Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 13, Issue 11

2021 November - 32 articles

Cover Story: Video delivery is exploiting 5G networks to enable higher server consolidation and deployment flexibility. We present a multi-objective optimization framework for service function chain deployment in the particular context of live streaming in virtualized content delivery networks using deep reinforcement learning. Trace-driven simulations with real-world data reveal that our approach is the only one to adapt to the complexity of the particular context of live video delivery concerning state-of-the-art algorithms designed for general-case service function chain deployment. In particular, our simulation test revealed a substantial QoS/QoE performance improvement in terms of session acceptance ratio against the compared algorithms while keeping operational costs within proper bounds. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (32)

  • Article
  • Open Access
3 Citations
3,344 Views
11 Pages

Community Formation as a Byproduct of a Recommendation System: A Simulation Model for Bubble Formation in Social Media

  • Franco Bagnoli,
  • Guido de Bonfioli Cavalcabo’,
  • Banedetto Casu and
  • Andrea Guazzini

22 November 2021

We investigate the problem of the formation of communities of users that selectively exchange messages among them in a simulated environment. This closed community can be seen as the prototype of the bubble effect, i.e., the isolation of individuals...

  • Article
  • Open Access
4 Citations
3,400 Views
13 Pages

Detection of Induced Activity in Social Networks: Model and Methodology

  • Dmitrii Gavra,
  • Ksenia Namyatova and
  • Lidia Vitkova

22 November 2021

This paper examines the problem of social media special operations and especially induced support in social media during political election campaigns. The theoretical background of the paper is based on the study fake activity in social networks duri...

  • Article
  • Open Access
3 Citations
5,725 Views
14 Pages

Face Swapping Consistency Transfer with Neural Identity Carrier

  • Kunlin Liu,
  • Ping Wang,
  • Wenbo Zhou,
  • Zhenyu Zhang,
  • Yanhao Ge,
  • Honggu Liu,
  • Weiming Zhang and
  • Nenghai Yu

22 November 2021

Deepfake aims to swap a face of an image with someone else’s likeness in a reasonable manner. Existing methods usually perform deepfake frame by frame, thus ignoring video consistency and producing incoherent results. To address such a problem,...

  • Article
  • Open Access
14 Citations
4,119 Views
17 Pages

Detection of Hidden Communities in Twitter Discussions of Varying Volumes

  • Ivan Blekanov,
  • Svetlana S. Bodrunova and
  • Askar Akhmetov

20 November 2021

The community-based structure of communication on social networking sites has long been a focus of scholarly attention. However, the problem of discovery and description of hidden communities, including defining the proper level of user aggregation,...

  • Article
  • Open Access
33 Citations
4,179 Views
17 Pages

Enable Fair Proof-of-Work (PoW) Consensus for Blockchains in IoT by Miner Twins (MinT)

  • Qian Qu,
  • Ronghua Xu,
  • Yu Chen,
  • Erik Blasch and
  • Alexander Aved

19 November 2021

Blockchain technology has been recognized as a promising solution to enhance the security and privacy of Internet of Things (IoT) and Edge Computing scenarios. Taking advantage of the Proof-of-Work (PoW) consensus protocol, which solves a computation...

  • Article
  • Open Access
28 Citations
6,697 Views
17 Pages

19 November 2021

Education 4.0 prepares new generations to develop the skills required to perform in a technological, dynamic, and unpredictable world. The main barrier to implementing Education 4.0 in schools is that teachers have not been trained for it. Given the...

  • Review
  • Open Access
7 Citations
4,187 Views
18 Pages

Resilience in the Cyberworld: Definitions, Features and Models

  • Elisabeth Vogel,
  • Zoya Dyka,
  • Dan Klann and
  • Peter Langendörfer

19 November 2021

Resilience is a feature that is gaining more and more attention in computer science and computer engineering. However, the definition of resilience for the cyber landscape, especially embedded systems, is not yet clear. This paper discusses definitio...

  • Article
  • Open Access
1 Citations
3,205 Views
22 Pages

19 November 2021

The cloud-based Internet of Things (IoT-Cloud) combines the advantages of the IoT and cloud computing, which not only expands the scope of cloud computing but also enhances the data processing capability of the IoT. Users always seek affordable and e...

  • Article
  • Open Access
4 Citations
4,039 Views
12 Pages

Person Re-Identification by Low-Dimensional Features and Metric Learning

  • Xingyuan Chen,
  • Huahu Xu,
  • Yang Li and
  • Minjie Bian

18 November 2021

Person re-identification (Re-ID) has attracted attention due to its wide range of applications. Most recent studies have focused on the extraction of deep features, while ignoring color features that can remain stable, even for illumination variation...

