematic reviews, 28\% focus on application-based
studies, and 20\% combine both approaches. The keyword
analysis identified 287 total words, with
``blockchain'' and ``education'' as the most prominent
themes. This study highlights blockchain's potential to
improve credential management, academic integrity,
administrative efficiency, and funding mechanisms in
education. However, challenges such as technical
implementation (24\%), regulatory compliance (32\%),
environmental concerns (28\%), and data security risks
(40\%) must be addressed to achieve widespread
adoption. This study also discusses critical
prerequisites for successful blockchain integration,
including infrastructure development, staff training,
regulatory harmonisation, and the incorporation of AI
for personalised learning. Our research concludes that
blockchain, when strategically implemented and combined
with AI, has the potential to transform the Australian
higher education system, significantly enhancing its
integrity, efficiency, and global competitiveness.",
acknowledgement = ack-nhfb,
articleno = "378",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Hatami:2024:SRT,
author = "Mohsen Hatami and Qian Qu and Yu Chen and Hisham
Kholidy and Erik Blasch and Erika Ardiles-Cruz",
title = "A Survey of the Real-Time Metaverse: Challenges and
Opportunities",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "18",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100379",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/379",
abstract = "The metaverse concept has been evolving from static,
pre-rendered virtual environments to a new frontier:
the real-time metaverse. This survey paper explores the
emerging field of real-time metaverse technologies,
which enable the continuous integration of dynamic,
real-world data into immersive virtual environments. We
examine the key technologies driving this evolution,
including advanced sensor systems (LiDAR, radar,
cameras), artificial intelligence (AI) models for data
interpretation, fast data fusion algorithms, and edge
computing with 5G networks for low-latency data
transmission. This paper reveals how these technologies
are orchestrated to achieve near-instantaneous
synchronization between physical and virtual worlds, a
defining characteristic that distinguishes the
real-time metaverse from its traditional counterparts.
The survey provides a comprehensive insight into the
technical challenges and discusses solutions to realize
responsive dynamic virtual environments. The potential
applications and impact of real-time metaverse
technologies across various fields are considered,
including live entertainment, remote collaboration,
dynamic simulations, and urban planning with digital
twins. By synthesizing current research and identifying
future directions, this survey provides a foundation
for understanding and advancing the rapidly evolving
landscape of real-time metaverse technologies,
contributing to the growing body of knowledge on
immersive digital experiences and setting the stage for
further innovations in the Metaverse transformative
field.",
acknowledgement = ack-nhfb,
articleno = "379",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Kufakunesu:2024:CAA,
author = "Rachel Kufakunesu and Gerhard P. Hancke and Adnan M.
Abu-Mahfouz",
title = "Collision Avoidance Adaptive Data Rate Algorithm for
{LoRaWAN}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "19",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100380",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/380",
abstract = "Long-Range Wide-Area Network (LoRaWAN) technology
offers efficient connectivity for numerous end devices
over a wide coverage area in the Internet of Things
(IoT) network, enabling the exchange of data over the
Internet between even the most minor Internet-connected
devices and systems. One of LoRaWAN's hallmark features
is the Adaptive Data Rate (ADR) algorithm. ADR is a
resource allocation function which dynamically adjusts
the network's data rate, airtime, and energy
dissipation to optimise its performance. The allocation
of spreading factors plays a critical function in
defining the throughput of the end device and its
robustness to interference. However, in practical
deployments, LoRaWAN networks experience considerable
interference, severely affecting the packet delivery
ratio, energy utilisation, and general network
performance. To address this, we present a novel ADR
framework, SSFIR-ADR, which utilises randomised
spreading factor allocation to minimise energy
consumption and packet collisions while maintaining
optimal network performance. We implement a LoRa
network composed of a single gateway that connects
loads of end nodes to a network server. In terms of
energy use, packet delivery rate, and interference rate
(IR), our simulation implementation does better than
LoRaWAN's legacy ADR scheme for a range of application
data intervals.",
acknowledgement = ack-nhfb,
articleno = "380",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Abinayaa:2024:SEC,
author = "Sennanur Srinivasan Abinayaa and Prakash Arumugam and
Divya Bhavani Mohan and Anand Rajendran and Abderezak
Lashab and Baoze Wei and Josep M. Guerrero",
title = "Securing the Edge: {CatBoost} Classifier Optimized by
the Lyrebird Algorithm to Detect Denial of Service
Attacks in {Internet of Things}-Based Wireless Sensor
Networks",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "19",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100381",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/381",
abstract = "The security of Wireless Sensor Networks (WSNs) is of
the utmost importance because of their widespread use
in various applications. Protecting WSNs from harmful
activity is a vital function of intrusion detection
systems (IDSs). An innovative approach to WSN intrusion
detection (ID) utilizing the CatBoost classifier (Cb-C)
and the Lyrebird Optimization Algorithm is presented in
this work (LOA). As is typical in ID settings, Cb-C
excels at handling datasets that are imbalanced. The
lyrebird's remarkable capacity to imitate the sounds of
its surroundings served as inspiration for the LOA, a
metaheuristic optimization algorithm. The WSN-DS
dataset, acquired from Prince Sultan University in
Saudi Arabia, is used to assess the suggested method.
