Results 61 to 70 of about 7,921 (184)
Optimal Orchestration of Virtual Network Functions [PDF]
-The emergence of Network Functions Virtualization (NFV) is bringing a set of novel algorithmic challenges in the operation of communication networks. NFV introduces volatility in the management of network functions, which can be dynamically orchestrated,
Addis, Bernardetta +3 more
core +1 more source
ABSTRACT Circular economy practices are increasingly recognized as strategic approaches to enhance competitiveness and sustainability. However, the transition to circular business models, particularly concerning internal capabilities and environmental dynamics in small‐ and medium‐sized enterprises (SMEs), has not been sufficiently explored. This study
I. Wayan Edi Arsawan +3 more
wiley +1 more source
Dietary DNA Metabarcoding From Animal Fecal Samples
Abstract Fecal DNA metabarcoding is a powerful tool for examining animal diets with unprecedented resolution, offering insights into ecological patterns shaped by trophic interactions. As a result, dietary metabarcoding has become widely applied across ecology, evolution, behavior, and conservation.
Rachel D. McConnell +6 more
wiley +1 more source
ABSTRACT The signal intensities of linear and star‐shaped poly(L‐lactides) (PLA) and poly (ethylene oxides) (PEO) were compared to determine the influence of the number of arms on the ionization in matrix‐assisted laser desorption/ionization time‐of‐flight (MALDI‐TOF) mass spectrometry. In this study, a variety of blends were prepared and investigated,
Mete‐Sungur Dalgic +2 more
wiley +1 more source
An Energy-driven Network Function Virtualization for Multi-domain Software Defined Networks
Network Functions Virtualization (NFV) in Software Defined Networks (SDN) emerged as a new technology for creating virtual instances for smooth execution of multiple applications. Their amalgamation provides flexible and programmable platforms to utilize
Ahmed, Syed Hassan +5 more
core +1 more source
Enhancing E‐Commerce Security Based on Involution Function Using Twin Key AES Cipher
In the realm of surging e‐commerce data and increasing digital transactions, ensuring end‐to‐end security is paramount to protect sensitive information and maintain user trust. The Advanced Encryption Standard (AES), a cornerstone of network security, relies on symmetric key encryption for secure communication.
Biresh Kumar +11 more
wiley +1 more source
Impact of Processing-Resource Sharing on the Placement of Chained Virtual Network Functions
Network Function Virtualization (NFV) provides higher flexibility for network operators and reduces the complexity in network service deployment. Using NFV, Virtual Network Functions (VNF) can be located in various network nodes and chained together in a
Savi, Marco +2 more
core +1 more source
Endothelial cells under oxidative stress and inflammation are vital contributors to the progression of atherosclerosis. Although Orientin possesses antioxidant and anti‐inflammatory activities, the effects of Orientin on oxidized low‐density lipoprotein and high glucose (ox‐LDL/HG)–triggered endothelial cell injury and diabetes‐accelerated ...
Qi Li +11 more
wiley +1 more source
Network function virtualization (NFV) has become an emerging issue in both academia and industry. By outsourcing network functions from dedicated hardware to virtualization platform, NFV promises to significantly improve the scalability and flexibility ...
Hang Li +4 more
doaj +1 more source
Scheduling Method of Virtual Network Function Based on Q-learning [PDF]
Most of the existing scheduling methods do not consider the virtual machine selection problem of the virtual network function in the instantiation process,a new virtual network scheduling method is proposed.It establishes virtual network function ...
WANG Xiaolei,CHEN Yunjie,WANG Chen,NIU Ben
doaj +1 more source

