


Остановите войну!
for scientists:


default search action
Future Internet, Volume 14
Volume 14, Number 1, January 2022
- Dennis Przytarski, Christoph Stach
, Clémentine Gritti
, Bernhard Mitschang:
Query Processing in Blockchain Systems: Current State and Future Challenges. 1 - Nuria Rodriguez-Diaz, Decky Aspandi
, Federico M. Sukno
, Xavier Binefa
:
Machine Learning-Based Lie Detector Applied to a Novel Annotated Game Dataset. 2 - Luiz Henrique A. Salazar
, Valderi R. Q. Leithardt
, Wemerson Delcio Parreira
, Anita Maria da Rocha Fernandes
, Jorge Luis Victória Barbosa
, Sérgio Duarte Correia
:
Application of Machine Learning Techniques to Predict a Patient's No-Show in the Healthcare Sector. 3 - Anastasia Mikhailovna Fedotova, Aleksandr Romanov
, Anna V. Kurtukova, Alexander A. Shelupanov:
Authorship Attribution of Social Media and Literary Russian-Language Texts Using Machine Learning Methods and Feature Selection. 4 - Peter A. Gloor
, Andrea Fronzetti Colladon
, Erkin Altuntas, Cengiz Cetinkaya, Maximilian F. Kaiser
, Lukas Ripperger, Tim Schaefer
:
Your Face Mirrors Your Deepest Beliefs - Predicting Personality and Morals through Facial Emotion Recognition. 5 - Tolijan Trajanovski
, Ning Zhang:
An Automated Behaviour-Based Clustering of IoT Botnets. 6 - Jin Wang, Jun Luo
:
No Perfect Outdoors: Towards a Deep Profiling of GNSS-Based Location Contexts. 7 - Ihar Volkau
, Abdul Mujeeb, Wenting Dai, Marius Erdt, Alexei Sourin:
The Impact of a Number of Samples on Unsupervised Feature Extraction, Based on Deep Learning for Detection Defects in Printed Circuit Boards. 8 - Faheem Ahmed Malik, Laurent N. Dala, Krishna Busawon:
Real-Time Nanoscopic Rider Safety System for Smart and Green Mobility Based upon Varied Infrastructure Parameters. 9 - Leonardo Ranaldi
, Francesca Fallucchi
, Fabio Massimo Zanzotto
:
Dis-Cover AI Minds to Preserve Human Knowledge. 10 - Yunusa Simpa Abdulsalam
, Mustapha Hedabou
:
Security and Privacy in Cloud Computing: Technical Review. 11 - Mazen Alowish, Yoshiaki Shiraishi
, Masami Mohri, Masakatu Morii:
Three Layered Architecture for Driver Behavior Analysis and Personalized Assistance with Alert Message Dissemination in 5G Envisioned Fog-IoCV. 12 - Artem Volkov, Vadim Kovalenko, Ibrahim A. Elgendy
, Ammar Muthanna
, Andrey Koucheryavy:
DD-FoG: Intelligent Distributed Dynamic FoG Computing Framework. 13 - Junyan Han
, Huili Shi
, Longfei Chen
, Hao Li, Xiaoyuan Wang
:
The Car-Following Model and Its Applications in the V2X Environment: A Historical Review. 14 - Shengguo Ge
, Siti Nurulain Mohd Rum
:
Key Points' Location in Infrared Images of the Human Body Based on Mscf-ResNet. 15 - Chandrashekar Jatoth
, Rishabh Jain, Ugo Fiore
, Subrahmanyam Chatharasupalli:
Improved Classification of Blockchain Transactions Using Feature Engineering and Ensemble Learning. 16 - Shuailong Li
, Wei Zhang, Yuquan Leng
, Xiaohui Wang:
The Important Role of Global State for Multi-Agent Reinforcement Learning. 17 - Shoujiang Dang
, Rui Han:
An In-Network Cooperative Storage Schema Based on Neighbor Offloading in a Programmable Data Plane. 18 - Zineddine Kouahla
, Ala-Eddine Benrazek
, Mohamed Amine Ferrag
