Skip to Content

Future Internet, Volume 14, Issue 3

2022 March - 29 articles

Cover Story: Authentication relies on the detection of inconsistencies that indicate malicious editing in audiovisual files. However, automation does not guarantee robustness. A computer-supported toolbox is presented that can assist inexperienced users to visually investigate the consistency of audio streams. Several algorithms are incorporated, including a convolutional network model for Signal-to-Reverberation-Ratio (SRR) estimation. The user can access the application through a web browser amd can upload an audio/video file or YouTube link. The application outputs a set of interactive visualizations that help the user investigate the authenticity of the file. Following a crowdsourcing methodology, users can contribute by uploading or annotating files from the dataset to determine their authenticity. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (29)

  • Article
  • Open Access
4 Citations
3,223 Views
16 Pages

The prediction of marine elements has become increasingly important in the field of marine research. However, time series data in a complex environment vary significantly because they are composed of dynamic changes with multiple mechanisms, causes,...

  • Review
  • Open Access
39 Citations
14,152 Views
30 Pages

We describe self-organizing network (SON) concepts and architectures and their potential to play a central role in 5G deployment and next-generation networks. Our focus is on the basic SON use case applied to radio access networks (RAN), which is sel...

  • Article
  • Open Access
50 Citations
14,015 Views
19 Pages

Numerous valuable clients can be lost to competitors in the telecommunication industry, leading to profit loss. Thus, understanding the reasons for client churn is vital for telecommunication companies. This study aimed to develop a churn prediction...

  • Review
  • Open Access
40 Citations
10,205 Views
19 Pages

Survey on Videos Data Augmentation for Deep Learning Models

  • Nino Cauli and
  • Diego Reforgiato Recupero

In most Computer Vision applications, Deep Learning models achieve state-of-the-art performances. One drawback of Deep Learning is the large amount of data needed to train the models. Unfortunately, in many applications, data are difficult or expensi...

  • Article
  • Open Access
6 Citations
4,113 Views
20 Pages

The Time Machine in Columnar NoSQL Databases: The Case of Apache HBase

  • Chia-Ping Tsai,
  • Che-Wei Chang,
  • Hung-Chang Hsiao and
  • Haiying Shen

Not Only SQL (NoSQL) is a critical technology that is scalable and provides flexible schemas, thereby complementing existing relational database technologies. Although NoSQL is flourishing, present solutions lack the features required by enterprises...

  • Article
  • Open Access
14 Citations
6,285 Views
14 Pages

CPU-GPU-Memory DVFS for Power-Efficient MPSoC in Mobile Cyber Physical Systems

  • Somdip Dey,
  • Samuel Isuwa,
  • Suman Saha,
  • Amit Kumar Singh and
  • Klaus McDonald-Maier

Most modern mobile cyber-physical systems such as smartphones come equipped with multi-processor systems-on-chip (MPSoCs) with variant computing capacity both to cater to performance requirements and reduce power consumption when executing an applica...

  • Article
  • Open Access
18 Citations
5,235 Views
20 Pages

Many machine learning problem domains, such as the detection of fraud, spam, outliers, and anomalies, tend to involve inherently imbalanced class distributions of samples. However, most classification algorithms assume equivalent sample sizes for eac...

  • Article
  • Open Access
97 Citations
13,241 Views
27 Pages

A Survey on Intrusion Detection Systems for Fog and Cloud Computing

  • Victor Chang,
  • Lewis Golightly,
  • Paolo Modesti,
  • Qianwen Ariel Xu,
  • Le Minh Thao Doan,
  • Karl Hall,
  • Sreeja Boddu and
  • Anna Kobusińska

The rapid advancement of internet technologies has dramatically increased the number of connected devices. This has created a huge attack surface that requires the deployment of effective and practical countermeasures to protect network infrastructur...

  • Article
  • Open Access
7 Citations
5,280 Views
14 Pages

Neural Network-Based Price Tag Data Analysis

  • Pavel Laptev,
  • Sergey Litovkin,
  • Sergey Davydenko,
  • Anton Konev,
  • Evgeny Kostyuchenko and
  • Alexander Shelupanov

This paper compares neural networks, specifically Unet, MobileNetV2, VGG16 and YOLOv4-tiny, for image segmentation as part of a study aimed at finding an optimal solution for price tag data analysis. The neural networks considered were trained on an...

