Topic Review
Enhancing VNF Instantiation with Blockchain
In the realm of Network Function Virtualization (NFV), Virtual Network Functions (VNFs) are crucial software entities that require execution on virtualized hardware infrastructure. Deploying a Service Function Chain (SFC) requires multiple steps for instantiating VNFs to analyze, request, deploy, and monitor resources. It is well recognized that the sharing of infrastructure resources among different VNFs will enhance resource utilization. However, conventional mechanisms for VNF sharing often neglect the interests of both VNF instances and infrastructure providers.
  • 220
  • 12 Dec 2023
Topic Review
Foreign Language Learning in Virtual Reality
With the widespread application of virtual reality (VR) in education, optimizing foreign language learning in VR has become a focal point of research.
  • 199
  • 06 Dec 2023
Topic Review
Spatial Keyword Group Query
Location-based services have been commonly used in daily life. Spatial keyword query, as one of the important technologies in location-based services, has been widely used in many fields, such as intelligent navigation systems and spatial positioning systems. Different types of spatial keyword query problems have been studied in depth by scholars.
  • 181
  • 24 Nov 2023
Topic Review
Performance Analysis of Wired Software-Defined Networking Networks
The Software-Defined Networking (SDN) paradigm is one that is utilized frequently in data centers. Software-Defined Wireless Networking, often known as SDWN, refers to an environment in which concepts from SDN are implemented in wireless networks. The SDWN is struggling with challenges of scalability and performance as a result of the growing number of wireless networks in its coverage area. It is thought that SDN techniques, such as Mininet-Wi-Fi and Ryu Controller for wireless networks, can overcome the problems with scalability and performance. 
  • 113
  • 21 Nov 2023
Topic Review
Video Blockchain
Researchers explore video blockchain for establishing connectivity among vehicles in a smart city through utilizing blockchain technology.
  • 110
  • 17 Nov 2023
Topic Review
Random Neighbor-Based Differential Evolution
Symmetry in a differential evolution (DE) transforms a solution without impacting the family of solutions. For symmetrical problems in differential equations, DE is a strong evolutionary algorithm that provides a powerful solution to resolve global optimization problems. DE/best/1 and DE/rand/1 are the two most commonly used mutation strategies in DE. The former provides better exploitation while the latter ensures better exploration. DE/Neighbor/1 is an improved form of DE/rand/1 to maintain a balance between exploration and exploitation which was used with a random neighbor-based differential evolution (RNDE) algorithm.
  • 130
  • 03 Nov 2023
Topic Review
Mobile Government Services Adoption in the Egyptian Context
Customers are increasingly using mobile devices to locate merchants, conduct product research, make purchases, and manage their accounts. Mobile value-added services (VAS) is a term for services that are not included in standard phone plans and that must be purchased or downloaded separately by the end user. 
  • 159
  • 23 Oct 2023
Topic Review
Regenerating Code in Cloud Storage System
Cloud storage is an indispensable part of cloud computing solutions and the security of its stored data has become a key issue in the research and application of cloud storage systems.
  • 118
  • 26 Sep 2023
Topic Review
Malicious PDF Document Detection Methods
In network attacks based on malicious documents, the PDF document type accounts for a large proportion. Traditional PDF document detection technology usually builds a rule or feature library for specific vulnerabilities and therefore is only fit for single detection targets and lacks anti-detection ability.
  • 101
  • 15 Sep 2023
Topic Review
Metaheuristic Approach for University Course Timetabling Problems
The university course timetabling problem (UCTP) is a multidimensional assignment problem that involves assigning students and teachers to events (or courses), which are then allocated to appropriate timeslots and rooms. The UCTP can be categorized into two categories: post-enrollment-based course timetabling problems (PE-CTPs) and curriculum-based course timetabling problems (CB-CTPs). 
  • 208
  • 09 Aug 2023
  • Page
  • of
  • 14