, Brahim Farou
, Hamid Seridi, Muhammet Kurulay, Adeel Anjum
, Alia Asheralieva:
A Survey on Big IoT Data Indexing: Potential Solutions, Recent Advancements, and Open Issues. 19 - Tan Nghia Duong
, Nguyen Nam Doan
, Truong Giang Do
, Manh Hoang Tran, Duc Minh Nguyen, Quang Hieu Dang:
Utilizing Half Convolutional Autoencoder to Generate User and Item Vectors for Initialization in Matrix Factorization. 20 - Weiwei Zhang, Xin Ma, Yuzhao Zhang, Ming Ji, Chenghui Zhen:
SMYOLO: Lightweight Pedestrian Target Detection Algorithm in Low-Altitude Scenarios. 21 - Pedro Ponce
, Omar Mata
, Esteban Pérez, Juan Roberto López Gutiérrez
, Arturo Molina
, Troy McDaniel
:
S4 Features and Artificial Intelligence for Designing a Robot against COVID-19 - Robocov. 22 - Laécio Rodrigues, Joel J. P. C. Rodrigues
, Antonio de Barros Serra, Francisco Airton Silva:
A Queueing-Based Model Performance Evaluation for Internet of People Supported by Fog Computing. 23 - Hui Yan
, Chaoyuan Cui:
CacheHawkeye: Detecting Cache Side Channel Attacks Based on Memory Events. 24 - Gianfranco Lombardo
, Michele Tomaiuolo
, Monica Mordonini
, Gaia Codeluppi
, Agostino Poggi
:
Mobility in Unsupervised Word Embeddings for Knowledge Extraction - The Scholars' Trajectories across Research Topics. 25 - Michail Niarchos
, Marina Eirini Stamatiadou
, Charalampos Dimoulas
, Andreas A. Veglis
, Andreas L. Symeonidis
:
A Semantic Preprocessing Framework for Breaking News Detection to Support Future Drone Journalism Services. 26 - Junda Li
, Chunxu Zhang, Bo Yang:
Global Contextual Dependency Network for Object Detection. 27 - Yelena Trofimova
, Pavel Tvrdík
:
Enhancing Reactive Ad Hoc Routing Protocols with Trust. 28 - Leonardo Alberro
, Alberto Castro
, Eduardo Grampín
:
Experimentation Environments for Data Center Routing Protocols: A Comprehensive Review. 29
Volume 14, Number 2, February 2022
- Youpeng Tu
, Haiming Chen
, Linjie Yan
, Xinyan Zhou
:
Task Offloading Based on LSTM Prediction and Deep Reinforcement Learning for Efficient Edge Computing in IoT. 30 - Darius Kianersi, Suraj Uppalapati, Anirudh Bansal
, Jeremy Straub:
Evaluation of a Reputation Management Technique for Autonomous Vehicles. 31 - Jiagang Song
, Jiayu Song, Xinpan Yuan
, Xiao He, Xinghui Zhu:
Graph Representation-Based Deep Multi-View Semantic Similarity Learning Model for Recommendation. 32 - Tianchi Zhou, Peng Sun, Rui Han:
An Active Path-Associated Cache Scheme for Mobile Scenes. 33 - Michael Mackay
, Alessandro Raschellà
, Ogeen H. Toma:
Modelling and Analysis of Performance Characteristics in a 60 Ghz 802.11ad Wireless Mesh Backhaul Network for an Urban 5G Deployment. 34 - Saleh M. Altowaijri
:
Efficient Next-Hop Selection in Multi-Hop Routing for IoT Enabled Wireless Sensor Networks. 35 - Andreas Giannakoulopoulos
, Minas Pergantis
, Nikos Konstantinou, Alexandros Kouretsis, Aristeidis Lamprogeorgos, Iraklis Varlamis
:
Estimation on the Importance of Semantic Web Integration for Art and Culture Related Online Media Outlets. 36 - Xiu Fang, Suxin Si, Guohao Sun, Quan Z. Sheng
, Wenjun Wu, Kang Wang, Hang Lv:
Selecting Workers Wisely for Crowdsourcing When Copiers and Domain Experts Co-exist. 37 - Yingjie Duan
