Results 51 to 60 of about 24,575 (225)

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Standardization SDN&NFV

open access: yesComputer Standards & Interfaces, 2017
Part of special issue: SI: Standardization SDN&NFV ...
Diego Lopez   +4 more
openaire   +3 more sources

Architecture design of NFV PaaS platform

open access: yesDianxin kexue, 2018
NFV is evolving from the initial stage of software and hardware decoupling to the goal of full cloudification and cloud native,which will make the telecommunication networks more scalable,flexible and efficient.The introduction of the NFV PaaS platform ...
Binhong MAO, Zhiming YANG
doaj   +2 more sources

Analysis of Network Function Virtualization and Software Defined Virtualization

open access: yesJOIV: International Journal on Informatics Visualization, 2017
Network function virtualization (NFV) has played important role in both industry and academic change in telecommunication services. NFV has the ability to handle reduction on OPEX and CAPEX; it provides new service and also increases quickly in getting a
M. Sandeep Kumar, Prabhu j
doaj   +1 more source

АНАЛІТИЧНЕ МОДЕЛЮВАННЯ SDN / NFV

open access: yesСистеми управління, навігації та зв’язку. Збірник наукових праць, 2021
Традиційні телекомунікаційні мережі проектувалися в розрахунку на використання спеціалізованихапаратних пристроїв (маршрутизаторів, Ethernet-комутаторів та ін.). Ці пристрої створювалися на базі специфічнихапаратних і програмних платформ окремих вендорів.
Oleksandr Zvenihorodskyi   +4 more
openaire   +1 more source

Russian wheat aphid: a model for genomic plasticity and a challenge to breeders

open access: yesInsect Science, EarlyView.
Invasive foundress finds suitable habitat and reproduces through pathogenesis. Wingless females produce life offspring quickly, which leads to high population densities. High population densities result in competition, which may induce epigenetic changes and wing development for dispersal.
Astrid Jankielsohn   +8 more
wiley   +1 more source

New Network Architecture for Urban Rail Transit Video Surveillance System Based on SDN and NFV Technologies

open access: yesChengshi guidao jiaotong yanjiu
Objective The video surveillance system of Shanghai urban rail transit faces challenges such as insufficient flexibility, poor scalability, and complex operation and maintenance. In response, a new network architecture for video surveillance system based
ZHANG Wankang
doaj   +1 more source

Offloading in P4 Switch Integrated with Multiple Virtual Network Function Servers

open access: yesJournal of Communications Software and Systems, 2023
Software Defined Networking (SDN) and Network Function Virtualization (NFV) are two transformative technologies that offer distinct benefits. SDN virtualizes the control plane by separating it from the data plane, while NFV virtualizes the data plane by ...
Farhin Faiza Neha   +3 more
doaj   +1 more source

The OLGIMA system for gastric cancer risk assessment. A useful method based on the histological Sydney consensus

open access: yesHistopathology, EarlyView.
The new OLGIMA method for histological gastric cancer risk assessment is based on the severity of glandular atrophy and intestinal metaplasia, in both antrum and corpus, according to the Updated Sydney classification. The highest score of either atrophy or intestinal metaplasia from each location will be used for the final OLGIMA stage.
Pedro Genaro Delgado Guillena   +125 more
wiley   +1 more source

Hierarchical Edge Computing

open access: yesМоделирование и анализ информационных систем, 2019
The computing paradigm based on the giant-like DC is replaced by a new paradigm. The urgency of this shift is caused by the requirements of new applications that actively use video, real-time interactivity, new mobile communication technologies, which ...
Ruslan L. Smeliansky
doaj   +1 more source

Home - About - Disclaimer - Privacy