You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 14, Issue 3

March 2022 - 29 articles

Cover Story: Authentication relies on the detection of inconsistencies that indicate malicious editing in audiovisual files. However, automation does not guarantee robustness. A computer-supported toolbox is presented that can assist inexperienced users to visually investigate the consistency of audio streams. Several algorithms are incorporated, including a convolutional network model for Signal-to-Reverberation-Ratio (SRR) estimation. The user can access the application through a web browser amd can upload an audio/video file or YouTube link. The application outputs a set of interactive visualizations that help the user investigate the authenticity of the file. Following a crowdsourcing methodology, users can contribute by uploading or annotating files from the dataset to determine their authenticity. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (29)

  • Article
  • Open Access
4 Citations
3,073 Views
16 Pages

The prediction of marine elements has become increasingly important in the field of marine research. However, time series data in a complex environment vary significantly because they are composed of dynamic changes with multiple mechanisms, causes,...

  • Review
  • Open Access
33 Citations
13,168 Views
30 Pages

We describe self-organizing network (SON) concepts and architectures and their potential to play a central role in 5G deployment and next-generation networks. Our focus is on the basic SON use case applied to radio access networks (RAN), which is sel...

  • Article
  • Open Access
48 Citations
12,894 Views
19 Pages

Numerous valuable clients can be lost to competitors in the telecommunication industry, leading to profit loss. Thus, understanding the reasons for client churn is vital for telecommunication companies. This study aimed to develop a churn prediction...

  • Review
  • Open Access
38 Citations
9,262 Views
19 Pages

Survey on Videos Data Augmentation for Deep Learning Models

  • Nino Cauli and
  • Diego Reforgiato Recupero

In most Computer Vision applications, Deep Learning models achieve state-of-the-art performances. One drawback of Deep Learning is the large amount of data needed to train the models. Unfortunately, in many applications, data are difficult or expensi...

  • Article
  • Open Access
5 Citations
3,794 Views
20 Pages

The Time Machine in Columnar NoSQL Databases: The Case of Apache HBase

  • Chia-Ping Tsai,
  • Che-Wei Chang,
  • Hung-Chang Hsiao and
  • Haiying Shen

Not Only SQL (NoSQL) is a critical technology that is scalable and provides flexible schemas, thereby complementing existing relational database technologies. Although NoSQL is flourishing, present solutions lack the features required by enterprises...

  • Article
  • Open Access
13 Citations
5,532 Views
14 Pages

CPU-GPU-Memory DVFS for Power-Efficient MPSoC in Mobile Cyber Physical Systems

  • Somdip Dey,
  • Samuel Isuwa,
  • Suman Saha,
  • Amit Kumar Singh and
  • Klaus McDonald-Maier

Most modern mobile cyber-physical systems such as smartphones come equipped with multi-processor systems-on-chip (MPSoCs) with variant computing capacity both to cater to performance requirements and reduce power consumption when executing an applica...

  • Article
  • Open Access
17 Citations
4,946 Views
20 Pages

Many machine learning problem domains, such as the detection of fraud, spam, outliers, and anomalies, tend to involve inherently imbalanced class distributions of samples. However, most classification algorithms assume equivalent sample sizes for eac...

  • Article
  • Open Access
80 Citations
12,404 Views
27 Pages

A Survey on Intrusion Detection Systems for Fog and Cloud Computing

  • Victor Chang,
  • Lewis Golightly,
  • Paolo Modesti,
  • Qianwen Ariel Xu,
  • Le Minh Thao Doan,
  • Karl Hall,
  • Sreeja Boddu and
  • Anna Kobusińska

The rapid advancement of internet technologies has dramatically increased the number of connected devices. This has created a huge attack surface that requires the deployment of effective and practical countermeasures to protect network infrastructur...

  • Article
  • Open Access
7 Citations
4,993 Views
14 Pages

Neural Network-Based Price Tag Data Analysis

  • Pavel Laptev,
  • Sergey Litovkin,
  • Sergey Davydenko,
  • Anton Konev,
  • Evgeny Kostyuchenko and
  • Alexander Shelupanov

This paper compares neural networks, specifically Unet, MobileNetV2, VGG16 and YOLOv4-tiny, for image segmentation as part of a study aimed at finding an optimal solution for price tag data analysis. The neural networks considered were trained on an...

  • Article
  • Open Access
13 Citations
4,847 Views
42 Pages

Handover Management in 5G Vehicular Networks

  • Ioannis Kosmopoulos,
  • Emmanouil Skondras,
  • Angelos Michalas,
  • Emmanouel T. Michailidis and
  • Dimitrios D. Vergados

Fifth-Generation (5G) vehicular networks support novel services with increased Quality of Service (QoS) requirements. Vehicular users need to be continuously connected to networks that fulfil the constraints of their services. Thus, the implementatio...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903Creative Common CC BY license