Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 13, Issue 3

2021 March - 27 articles

Cover Story: Video conferencing services based on web real-time communication (WebRTC) protocol are growing in popularity, especially during this pandemic era. However, the best-effort nature of 802.11 networks hinders users from experiencing uninterrupted high-quality video conferencing. This paper presents a novel methodology to predict the perceived quality of service (PQoS) of video conferencing services over Wi-Fi networks using machine learning techniques with 92–98% accuracy in various networks. In effect, ISPs can utilize this methodology to provide predictable and measurable wireless quality by implementing a non-intrusive quality monitoring approach in the form of edge computing that preserves customer privacy while reducing the operational costs of monitoring and data analytics. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (27)

  • Article
  • Open Access
6 Citations
3,576 Views
25 Pages

Virtual Network Function Embedding under Nodal Outage Using Deep Q-Learning

  • Swarna Bindu Chetty,
  • Hamed Ahmadi,
  • Sachin Sharma and
  • Avishek Nag

With the emergence of various types of applications such as delay-sensitive applications, future communication networks are expected to be increasingly complex and dynamic. Network Function Virtualization (NFV) provides the necessary support towards...

  • Article
  • Open Access
23 Citations
3,852 Views
14 Pages

In location-based social networks (LBSNs), exploit several key features of points-of-interest (POIs) and users on precise POI recommendation be significant. In this work, a novel POI recommendation pipeline based on the convolutional neural network n...

  • Article
  • Open Access
44 Citations
9,262 Views
18 Pages

A Web Interface for Analyzing Hate Speech

  • Lazaros Vrysis,
  • Nikolaos Vryzas,
  • Rigas Kotsakis,
  • Theodora Saridou,
  • Maria Matsiola,
  • Andreas Veglis,
  • Carlos Arcila-Calderón and
  • Charalampos Dimoulas

Social media services make it possible for an increasing number of people to express their opinion publicly. In this context, large amounts of hateful comments are published daily. The PHARM project aims at monitoring and modeling hate speech against...

  • Article
  • Open Access
24 Citations
4,606 Views
17 Pages

Vehicular Communication Management Framework: A Flexible Hybrid Connectivity Platform for CCAM Services

  • Dries Naudts,
  • Vasilis Maglogiannis,
  • Seilendria Hadiwardoyo,
  • Daniel van den Akker,
  • Simon Vanneste,
  • Siegfried Mercelis,
  • Peter Hellinckx,
  • Bart Lannoo,
  • Johann Marquez-Barja and
  • Ingrid Moerman

In the upcoming decade and beyond, the Cooperative, Connected and Automated Mobility (CCAM) initiative will play a huge role in increasing road safety, traffic efficiency and comfort of driving in Europe. While several individual vehicular wireless c...

  • Article
  • Open Access
28 Citations
13,041 Views
13 Pages

Most retailers are integrating their practices with modern technologies to enhance the effectiveness of their operations. The adoption of technology aims to enable businesses to accurately meet customer needs and expectations. This study focused on e...

  • Article
  • Open Access
1 Citations
3,886 Views
13 Pages

The continuous increase in network traffic has sharply increased the demand for high-performance packet processing systems. For a high-performance packet processing system based on multi-core processors, the packet scheduling algorithm is critical be...

  • Article
  • Open Access
16 Citations
7,512 Views
20 Pages

Realistic Aspects of Simulation Models for Fake News Epidemics over Social Networks

  • Quintino Francesco Lotito,
  • Davide Zanella and
  • Paolo Casari

The pervasiveness of online social networks has reshaped the way people access information. Online social networks make it common for users to inform themselves online and share news among their peers, but also favor the spreading of both reliable an...

  • Article
  • Open Access
3 Citations
4,440 Views
24 Pages

At present, our online activity is almost constant, either producing information or consuming it, both for the social and academic fields. The spaces in which people move and travel every day, innocently divided between the face-to-face and the virtu...

  • Article
  • Open Access
3,401 Views
14 Pages

Graph variational auto-encoder (GVAE) is a model that combines neural networks and Bayes methods, capable of deeper exploring the influential latent features of graph reconstruction. However, several pieces of research based on GVAE employ a plain pr...

  • Article
  • Open Access
148 Citations
13,967 Views
14 Pages

Deep Model Poisoning Attack on Federated Learning

  • Xingchen Zhou,
  • Ming Xu,
  • Yiming Wu and
  • Ning Zheng

Federated learning is a novel distributed learning framework, which enables thousands of participants to collaboratively construct a deep learning model. In order to protect confidentiality of the training data, the shared information between server...

  • Article
  • Open Access
3,109 Views
13 Pages

Using the single premise entailment (SPE) model to accomplish the multi-premise entailment (MPE) task can alleviate the problem that the neural network cannot be effectively trained due to the lack of labeled multi-premise training data. Moreover, th...

  • Article
  • Open Access
4 Citations
4,880 Views
15 Pages

Person re-identification (ReID) plays a significant role in video surveillance analysis. In the real world, due to illumination, occlusion, and deformation, pedestrian features extraction is the key to person ReID. Considering the shortcomings of exi...

  • Article
  • Open Access
7 Citations
3,056 Views
23 Pages

The combination of mobile edge computing (MEC) and wireless power transfer (WPT) is recognized as a promising technology to solve the problem of limited battery capacities and insufficient computation capabilities of mobile devices. This technology c...

