Skip to Content
You are currently on the new version of our website. Access the old version .

86 Results Found

  • Article
  • Open Access
7 Citations
2,544 Views
18 Pages

8 January 2024

Cloud computing has gained widespread recognition for facilitating myriad online services and applications. However, the current stages of commercial cloud computing employ a moderate design, wherein computational resources like storage and servers a...

  • Article
  • Open Access
2 Citations
3,058 Views
17 Pages

The fast expansion of cloud computing has raised carbon emissions and energy usage in cloud data centers, so creative solutions for sustainable resource management are more necessary. This work presents a new algorithm—Carbon-Aware, Energy-Effi...

  • Article
  • Open Access
15 Citations
8,610 Views
17 Pages

Cloud vendors offer a variety of serverless technologies promising high availability and dynamic scaling while reducing operational and maintenance costs. One such technology, serverless computing, or function-as-a-service (FaaS), is advertised as a...

  • Article
  • Open Access
3 Citations
2,742 Views
18 Pages

Experiments and Evaluation of a Container Migration Data-Auditing System on Edge Computing Environment

  • Toshihiro Uchibayashi,
  • Bernady Apduhan,
  • Takuo Suganuma and
  • Masahiro Hiji

27 January 2023

With the proliferation of IoT sensors and devices, storing collected data in the cloud has become common. A wide variety of data with different purposes and forms are not directly stored in the cloud but are sent to the cloud via edge servers. At the...

  • Article
  • Open Access
19 Citations
3,607 Views
21 Pages

30 September 2021

With the emergence of virtualization technology, Network Function Virtualization (NFV) and Software Defined Networking (SDN) make the network function abstract from the hardware and allow it to be run on virtual machines. These technologies can help...

  • Article
  • Open Access
2 Citations
1,332 Views
20 Pages

4 December 2024

The current cybersecurity ecosystem is proving insufficient in today’s increasingly sophisticated cyber attacks. Malware authors and intruders have pursued innovative avenues to circumvent emulated monitoring systems (EMSs) such as honeypots, v...

  • Article
  • Open Access
5 Citations
6,506 Views
16 Pages

Virtualization vs. Containerization, a Comparative Approach for Application Deployment in the Computing Continuum Focused on the Edge

  • Hamish Sturley,
  • Augustin Fournier,
  • Andoni Salcedo-Navarro,
  • Miguel Garcia-Pineda and
  • Jaume Segura-Garcia

19 November 2024

With the emergence of containerization 10 years ago, we saw a compact, convenient and portable way of running apps directly concurrently with virtualization. The major difference is in the architecture. Containers share the same kernel as the guest a...

  • Article
  • Open Access
1 Citations
1,244 Views
27 Pages

On the Use of Containers for LoRaWAN Node Virtualization: Practice and Performance Evaluation

  • Hossein Khalilnasl,
  • Paolo Ferrari,
  • Alessandra Flammini and
  • Emiliano Sisinni

This paper investigates the virtualization of LoRaWAN end nodes through Linux containers (LXCs) to improve scalability, flexibility, and resource management. By leveraging lightweight Docker-based virtualization, we break down the core functions of t...

  • Review
  • Open Access
37 Citations
14,084 Views
30 Pages

We describe self-organizing network (SON) concepts and architectures and their potential to play a central role in 5G deployment and next-generation networks. Our focus is on the basic SON use case applied to radio access networks (RAN), which is sel...

  • Article
  • Open Access
1,957 Views
14 Pages

MixNN: A Design for Protecting Deep Learning Models

  • Chao Liu,
  • Hao Chen,
  • Yusen Wu and
  • Rui Jin

28 October 2022

In this paper, we propose a novel design, called MixNN, for protecting deep learning model structure and parameters since the model consists of several layers and each layer contains its own structure and parameters. The layers in a deep learning mod...

  • Article
  • Open Access
7 Citations
2,926 Views
17 Pages

13 April 2021

Network function virtualization (NFV) is a key technology to decouple hardware device and software function. Several virtual network functions (VNFs) combine into a function sequence in a certain order, that is defined as service function chain (SFC)...

