Results 41 to 50 of about 1,018,999 (294)

Security-aware Service Function Chain Deployment Method Based on Deep ReinforcementLearning [PDF]

open access: yesJisuanji kexue
As a key technology to improve the utilization of network resources,service function chain combined with deep reinforcement learning makes it possible to achieve flexible and secure deployment.However,how to effectively deploy service function chains ...
ZHU Ziyi, ZHANG Jianhui, ZENG Junjieand ZHANG Hongyuan
doaj   +1 more source

Deep Learning for Service Function Chain Provisioning in Fog Computing

open access: yesIEEE Access, 2020
Cloud and fog computing along with network function virtualization technology have significantly shifted the development of network architectures.
Nazli Siasi   +3 more
doaj   +1 more source

Analysis and Computation of the Joint Queue Length Distribution in a FIFO Single-Server Queue with Multiple Batch Markovian Arrival Streams [PDF]

open access: yes, 2014
This paper considers a work-conserving FIFO single-server queue with multiple batch Markovian arrival streams governed by a continuous-time finite-state Markov chain.
Masuyama, Hiroyuki, Takine, Tetsuya
core   +1 more source

Conserved structural motifs in PAS, LOV, and CRY proteins regulate circadian rhythms and are therapeutic targets

open access: yesFEBS Letters, EarlyView.
Cryptochrome and PAS/LOV proteins play intricate roles in circadian clocks where they act as both sensors and mediators of protein–protein interactions. Their ubiquitous presence in signaling networks has positioned them as targets for small‐molecule therapeutics. This review provides a structural introduction to these protein families.
Eric D. Brinckman   +2 more
wiley   +1 more source

Performance measurement in the service business: the facilities management function [PDF]

open access: yes, 2005
The nature of performance measurement has changed over the past few decades. Generally performance measurement indicates successful management in the fulfilment of organisation goals.
Alias, Buang   +2 more
core  

A linear chained approach for service invocation in IP multimedia subsystem. [PDF]

open access: yes, 2012
IP Multimedia Subsystem (IMS) is considered to provide multimedia services to users through an IP-based control plane. The current IMS service invocation mechanism, however, requires the Serving-Call Session Control Function (S-CSCF) invokes each ...
Buono   +14 more
core   +2 more sources

In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS

open access: yesFEBS Letters, EarlyView.
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka   +11 more
wiley   +1 more source

Improved grey wolf optimization algorithm based service function chain mapping algorithm

open access: yesDianxin kexue, 2022
With the rise of new Internet applications such as the industrial Internet, the Internet of vehicles, and the metaverse, the network’s requirements for low latency, reliability, security, and certainty are facing severe challenges.In the process of ...
Yue ZHANG   +4 more
doaj   +2 more sources

Service Function Chain Design and Mapping Algorithm Based on VNF Combination [PDF]

open access: yesJisuanji gongcheng, 2020
In order to optimize the design and mapping of service function chains in Network Function Virtualization (NFV) and improve the utilization of physical resources,this paper proposes a service function chain design and mapping algorithm A-VNFC based on ...
ZHU Guohui, LIU Lu, LEI Lanjie
doaj   +1 more source

Cell wall target fragment discovery using a low‐cost, minimal fragment library

open access: yesFEBS Letters, EarlyView.
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy