Abstract
With the expansion of the Internet, network functions and requirements are becoming more varied. To solve this problem, cloud computing adopts virtualization technology and refers to virtual network function migration to improve network adaptability. However, issues such as resource overload and inefficient migration still exist. Given this, the article proposes a bandwidth-aware virtual network migration algorithm. It combines the risk avoidance simulation learning algorithm with the good and bad distance solution method and applies it to the cloud computing virtual environment. The algorithm monitors bandwidth usage in real-time, identifying potential bottlenecks and considering both resource utilization and bandwidth availability when determining whether to migrate virtual machines. This approach avoids performance degradation due to bandwidth limits. The results showed that the algorithm outperformed others, achieving optimal performance in just 102 iterations and excelling in resource occupancy, utilization, load balancing, migration costs, average migration quantity, latency, and task completion time. This has enabled cloud providers to manage data center network resources in a more efficient manner, thereby enhancing operational efficiency, reducing costs, and delivering more stable and reliable cloud services, which hold significant practical and market value.
1 Introduction
With the development of the Internet, the Internet of Things technology has also developed, and different fields have gradually developed specialized network requirements. For example, in autonomous driving, extremely low communication delay is required. In manufacturing, it is necessary to minimize packet loss rate and latency as much as possible. In online video interconnection, it is necessary to have the highest possible bandwidth [1,2]. Typically, conventional single-standard networks are only capable of fulfilling one or a few of the desired requirements. Consequently, networks with multiple requirements necessitate the integration of multiple single-standard networks. Considering the network needs of users, integrating and utilizing network resources to achieve intelligent adaptation of the network and providing targeted network services for users is an important research direction in future network development [3]. Upgrading traditional network architectures is difficult to adapt to new network requirements. Cloud computing virtualization technology is proposed, and the concept of network slicing proposed by network operators can better meet current needs [4]. The construction of a network function service chain through the utilization of network functions virtualization (NFV) technology subsequently facilitates the instantiation of the service chain as a network instance, thereby meeting the corresponding network requirements [5]. Cloud computing technology is a mode of providing computing resources and data storage services through the Internet. Users do not need to own physical hardware to access servers, storage, and applications over the network. The most prevalent application of cloud computing is in machine learning. In this context, cloud computing provides high-performance computing resources and extensive data set storage, enabling enterprises to train intricate machine learning models at a reduced cost. However, cloud computing services mainly rely on the network. In a virtualized environment, the increase in the number of virtual machines may have a negative impact on network bandwidth and latency. The instability of network operation further affects the performance of cloud computing. Concurrently, the implementation of virtualization technology introduces supplementary overhead, including scheduling, resource allocation, and sharing issues at the virtualization layer. These often result in load imbalance. Therefore, this study proposes a virtual network function (VNF) transfer technology based on a bandwidth resource-aware transfer algorithm. The purpose is to further optimize the application effect of cloud computing virtualization technology, achieve more efficient resource management, and promote overall load balancing. The innovation of this research has two points. The first point is to build a virtual network migration model by combining risk aversion simulation learning (RASL) resource awareness and the TOPSIS algorithm. The second point is the introduction of a preventive strategy and a responsive strategy, which reduces the average number of system migrations and reduces migration costs. This study is separated into four parts. The contribution of this research mainly includes two aspects. First, the performance of the cloud computing platform is optimized, and the response speed and concurrency capability of the system are improved. Second, by realizing dynamic resource allocation, the cloud computing platform resource waste and the overall energy consumption are reduced. The first part summarizes and elaborates on relevant research. The second part proposes a bandwidth resource-aware migration algorithm for existing problems. The third part verifies the algorithm proposed in this study. The fourth part is a research summary.
2 Related works
With the boost and maturity of cloud computing virtualization technology, NFV technology has emerged. NFV technology can achieve flexible network deployment and has strong scalability. However, there is a problem of network node resource overload during its application, so researchers have proposed the VNF migration technology. VNF migration technology achieves the virtualization of network functions by deploying traditional physical network resources in the data cloud in a virtual network environment. Yi et al. implemented a new service for business function chains using NFV technology and proposed a VNF migration method, which improved performance and balanced load [6]. Rui et al. proposed a virtual network migration method with reliability as the optimization objective while considering cost. This algorithm had a lower cost and reduced the negative impact caused by resource preemption [7]. Zhang et al. proposed an online delay migration adaptive interference perception algorithm to achieve real-time network changes and VNF migration with excellent reward performance [8]. Li et al. proposed an improved hybrid genetic evolutionary algorithm, which solved the VNF migration problem in dynamic networks, realized more flexible migration, and reduced network latency of different scales [9]. Shang et al. proposed a method to jointly prevent virtual network nodes and routing flows in response to the contradiction between cost and performance in the business function chain. This method ultimately reduced migration costs and prediction errors while maintaining accurate results [10]. Qu et al. studied the scalability of virtual network migration to address the issue of significant network load fluctuations and combined it with the perception of resource overload to reduce training losses [11]. Abdelaal et al. developed an integer linear programming method to simulate the deployment of virtual network migration and proposed a deployment heuristic algorithm considering the redundancy of virtual network migration. This algorithm reduced link utilization and bandwidth consumption [12]. Qu et al. proposed a multi-objective mixed integer optimization scheme to solve the problem of load changing over time in networks. Experiments showed that it reduced Time complexity and guaranteed delay [13].
