Research Article
Sixth-Generation (6G) Mobile Cloud Security and Privacy Risks for AI System Using High-Performance Computing Implementation
Table 7
Outputs based on virtualization cluster.
| | Ubnist1.gen3.E01 | Nps-2009-domexuser.E01 | Factors | Node-1 | Node-2 | Node-3 | Node-4 | Node-1 | Node-2 | Node-3 | Node-4 |
| Sec | 19.0 | 25.8 | 13.5 | 5.9 | 239.2 | 169.2 | 164.3 | 46.8 | Mebibyte per second | 24.6 | 18.8 | 34.8 | 89.4 | 43.9 | 61.6 | 65.3 | 224.8 | Mebibyte | 519 | 520 | 520 | 546 | 10737 | 10737 | 10737 | 10737 | Bound | C.P.U. | C.P.U. | C.P.U. | -none- | C.P.U. | C.P.U. | C.P.U. | Input and output |
|
|