Zenan Wang

ORCID: 0000-0003-2450-517X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software-Defined Networks and 5G
  • Network Security and Intrusion Detection
  • Advanced Optical Network Technologies
  • Caching and Content Delivery
  • Network Traffic and Congestion Control
  • Cancer, Lipids, and Metabolism
  • Immune cells in cancer
  • Atmospheric chemistry and aerosols
  • Matrix Theory and Algorithms
  • Maritime Navigation and Safety
  • Software System Performance and Reliability
  • Surgical Simulation and Training
  • Cancer Cells and Metastasis
  • Cancer, Hypoxia, and Metabolism
  • Atmospheric and Environmental Gas Dynamics
  • Cancer Immunotherapy and Biomarkers
  • Autophagy in Disease and Therapy
  • Wireless Sensor Networks and IoT
  • Atmospheric aerosols and clouds
  • Augmented Reality Applications
  • Water Resources and Sustainability
  • Advanced Computational Techniques and Applications
  • Technology and Security Systems
  • Virtual Reality Applications and Impacts
  • Cloud Computing and Resource Management

Anhui University
2025

Zhejiang Lab
2024

Zhejiang University Medical College Affiliated Stomatological Hospital
2024

Second Affiliated Hospital of Zhejiang University
2024

Purple Mountain Laboratories
2019-2022

Beijing University of Posts and Telecommunications
2019-2021

State Key Laboratory of Networking and Switching Technology
2017-2020

Hebei Science and Technology Department
2019

China Shipbuilding Industry Corporation (China)
2018

Huazhong University of Science and Technology
2018

Bone is a common organ for solid tumor metastasis. Malignant bone becomes insensitive to systemic therapy after colonization, followed by poor prognosis and high relapse rate. Immune cells in situ constitute unique immune microenvironment, which plays crucial role the context of This review firstly focuses on lymphatic metastatic cancer, including their function dissemination, invasion, growth possible cytotoxicity-induced eradication. Subsequently, we examine myeloid cells, namely...

10.3389/fimmu.2024.1335366 article EN cc-by Frontiers in Immunology 2024-02-23

In recent years, the virtual reality technology has been greatly developed and applied to many fields, its application extends product design, education training, military aerospace, entertainment leisure fields. This article summarizes current developments in hardware software of field, then analyzes future development trends military.

10.1088/1755-1315/170/3/032155 article EN IOP Conference Series Earth and Environmental Science 2018-07-01

Network Function Virtualization (NFV) turns a sequence of network functions on hardwares into service chain virtual (VNFs) provisioned machines or containers. However, the VNFs may suffer from interruption as long one VNF fails due to software faults hardware malfunctions. A common approach ensuring high availability is provide backup nodes for primary VNFs. existing work allocating have not considered heterogeneous resource demands different In this paper, we formalize resource-aware...

10.1109/infocom.2019.8737565 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2019-04-01

In legacy networks, network functions (e.g., firewalls, NAT, QoS) are highly dependent on dedicated hardware. It is sophisticated and costly for operators to determine the order of stitch them together create service chains end users, especially with explosive growth end-users Internet services. The recent emergence NFV SDN technologies provide benefits function chaining reduce OPEX CAPEX operators. This article presents a typical framework construct by combining NFV, describes several...

10.1109/mnet.2018.1700467 article EN IEEE Network 2018-08-29

With the development of network function virtualization (NFV), service chains (SFCs) are deployed via virtual functions (VNFs). In general, SFCs served composition and then into data center infrastructures. However, most existing works neglect SFC composition. Furthermore, they consider that VNF instances independently for each SFC, which may underutilize computational power servers. We consider, required in chain, operator can either place it on a new instance or assign to an established if...

10.1109/tnsm.2019.2933872 article EN IEEE Transactions on Network and Service Management 2019-08-08

With the development of network function virtualization technology, service flows are expected to be served by a chain Virtual Network Functions (VNFs). Some works adopt queuing theory derive end-to-end delay for VNFs. However, based on is an average delay, and packets cannot guaranteed transmitted within this in worst cases. In letter, we apply calculus bounds The prioritized with per-VNF priority, share VNF instances. We design implement prototype system validate our derivations, results...

10.1109/lcomm.2021.3065147 article EN IEEE Communications Letters 2021-03-10

ABSTRACT Industrial development is an important part of economic and social development, a stable pattern water resource security can meet the needs development. Therefore, correctly handling relationship between industrial in China key to achieving high-quality This paper takes 287 prefecture-level cities from 2010 2019 as research object, establishes evaluation index system security, calculates comprehensive by entropy weight method, analyzes spatiotemporal evolution trend two using...

10.2166/wp.2024.161 article EN cc-by Water Policy 2024-10-07

Network Function Virtualization (NFV) enables service flexibility and cost reduction by replacing traditional hardware middle-boxes with Virtual Functions (VNFs) running on general-purpose servers. Normally, network traffic usually needs to pass through several VNFs in a particular order. This phenomenon is known as Service Chaining (SFC). How place SFCs minimal resource still an open problem. Most of the existing work thinks it's difficult find placement solution for all whole, they,...

10.1109/iccc47050.2019.9064448 article EN 2019-12-01

Network Function Virtualization has attracted attention from both academia and industry as it can help the service provider to obtain agility flexibility in network deployment. In general, enterprises require their flows pass through a specific sequence of virtual function (VNF) that varies service. addition, for each VNF required coming demands, operator either launch new instance or assign an established instance. This makes deployment tasks even more complicated. this paper, we first...

10.1109/iwqos.2017.7969143 article EN 2017-06-01

A cluster of Virtual Network Functions (VNF) can serve massive fluctuating traffic by managing VNF instances and distributing flows. However, how to schedule the flows manage scaling efficiently in a is still an open question. Existing solutions such as hash based schemes encounter imbalance passive flow remapping obstacles while table-based scheme suffers from high processing latency entries overflow challenges. In this paper, we design present Hieff, efficient NFV system that coordinates...

10.1109/ipccc50635.2020.9391534 article EN 2020-11-06

The launch of China's first aircraft carrier marks a qualitative change in the requirements maritime defense forces for battle group [1]. In this paper, Marine hydrometeorological data is combined with mathematical model ship performance calculation to preliminarily construct software analyze influence hydrological meteorological environment on cooperative operation aircraft. This system uses ORACLE11g [2, 3] create corresponding database storage data, and QT5.6 [4, 5] build front-end...

10.1088/1755-1315/170/3/032153 article EN IOP Conference Series Earth and Environmental Science 2018-07-01
Coming Soon ...