There are various types of network services nowadays, and it is difficult to update existing services. Not only does it need to consider the issue of construction costs, but there are also compatibility issues between different network devices. Cloud computing virtualization technology is proposed, which allocates computing tasks in cloud resource pools, separates different storage and computing spaces, and completes different software services by combining different requirements. Cerveira et al. analyzed different fault data in virtualized servers and developed a recovery mechanism that can suspend servers due to frequent errors [14]. Rajakumari et al. proposed a fuzzy method based on an updated ant colony optimization algorithm with inertia weights and pheromone trajectories to extend task scheduling in cloud environments, minimize execution time and waiting time, and maximize resource utilization and task scheduling [15]. Eshratifar et al. proposed a self-developed engine to address the latency and energy consumption issues between mobile devices and cloud computing, reducing the load rate and computational load on cloud servers [16]. Badotra and Panda introduced software-defined networks in cloud computing, which increases the manageability of cloud computing as its scalability increases. They explored the importance, advantages, and improvement suggestions of software-defined networks [17]. To make educational activities more convenient and real-time, Trang has constructed a method of using cloud computing technology to achieve virtual classrooms, which has high efficiency and excellent results [18]. Sharma et al. proposed an optimization function to analyze the performance parameters of their developed queuing system. They also proposed two new encryption algorithms for the multi-user optimization problem faced by encrypted data storage in cloud computing. The research emphasized the importance of data from both storage and security perspectives [19]. Yang put forth a topology structure utilizing cluster networks for the analysis of resource utilization in cluster systems. This approach enabled real-time monitoring of resource utilization and load conditions, facilitating improvements in resource utilization and a reduction in system load [20].
The above results show that with the development of communication technology, the traditional network architecture model is no longer suitable for new and diverse needs. NFV technology saves the cost of dedicated network devices and greatly improves the dynamic adaptability of the network by deploying the network to cloud servers and then mapping it to general physical devices. Its shortcomings lie in the high cost of network resources, slow deployment and launch, high static investment, and dynamic operational costs. To solve the above problems, this study combines VNF migration pre-computation and real-time computing and proposes a bandwidth-aware migration algorithm. Then, it introduces the RASL algorithm and the multi-objective decision algorithm TOPSIS for comprehensive optimization, improving migration efficiency and reducing migration costs.
3 Cloud computing virtualization technology in view of bandwidth resource-aware migration algorithm
With the development of the network, traditional single-network architecture has become difficult to meet people’s needs [21]. Therefore, cloud computing virtualization technology has been proposed to achieve network adaptability by deploying nodes on virtual networks [22]. When the resources of the virtualization network reach the resource constraint threshold, VNF migration will be triggered [23,24]. The development of migration algorithms has been a prominent area of research to improve the efficiency of migration processes and reduce the occupation of resources during migration. This study proposes a migration algorithm for dynamic bandwidth resource perception from the perspective of bandwidth resource perception.
3.1 Construction of cloud computing virtualization technology in view of bandwidth resource perception migration algorithm
With the widespread application of related technologies, there are already examples of combining software-defined networks (SDN) and NFV to deploy network services onto common network hardware [25]. However, when SDN and NFV technology are mixed, there will be issues of uneven traffic and load. As shown in Figure 1, there are three regions in total, A-1, A-2, and A-3, each with corresponding network management centers. When a large amount of data flows into A-1, the number of connections rapidly increases, but at this time, the network does not make corresponding resource scheduling for this, and other idle resources are not utilized [26]. This leads to an imbalanced load on network nodes. Therefore, the dynamic deployment function of SDN is proposed to adaptively deploy network resources.

VNF migration diagram. Source: Created by the author.
Therefore, it is necessary to study the network function migration mentioned above. The migration process of VNF can essentially be understood as the redeployment of network architecture, which utilizes a programmable network management mode to dynamically migrate network nodes with resource loads. Dynamic network migration can balance the direct resource allocation in the network control domain. The deployment of VNF networks can be actively migrated according to changes in network business requirements [27]. The SDN control center can perform VNF migration given the location of network users, network QoS, and network QoE requirements, as shown in Figure 2.

VNF diagram. Source: Created by the author.