  • Article
  • Open Access
20 Citations
4,885 Views
21 Pages

ATARI: A Graph Convolutional Neural Network Approach for Performance Prediction in Next-Generation WLANs

  • Paola Soto,
  • Miguel Camelo,
  • Kevin Mets,
  • Francesc Wilhelmi,
  • David Góez,
  • Luis A. Fletscher,
  • Natalia Gaviria,
  • Peter Hellinckx,
  • Juan F. Botero and
  • Steven Latré

24 June 2021

IEEE 802.11 (Wi-Fi) is one of the technologies that provides high performance with a high density of connected devices to support emerging demanding services, such as virtual and augmented reality. However, in highly dense deployments, Wi-Fi performa...

  • Article
  • Open Access
1,046 Views
21 Pages

13 May 2025

With the continuous expansion of application scenarios for cloud computing, large-scale service deployments in cloud data centers are accompanied by a significant increase in resource consumption. Virtual machines (VMs) in data centers are allocated...

  • Article
  • Open Access
5 Citations
6,660 Views
20 Pages

Traditional hypervisor-assisted virtualization is a leading virtualization technology in data centers, providing cost savings (CapEx and OpEx), high availability, and disaster recovery. However, its inherent overhead may hinder performance and seems...

  • Review
  • Open Access
47 Citations
7,941 Views
20 Pages

Virtual Inertia Control Methods in Islanded Microgrids

  • Vjatseslav Skiparev,
  • Ram Machlev,
  • Nilanjan Roy Chowdhury,
  • Yoash Levron,
  • Eduard Petlenkov and
  • Juri Belikov

11 March 2021

Although the deployment and integration of isolated microgrids is gaining widespread support, regulation of microgrid frequency under high penetration levels of renewable sources is still being researched. Among the numerous studies on frequency stab...

  • Article
  • Open Access
9 Citations
6,276 Views
20 Pages

13 October 2023

Kubernetes, known for its versatility in infrastructure management, rapid scalability, and ease of deployment, makes it an excellent platform for edge computing. However, its native scheduling algorithm struggles with load balancing, especially durin...

  • Review
  • Open Access
32 Citations
9,749 Views
26 Pages

Machine Learning-Based Anomaly Detection in NFV: A Comprehensive Survey

  • Sehar Zehra,
  • Ummay Faseeha,
  • Hassan Jamil Syed,
  • Fahad Samad,
  • Ashraf Osman Ibrahim,
  • Anas W. Abulfaraj and
  • Wamda Nagmeldin

5 June 2023

Network function virtualization (NFV) is a rapidly growing technology that enables the virtualization of traditional network hardware components, offering benefits such as cost reduction, increased flexibility, and efficient resource utilization. Mor...

  • Article
  • Open Access
33 Citations
5,287 Views
13 Pages

Data Twin-Driven Cyber-Physical Factory for Smart Manufacturing

  • Jung-Sing Jwo,
  • Cheng-Hsiung Lee and
  • Ching-Sheng Lin

7 April 2022

Because of the complex production processes and technology-intensive operations that take place in the aerospace and defense industry, introducing Industry 4.0 into the manufacturing processes of aircraft composite materials is inevitable. Digital Tw...

  • Review
  • Open Access
59 Citations
14,263 Views
39 Pages

15 February 2022

Network slicing has become a fundamental property for next-generation networks, especially because an inherent part of 5G standardisation is the ability for service providers to migrate some or all of their network services to a virtual network infra...

  • Review
  • Open Access
16 Citations
7,097 Views
22 Pages

6 May 2020

The emerging 5G applications and the connectivity of billions of devices have driven the investigation of multi-domain heterogeneous converged optical networks. To support emerging applications with their diverse quality of service requirements, netw...

  • Article
  • Open Access
12 Citations
6,563 Views
25 Pages

Semantic Agent-Based Service Middleware and Simulation for Smart Cities

  • Ming Liu,
  • Yang Xu,
  • Haixiao Hu and
  • Abdul-Wahid Mohammed

21 December 2016

With the development of Machine-to-Machine (M2M) technology, a variety of embedded and mobile devices is integrated to interact via the platform of the Internet of Things, especially in the domain of smart cities. One of the primary challenges is tha...

  • Feature Paper
  • Article
  • Open Access
21 Citations
3,273 Views
22 Pages

GWO-Based Simulated Annealing Approach for Load Balancing in Cloud for Hosting Container as a Service

  • Manoj Kumar Patra,
  • Sanjay Misra,
  • Bibhudatta Sahoo and
  • Ashok Kumar Turuk

2 November 2022

Container-based virtualization has gained significant popularity in recent years because of its simplicity in deployment and adaptability in terms of cloud resource provisioning. Containerization technology is the recent development in cloud computin...