  • Article
  • Open Access
14 Citations
5,190 Views
42 Pages

Handover Management in 5G Vehicular Networks

  • Ioannis Kosmopoulos,
  • Emmanouil Skondras,
  • Angelos Michalas,
  • Emmanouel T. Michailidis and
  • Dimitrios D. Vergados

Fifth-Generation (5G) vehicular networks support novel services with increased Quality of Service (QoS) requirements. Vehicular users need to be continuously connected to networks that fulfil the constraints of their services. Thus, the implementatio...

  • Article
  • Open Access
3 Citations
5,049 Views
17 Pages

Industrial quality control is an important task. Most of the existing vision-based unsupervised industrial anomaly detection and segmentation methods require that the training set only consists of normal samples, which is difficult to ensure in pract...

  • Article
  • Open Access
2 Citations
3,288 Views
18 Pages

State-of-the-art methods for metonymy resolution (MR) consider the sentential context by modeling the entire sentence. However, entity representation, or syntactic structure that are informative may be beneficial for identifying metonymy. Other appro...

  • Article
  • Open Access
6 Citations
3,459 Views
15 Pages

Weighted-CAPIC Caching Algorithm for Priority Traffic in Named Data Network

  • Leanna Vidya Yovita,
  • Nana Rachmana Syambas and
  • Ian Joseph Matheus Edward

Today, the internet requires many additional mechanisms or protocols to support various ever-growing applications. As a future internet architecture candidate, the Named Data Network (NDN) offers a solution that naturally fulfills this need. One of t...

  • Article
  • Open Access
6 Citations
4,759 Views
23 Pages

High-Performance Computing and ABMS for High-Resolution COVID-19 Spreading Simulation

  • Mattia Pellegrino,
  • Gianfranco Lombardo,
  • Stefano Cagnoni and
  • Agostino Poggi

This paper presents an approach for the modeling and the simulation of the spreading of COVID-19 based on agent-based modeling and simulation (ABMS). Our goal is not only to support large-scale simulations but also to increase the simulation resoluti...

  • Article
  • Open Access
10 Citations
5,705 Views
21 Pages

Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks

  • Emtethal K. Alamri,
  • Abdullah M. Alnajim and
  • Suliman A. Alsuhibany

Phishing is a cybercrime that is increasing exponentially day by day. In phishing, a phisher employs social engineering and technology to misdirect victims towards revealing their personal information, which can then be exploited. Despite ongoing res...

  • Article
  • Open Access
7 Citations
5,068 Views
22 Pages

Bot-Based Emergency Software Applications for Natural Disaster Situations

  • Gabriel Ovando-Leon,
  • Luis Veas-Castillo,
  • Veronica Gil-Costa and
  • Mauricio Marin

Upon a serious emergency situation such as a natural disaster, people quickly try to call their friends and family with the software they use every day. On the other hand, people also tend to participate as a volunteer for rescue purposes. It is unli...

  • Article
  • Open Access
5 Citations
4,447 Views
17 Pages

Deep Anomaly Detection Based on Variational Deviation Network

  • Junwen Lu,
  • Jinhui Wang,
  • Xiaojun Wei,
  • Keshou Wu and
  • Guanfeng Liu

There is relatively little research on deep learning for anomaly detection within the field of deep learning. Existing deep anomaly detection methods focus on the learning of feature reconstruction, but such methods mainly learn new feature represent...

  • Article
  • Open Access
40 Citations
7,270 Views
24 Pages

Solar Radiation Forecasting by Pearson Correlation Using LSTM Neural Network and ANFIS Method: Application in the West-Central Jordan

  • Hossam Fraihat,
  • Amneh A. Almbaideen,
  • Abdullah Al-Odienat,
  • Bassam Al-Naami,
  • Roberto De Fazio and
  • Paolo Visconti

Solar energy is one of the most important renewable energies, with many advantages over other sources. Many parameters affect the electricity generation from solar plants. This paper aims to study the influence of these parameters on predicting solar...

  • Article
  • Open Access
14 Citations
6,943 Views
29 Pages

Graphol: A Graphical Language for Ontology Modeling Equivalent to OWL 2

  • Domenico Lembo,
  • Valerio Santarelli,
  • Domenico Fabio Savo and
  • Giuseppe De Giacomo

28 February 2022

In this paper we study Graphol, a fully graphical language inspired by standard formalisms for conceptual modeling, similar to the UML class diagram and the ER model, but equipped with formal semantics. We formally prove that Graphol is equivalent to...