The first task is to model the multi-dimensional environment in the network and define the network using SDN and VNF technology, as shown in formula (1). In formula (1),
Meanwhile, in view of the resource usage of network nodes, a threshold is set, and the resource constraint threshold of a certain network node is calibrated to
In formula (2),
In formula (3),
If
In formula (5),
In formula (6),
In formula (7),

SFC deployment and composition. Source: Created by the author.
3.2 Optimization of cloud computing virtualization technology in view of bandwidth resource perception migration algorithm
During the migration process of VNF, there may be situations where the bandwidth is extremely high [28,29]. As shown in Figure 4, when the resources of node A exceed the threshold constraint limit, VNF migration is required. When the branch VNF1 of VNF needs to be migrated to node C, this migration will also cause SFC to migrate, further increasing bandwidth. The virtual infrastructure management network controller will reassign paths to SFC, and at this point, the additional bandwidth of the current link is 3.

VNF migration. Source: Created by the author.
At this time, there may be a situation of network traffic forwarding in the opposite direction on the link, and the network bandwidth will double at this time. Figure 5 shows the VNF migration situation. It is typical for multiple SFC chains to be necessary for the implementation of a VNF instance. This presents a scenario that warrants further examination. In a VNF migration network, a single VNF may be utilized by multiple SFCs, and the bandwidth of these SFCs may vary. However, they all adhere to a minimum constraint, and the aggregate additional bandwidth of the VNF migration and the original bandwidth must remain below the minimum bandwidth constraint of the SFC to which this VNF belongs. This study will further investigate and optimize the bandwidth constraints of a single SFC in VNF migration.

VNF migration overload. Source: Created by the author.
To reduce the migration cost of VNF and further enhance the dynamic flexibility of virtual network migration, this study proposes a bandwidth resource awareness method in view of pre-computing and real-time computing. This method combines this perception method for VNF transfer. This method can effectively reduce the computational cost of VNF migration and further reduce the number of network system migrations and the time cost during migration. The implementation process of the migration algorithm in view of the cooperation of migration pre-computing and real-time computing is shown in Figure 6.

Migration of predictive and real-time computing synergistic processes. Source: Created by the author.
Various resources on each node have corresponding thresholds. When the occupancy of a certain resource in the node exceeds the threshold, VNF migration is performed. It uses dynamic perception of the resource usage of each node to determine whether VNF migration is necessary. Therefore, the VNF migration algorithm is introduced into the RASL dynamic resource awareness algorithm. When the load of a certain resource is uneven, VNF migration is carried out in view of the type of resource that exceeds the limit. Nodes with more load can be migrated to destination nodes with idle resources. The calculation of network occupancy, storage occupancy, and network occupancy is shown in the following equation:
By utilizing bandwidth resource perception and setting the dynamic weight of RASL, the migration coefficient
In formula (9),
According to the constraint conditions of formula (10), the migration is carried out by selecting nodes with large remaining resources to ensure that resource overloading does not occur after the migration. It then uses the TOPSIS algorithm to balance the migration index during the process of selecting nodes for VNF migration. According to the definition of TOPSIS, the first is to calculate the positive ideal solution best-Node, as shown in the following equation:
According to formula (11), it calculates the minimum utilization rate of each resource in the selected node as the occupancy rate
After calculating the positive ideal solution and using it to obtain the maximum additional bandwidth
According to formula (13), combined with the RASL dynamic resource awareness algorithm for analysis, the maximum resource utilization rate on the VNF node to be migrated can be obtained. The resource utilization rate is taken as the occupancy rate
Finally, the Euclidean distance
In formula (15),
4 Evaluation of cloud computing virtualization technology in view of bandwidth resource-aware migration algorithms
To verify the effectiveness of the bandwidth resource-aware migration algorithm proposed in this study, the network of an ISP is taken as an example. The initial network nodes in the simulated network are set to be 100, each of which contains computer network resources, such as storage, network, and arithmetic. About 500 network links are generated based on these nodes. It uses a fixed weight algorithm, simple instant algorithm, and PRT algorithm to compare node migration performance with the RT algorithm (RASL&TOPSIS) proposed in this study. The comparison and expected benefits of several algorithms are shown in Table 1.
Comparison and characteristics of algorithms
Algorithm | The similarity with the RT algorithm | The difference with the RT algorithm | Characteristic |
---|---|---|---|
RT algorithm (RASL&TOPSIS) | — | — | To obtain the optimal migration scheme of the optimization target, but the complexity is high |
Fixed weight algorithm (FW) [30] | TOPSIS algorithm was adopted. | Traditional waiting for migration, no resource awareness | The computational complexity is reduced, and the computation cannot be accelerated |
Simple real-time algorithm (SR) [31] | RASL resource awareness was used | Nodes are selected with performance constraints | This reduces the complexity and system stability |
PRT algorithm (PRT) [32] | TOPSIS and RASL algorithms are adopted | A pre-calculation mechanism is used | Greatly reduce the migration calculation overhead |
First, it compares the convergence of the four algorithms, and the comparison results are shown in Figure 7. Figure 7 shows that the improved algorithm in this study can achieve the optimal target accuracy and loss value after training 102 times, which is 38 times less than the FW algorithm, 57 times less than the SR algorithm, and 19 times less than the PRT algorithm. This indicates that the convergence of the improved bandwidth resource-aware migration algorithm is superior to other algorithms.