, Hong Ni, Xiaoyong Zhu, Xu Wang:
A Single-Rate Multicast Congestion Control (SRMCC) Mechanism in Information-Centric Networking. 38 - Meng Wu
, Tingting Jiang, Chenyang Bu
, Bin Zhu:
Coarse-to-Fine Entity Alignment for Chinese Heterogeneous Encyclopedia Knowledge Base. 39 - Cunwei Yang
, Weiqing Wang
, Fengying Li
, Degang Yang
:
An IoT-Based COVID-19 Prevention and Control System for Enclosed Spaces. 40 - Jialin Shi, Chenyi Guo, Ji Wu:
A Hybrid Robust-Learning Architecture for Medical Image Segmentation with Noisy Labels. 41 - Rashmi Munjal, William Liu, Xue Jun Li
, Jairo A. Gutiérrez
, Peter Han Joo Chong
:
Multi-Attribute Decision Making for Energy-Efficient Public Transport Network Selection in Smart Cities. 42 - Liewu Cai
, Lei Zhu
, Hongyan Zhang, Xinghui Zhu:
DA-GAN: Dual Attention Generative Adversarial Network for Cross-Modal Retrieval. 43 - Ons Aouedi
, Kandaraj Piamrat, Benoît Parrein
:
Intelligent Traffic Management in Next-Generation Networks. 44 - Grigorios Kakkavas
, Vasileios Karyotis
, Symeon Papavassiliou
:
Topology Inference and Link Parameter Estimation Based on End-to-End Measurements. 45 - Haoxuan Qiu, Yanhui Du, Tianliang Lu:
The Framework of Cross-Domain and Model Adversarial Attack against Deepfake. 46 - Huanliang Xiong, Muxi Chen
, Canghai Wu, Yingding Zhao, Wenlong Yi:
Research on Progress of Blockchain Consensus Algorithm: A Review on Recent Progress of Blockchain Consensus Algorithms. 47 - Abdelkader Tayeb Herouala
, Chaker Abdelaziz Kerrache
, Benameur Ziani, Carlos T. Calafate
, Nasreddine Lagraa, Abdou El Karim Tahari:
Controlling the Trade-Off between Resource Efficiency and User Satisfaction in NDNs Based on Naïve Bayes Data Classification and Lagrange Method. 48 - Kenneth Li-Minn Ang, Jasmine Kah-Phooi Seng, Ericmoore Ngharamike
:
Towards Crowdsourcing Internet of Things (Crowd-IoT): Architectures, Security and Applications. 49 - Yaojie Zhang, Huahu Xu, Junsheng Xiao, Minjie Bian:
JoSDW: Combating Noisy Labels by Dynamic Weight. 50 - Helmer Augusto de Souza Mourão
, Horacio A. B. Fernandes de Oliveira:
Indoor Localization System Using Fingerprinting and Novelty Detection for Evaluation of Confidence. 51 - Souad Marir
, Faiza Belala
, Nabil Hameurlain
:
A Strategy-Based Formal Approach for Fog Systems Analysis. 52 - Future Internet Editorial Office:
Acknowledgment to Reviewers of Future Internet in 2021. 53 - Ning Chen, Yu Chen
:
Anomalous Vehicle Recognition in Smart Urban Traffic Monitoring as an Edge Service. 54 - Khumbelo Muthavhine, Mbuyu Sumbwanyambe
:
Securing IoT Devices against Differential-Linear (DL) Attack Used on Serpent Algorithm. 55 - Venushini Rajendran
, R. Kanesaraj Ramasamy
, Wan Noorshahida Mohd Isa
:
Improved Eagle Strategy Algorithm for Dynamic Web Service Composition in the IoT: A Conceptual Approach. 56 - Cristian D'Ortona, Daniele Tarchi
, Carla Raffaelli
:
Open-Source MQTT-Based End-to-End IoT System for Smart City Scenarios. 57 - Tanmaya Mahapatra
, Syeeda Nilofer Banoo:
Flow-Based Programming for Machine Learning. 58 - Haruna Umar Adoga
, Dimitrios P. Pezaros
:
Network Function Virtualization and Service Function Chaining Frameworks: A Comprehensive Review of Requirements, Objectives, Implementations, and Open Research Challenges. 59 - Zhixi Hu, Yi Zhu
, Xiaoying Chen, Yu Zhao
:
Safety Verification of Driving Resource Occupancy Rules Based on Functional Language. 60 - Dania Marabissi
, Lorenzo Mucchi
, Andrea Stomaci
:
IoT Nodes Authentication and ID Spoofing Detection Based on Joint Use of Physical Layer Security and Machine Learning. 61 - Matteo Zubani, Luca Sigalini, Ivan Serina
, Luca Putelli, Alfonso Emilio Gerevini, Mattia Chiari:
A Performance Comparison of Different Cloud-Based Natural Language Understanding Services for an Italian e-Learning Platform. 62 - Fernando L. Almeida
, Jorge Simões
, Sérgio Lopes
:
Exploring the Benefits of Combining DevOps and Agile. 63 - Cheng Qian
, Xing Liu, Colin Ripley
, Mian Qian
, Fan Liang, Wei Yu
:
Digital Twin - Cyber Replica of Physical Things: Architecture, Applications and Future Research Directions. 64 - Martin Fraga, Matias Micheletto, Andrés Llinás, Rodrigo M. Santos
, Paula Zabala
:
Flow Scheduling in Data Center Networks with Time and Energy Constraints: A Software-Defined Network Approach. 65 - Akrivi Krouska
, Katerina Kabassi, Christos Troussas
, Cleo Sgouropoulou:
Personalizing Environmental Awareness through Smartphones Using AHP and PROMETHEE II. 66 - Madushi H. Pathmaperuma, Yogachandran Rahulamathavan, Safak Dogan
, Ahmet M. Kondoz:
CNN for User Activity Detection Using Encrypted In-App Mobile Data. 67
Volume 14, Number 3, March 2022
- Jiaqi Li
, Jiali You, Haojiang Deng:
Adjacency-Information-Entropy-Based Cooperative Name Resolution Approach in ICN. 68 - Ivan S. Blekanov
, Nikita Tarasov
, Svetlana S. Bodrunova
:
Transformer-Based Abstractive Summarization for Reddit and Twitter: Single Posts vs. Comment Pools in Three Languages. 69 - Iraklis Varlamis
, Dimitrios Michail
, Foteini Glykou, Panagiotis Tsantilas:
A Survey on the Use of Graph Convolutional Networks for Combating Fake News. 70 - Thanh-Nam Tran
, Van-Cuu Ho, Thoai Phu Vo, Tran Ngo Nhu Khanh, Miroslav Voznák
:
Design of Relay Switching to Combat an Eavesdropper in IoT-NOMA Wireless Networks. 71 - Diogo Teixeira
, Silvestre Malta
, Pedro Pinto
:
A Vote-Based Architecture to Generate Classified Datasets and Improve Performance of Intrusion Detection Systems Based on Supervised Learning. 72 - Mohd Hirzi Adnan
, Zuriati Ahmad Zukarnain, Nur Ziadah Harun
:
Quantum Key Distribution for 5G Networks: A Review, State of Art and Future Directions. 73 - Jacqueline Zonichenn Reis
, Rodrigo Franco Gonçalves
, Márcia Terra da Silva, Nikolai Kazantsev:
Business Models for the Internet of Services: State of the Art and Research Agenda. 74 - Nikolaos Vryzas
, Anastasia Katsaounidou, Lazaros Vrysis
, Rigas Kotsakis, Charalampos Dimoulas
:
A Prototype Web Application to Support Human-Centered Audiovisual Content Authentication and Crowdsourcing. 75 - Diogo E. Moreira da Silva
, Eduardo José Solteiro Pires
, Arsénio Reis
, Paulo B. de Moura Oliveira
, João Barroso
:
Forecasting Students Dropout: A UTAD University Study. 76 - Yurika Pant Khanal, Abeer Alsadoon
, Khurram Shahzad
, Ahmad B. Al-Khalil, Penatiyana W. C. Prasad
