You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 13, Issue 11

November 2021 - 32 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Cover Story: Video delivery is exploiting 5G networks to enable higher server consolidation and deployment flexibility. We present a multi-objective optimization framework for service function chain deployment in the particular context of live streaming in virtualized content delivery networks using deep reinforcement learning. Trace-driven simulations with real-world data reveal that our approach is the only one to adapt to the complexity of the particular context of live video delivery concerning state-of-the-art algorithms designed for general-case service function chain deployment. In particular, our simulation test revealed a substantial QoS/QoE performance improvement in terms of session acceptance ratio against the compared algorithms while keeping operational costs within proper bounds. View this paper

Articles (32)

  • Article
  • Open Access
3 Citations
5,093 Views
14 Pages

Face Swapping Consistency Transfer with Neural Identity Carrier

  • Kunlin Liu,
  • Ping Wang,
  • Wenbo Zhou,
  • Zhenyu Zhang,
  • Yanhao Ge,
  • Honggu Liu,
  • Weiming Zhang and
  • Nenghai Yu

22 November 2021

Deepfake aims to swap a face of an image with someone else’s likeness in a reasonable manner. Existing methods usually perform deepfake frame by frame, thus ignoring video consistency and producing incoherent results. To address such a problem,...

  • Article
  • Open Access
3 Citations
3,144 Views
11 Pages

Community Formation as a Byproduct of a Recommendation System: A Simulation Model for Bubble Formation in Social Media

  • Franco Bagnoli,
  • Guido de Bonfioli Cavalcabo’,
  • Banedetto Casu and
  • Andrea Guazzini

22 November 2021

We investigate the problem of the formation of communities of users that selectively exchange messages among them in a simulated environment. This closed community can be seen as the prototype of the bubble effect, i.e., the isolation of individuals...

  • Article
  • Open Access
4 Citations
3,160 Views
13 Pages

Detection of Induced Activity in Social Networks: Model and Methodology

  • Dmitrii Gavra,
  • Ksenia Namyatova and
  • Lidia Vitkova

22 November 2021

This paper examines the problem of social media special operations and especially induced support in social media during political election campaigns. The theoretical background of the paper is based on the study fake activity in social networks duri...

  • Article
  • Open Access
13 Citations
3,861 Views
17 Pages

Detection of Hidden Communities in Twitter Discussions of Varying Volumes

  • Ivan Blekanov,
  • Svetlana S. Bodrunova and
  • Askar Akhmetov

20 November 2021

The community-based structure of communication on social networking sites has long been a focus of scholarly attention. However, the problem of discovery and description of hidden communities, including defining the proper level of user aggregation,...

  • Article
  • Open Access
30 Citations
3,828 Views
17 Pages

Enable Fair Proof-of-Work (PoW) Consensus for Blockchains in IoT by Miner Twins (MinT)

  • Qian Qu,
  • Ronghua Xu,
  • Yu Chen,
  • Erik Blasch and
  • Alexander Aved

19 November 2021

Blockchain technology has been recognized as a promising solution to enhance the security and privacy of Internet of Things (IoT) and Edge Computing scenarios. Taking advantage of the Proof-of-Work (PoW) consensus protocol, which solves a computation...

  • Article
  • Open Access
26 Citations
6,251 Views
17 Pages

19 November 2021

Education 4.0 prepares new generations to develop the skills required to perform in a technological, dynamic, and unpredictable world. The main barrier to implementing Education 4.0 in schools is that teachers have not been trained for it. Given the...

  • Review
  • Open Access
7 Citations
3,972 Views
18 Pages

Resilience in the Cyberworld: Definitions, Features and Models

  • Elisabeth Vogel,
  • Zoya Dyka,
  • Dan Klann and
  • Peter Langendörfer

19 November 2021

Resilience is a feature that is gaining more and more attention in computer science and computer engineering. However, the definition of resilience for the cyber landscape, especially embedded systems, is not yet clear. This paper discusses definitio...

  • Article
  • Open Access
1 Citations
3,071 Views
22 Pages

19 November 2021

The cloud-based Internet of Things (IoT-Cloud) combines the advantages of the IoT and cloud computing, which not only expands the scope of cloud computing but also enhances the data processing capability of the IoT. Users always seek affordable and e...

  • Article
  • Open Access
4 Citations
3,697 Views
12 Pages

Person Re-Identification by Low-Dimensional Features and Metric Learning

  • Xingyuan Chen,
  • Huahu Xu,
  • Yang Li and
  • Minjie Bian

18 November 2021

Person re-identification (Re-ID) has attracted attention due to its wide range of applications. Most recent studies have focused on the extraction of deep features, while ignoring color features that can remain stable, even for illumination variation...

  • Article
  • Open Access
1 Citations
4,255 Views
17 Pages

MFCNet: Mining Features Context Network for RGB–IR Person Re-Identification

  • Jing Mei,
  • Huahu Xu,
  • Yang Li,
  • Minjie Bian and
  • Yuzhe Huang

18 November 2021

RGB–IR cross modality person re-identification (RGB–IR Re-ID) is an important task for video surveillance in poorly illuminated or dark environments. In addition to the common challenge of Re-ID, the large cross-modality variations between RGB and IR...

of 4