Convergence of four algorithms: (a) error and (b) loss. Source: Created by the author.
Then, it compares the resource utilization and load balancing of the four algorithms. The results are shown in Figure 8. Figure 8 shows that with the increase of migration nodes, the improved bandwidth resource-aware migration algorithm has increased its resource utilization rate from 54 to 71%, leading by 7–17% relative to other algorithms. The improved algorithm in this study performs well in terms of load balancing. As the number of migrated nodes increases, its load balancing degree increases from 65 to 86%, leading by 6–19% relative to other algorithms. This indicates that the improved bandwidth resource-aware migration algorithm in this study performs well in terms of resource utilization and load balancing when used for node migration.

Resource usage and load balancing of four algorithms: (a) resource occupancy rate and (b) load balancing degree. Source: Created by the author.
It compares the average migration times and average migration costs of the four algorithms, and the results are shown in Figure 9. Figure 9 shows that the number of network function migrations and migration costs per unit system time increase with the increase of the number of network nodes. Due to the use of collaborative resource awareness and multi-objective decision-making in the RT algorithm, the migration decision of the RT algorithm is more comprehensive. Due to the introduction of the TOPSIS algorithm, every migration of the RT algorithm is the most effective, resulting in the best average migration quantity and migration cost. Compared with the FW algorithm, SR algorithm, and PRT algorithm, the average migration quantity has decreased by 17–28%, 12–19%, and 4–11%, respectively. Relative to the FW algorithm, SR algorithm, and PRT algorithm, the migration cost has decreased by 12–21%, 8–15%, and 5–9%, respectively.

Average number and cost of migration of four algorithms: (a) average number of migration and (b) average cost of migration. Source: Created by the author.
Then, it compares the energy consumption and latency of the four algorithms, and the results are shown in Figure 10. Figure 10 shows that as the number of migrated nodes increases, their energy consumption and latency also increase, but the overall performance of the RT algorithm is better. It indicates that the energy consumption of the RT algorithm is 21–32%, 14–21%, and 9–12% less than that of the FW algorithm, SR algorithm, and PRT algorithm, respectively. Its delay is shortened by 23–40%, 19–35%, and 15–21% relative to the FW algorithm, SR algorithm, and PRT algorithm, respectively. Therefore, in terms of energy consumption and latency, the RT algorithm proposed in this study can be more effectively applied in cloud computing virtualization.

Energy consumption and delay of four algorithms: (a) energy consumption and (b) delay. Source: Created by the author.
To demonstrate that the improved algorithm has better migration performance, the Cloudsim simulation tool is used to set random tasks. Furthermore, the resource utilization and task execution time of four algorithms are compared as a function of the number of tasks. The results are shown in Figure 11. Figure 11 shows that as the number of tasks increases, the task execution time increases and resource utilization decreases. The improved algorithm in this study has reduced task execution time by 4–8%, 3–7%, and 2–4% relative to the FW algorithm, SR algorithm, and PRT algorithm, respectively. Relative to the FW algorithm, SR algorithm, and PRT algorithm, the resource utilization rate has increased by 7–38%, 5–25%, and 2–18%, respectively.

Energy consumption and delay of four algorithms: (a) execution time and resource utilization rate. Source: Created by the author.
Finally, the total migration resource cost and migration completion time of the four algorithms are compared, and the results are shown in Figure 12. Figure 12 shows that as the number of migration nodes increases, the migration completion time also increases. The improved algorithm in this study has shortened the migration completion time by 23–56%, 19–27%, and 11–15% relative to the FW algorithm, SR algorithm, and PRT algorithm, respectively. In terms of overall resource expenditure, the improved algorithm in this study has reduced by 24–38%, 11–21%, and 5–9% relative to the FW algorithm, SR algorithm, and PRT algorithm, respectively. In summary, the comparison with the FW algorithm, SR algorithm, and PRT algorithm fully proves that the improved algorithm in this study performs well and can be effectively applied in cloud computing and virtualization.

Migration completion time and total overhead of four algorithms: (a) migration completion time and (b) total cost of migration. Source: Created by the author.
5 Conclusion
In the context of the increasingly diverse functions and requirements of the modern Internet, VNF migration technology has emerged to enhance the adaptive capabilities of cloud computing environments. However, the challenges of resource overload and low migration efficiency underscore the limitations of contemporary cloud virtualization technologies. Given this, an algorithm was introduced that amalgamates RASL with a superior–inferior solution distance method dedicated to improving the efficiency of cloud computing virtualization. This algorithm aimed to accurately locate bandwidth bottlenecks by continuously monitoring the network status within cloud data centers. It also combined the virtual machine migration decision-making process that considers the utilization of target host resources and network bandwidth availability. This ensured that performance did not degrade due to bandwidth constraints. Analysis of the data revealed that in terms of migration completion time, the proposed algorithm achieved a reduction of 23–56%, 19–27%, and 11–15% compared to the FW, SR, and PRT algorithms, respectively. Furthermore, it reduced the total resource expenditure by 24–38%, 11–21%, and 5–9% against the same benchmarks. The algorithm significantly enhanced the management efficiency of network resources within data centers for cloud service providers, optimizing the virtualization environment while reducing operational costs and improving the stability and reliability of cloud services. However, the proposed method still has some limitations; that is, it reduces the migration time to a certain extent, resulting in the increase of additional migration actions, which makes the server face greater pressure. Therefore, a heuristic search algorithm should be used in the future to reduce the migration action of the split to improve the efficiency of the algorithm. At the same time, the generalization of the algorithm is further enhanced, and the migration decision is dynamically adjusted through a more powerful mechanism, thereby improving the performance of the cloud computing platform.
-
Funding information: The author states no funding involved.
-
Authors contribution: The article proposes a bandwidth-aware virtual network migration algorithm. It combines the risk avoidance simulation learning algorithm with the good and bad distance solution method and applies it to the cloud computing virtual environment. Zhiwei Jin conducted experiments, recorded data, analyzed the results, and wrote a manuscript. Zhiwei Jin agreed to the published version of the manuscript.
-
Conflict of interest: The author states no conflict of interest.
-
Data availability statement: All data generated or analyzed during this study are included in this published article.
Appendix
All variable symbols
Variable symbols | Meanings |
---|---|
|
Set of nodes |
|
Set of links between nodes |
|
Threshold and calibrate the resource constraint threshold of a certain network node |
|
Node resource |
|
Computing resources owned by node
|
|
Storage resources owned by node
|
|
Link bandwidth between node
|
|
Whether VNF
|
|
Each functional chain |
|
Sum of its additional bandwidth |
|
Original bandwidth |
|
Minimum bandwidth constraint for each functional chain |
|
Core resources owned by node
|
|
Storage resources owned by node
|
|
Network resources required for VNF
|
|
Whether VNF
|
|
Using to identify whether VNF
|
|
Migration cost |
|
Number of transfers |
|
Adjustable weight coefficients |
|
Adjustable weight coefficients |
|
The migration bandwidth of VNF node
|
|
Storage resources occupied by VNF
|
|
The time taken for VNF
|
|
Migration coefficient |
|
The overload of Class
|
|
The proportion of
|
|
The occupancy rate of the
|
|
The worst additional bandwidth |
|
The Euclidean distance between node
|
|
The Euclidean distance
|
|
The approaching distance between node and the positive ideal solution |
|
The preset defined weights of each indicator |
References
[1] Cheng X, Fan Y. Research and design of intelligent speech equipment in smart English language lab based on Internet of Things technology. Procedia Comput Sci. 2022;198(1):505–11. 10.1016/j.procs.2021.12.277.Suche in Google Scholar
[2] Nappi I, de Campos Ribeiro G. Internet of Things technology applications in the workplace environment: A critical review. J Corp Real Estate. 2020;22(1):71–90. 10.1108/JCRE-06-2019-0028.Suche in Google Scholar
[3] Rao PM, Deebak BD. Security and privacy issues in smart cities/industries: technologies, applications, and challenges. J Amb Intel Hum Comp. 2023;14(8):10517–53. 10.1007/s12652-022-03707-1.Suche in Google Scholar
[4] Jawed MS, Sajid M. A comprehensive survey on cloud computing: architecture, tools, technologies, and open issues. Int J Cloud Appl Comput. 2022;12(1):1–33. 10.4018/IJCAC.308277.Suche in Google Scholar
[5] Mai L, Ding Y, Zhang X, Fan L, Yu S, Xu Z. Energy efficiency with service availability guarantee for network function virtualization. Future Gener Comput Syst. 2021;119(1):140–53. 10.1016/j.future.2021.02.002.Suche in Google Scholar
[6] Yi B, Wang X, Huang M, Li K. Design and implementation of network-aware VNF migration mechanism. IEEE Access. 2020;8(1):44346–58. 10.1109/ACCESS.2020.2978002.Suche in Google Scholar
