دانلود و نمایش مقالات مرتبط با Migration::صفحه 5
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Migration

تعداد مقالات یافته شده: 102
ردیف عنوان نوع
41 Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization
ارزیابی چابکی رمزنگاری مقاوم به کوانتومی در مسیریابی و تعویض زیرساخت های شبکه IT در یک سازمان مالی با اندازه بزرگ-2019
This paper provides exploratory research by determining the impact of quantum computing threat on modern routing and switching infrastructure components of IT network infrastructure in a large-size fi- nancial organization. We determine whether common routing and switching IT network infrastructure, including its hardware and software components, have enough cryptographic agility to accommodate the change of cryptographic algorithms to the ones that do not exhibit vulnerability to quantum computing and to the ones that are compliant with National Security Agency (NSA) Suite B set of protocols. We pinpoint upstream or downstream impacts of a change in the encryption algorithms across various IT network infrastructure components in terms of effort required to accomplish this transition. This study is among the first studies that investigate quantum-resistance cryptographic from the hard- ware perspectives of routing and switching technologies using diffusion of innovation theory. The study integrates enterprise governance to meet the challenges presented by quantum-computing with a focus on cryptographic agility. We offer an enterprise architecture framework for assessing the dependencies, costs, and benefits of IT infrastructure migration plan to meet the future challenges of quantum-resistant cryptographic. The analysis in this research can be used by IT managers to pre-plan for an upgrade of routing and switching infrastructure, assist in estimating the effort s required to perform these upgrades, and assist in selecting a vendor of routing and switching equipment from the perspective of cryptographic agility. With today’s supercomputers, a computational task involved in breaking modern asymmetric cryptographic algorithms would be infeasible due to the required computational complexity. However, with progress in the devel- opment of quantum computing technology, firms are facing an increasing risk of potential security threats to existing encrypted data and secured transmission channels as the processing power of quantum com- puters continue to increase.
Keywords: Quantum-resistance | Cryptography | Routing and switching | Enterprise architecture | IT governance
مقاله انگلیسی
42 An efficient code-based threshold ring signature scheme
یک طرح امضای حلقه آستانه مبتنی بر کد-2019
Code based cryptography is a powerful and a promising alternative to the number theoretic cryptography as it is supposed to resist to the quantum computer. The migration to the post quantum hypothetical world requires the design of all the most important cryptographic primitives such as signature schemes. For this reason, we propose in this paper a ring signature and a threshold ring signature schemes that are based on coding theory assumptions. In the case of threshold ring signature scheme, we have a subset of users belonging to a group of users called a ring who collaborate in order to produce a signature on behalf of ring members while maintaining the anonymity of the identity of the real signers. In this paper, we use the AGS identification scheme, which is a coding theory zero-knowledge authentication protocol, to produce a ring signature and a threshold ring signature. By comparing our schemes with the best one in performance so far on 80 bits security level, we find an average 86% reduction of the signature size and also a reduction on the public key length at equivalent security level. The reduction is achieved for different values of the number of signers and ring’s size.
Keywords: Ring signature | Threshold ring signature | Code-based cryptography | AGS identification scheme | Post-quantum | Zero-knowledge
مقاله انگلیسی
43 Advanced DNA fingerprint genotyping based on a model developed from real chip electrophoresis data
ژنوتیپ پیشرفته اثر انگشت DNA بر اساس مدل توسعه یافته از داده های الکتروفورز تراشه واقعی-2019
Large-scale comparative studies of DNA fingerprints prefer automated chip capillary electrophoresis over conventional gel planar electrophoresis due to the higher precision of the digitalization process. However, the determination of band sizes is still limited by the device resolution and sizing accuracy. Band matching, therefore, remains the key step in DNA fingerprint analysis. Most current methods evaluate only the pairwise similarity of the samples, using heuristically determined constant thresholds to evaluate the maximum allowed band size deviation; unfortunately, that approach significantly reduces the ability to distinguish between closely related samples. This study presents a new approach based on global multiple alignments of bands of all samples, with an adaptive threshold derived from the detailed migration analysis of a large number of real samples. The proposed approach allows the accurate automated analysis of DNA fingerprint similarities for extensive epidemiological studies of bacterial strains, thereby helping to prevent the spread of dangerous microbial infections.