  • Article
  • Open Access
11 Citations
4,497 Views
17 Pages

Utilizing Blockchain for IoT Privacy through Enhanced ECIES with Secure Hash Function

  • Yurika Pant Khanal,
  • Abeer Alsadoon,
  • Khurram Shahzad,
  • Ahmad B. Al-Khalil,
  • Penatiyana W. C. Prasad,
  • Sabih Ur Rehman and
  • Rafiqul Islam

28 February 2022

Blockchain technology has been widely advocated for security and privacy in IoT systems. However, a major impediment to its successful implementation is the lack of privacy protection regarding user access policy while accessing personal data in the...

  • Article
  • Open Access
21 Citations
5,971 Views
14 Pages

Forecasting Students Dropout: A UTAD University Study

  • Diogo E. Moreira da Silva,
  • Eduardo J. Solteiro Pires,
  • Arsénio Reis,
  • Paulo B. de Moura Oliveira and
  • João Barroso

28 February 2022

In Portugal, the dropout rate of university courses is around 29%. Understanding the reasons behind such a high desertion rate can drastically improve the success of students and universities. This work applies existing data mining techniques to pred...

  • Article
  • Open Access
10 Citations
4,271 Views
17 Pages

A Prototype Web Application to Support Human-Centered Audiovisual Content Authentication and Crowdsourcing

  • Nikolaos Vryzas,
  • Anastasia Katsaounidou,
  • Lazaros Vrysis,
  • Rigas Kotsakis and
  • Charalampos Dimoulas

27 February 2022

Media authentication relies on the detection of inconsistencies that may indicate malicious editing in audio and video files. Traditionally, authentication processes are performed by forensics professionals using dedicated tools. There is rich resear...

  • Review
  • Open Access
5 Citations
5,988 Views
18 Pages

Business Models for the Internet of Services: State of the Art and Research Agenda

  • Jacqueline Zonichenn Reis,
  • Rodrigo Franco Gonçalves,
  • Marcia Terra da Silva and
  • Nikolai Kazantsev

25 February 2022

The relevance of the Internet of Services (IoS) comes from the global reach of the Internet into everyone’s home and daily activities and from the move from a manufacturing-based economy to a service-based economy. The IoS is seen as a new ecos...

  • Review
  • Open Access
31 Citations
13,515 Views
28 Pages

Quantum Key Distribution for 5G Networks: A Review, State of Art and Future Directions

  • Mohd Hirzi Adnan,
  • Zuriati Ahmad Zukarnain and
  • Nur Ziadah Harun

25 February 2022

In recent years, 5G networks and services become progressively popular among telecommunication providers. Simultaneously, the growth in the usage and deployment of smartphone platforms and mobile applications have been seen as phenomenal. Therefore,...

  • Article
  • Open Access
6 Citations
4,754 Views
17 Pages

25 February 2022

An intrusion detection system (IDS) is an important tool to prevent potential threats to systems and data. Anomaly-based IDSs may deploy machine learning algorithms to classify events either as normal or anomalous and trigger the adequate response. W...

  • Article
  • Open Access
2 Citations
3,404 Views
22 Pages

Design of Relay Switching to Combat an Eavesdropper in IoT-NOMA Wireless Networks

  • Thanh-Nam Tran,
  • Van-Cuu Ho,
  • Thoai Phu Vo,
  • Khanh Ngo Nhu Tran and
  • Miroslav Voznak

24 February 2022

The requirements of low latency, low cost, less energy consumption, high flexibility, high network capacity, and high data safety are crucial challenges for future Internet of Things (IoT) wireless networks. Motivated by these challenges, this study...

  • Article
  • Open Access
31 Citations
7,460 Views
19 Pages

A Survey on the Use of Graph Convolutional Networks for Combating Fake News

  • Iraklis Varlamis,
  • Dimitrios Michail,
  • Foteini Glykou and
  • Panagiotis Tsantilas

24 February 2022

The combat against fake news and disinformation is an ongoing, multi-faceted task for researchers in social media and social networks domains, which comprises not only the detection of false facts in published content but also the detection of accoun...

  • Article
  • Open Access
2 Citations
3,386 Views
22 Pages

23 February 2022

Information-centric networking (ICN) is an emerging network architecture that has the potential to address low-transmission latency and high-reliability requirements in the fifth generation and beyond communication networks (5G/B5G). In the ICN archi...

  • Article
  • Open Access
20 Citations
10,605 Views
25 Pages

23 February 2022

Abstractive summarization is a technique that allows for extracting condensed meanings from long texts, with a variety of potential practical applications. Nonetheless, today’s abstractive summarization research is limited to testing the models...

XFacebookLinkedIn
Future Internet - ISSN 1999-5903