Among the models presented, LOA-Cb-C produces the
highest accuracy of 99.66\%; nevertheless, when
compared with the other methods discussed in this
article, its error value of 0.34\% is the lowest.
Experimental results reveal that the suggested strategy
improves WSN-IoT security over the existing methods in
terms of detection accuracy and the false alarm rate.",
acknowledgement = ack-nhfb,
articleno = "381",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Salunke:2024:PBP,
author = "Sanket Vilas Salunke and Abdelkader Ouda",
title = "A Performance Benchmark for the {PostgreSQL} and
{MySQL} Databases",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "19",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100382",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
https://www.math.utah.edu/pub/tex/bib/sqlbooks.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/382",
abstract = "This study highlights the necessity for efficient
database management in continuous authentication
systems, which rely on large-scale behavioral biometric
data such as keystroke patterns. A benchmarking
framework was developed to evaluate the PostgreSQL and
MySQL databases, minimizing repetitive coding through
configurable functions and variables. The methodology
involved experiments assessing select and insert
queries under primary and complex conditions,
simulating real-world scenarios. Our quantified results
show PostgreSQL's superior performance in select
operations. In primary tests, PostgreSQL's execution
time for 1 million records ranged from 0.6 ms to 0.8
ms, while MySQL's ranged from 9 ms to 12 ms, indicating
that PostgreSQL is about 13 times faster. For select
queries with a where clause, PostgreSQL required 0.09
ms to 0.13 ms compared to MySQL's 0.9 ms to 1 ms,
making it roughly 9 times more efficient. Insert
operations were similar, with PostgreSQL at 0.0007 ms
to 0.0014 ms and MySQL at 0.0010 ms to 0.0030 ms. In
complex experiments with simultaneous operations,
PostgreSQL maintained stable performance (0.7 ms to 0.9
ms for select queries during inserts), while MySQL's
performance degraded significantly (7 ms to 13 ms).