Keywords:DNA fingerprinting | Automated chip capillary electrophoresis | Genotyping | Band matching | Gel sample distortion | Pattern recognition
مقاله انگلیسی
44 IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning
سیستم تشخیص نفوذ و استخراج ویژگی داده های اینترنت اشیا برای شهرهای هوشمند بر اساس یادگیری مهاجرتی عمیق-2019
With the development of information technology and economic growth, the Internet of Things (IoT) industry has also entered the fast lane of development. The IoT industry system has also gradually improved, forming a complete industrial foundation, including chips, electronic components, equipment, software, integrated systems, IoT services, and telecom operators. In the event of selective forwarding attacks, virus damage, malicious virus intrusion, etc., the losses caused by such security problems are more serious than those of traditional networks, which are not only network information materials, but also physical objects. The limitations of sensor node resources in the Internet of Things, the complexity of networking, and the open wireless broadcast communication characteristics make it vulnerable to attacks. Intrusion Detection System (IDS) helps identify anomalies in the network and takes the necessary countermeasures to ensure the safe and reliable operation of IoT applications. This paper proposes an IoT feature extraction and intrusion detection algorithm for intelligent city based on deep migration learning model, which combines deep learning model with intrusion detection technology. According to the existing literature and algorithms, this paper introduces the modeling scheme of migration learning model and data feature extraction. In the experimental part, KDD CUP 99 was selected as the experimental data set, and 10% of the data was used as training data. At the same time, the proposed algorithm is compared with the existing algorithms. The experimental results show that the proposed algorithm has shorter detection time and higher detection efficiency.
Keywords: Deep learning | Migration learning model | Sensor network | Smart City | Internet of things | Information feature extraction | Intrusion detection | machine learning
مقاله انگلیسی
45 Rural entrepreneurship and migration
کارآفرینی روستایی و مهاجرت-2019
Using data for U.S. rural counties we examine the how the age profile of migrants from 1990 to 2000 impacts business start-ups in 2000. Depending on the industry classification, we find that younger and older migrants tend to have the largest impacts on rural business start-ups. The impacts tend to be larger for older migrants than younger. This result, which is consistent with the findings of the meta analysis of Akgün et al. (2011), has strong policy implications: from an entrepreneurial perspective, the loss of younger adults is likely out-weighed by the “retirement migration” of older persons. Rural communities should not overlook the in-migration of people who are either pre-retirement age or retirees when pursuing entrepreneurship strategies.
Keywords: Rural | Migration | Entrepreneurship | Economic developmentJEL classification:L26 | O15 | R11
مقاله انگلیسی
46 Error assessment and optimal cross-validation approaches in machine learning applied to impurity diffusion
ارزیابی خطا و رویکردهای بهینه سازی متقابل بهینه در یادگیری ماشین اعمال شده برای انتشار ناخالصی-2019
Machine learning models have been widely utilized in materials science to discover trends in existing data and then make predictions to generate large databases, providing powerful tools for accelerating materials discovery and design. However, there is a significant need to refine approaches both for developing the best models and assessing the uncertainty in their predictions. In this work, we evaluate the performance of Gaussian kernel ridge regression (GKRR) and Gaussian process regression (GPR) for modeling ab-initio predicted impurity diffusion activation energies, using a database with 15 pure metal hosts and 408 host-impurity pairs. We demonstrate the advantages of basing the feature selection on minimizing the Leave-Group-Out (LOG) cross-validation (CV) root mean squared error (RMSE) instead of the more commonly used random K-fold CV RMSE. For the best descriptor and hyperparameter sets, the LOG RMSE from the GKRR (GPR) model is only 0.148 eV (0.155 eV) and the corresponding 5-fold RMSE is 0.116 eV (0.129 eV), demonstrating the model can effectively predict diffusion activation energies. We also show that the ab-initio impurity migration barrier can be employed as a feature to increase the accuracy of the model significantly while still yielding a significant speedup in the ability to predict the activation energy of new systems. Finally, we define r as the magnitude of the ratio of the actual error (residual) in a left-out data point during CV to the predicted standard deviation for that same data point in the GPR model, and compare the distribution of r to a normal distribution. Deviations of r from a normal distribution can be used to quantify the accuracy of the machine learning error estimates, and our results generally show that the approach yields accurate, normally-distributed error estimates for this diffusion data set.
Keywords: Machine learning | Diffusion | Gaussian process | Error assessment
مقاله انگلیسی
47 A C1qDC (CgC1qDC-6) with a collagen-like domain mediates hemocyte phagocytosis and migration in oysters
A C1qDC (CgC1qDC-6) with a collagen-like domain mediates hemocyte phagocytosis and migration in oysters-2019
Most of the bivalve C1q domain containing proteins (C1qDCs) are either only composed of the globular head domain, or contain an N-terminal coiled-coil domain, presumed to cover a role in oligomerization. On the other hand, collagen regions, widespread in vertebrate C1qDCs, are very uncommon in bivalves. In the present study, a C1qDC with a collagen-like domain (designated CgC1qDC-6) was identified from the Pacific oyster Crassostrea gigas and its possible involvement in immune responses was also characterized. The coding sequence of CgC1qDC-6 was of 756 bp, encoding a peptide of 251 amino acids with an N-terminal signal peptide, a central collagen-like domain, and a C-terminal ghC1q domain. CgC1qDC-6 was clustered with the C1qDCs from several mollusks in the phylogenetic tree. CgC1qDC-6 was detected at both mRNA and protein levels in all tested tissues including hepatopancreas, gonad, gill, mantle, adductor muscle, and hemocytes. The recombinant CgC1qDC-6 protein (rCgC1qDC-6) exhibited binding activity to various pathogen-associated molecular patterns (PAMPs) including LPS, PGN, mannose and Poly I:C, and microorganisms including Gram-negative bacteria (Escherichia coli and Vibrio splendidus), Gram-positive bacteria (Micrococcus luteus and Staphylococcus aureus), and fungus (Pichia pastoris). The phagocytic rates of oyster hemocytes towards V. splendidus pre-incubation with rCgC1qDC-6 were significantly enhanced (p < 0.05). In the chemotaxis assay, rCgC1qDC-6 could mediate the migration of oyster hemocytes in a dose-dependent manner, which exhibited a positive chemotactic effect at low concentration (< 10 nM). These results collectively indicated that CgC1qDC-6 could serve as a pattern recognition receptor and mediate the hemocyte phagocytosis and migration to eliminate the invading pathogens.
