{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:54:34Z","timestamp":1740174874948,"version":"3.37.3"},"reference-count":29,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2018YFB1306000","61802455","62172457","ZJ2020074","202102210139","202102210098"],"award-info":[{"award-number":["2018YFB1306000","61802455","62172457","ZJ2020074","202102210139","202102210098"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2018YFB1306000","61802455","62172457","ZJ2020074","202102210139","202102210098"],"award-info":[{"award-number":["2018YFB1306000","61802455","62172457","ZJ2020074","202102210139","202102210098"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Program of Science and Technology in Henan","award":["2018YFB1306000","61802455","62172457","ZJ2020074","202102210139","202102210098"],"award-info":[{"award-number":["2018YFB1306000","61802455","62172457","ZJ2020074","202102210139","202102210098"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Scientific Programming"],"published-print":{"date-parts":[[2021,12,13]]},"abstract":"<jats:p>Benefiting from the convenience of virtualization, virtual machine migration is generally utilized to fulfil optimization objectives in cloud\/edge computing. However, live migration has certain risks and unapt decision may lead to side effects and performance degradation. Leveraging modified deep Q network, this paper provided an advanced risk evaluation system. Thorough formulation was given in this paper and a specific integration method was innovated based on uncertain theory. Series experiments were carried on computing cluster with OpenStack. The experimental results showed deep Q network for risk system was reliable while the uncertain approach was a proper way to deal with the risk integration.<\/jats:p>","DOI":"10.1155\/2021\/6784419","type":"journal-article","created":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T17:20:08Z","timestamp":1639416008000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["A Specific Risk Evaluation System for Live Virtual Machine Migration Based on the Uncertain Theory"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9456-0601","authenticated-orcid":true,"given":"Hang","family":"Zhou","sequence":"first","affiliation":[{"name":"Hangzhou Innovation Institute of Beihang University, Hangzhou, Zhejiang 310051, China"},{"name":"Department of Engineering Network, Zhoukou Normal University, Zhoukou, Henan 466001, China"}]},{"given":"Xinying","family":"Zhu","sequence":"additional","affiliation":[{"name":"Department of Engineering Network, Zhoukou Normal University, Zhoukou, Henan 466001, China"}]},{"given":"Jian","family":"Wang","sequence":"additional","affiliation":[{"name":"Hangzhou Innovation Institute of Beihang University, Hangzhou, Zhejiang 310051, China"}]}],"member":"311","reference":[{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/tsc.2018.2817208"},{"issue":"1","key":"2","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/JPROC.2013.2287711","article-title":"Managing performance overhead of virtual machines in cloud computing: a survey, state of the art, and future directions","volume":"102","author":"F. Xu","year":"2013","journal-title":"Proceedings of the IEEE"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.32604\/csse.2021.014975"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1007\/s11227-021-03753-0"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1016\/j.suscom.2020.100468"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1007\/s10586-020-03228-6"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1016\/j.jpdc.2019.04.014"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.32604\/iasc.2021.012401"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/TCC.2018.2886187"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/TCC.2017.2710193"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1016\/j.jss.2021.110943"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/TPDS.2012.240"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1007\/s11227-020-03165-6"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/access.2021.3065170"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1016\/j.simpat.2020.102201"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/ICACCAF.2018.8776820"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1016\/j.infsof.2020.106390"},{"issue":"8","key":"18","first-page":"61","article-title":"Optimizing the energy efficient VM placement by IEFWA and hybrid IEFWA","volume":"48","author":"H. M. Ali","year":"2016","journal-title":"BBO Algorithms\u201d Simulation Series"},{"doi-asserted-by":"publisher","key":"19","DOI":"10.1007\/s10772-020-09682-2"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1002\/cpe.6195"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1016\/j.future.2020.01.008"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.11999\/JEIT190612"},{"author":"Z. Shen","first-page":"51","article-title":"CloudScale: elastic resource scaling for multi-tenant cloud systems","key":"23"},{"author":"Y. Wu","first-page":"492","article-title":"Performance modeling of virtual machine live migration","key":"24"},{"author":"S. Akoush","first-page":"37","article-title":"Predicting the performance of virtual machine migration","key":"25"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1016\/j.comnet.2009.04.015"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1109\/tnsm.2015.2407273"},{"key":"28","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-44354-5","volume-title":"Uncertainty Theory","author":"B. Liu","year":"2015","edition":"4Eds"},{"author":"J. Peng","first-page":"93","article-title":"Mathematical models for logistics network optimization with uncertain data","key":"29"}],"container-title":["Scientific Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2021\/6784419.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2021\/6784419.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2021\/6784419.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T01:24:41Z","timestamp":1699925081000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/sp\/2021\/6784419\/"}},"subtitle":[],"editor":[{"given":"Rahman","family":"Ali","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":29,"alternative-id":["6784419","6784419"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6784419","relation":{},"ISSN":["1875-919X","1058-9244"],"issn-type":[{"type":"electronic","value":"1875-919X"},{"type":"print","value":"1058-9244"}],"subject":[],"published":{"date-parts":[[2021,12,13]]}}}