These findings underscore PostgreSQL's suitability for
environments requiring low data latency and robust
concurrent processing capabilities, making it ideal for
continuous authentication systems.",
acknowledgement = ack-nhfb,
articleno = "382",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Vasilas:2024:CVA,
author = "Teodora Vasilas and Claudiu Bacila and Remus Brad",
title = "Correction: {Vasilas et al. Beat the Heat: Syscall
Attack Detection via Thermal Side Channel. Future
Internet 2024, 16, 301}",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "21",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100383",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/383",
abstract = "The integration of the Internet of Things (IoT) and
Distributed Computing Systems (DCS) is transforming
business models across industries. IoT devices allow
immediate monitoring of equipment and processes,
mitigating lost time and enhancing efficiency. In this
case, manufacturing companies use IoT sensors to
monitor machinery, predict failures, and schedule
maintenance. Also, automation via IoT reduces manual
intervention, resulting in boosted productivity in
smart factories and automated supply chains. IoT
devices generate this vast amount of data, which
businesses analyze to gain insights into customer
behavior, operational inefficiencies, and market
trends. In turn, Distributed Computing Systems process
this data, providing actionable insights and enabling
advanced analytics and machine learning for future
trend predictions. While, IoT facilitates personalized
products and services by collecting data on customer
preferences and usage patterns, enhancing satisfaction
and loyalty, IoT devices support new customer
interactions, like wearable health devices, and enable
subscription-based and pay-per-use models in
transportation and utilities. Conversely, real-time
monitoring enhances security, as distributed systems
quickly respond to threats, ensuring operational
safety. It also aids regulatory compliance by providing
accurate operational data. In this way, this study,
through a Bibliometric Literature Review (LRSB) of 91
screened pieces of literature, aims at ascertaining to
what extent the aforementioned capacities, overall,
enhance business models, in terms of efficiency and
effectiveness. The study concludes that those systems
altogether leverage businesses, promoting competitive
edge, continuous innovation, and adaptability to market
dynamics. In particular, overall, the integration of
both IoT and Distributed Systems in business models
augments its numerous advantages: it develops smart
infrastructures e.g., smart grids; edge computing that
allows data processing closer to the data source e.g.,
autonomous vehicles; predictive analytics, by helping
businesses anticipate issues e.g., to foresee equipment
failures; personalized services e.g., through
e-commerce platforms of personalized recommendations to
users; enhanced security, while reducing the risk of
centralized attacks e.g., blockchain technology, in how
IoT and Distributed Computing Systems altogether impact
business models. Future research avenues are
suggested.",
acknowledgement = ack-nhfb,
articleno = "383",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}
@Article{Rosario:2024:ITD,
author = "Alb{\'e}rico Travassos Ros{\'a}rio and Ricardo
Raimundo",
title = "{Internet of Things} and Distributed Computing Systems
in Business Models",
journal = j-FUTURE-INTERNET,
volume = "16",
number = "10",
day = "21",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.3390/fi16100384",
ISSN = "1999-5903",
ISSN-L = "1999-5903",
bibdate = "Mon Oct 28 06:41:40 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
URL = "https://www.mdpi.com/1999-5903/16/10/384",
abstract = "The integration of the Internet of Things (IoT) and
Distributed Computing Systems (DCS) is transforming
business models across industries. IoT devices allow
immediate monitoring of equipment and processes,
mitigating lost time and enhancing efficiency. In this
case, manufacturing companies use IoT sensors to
monitor machinery, predict failures, and schedule
maintenance. Also, automation via IoT reduces manual
intervention, resulting in boosted productivity in
smart factories and automated supply chains. IoT
devices generate this vast amount of data, which
businesses analyze to gain insights into customer
behavior, operational inefficiencies, and market
trends. In turn, Distributed Computing Systems process
this data, providing actionable insights and enabling
advanced analytics and machine learning for future
trend predictions. While, IoT facilitates personalized
products and services by collecting data on customer
preferences and usage patterns, enhancing satisfaction
and loyalty, IoT devices support new customer
interactions, like wearable health devices, and enable
subscription-based and pay-per-use models in
transportation and utilities. Conversely, real-time
monitoring enhances security, as distributed systems
quickly respond to threats, ensuring operational
safety. It also aids regulatory compliance by providing
accurate operational data. In this way, this study,
through a Bibliometric Literature Review (LRSB) of 91
screened pieces of literature, aims at ascertaining to
what extent the aforementioned capacities, overall,
enhance business models, in terms of efficiency and
effectiveness. The study concludes that those systems
altogether leverage businesses, promoting competitive
edge, continuous innovation, and adaptability to market
dynamics. In particular, overall, the integration of
both IoT and Distributed Systems in business models
augments its numerous advantages: it develops smart
infrastructures e.g., smart grids; edge computing that
allows data processing closer to the data source e.g.,
autonomous vehicles; predictive analytics, by helping
businesses anticipate issues e.g., to foresee equipment
failures; personalized services e.g., through
e-commerce platforms of personalized recommendations to
users; enhanced security, while reducing the risk of
centralized attacks e.g., blockchain technology, in how
IoT and Distributed Computing Systems altogether impact
business models. Future research avenues are
suggested.",
acknowledgement = ack-nhfb,
articleno = "384",
journal-URL = "https://www.mdpi.com/journal/futureinternet",
}