  • Article
  • Open Access
1 Citations
4,473 Views
17 Pages

MFCNet: Mining Features Context Network for RGB–IR Person Re-Identification

  • Jing Mei,
  • Huahu Xu,
  • Yang Li,
  • Minjie Bian and
  • Yuzhe Huang

18 November 2021

RGB–IR cross modality person re-identification (RGB–IR Re-ID) is an important task for video surveillance in poorly illuminated or dark environments. In addition to the common challenge of Re-ID, the large cross-modality variations between RGB and IR...

  • Review
  • Open Access
27 Citations
6,103 Views
45 Pages

An Analysis on Contemporary MAC Layer Protocols in Vehicular Networks: State-of-the-Art and Future Directions

  • Lopamudra Hota,
  • Biraja Prasad Nayak,
  • Arun Kumar,
  • G. G. Md. Nawaz Ali and
  • Peter Han Joo Chong

17 November 2021

Traffic density around the globe is increasing on a day-to-day basis, resulting in more accidents, congestion, and pollution. The dynamic vehicular environment induces challenges in designing an efficient and reliable protocol for communication. Time...

  • Article
  • Open Access
13 Citations
5,314 Views
14 Pages

17 November 2021

Many deepfake-image forensic detectors have been proposed and improved due to the development of synthetic techniques. However, recent studies show that most of these detectors are not immune to adversarial example attacks. Therefore, understanding t...

  • Article
  • Open Access
17 Citations
7,560 Views
20 Pages

What Went Wrong? Predictors of Contact Tracing Adoption in Italy during COVID-19 Pandemic

  • Andrea Guazzini,
  • Maria Fiorenza,
  • Gabriele Panerai and
  • Mirko Duradoni

15 November 2021

Together with vaccines, contact tracing systems (CTS) have proved to be one of the best strategies to deal with the current COVID-19 pandemic. However, the adoption of such systems has been quite limited in EU countries, and Italy was no exception. T...

  • Article
  • Open Access
63 Citations
10,438 Views
20 Pages

12 November 2021

Blockchain technology is a sustainable technology that offers a high level of security for many industrial applications. Blockchain has numerous benefits, such as decentralisation, immutability and tamper-proofing. Blockchain is composed of two proce...

  • Review
  • Open Access
16 Citations
9,711 Views
15 Pages

8 November 2021

Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewall...

  • Article
  • Open Access
27 Citations
8,990 Views
17 Pages

Intelligent Planning and Research on Urban Traffic Congestion

  • Qigang Zhu,
  • Yifan Liu,
  • Ming Liu,
  • Shuaishuai Zhang,
  • Guangyang Chen and
  • Hao Meng

8 November 2021

For large and medium-sized cities, the planning and development of urban road networks may not keep pace with the growth of urban vehicles, resulting in traffic congestion on urban roads during peak hours. Take Jinan, a mid-sized city in China’s Shan...

  • Article
  • Open Access
9 Citations
7,289 Views
19 Pages

Improving Institutional Repositories through User-Centered Design: Indicators from a Focus Group

  • Laura Icela González-Pérez,
  • María Soledad Ramírez-Montoya and
  • Francisco José García-Peñalvo

2 November 2021

User experience with intuitive and flexible digital platforms can be enjoyable and satisfying. A strategy to deliver such an experience is to place the users at the center of the design process and analyze their beliefs and perceptions to add appropr...

  • Article
  • Open Access
8 Citations
2,914 Views
39 Pages

University Community Members’ Perceptions of Labels for Online Media

  • Ryan Suttle,
  • Scott Hogan,
  • Rachel Aumaugher,
  • Matthew Spradling,
  • Zak Merrigan and
  • Jeremy Straub

31 October 2021

Fake news is prevalent in society. A variety of methods have been used in an attempt to mitigate the spread of misinformation and fake news ranging from using machine learning to detect fake news to paying fact checkers to manually fact check media t...

  • Article
  • Open Access
8 Citations
3,642 Views
20 Pages

Configurable Hardware Core for IoT Object Detection

  • Pedro R. Miranda,
  • Daniel Pestana,
  • João D. Lopes,
  • Rui Policarpo Duarte,
  • Mário P. Véstias,
  • Horácio C. Neto and
  • José T. de Sousa

30 October 2021

Object detection is an important task for many applications, like transportation, security, and medical applications. Many of these applications are needed on edge devices to make local decisions. Therefore, it is necessary to provide low-cost, fast...

  • Article
  • Open Access
8 Citations
3,503 Views
18 Pages

Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption

  • Siti Dhalila Mohd Satar,
  • Masnida Hussin,
  • Zurina Mohd Hanapi and
  • Mohamad Afendee Mohamed

30 October 2021

Managing and controlling access to the tremendous data in Cloud storage is very challenging. Due to various entities engaged in the Cloud environment, there is a high possibility of data tampering. Cloud encryption is being employed to control data a...

  • Article
  • Open Access
14 Citations
5,657 Views
15 Pages

29 October 2021

In order to unify access to multiple heterogeneous sources of cultural heritage data, many datasets were mapped to the CIDOC-CRM ontology. CIDOC-CRM provides a formal structure and definitions for most cultural heritage concepts and their relationshi...