  • Article
  • Open Access
28 Citations
5,285 Views
13 Pages

Multi-Agent Team Learning in Virtualized Open Radio Access Networks (O-RAN)

  • Pedro Enrique Iturria-Rivera,
  • Han Zhang,
  • Hao Zhou,
  • Shahram Mollahasani and
  • Melike Erol-Kantarci

19 July 2022

Starting from the concept of the Cloud Radio Access Network (C-RAN), continuing with the virtual Radio Access Network (vRAN) and most recently with the Open RAN (O-RAN) initiative, Radio Access Network (RAN) architectures have significantly evolved i...

  • Article
  • Open Access
5 Citations
3,011 Views
18 Pages

14 December 2021

In Infrastructure-as-a-Service (IaaS) clouds, the development process of a ready-to-use and reliable infrastructure might be a complex task due to the interconnected and dependent services that are deployed (and operated later on) in a concurrent way...

  • Review
  • Open Access
65 Citations
14,279 Views
27 Pages

A Comprehensive Review on a Virtual-Synchronous Generator: Topologies, Control Orders and Techniques, Energy Storages, and Applications

  • Myada Shadoul,
  • Razzaqul Ahshan,
  • Rashid S. AlAbri,
  • Abdullah Al-Badi,
  • Mohammed Albadi and
  • Mohsin Jamil

10 November 2022

In recent years, the penetration of renewable power generations into the electrical grid has substantially increased. Continuous deployment of power electronic-based distributed generations and the reduction of traditional synchronous machines with t...

  • Article
  • Open Access
6 Citations
4,599 Views
17 Pages

Design and Optimization of an Active Leveling System Actuator for Lunar Lander Application

  • Raffaele Manca,
  • Marco Puliti,
  • Salvatore Circosta,
  • Renato Galluzzi,
  • Sergio Salvatore and
  • Nicola Amati

13 September 2022

This work proposes a systematic methodology for designing an active leveling system (ALS) actuator for lunar landing application. The ALS actuator is integrated into an inverted tripod leg layout, exploiting a honeycomb crushable damper as a shock ab...

  • Article
  • Open Access
23 Citations
5,499 Views
48 Pages

Extending TOSCA for Edge and Fog Deployment Support

  • Andreas Tsagkaropoulos,
  • Yiannis Verginadis,
  • Maxime Compastié,
  • Dimitris Apostolou and
  • Gregoris Mentzas

The emergence of fog and edge computing has complemented cloud computing in the design of pervasive, computing-intensive applications. The proximity of fog resources to data sources has contributed to minimizing network operating expenditure and has...

  • Article
  • Open Access
1,280 Views
25 Pages

Analysis of a Driving Simulator’s Steering System for the Evaluation of Autonomous Vehicle Driving

  • Juan F. Dols,
  • Samuel Boix,
  • Jaime Molina,
  • Sara Moll,
  • Francisco J. Camacho and
  • Griselda López

20 October 2025

The integration of autonomous vehicles (AVs) into road transport requires robust experimental tools to analyze the human–machine interaction, particularly under conditions of system disengagement. This study presents the primary controls calibr...

  • Article
  • Open Access
24 Citations
7,180 Views
24 Pages

Software-Defined Vehicular Cloud Networks: Architecture, Applications and Virtual Machine Migration

  • Lionel Nkenyereye,
  • Lewis Nkenyereye,
  • Bayu Adhi Tama,
  • Alavalapati Goutham Reddy and
  • JaeSeung Song

17 February 2020

Cloud computing supports many unprecedented cloud-based vehicular applications. To improve connectivity and bandwidth through programmable networking architectures, Software- Defined (SD) Vehicular Network (SDVN) is introduced. SDVN architecture enab...

  • Review
  • Open Access
39 Citations
10,072 Views
29 Pages

19 October 2022

The advancing applications based on machine learning and deep learning in communication networks have been exponentially increasing in the system architectures of enabled software-defined networking, network functions virtualization, and other wired/...