[7] Rui L, Chen X, Gao Z, Li W, Qiu X, Meng L. Petri net-based reliability assessment and migration optimization strategy of SFC. IEEE Trans Netw Serv Manag. 2020;18(1):167–81. 10.1109/TNSM.2020.3045705.Suche in Google Scholar
[8] Zhang Q, Liu F, Zeng C. Online adaptive interference-aware VNF deployment and migration for 5G network slice. IEEE/ACM Trans Netw. 2021;29(5):2115–28. 10.1109/TNET.2021.3080197.Suche in Google Scholar
[9] Li B, Cheng B, Liu X, Wang M, Yue L, Chen J. Joint resource optimization and delay-aware virtual network function migration in data center networks. IEEE Trans Netw Serv Manag. 2021;18(3):2960–74. 10.1109/TNSM.2021.3067883.Suche in Google Scholar
[10] Shang X, Liu Z, Yang Y. Online service function chain placement for cost-effectiveness and network congestion control. IEEE Trans Comput. 2020;71(1):27–39. 10.1109/TC.2020.3035991.Suche in Google Scholar
[11] Qu K, Zhuang W, Shen X, Li X, Rao J. Dynamic resource scaling for VNF over nonstationary traffic: A learning approach. IEEE Trans Cognit Commun Netw. 2020;7(2):648–62. 10.1109/TCCN.2020.3018157.Suche in Google Scholar
[12] Abdelaal MA, Ebrahim GA, Anis WR. High availability deployment of virtual network function forwarding graph in cloud computing environments. IEEE Access. 2021;9(1):53861–84. 10.1109/ACCESS.2021.3068342.Suche in Google Scholar
[13] Qu K, Zhuang W, Ye Q, Shen X, Rao J. Dynamic flow migration for embedded services in SDN/NFV-Enabled 5G core networks. IEEE Trans Commun. 2020;68(4):2394–408. 10.1109/TCOMM.2020.2968907.Suche in Google Scholar
[14] Cerveira F, Barbosa R, Madeira H, Araujo F. The effects of soft errors and mitigation strategies for virtualization servers. IEEE Trans Cloud Comput. 2020;10(2):1065–81. 10.1109/TCC.2020.2973146.Suche in Google Scholar
[15] Rajakumari K, Kumar MV, Verma G, Balu S, Sharma DK, Sengan S. Fuzzy based ant colony optimization scheduling in cloud computing. Comput Syst Sci Eng. 2022;40(2):581–92. 10.32604/csse.2022.019175.Suche in Google Scholar
[16] Eshratifar AE, Abrishami MS, Pedram M. Joint DNN: An efficient training and inference engine for intelligent mobile cloud computing services. IEEE Trans Mob Comput. 2021;20(2):565–76. 10.1109/TMC.2019.2947893.Suche in Google Scholar
[17] Badotra S, Panda SN. Software defined networking: a crucial approach for cloud computing adoption. Int J Cloud Comput. 2022;11(2):123–37. 10.1504/IJCC.2022.122028.Suche in Google Scholar
[18] Trang TTT. From practice to prediction about the trend to develop virtual classroom model on cloud computing. VNUHCM J Soc Sci Humanit. 2021;5(2):1019–25. 10.32508/stdjssh.v5i2.664.Suche in Google Scholar
[19] Sharma D, Kumar G, Sharma R. Analysis of heterogeneous data storage and access control management for cloud computing under M/M/c queueing model. Int J Cloud Appl Comput (IJCAC). 2021;11(3):58–71. 10.4018/IJCAC.2021070104.Suche in Google Scholar
[20] Yang F. Cloud computing virtual resource dynamic system allocation and application based on system architecture. Dyn Syst Appl. 2021;30(5):753–70. 10.46719/dsa20213056.Suche in Google Scholar
[21] Wang T, Xu H, Liu F. Multi-resource load balancing for virtual network functions. 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE; 2017. p. 1322–32. 10.1109/ICDCS.2017.233.Suche in Google Scholar
[22] Xu F, Liu F, Xi H. Heterogeneity and interference-aware virtual machine provisioning for predictable performance in the cloud. IEEE Trans Comput. 2015;65(8):2470–83. 10.1109/TC.2015.2481403.Suche in Google Scholar
[23] Xu F, Liu F, Liu L, Xi H, Li B, Li B. iAware: Making live migration of virtual machines interference-aware in the cloud. IEEE Trans Comput. 2013;63(12):3012–25. 10.1109/TC.2013.185.Suche in Google Scholar
[24] Fei X, Liu F, Xu H, Jin H. Adaptive VNF scaling and flow routing with proactive demand prediction. IEEE INFOCOM 2018-IEEE Conference on Computer Communications. IEEE; 2018. p. 486–94. 10.1109/INFOCOM.2018.8486320.Suche in Google Scholar
[25] Zeng C, Liu F, Chen S, Jiang W, Li M. Demystifying the performance interference of co-located virtual network functions. IEEE INFOCOM 2018-IEEE Conference on Computer Communications. IEEE; 2018. p. 765–73. 10.1109/INFOCOM.2018.8486246.Suche in Google Scholar
[26] Xiao Y, Zhang Q, Liu F, Wang J, Zhao M, Zhang Z, Zhang J. NFVdeep: Adaptive online service function chain deployment with deep reinforcement learning. Proceedings of the International Symposium on Quality of Service; 2019. p. 1–10. 10.1145/3326285.3329056.Suche in Google Scholar
[27] Fei X, Liu F, Xi H, Li B. FlexNFV: Flexible network service chaining with dynamic scaling. IEEE Netw. 2020;34(4):203–9. 10.1109/MNET.001.1900483.Suche in Google Scholar
[28] Xu F, Liu F, Xi H, Vasilakos AV. Managing performance overhead of virtual machines in cloud computing: A survey, state of the art, and future directions. Proc IEEE. 2013;102(1):11–31. 10.1109/JPROC.2013.2287711.Suche in Google Scholar
[29] Sarkar A, Biswas A, Kundu M. Development of Q-rung Orthopair trapezoidal fuzzy Einstein aggregation operators and their application in MCGDM problems. J Comput Cognit Eng. 2022;1(3):109–21. 10.47852/bonviewJCCE2202162.Suche in Google Scholar
[30] Sun J, Liu F, Wang H, Ahmed M, Li Y, Liu M. Efficient VNF placement for Poisson arrived traffic. IEEE Trans Netw Serv Manag. 2021;18(4):4277–93. 10.1109/TNSM.2021.3102583.Suche in Google Scholar