  • Article
  • Open Access
28 Citations
5,842 Views
17 Pages

Effects of Transport Network Slicing on 5G Applications

  • Yi-Bing Lin,
  • Chien-Chao Tseng and
  • Ming-Hung Wang

Network slicing is considered a key technology in enabling the underlying 5G mobile network infrastructure to meet diverse service requirements. In this article, we demonstrate how transport network slicing accommodates the various network service re...

  • Article
  • Open Access
16 Citations
5,233 Views
24 Pages

Investigating and Modeling of Cooperative Vehicle-to-Vehicle Safety Stopping Distance

  • Steven Knowles Flanagan,
  • Zuoyin Tang,
  • Jianhua He and
  • Irfan Yusoff

Dedicated Short-Range Communication (DSRC) or IEEE 802.11p/OCB (Out of the Context of a Base-station) is widely considered to be a primary technology for Vehicle-to-Vehicle (V2V) communication, and it is aimed toward increasing the safety of users on...

  • Article
  • Open Access
36 Citations
5,927 Views
19 Pages

Implementation of IoT Framework with Data Analysis Using Deep Learning Methods for Occupancy Prediction in a Building

  • Eric Hitimana,
  • Gaurav Bajpai,
  • Richard Musabe,
  • Louis Sibomana and
  • Jayavel Kayalvizhi

Many countries worldwide face challenges in controlling building incidence prevention measures for fire disasters. The most critical issues are the localization, identification, detection of the room occupant. Internet of Things (IoT) along with mach...

  • Article
  • Open Access
12 Citations
6,056 Views
12 Pages

The General Data Protection Regulation (GDPR) harmonizes personal data protection laws across the European Union, affecting all sectors including the healthcare industry. For processing operations that pose a high risk for data subjects, a Data Prote...

  • Article
  • Open Access
5 Citations
3,354 Views
21 Pages

In a community with an aging population, helping each other is a must society function. Lacking mutual trust makes the need for a fair and transparent service exchange platform on top of the public service administration’s list. We present an efficie...

  • Article
  • Open Access
1 Citations
3,847 Views
16 Pages

Classification of resource can help us effectively reduce the work of filtering massive academic resources, such as selecting relevant papers and focusing on the latest research by scholars in the same field. However, existing graph neural networks d...

  • Article
  • Open Access
4 Citations
3,857 Views
18 Pages

Video conferencing services based on web real-time communication (WebRTC) protocol are growing in popularity among Internet users as multi-platform solutions enabling interactive communication from anywhere, especially during this pandemic era. Meanw...

  • Article
  • Open Access
42 Citations
11,466 Views
18 Pages

27 February 2021

With the rise of misinformation, there is a great need for scalable educational interventions supporting students’ abilities to determine the trustworthiness of digital news. We address this challenge in our study by developing an online intervention...

  • Article
  • Open Access
5 Citations
4,250 Views
13 Pages

27 February 2021

The XPRIZE Foundation designs and operates multi-million-dollar, global competitions to incentivize the development of technological breakthroughs that accelerate humanity toward a better future. To combat the COVID-19 pandemic, the foundation coordi...

  • Review
  • Open Access
112 Citations
14,141 Views
32 Pages

Distributed Ledger Technology Review and Decentralized Applications Development Guidelines

  • Claudia Antal,
  • Tudor Cioara,
  • Ionut Anghel,
  • Marcel Antal and
  • Ioan Salomie

27 February 2021

The Distributed Ledger Technology (DLT) provides an infrastructure for developing decentralized applications with no central authority for registering, sharing, and synchronizing transactions on digital assets. In the last years, it has drawn high in...

  • Article
  • Open Access
7 Citations
3,944 Views
22 Pages

Adapting Data-Driven Research to the Fields of Social Sciences and the Humanities

  • Albert Weichselbraun,
  • Philipp Kuntschik,
  • Vincenzo Francolino,
  • Mirco Saner,
  • Urs Dahinden and
  • Vinzenz Wyss

26 February 2021

Recent developments in the fields of computer science, such as advances in the areas of big data, knowledge extraction, and deep learning, have triggered the application of data-driven research methods to disciplines such as the social sciences and h...

  • Review
  • Open Access
5 Citations
3,483 Views
18 Pages

Investigation of Degradation and Upgradation Models for Flexible Unit Systems: A Systematic Literature Review

  • Thirupathi Samala,
  • Vijaya Kumar Manupati,
  • Maria Leonilde R. Varela and
  • Goran Putnik

25 February 2021

Research on flexible unit systems (FUS) with the context of descriptive, predictive, and prescriptive analysis have remarkably progressed in recent times, being now reinforced in the current Industry 4.0 era with the increased focus on integration of...

  • Article
  • Open Access
16 Citations
9,512 Views
35 Pages

A Multi-Tier Security Analysis of Official Car Management Apps for Android

  • Efstratios Chatzoglou,
  • Georgios Kambourakis and
  • Vasileios Kouliaridis

25 February 2021

Using automotive smartphone applications (apps) provided by car manufacturers may offer numerous advantages to the vehicle owner, including improved safety, fuel efficiency, anytime monitoring of vehicle data, and timely over-the-air delivery of soft...

  • Article
  • Open Access
14 Citations
5,543 Views
22 Pages

Online Professional Learning in Response to COVID-19—Towards Robust Evaluation

  • Alireza Ahadi,
  • Matt Bower,
  • Abhay Singh and
  • Michael Garrett

24 February 2021

As COVID-19 continues to impact upon education worldwide, systems and organizations are rapidly transiting their professional learning to online mode. This raises concerns, not simply about whether online professional learning can result in equivalen...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903