, Sabih ur Rehman
, Rafiqul Islam:
Utilizing Blockchain for IoT Privacy through Enhanced ECIES with Secure Hash Function. 77 - Domenico Lembo, Valerio Santarelli, Domenico Fabio Savo
, Giuseppe De Giacomo:
Graphol: A Graphical Language for Ontology Modeling Equivalent to OWL 2. 78 - Hossam Fraihat, Amneh A. Almbaideen, Abdullah Al-Odienat
, Bassam Al-Naami
, Roberto de Fazio
, Paolo Visconti
:
Solar Radiation Forecasting by Pearson Correlation Using LSTM Neural Network and ANFIS Method: Application in the West-Central Jordan. 79 - Junwen Lu, Jinhui Wang, Xiaojun Wei, Keshou Wu, Guanfeng Liu:
Deep Anomaly Detection Based on Variational Deviation Network. 80 - Gabriel Ovando-Leon, Luis Veas-Castillo, Veronica Gil-Costa, Mauricio Marín
:
Bot-Based Emergency Software Applications for Natural Disaster Situations. 81 - Emtethal K. Alamri
, Abdullah M. Alnajim
, Suliman A. Alsuhibany
:
Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks. 82 - Mattia Pellegrino
, Gianfranco Lombardo
, Stefano Cagnoni
, Agostino Poggi
:
High-Performance Computing and ABMS for High-Resolution COVID-19 Spreading Simulation. 83 - Leanna Vidya Yovita
, Nana Rachmana Syambas
, Ian Joseph Matheus Edward:
Weighted-CAPIC Caching Algorithm for Priority Traffic in Named Data Network. 84 - Siyuan Du, Hao Wang:
Addressing Syntax-Based Semantic Complementation: Incorporating Entity and Soft Dependency Constraints into Metonymy Resolution. 85 - Jiahao Guo, Xiaohuo Yu, Lu Wang:
Unsupervised Anomaly Detection and Segmentation on Dirty Datasets. 86 - Ioannis Kosmopoulos, Emmanouil Skondras, Angelos Michalas, Emmanouel T. Michailidis
, Dimitrios D. Vergados:
Handover Management in 5G Vehicular Networks. 87 - Pavel Laptev
, Sergey Litovkin
, Sergey Davydenko
, Anton Konev
, Evgeny Kostyuchenko
, Alexander A. Shelupanov:
Neural Network-Based Price Tag Data Analysis. 88 - Victor Chang
, Lewis Golightly
, Paolo Modesti
, Qianwen Ariel Xu, Le Minh Thao Doan
, Karl Hall
, Sreeja Boddu, Anna Kobusinska
:
A Survey on Intrusion Detection Systems for Fog and Cloud Computing. 89 - Jia Dong, Quan Qian
:
A Density-Based Random Forest for Imbalanced Data Classification. 90 - Somdip Dey
, Samuel Isuwa, Suman Saha, Amit Kumar Singh, Klaus D. McDonald-Maier
:
CPU-GPU-Memory DVFS for Power-Efficient MPSoC in Mobile Cyber Physical Systems. 91 - Chia-Ping Tsai, Che-Wei Chang
, Hung-Chang Hsiao, Haiying Shen:
The Time Machine in Columnar NoSQL Databases: The Case of Apache HBase. 92 - Nino Cauli
, Diego Reforgiato Recupero
:
Survey on Videos Data Augmentation for Deep Learning Models. 93 - Tianyuan Zhang
, Sérgio Moro
, Ricardo F. Ramos
:
A Data-Driven Approach to Improve Customer Churn Prediction Based on Telecom Customer Segmentation. 94 - Andreas G. Papidas, George C. Polyzos
:
Self-Organizing Networks for 5G and Beyond: A View from the Top. 95 - Jiahao Shi, Jie Yu, Jinkun Yang, Lingyu Xu, Huan Xu:
Time Series Surface Temperature Prediction Based on Cyclic Evolutionary Network Model for Complex Sea Area. 96
Volume 14, Number 4, April 2022
- Kim Ferres, Timo Schloesser
, Peter A. Gloor
:
Predicting Dog Emotions Based on Posture Analysis Using DeepLabCut. 97 - Luisanna Cocco