  • Article
  • Open Access
29 Citations
14,036 Views
25 Pages

Blueprinting Approach in Support of Cloud Computing

  • Dinh Khoa Nguyen,
  • Francesco Lelli,
  • Mike P. Papazoglou and
  • Willem-Jan Van den Heuvel

21 March 2012

Current cloud service offerings, i.e., Software-as-a-service (SaaS), Platform-as-a-service (PaaS) and Infrastructure-as-a-service (IaaS) offerings are often provided as monolithic, one-size-fits-all solutions and give little or no room for customizat...

  • Article
  • Open Access
8 Citations
3,470 Views
22 Pages

11 August 2023

The symmetry between customer expectations and operator goals, on one hand, and the digital transition of the railways, on the other hand, is one of the main factors affecting green transport sustainability. The European Train Control System (ETCS) w...

  • Review
  • Open Access
97 Citations
15,671 Views
28 Pages

ML-Based 5G Network Slicing Security: A Comprehensive Survey

  • Ramraj Dangi,
  • Akshay Jadhav,
  • Gaurav Choudhary,
  • Nicola Dragoni,
  • Manas Kumar Mishra and
  • Praveen Lalwani

Fifth-generation networks efficiently support and fulfill the demands of mobile broadband and communication services. There has been a continuing advancement from 4G to 5G networks, with 5G mainly providing the three services of enhanced mobile broad...

  • Editorial
  • Open Access
426 Views
44 Pages

12 January 2026

This paper provides a comprehensive overview of mobile network softwarization, emphasizing the technological foundations and its transformative impact on the energy efficiency of modern and future mobile networks. In the paper, a detailed analysis of...

  • Feature Paper
  • Article
  • Open Access
23 Citations
5,352 Views
15 Pages

Virtualizing AI at the Distributed Edge towards Intelligent IoT Applications

  • Claudia Campolo,
  • Giacomo Genovese,
  • Antonio Iera and
  • Antonella Molinaro

Several Internet of Things (IoT) applications are booming which rely on advanced artificial intelligence (AI) and, in particular, machine learning (ML) algorithms to assist the users and make decisions on their behalf in a large variety of contexts,...

  • Article
  • Open Access
1 Citations
1,612 Views
24 Pages

3 June 2025

This paper presents a simulation approach for mobile robots designed to operate within networks intended for emergency response scenarios. The simulation component is part of a broader and more complex system architecture focused on enhancing communi...

  • Article
  • Open Access
34 Citations
5,226 Views
18 Pages

Flexible Framework to Model Industry 4.0 Processes for Virtual Simulators

  • Kiara Ottogalli,
  • Daniel Rosquete,
  • Aiert Amundarain,
  • Iker Aguinaga and
  • Diego Borro

20 November 2019

Virtual reality (VR)- and augmented reality (AR)-based simulations are key technologies in Industry 4.0 which allow for testing and studying of new processes before their deployment. A simulator of industrial processes needs a flexible way in which t...

  • Article
  • Open Access
8 Citations
4,227 Views
37 Pages

Integration of Machine Learning-Based Attack Detectors into Defensive Exercises of a 5G Cyber Range

  • Alberto Mozo,
  • Antonio Pastor,
  • Amit Karamchandani,
  • Luis de la Cal,
  • Diego Rivera and
  • Jose Ignacio Moreno

14 October 2022

Cybercrime has become more pervasive and sophisticated over the years. Cyber ranges have emerged as a solution to keep pace with the rapid evolution of cybersecurity threats and attacks. Cyber ranges have evolved to virtual environments that allow va...

  • Article
  • Open Access
3 Citations
2,878 Views
14 Pages

Digital Twin-Based Vibration Monitoring of Plant Factory Transplanting Machine

  • Kaikang Chen,
  • Bo Zhao,
  • Yanli Zhang,
  • Liming Zhou,
  • Kang Niu,
  • Xin Jin,
  • Bingbing Xu,
  • Yanwei Yuan and
  • Yongjun Zheng

9 November 2023

In response to the problem of bowl seedling detachment caused by the shaking of the transplanting machine in plant factories, this paper proposes a physical entity monitoring method for the digital twin (DT) plant factory transplanting system. The me...

  • Review
  • Open Access
168 Views
23 Pages

Artificial Intelligence in Veterinary Education: Preparing the Workforce for Clinical Applications in Diagnostics and Animal Health

  • Esteban Pérez-García,
  • Ana S. Ramírez,
  • Miguel Ángel Quintana-Suárez,
  • Magnolia M. Conde-Felipe,
  • Conrado Carrascosa,
  • Inmaculada Morales,
  • Juan Alberto Corbera,
  • Esther SanJuan and
  • Jose Raduan Jaber

12 February 2026

Artificial intelligence (AI), including machine learning (ML) and deep learning (DL), is rapidly transforming clinical veterinary practice by enhancing diagnostics, disease surveillance and decision support processes across animal health domains. The...