[31] Akbari M, Abedi MR, Joda R, Pourghasemian M, Mokari N, Erol-Kantarci M. Age of information aware VNF scheduling in industrial IoT using deep reinforcement learning. IEEE J Sel Areas Commun. 2021;39(8):2487–500. 10.1109/JSAC.2021.3087264.Suche in Google Scholar
[32] Shi Y, Wang P, Zhu X, Zhu H. Reconfigurable digital satellite-borne base station design and virtual function fast migration algorithm. Sensors. 2023;23(17):7591–3. 10.3390/s23177591.Suche in Google Scholar PubMed PubMed Central
© 2025 the author(s), published by De Gruyter
This work is licensed under the Creative Commons Attribution 4.0 International License.
Artikel in diesem Heft
- Research Articles
- Synergistic effect of artificial intelligence and new real-time disassembly sensors: Overcoming limitations and expanding application scope
- Greenhouse environmental monitoring and control system based on improved fuzzy PID and neural network algorithms
- Explainable deep learning approach for recognizing “Egyptian Cobra” bite in real-time
- Optimization of cyber security through the implementation of AI technologies
- Deep multi-view feature fusion with data augmentation for improved diabetic retinopathy classification
- A new metaheuristic algorithm for solving multi-objective single-machine scheduling problems
- Estimating glycemic index in a specific dataset: The case of Moroccan cuisine
- Hybrid modeling of structure extension and instance weighting for naive Bayes
- Application of adaptive artificial bee colony algorithm in environmental and economic dispatching management
- Stock price prediction based on dual important indicators using ARIMAX: A case study in Vietnam
- Emotion recognition and interaction of smart education environment screen based on deep learning networks
- Supply chain performance evaluation model for integrated circuit industry based on fuzzy analytic hierarchy process and fuzzy neural network
- Application and optimization of machine learning algorithms for optical character recognition in complex scenarios
- Comorbidity diagnosis using machine learning: Fuzzy decision-making approach
- A fast and fully automated system for segmenting retinal blood vessels in fundus images
- Application of computer wireless network database technology in information management
- A new model for maintenance prediction using altruistic dragonfly algorithm and support vector machine
- A stacking ensemble classification model for determining the state of nitrogen-filled car tires
- Research on image random matrix modeling and stylized rendering algorithm for painting color learning
- Predictive models for overall health of hydroelectric equipment based on multi-measurement point output
- Architectural design visual information mining system based on image processing technology
- Measurement and deformation monitoring system for underground engineering robots based on Internet of Things architecture
- Face recognition method based on convolutional neural network and distributed computing
- OPGW fault localization method based on transformer and federated learning
- Class-consistent technology-based outlier detection for incomplete real-valued data based on rough set theory and granular computing
- Detection of single and dual pulmonary diseases using an optimized vision transformer
- CNN-EWC: A continuous deep learning approach for lung cancer classification
- Cloud computing virtualization technology based on bandwidth resource-aware migration algorithm
- Hyperparameters optimization of evolving spiking neural network using artificial bee colony for unsupervised anomaly detection
- Classification of histopathological images for oral cancer in early stages using a deep learning approach
- A refined methodological approach: Long-term stock market forecasting with XGBoost
- Enhancing highway security and wildlife safety: Mitigating wildlife–vehicle collisions with deep learning and drone technology
- An adaptive genetic algorithm with double populations for solving traveling salesman problems
- EEG channels selection for stroke patients rehabilitation using equilibrium optimizer
- Influence of intelligent manufacturing on innovation efficiency based on machine learning: A mechanism analysis of government subsidies and intellectual capital
- An intelligent enterprise system with processing and verification of business documents using big data and AI
- Hybrid deep learning for bankruptcy prediction: An optimized LSTM model with harmony search algorithm
- Construction of classroom teaching evaluation model based on machine learning facilitated facial expression recognition
- Artificial intelligence for enhanced quality assurance through advanced strategies and implementation in the software industry
- An anomaly analysis method for measurement data based on similarity metric and improved deep reinforcement learning under the power Internet of Things architecture
- Optimizing papaya disease classification: A hybrid approach using deep features and PCA-enhanced machine learning
- Review Articles
- A comprehensive review of deep learning and machine learning techniques for early-stage skin cancer detection: Challenges and research gaps
- An experimental study of U-net variants on liver segmentation from CT scans