, Roberto Tonelli, Michele Marchesi:
Bitcoin as a Safe Haven during COVID-19 Disease. 98 - Peter Krammer, Marcel Kvassay, Ján Mojzis
, Martin Kenyeres
, Milos Ockay
, Ladislav Hluchý, Lubos Pavlov, Lubos Skurcák:
Using Satellite Imagery to Improve Local Pollution Models for High-Voltage Transmission Lines and Insulators. 99 - Mario Milicevic
, Vedran Batos, Adriana Lipovac
, Zeljka Car:
Deep Regression Neural Networks for Proportion Judgment. 100 - Subhra Sankha Sarma
, Ranjay Hazra
, Peter Han Joo Chong
:
Performance Analysis of DF Relay-Assisted D2D Communication in a 5G mmWave Network. 101 - Vikas Tomer, Sachin Sharma
:
Detecting IoT Attacks Using an Ensemble Machine Learning Model. 102 - Xiaolin Chen
, Qixing Qu
, Chengxi Wei, Shudong Chen:
Cross-Domain Transfer Learning Prediction of COVID-19 Popular Topics Based on Knowledge Graph. 103 - Joakim Kävrestad
, Allex Hagberg, Marcus Nohlberg
, Jana Rambusch, Robert Roos, Steven Furnell
:
Evaluation of Contextual and Game-Based Training for Phishing Detection. 104 - Yingjie Duan
, Hong Ni, Xiaoyong Zhu:
A Dynamic Cache Allocation Mechanism (DCAM) for Reliable Multicast in Information-Centric Networking. 105 - Massimo Esposito
, Giovanni Luca Masala
, Aniello Minutolo
, Marco Pota
:
Special Issue "Natural Language Engineering: Methods, Tasks and Applications". 106 - Nusrat Afrin
, Jason Brown
, Jamil Y. Khan
:
A Multi-Service Adaptive Semi-Persistent LTE Uplink Scheduler for Low Power M2M Devices. 107 - João Vitorino
, Nuno Oliveira
, Isabel Praça
:
Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection. 108 - Marwane Ayaida
, Nadhir Messai
, Frédéric Valentin, Dimitri Marcheras:
TalkRoBots: A Middleware for Robotic Systems in Industry 4.0. 109 - Pranita Patil
, Kevin Purcell
:
Decorrelation-Based Deep Learning for Bias Mitigation. 110 - Haytham Khalil
, Khalid Elgazzar
:
Location Transparency Call (LTC) System: An Intelligent Phone Dialing System Based on the Phone of Things (PoT) Architecture. 111 - Chrysostomos Symvoulidis
, George Marinos, Athanasios Kiourtis
, Argyro Mavrogiorgou, Dimosthenis Kyriazis
:
HealthFetch: An Influence-Based, Context-Aware Prefetch Scheme in Citizen-Centered Health Storage Clouds. 112 - Zhao Wang, Qingguo Xu, Weimin Li:
Multi-Layer Feature Fusion-Based Community Evolution Prediction. 113 - Attila Csaba Marosi, Márk Emodi, Ákos Hajnal, Róbert Lovas
, Tamás Kiss
, Valerie Poser, Jibinraj Antony
, Simon Bergweiler
, Hamed Hamzeh
, James Deslauriers
, József Kovács
:
Interoperable Data Analytics Reference Architectures Empowering Digital-Twin-Aided Manufacturing. 114 - Mahmoud Al-Dwairi, Ahmed S. Shatnawi
, Osama Daifallah Al-Khaleel, Basheer Al-Duwairi:
Ransomware-Resilient Self-Healing XML Documents. 115 - Ramraj Dangi
, Akshay Jadhav
, Gaurav Choudhary
, Nicola Dragoni
, Manas Kumar Mishra
, Praveen Lalwani:
ML-Based 5G Network Slicing Security: A Comprehensive Survey. 116 - Ahmed I. Salameh
, Mohamed G. El-Tarhuni
:
From 5G to 6G - Challenges, Technologies, and Applications. 117 - Rokia Lamrani Alaoui
, El Habib Nfaoui
:
Deep Learning for Vulnerability and Attack Detection on Web Applications: A Systematic Literature Review. 118