  • Article
  • Open Access
7 Citations
3,973 Views
12 Pages

Simulating and Evaluating a Real-World ElasticSearch System Using the RECAP DES Simulator

  • Malika Bendechache,
  • Sergej Svorobej,
  • Patricia Takako Endo,
  • Adrian Mihai and
  • Theo Lynn

Simulation has become an indispensable technique for modelling and evaluating the performance of large-scale systems efficiently and at a relatively low cost. ElasticSearch (ES) is one of the most popular open source large-scale distributed data inde...

  • Article
  • Open Access
35 Citations
9,548 Views
36 Pages

Enhancing Network Slicing Security: Machine Learning, Software-Defined Networking, and Network Functions Virtualization-Driven Strategies

  • José Cunha,
  • Pedro Ferreira,
  • Eva M. Castro,
  • Paula Cristina Oliveira,
  • Maria João Nicolau,
  • Iván Núñez,
  • Xosé Ramon Sousa and
  • Carlos Serôdio

The rapid development of 5G networks and the anticipation of 6G technologies have ushered in an era of highly customizable network environments facilitated by the innovative concept of network slicing. This technology allows the creation of multiple...

  • Review
  • Open Access
529 Views
45 Pages

21 January 2026

Fault diagnosis is a core technology ensuring the safe and efficient operation of industrial systems. A paradigm shift has been observed wherein traditional signal analysis has been replaced by intelligent, algorithm-driven approaches. In recent year...

  • Article
  • Open Access
8 Citations
4,833 Views
15 Pages

7 November 2019

Digital tools have become indispensable for the testing and modification of prototypes in mobile and industrial machine manufacturing. Data that are extracted from virtual experimentation and analysis are both affordable and valuable, due to their re...

  • Review
  • Open Access
31 Citations
11,068 Views
22 Pages

29 June 2022

Fifth-generation (5G) and beyond networks are envisioned to serve multiple emerging applications having diverse and strict quality of service (QoS) requirements. To meet ultra-reliable and low latency communication, real-time data processing and mass...

  • Article
  • Open Access
39 Citations
7,024 Views
20 Pages

29 October 2020

The Industry 4.0 revolution envisions fully interconnected scenarios in the manufacturing industry to improve the efficiency, quality, and performance of the manufacturing processes. In parallel, the consolidation of 5G technology is providing substa...

  • Article
  • Open Access
10 Citations
4,494 Views
13 Pages

Latency Analysis of Blockchain-Based SSI Applications

  • Tamas Pflanzner,
  • Hamza Baniata and
  • Attila Kertesz

29 September 2022

Several revolutionary applications have been built on the distributed ledgers of blockchain (BC) technology. Besides cryptocurrencies, many other application fields can be found in smart systems exploiting smart contracts and Self Sovereign Identity...

  • Article
  • Open Access
5 Citations
3,494 Views
16 Pages

Simulating IoT Workflows in DISSECT-CF-Fog

  • Andras Markus,
  • Ali Al-Haboobi,
  • Gabor Kecskemeti and
  • Attila Kertesz

23 January 2023

The modelling of IoT applications utilising the resources of cloud and fog computing is not straightforward because they have to support various trigger-based events that make human life easier. The sequence of tasks, such as performing a service cal...

  • Article
  • Open Access
16 Citations
4,842 Views
28 Pages

17 January 2022

A common challenge among internal combustion engine (ICE) manufacturers is shortening the development time while facing requirements and specifications that are becoming more complex and border in scope. Virtual simulation and calibration are effecti...

  • Article
  • Open Access
306 Views
16 Pages

A Deep Reinforcement Learning-Based Approach for Bandwidth-Aware Service Function Chaining

  • Yan-Jing Wu,
  • Shi-Hao Hwang,
  • Wen-Shyang Hwang and
  • Ming-Hua Cheng

Network function virtualization (NFV) is an emerging technology that is gaining popularity for network function migration. NFV converts a network function from a dedicated hardware device into a virtual network function (VNF), thereby improving the a...

of 2