  • Article
  • Open Access
16 Citations
4,693 Views
28 Pages

Online Service Function Chain Deployment for Live-Streaming in Virtualized Content Delivery Networks: A Deep Reinforcement Learning Approach

  • Jesús Fernando Cevallos Moreno,
  • Rebecca Sattler,
  • Raúl P. Caulier Cisterna,
  • Lorenzo Ricciardi Celsi,
  • Aminael Sánchez Rodríguez and
  • Massimo Mecella

29 October 2021

Video delivery is exploiting 5G networks to enable higher server consolidation and deployment flexibility. Performance optimization is also a key target in such network systems. We present a multi-objective optimization framework for service function...

  • Article
  • Open Access
5 Citations
3,537 Views
20 Pages

28 October 2021

Advancements in smart technology, wearable and mobile devices, and Internet of Things, have made smart health an integral part of modern living to better individual healthcare and well-being. By enhancing self-monitoring, data collection and sharing...

  • Article
  • Open Access
7 Citations
2,562 Views
11 Pages

Security Challenges for Light Emitting Systems

  • Louiza Hamada,
  • Pascal Lorenz and
  • Marc Gilg

28 October 2021

Although visible light communication (VLC) channels are more secure than radio frequency channels, the broadcast nature of VLC links renders them open to eavesdropping. As a result, VLC networks must provide security in order to safeguard the user’s...

  • Article
  • Open Access
30 Citations
6,133 Views
18 Pages

Introducing Various Semantic Models for Amharic: Experimentation and Evaluation with Multiple Tasks and Datasets

  • Seid Muhie Yimam,
  • Abinew Ali Ayele,
  • Gopalakrishnan Venkatesh,
  • Ibrahim Gashaw and
  • Chris Biemann

27 October 2021

The availability of different pre-trained semantic models has enabled the quick development of machine learning components for downstream applications. However, even if texts are abundant for low-resource languages, there are very few semantic models...

  • Article
  • Open Access
13 Citations
4,037 Views
14 Pages

27 October 2021

In recent years, the Internet of Things (IoT) devices have become an inseparable part of our lives. With the growing demand for Smart Applications, it becomes clear that IoT will bring regular automation and intelligent sensing to a new level thus im...

  • Article
  • Open Access
12 Citations
4,055 Views
21 Pages

Software Design and Experimental Evaluation of a Reduced AES for IoT Applications

  • Malik Qasaimeh,
  • Raad S. Al-Qassas and
  • Mohammad Ababneh

27 October 2021

IoT devices include RFID tags, microprocessors, sensors, readers, and actuators. Their main characteristics are their limited resources and computing capabilities, which pose critical challenges to the reliability and security of their applications....

  • Article
  • Open Access
4 Citations
3,035 Views
14 Pages

COVIDNet: Implementing Parallel Architecture on Sound and Image for High Efficacy

  • Manickam Murugappan,
  • John Victor Joshua Thomas,
  • Ugo Fiore,
  • Yesudas Bevish Jinila and
  • Subhashini Radhakrishnan

26 October 2021

The present work relates to the implementation of core parallel architecture in a deep learning algorithm. At present, deep learning technology forms the main interdisciplinary basis of healthcare, hospital hygiene, biological and medicine. This work...

  • Article
  • Open Access
10 Citations
3,872 Views
24 Pages

26 October 2021

The expected huge amount of connected cars and applications with varying Quality of Service (QoS) demands still depend on agile/flexible networking infrastructure to deal with dynamic service requests to the control plane, which may become a bottlene...

  • Article
  • Open Access
15 Citations
5,192 Views
45 Pages

HyDSMaaS: A Hybrid Communication Infrastructure with LoRaWAN and LoraMesh for the Demand Side Management as a Service

  • Artur Felipe da Silva Veloso,
  • José Valdemir Reis Júnior,
  • Ricardo de Andrade Lira Rabelo and
  • Jocines Dela-flora Silveira

26 October 2021

Seeking to solve problems in the power electric system (PES) related to exacerbated and uncontrolled energy consumption by final consumers such as residences, condominiums, public buildings and industries, electric power companies (EPC) are increasin...

  • Article
  • Open Access
7 Citations
4,286 Views
18 Pages

25 October 2021

This study aims to explore the time series context and sentiment polarity features of rumors’ life cycles, and how to use them to optimize the CNN model parameters and improve the classification effect. The proposed model is a convolutional neural ne...

  • Article
  • Open Access
3,442 Views
20 Pages

A Multidimensional Analysis of Released COVID-19 Location-Based Mobile Applications

  • Theodoros Oikonomidis,
  • Konstantinos Fouskas and
  • Maro Vlachopoulou

25 October 2021

The spread of coronavirus disease (COVID-19) has triggered a series of responses worldwide ranging from traveling restrictions and shelter-in-place orders to lockdowns, contact tracing, social distancing, and other mitigation measures. To assist with...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903