You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 11, Issue 3

March 2019 - 29 articles

Cover Story: During recent decades, the Internet has been a key factor in building the global information society and leading economy growth. The mix of technologies in the Internet, such as Cloud Computing, Mobile Edge Computing, Network Function Virtualization (NFV), and Internet of Things (IoT), provide the necessary tools to build a service-centric Future Internet Architecture. However, Internet’s resounding success has also turned out to be the biggest obstacle leading to an inefficient utilization of the underlying infrastructure. The excessive amount of generated traffic from the IoT layer and the need for novel and more targeted networking services has led to a depletion of the physical resources. Thus, the goal of this article is to establish a scalable softwarized end-to-end solution that will gracefully combine different technologies to provide networking services with high Quality of Service and low communication cost. View this paper.

Articles (29)

  • Article
  • Open Access
16 Citations
6,367 Views
20 Pages

Network Function Virtualization is a new technology allowing for a elastic cloud and bandwidth resource allocation. The technology requires an orchestrator whose role is the service and resource orchestration. It receives service requests, each one c...

  • Article
  • Open Access
80 Citations
9,000 Views
17 Pages

The promising advancements in the telecommunications and automotive sectors over the years have empowered drivers with highly innovative communication and sensing capabilities, in turn paving the way for the next-generation connected and autonomous v...

  • Article
  • Open Access
93 Citations
10,022 Views
23 Pages

VNF Placement Optimization at the Edge and Cloud

  • Aris Leivadeas,
  • George Kesidis,
  • Mohamed Ibnkahla and
  • Ioannis Lambadaris

Network Function Virtualization (NFV) has revolutionized the way network services are offered to end users. Individual network functions are decoupled from expensive and dedicated middleboxes and are now provided as software-based virtualized entitie...

  • Article
  • Open Access
8 Citations
6,420 Views
16 Pages

Snack Texture Estimation System Using a Simple Equipment and Neural Network Model

  • Shigeru Kato,
  • Naoki Wada,
  • Ryuji Ito,
  • Takaya Shiozaki,
  • Yudai Nishiyama and
  • Tomomichi Kagawa

Texture evaluation is manually performed in general, and such analytical tasks can get cumbersome. In this regard, a neural network model is employed in this study. This paper describes a system that can estimate the food texture of snacks. The syste...

  • Article
  • Open Access
112 Citations
13,069 Views
18 Pages

Most industrial and SCADA-like (supervisory control and data acquisition) systems use proprietary communication protocols, and hence interoperability is not fulfilled. However, the MODBUS TCP is an open de facto standard, and is used for some automat...

  • Article
  • Open Access
35 Citations
9,305 Views
17 Pages

Gamification vs. Privacy: Identifying and Analysing the Major Concerns

  • Aikaterini-Georgia Mavroeidi,
  • Angeliki Kitsiou,
  • Christos Kalloniatis and
  • Stefanos Gritzalis

Gamification, the use of game design elements in applications that are not games, has been developed to provide attractive environments and maintain user interest in several domains. In domains such as education, marketing and health, where gamificat...

  • Article
  • Open Access
53 Citations
7,050 Views
17 Pages

A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs

  • Zulfiqar Ali Zardari,
  • Jingsha He,
  • Nafei Zhu,
  • Khalid Hussain Mohammadani,
  • Muhammad Salman Pathan,
  • Muhammad Iftikhar Hussain and
  • Muhammad Qasim Memon

A mobile ad-hoc network (MANET) is a temporary network of wireless mobile nodes. In a MANET, it is assumed that all of the nodes cooperate with each other to transfer data packets in a multi-hop fashion. However, some malicious nodes don’t coop...

  • Article
  • Open Access
11 Citations
4,819 Views
17 Pages

The article outlines conceptual and corresponding formal models of system functioning. Models provide means for estimation of information operation effects and the operational properties of systems and their functioning. Such systems are changed due...

  • Feature Paper
  • Article
  • Open Access
83 Citations
21,158 Views
25 Pages

Cyber security in a supply chain (SC) provides an organization the secure network facilities to meet its overall business objectives. The integration of technologies has improved business processes, increased production speed, and reduced distributio...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903