- Strategies for protection against adversarial attacks in AI models: An in-depth review
- Resource allocation strategies and task scheduling algorithms for cloud computing: A systematic literature review
- Latency optimization approaches for healthcare Internet of Things and fog computing: A comprehensive review
Artikel in diesem Heft
- Research Articles
- Synergistic effect of artificial intelligence and new real-time disassembly sensors: Overcoming limitations and expanding application scope
- Greenhouse environmental monitoring and control system based on improved fuzzy PID and neural network algorithms
- Explainable deep learning approach for recognizing “Egyptian Cobra” bite in real-time
- Optimization of cyber security through the implementation of AI technologies
- Deep multi-view feature fusion with data augmentation for improved diabetic retinopathy classification
- A new metaheuristic algorithm for solving multi-objective single-machine scheduling problems
- Estimating glycemic index in a specific dataset: The case of Moroccan cuisine
- Hybrid modeling of structure extension and instance weighting for naive Bayes
- Application of adaptive artificial bee colony algorithm in environmental and economic dispatching management
- Stock price prediction based on dual important indicators using ARIMAX: A case study in Vietnam
- Emotion recognition and interaction of smart education environment screen based on deep learning networks
- Supply chain performance evaluation model for integrated circuit industry based on fuzzy analytic hierarchy process and fuzzy neural network
- Application and optimization of machine learning algorithms for optical character recognition in complex scenarios
- Comorbidity diagnosis using machine learning: Fuzzy decision-making approach
- A fast and fully automated system for segmenting retinal blood vessels in fundus images
- Application of computer wireless network database technology in information management
- A new model for maintenance prediction using altruistic dragonfly algorithm and support vector machine
- A stacking ensemble classification model for determining the state of nitrogen-filled car tires
- Research on image random matrix modeling and stylized rendering algorithm for painting color learning
- Predictive models for overall health of hydroelectric equipment based on multi-measurement point output
- Architectural design visual information mining system based on image processing technology
- Measurement and deformation monitoring system for underground engineering robots based on Internet of Things architecture
- Face recognition method based on convolutional neural network and distributed computing
- OPGW fault localization method based on transformer and federated learning
- Class-consistent technology-based outlier detection for incomplete real-valued data based on rough set theory and granular computing
- Detection of single and dual pulmonary diseases using an optimized vision transformer
- CNN-EWC: A continuous deep learning approach for lung cancer classification
- Cloud computing virtualization technology based on bandwidth resource-aware migration algorithm
- Hyperparameters optimization of evolving spiking neural network using artificial bee colony for unsupervised anomaly detection
- Classification of histopathological images for oral cancer in early stages using a deep learning approach
- A refined methodological approach: Long-term stock market forecasting with XGBoost
- Enhancing highway security and wildlife safety: Mitigating wildlife–vehicle collisions with deep learning and drone technology
- An adaptive genetic algorithm with double populations for solving traveling salesman problems
- EEG channels selection for stroke patients rehabilitation using equilibrium optimizer
- Influence of intelligent manufacturing on innovation efficiency based on machine learning: A mechanism analysis of government subsidies and intellectual capital
- An intelligent enterprise system with processing and verification of business documents using big data and AI
- Hybrid deep learning for bankruptcy prediction: An optimized LSTM model with harmony search algorithm
- Construction of classroom teaching evaluation model based on machine learning facilitated facial expression recognition
- Artificial intelligence for enhanced quality assurance through advanced strategies and implementation in the software industry
- An anomaly analysis method for measurement data based on similarity metric and improved deep reinforcement learning under the power Internet of Things architecture
- Optimizing papaya disease classification: A hybrid approach using deep features and PCA-enhanced machine learning
- Review Articles
- A comprehensive review of deep learning and machine learning techniques for early-stage skin cancer detection: Challenges and research gaps
- An experimental study of U-net variants on liver segmentation from CT scans
- Strategies for protection against adversarial attacks in AI models: An in-depth review
- Resource allocation strategies and task scheduling algorithms for cloud computing: A systematic literature review
- Latency optimization approaches for healthcare Internet of Things and fog computing: A comprehensive review