Keywords: Crassostrea gigas | C1qDC | Collagen-like domain | Pattern recognition receptor | Opsonization | Chemotaxis
مقاله انگلیسی
48 A Joint Power Efficient Server and Network Consolidation approach for virtualized data centers
یک سرور توانی کارآمد مشترک و دیدگاه یکپارچه سازی شبکه برای مراکز داده ای مجازی-2018
Cloud computing and virtualization are enabling technologies for designing energy-aware resource management mechanisms in virtualized data centers. Indeed, one of the main challenges of big data centers is to decrease the power consumption, both to cut costs and to reduce the environmental impact. To this extent, Virtual Machine (VM) consolidation is often used to smartly reallocate the VMs with the objective of reducing the power consumption, by exploiting the VM live migration. The consolidation problem consists in finding the set of migrations that allow to keep turned on the minimum number of servers needed to host all the VMs. However, most of the proposed consolidation approaches do not consider the network related consumption, which represents about 10–20% of the total energy consumed by IT equipment in real data centers. This paper proposes a novel joint server and network consolidation model that takes into account the power efficiency of both the switches forwarding the traffic and the servers hosting the VMs. It powers down switch ports and routes traffic along the most energy efficient path towards the least energy consuming server under QoS constraints. Since the model is complex, a fast Simulated Annealing based Resource Consolidation algorithm (SARC) is proposed. Our numerical results demonstrate that our approach is able to save on average 50% of the network related power consumption compared to a network unaware consolidation.
keywords: Cloud| Virtualization| Power| Green computing| Simulated annealing
مقاله انگلیسی
49 Practices of conformity and transgression in an out-of-school reading programme for ‘at risk’ children
روشهای تایید و سرپیچی در یک برنامه آموزشی خارج از مدرسه برای بچه های پرخطر-2018
A large body of research has demonstrated that the plurilingualisms and pluriliteracies that children and youth bring to classrooms are often not those required for school success. This is even more so for students from underprivileged backgrounds, a demographic where children and youth with family backgrounds of immigration are over-represented. This article reports on ethnographic research at an after-school reading programme for primary school children considered to be at risk of school failure in the old town of Barcelona. Results suggest that the practices of pluriliteracy supported by the programme often conform with those inherent to the childrens formal education; that is, with the very practices that have contributed to the children being placed in the programme to begin with. However, through the fine-grained analysis of child–volunteer interactions, certain practices that subtly transgress these norms are identified. It is in such practices that we see potential for educational transformation.
keywords: Plurilingualism| Literacies| Translanguaging| Non-formal education| Children| Collaborative research
مقاله انگلیسی
50 Adaptation opportunities and maladaptive outcomes in climate vulnerability hotspots of northern Ghana
فرصت های سازگاری و خروجی های ناسازگاری در نقاط حساس آسیب پذیری های آب و هوایی شمال غنا-2018
How climate change adaptation practices can constrain development and deliver maladaptive outcomes in vulnerability hotspots is yet to be explored in-depth using case study analyses. This paper explores the effects of climate change coping and adaptation responses in three case study villages across the Central Gonja district of northern Ghana. The study addresses the following research questions: i) What are the key climatic and non-climatic stressors confronting households in northern Ghanaian communities? ii) How are households adapting to climatic and non-climatic stressors? and iii) What are the outcomes of these coping and adaptation responses on development? The study employs a mixed-method approach including key informant interviews, focus group discussions and household questionnaire surveys. Data identified socioeconomic stressors including a lack of access to (and high cost of) farm inputs, labour shortages and population growth. Climatic stressors include erratic rainfall, high temperature, droughts and floods. Climatic and non-climatic stressors interact to affect agricultural practices and related livelihoods. The study identified various adaptation measures including extensification and intensification of agriculture, temporary migration, planting of drought resistant varieties, irrigation, and livelihood diversification. We show that many coping measures (e.g. livelihood diversifications activities such as selling of firewood and charcoal production) and adaptation responses (including intensification, extensification and irrigation) currently deliver maladaptive outcomes, resulting in lock-ins that could exacerbate future climate vulnerabilities. The paper contributes to the growing literature on adaptation and climate risk management by providing empirical evidence showing how coping and adaptations measures can deliver maladaptive outcomes in vulnerable communities.
keywords: Maladaptation |Climate change and variability |Livelihoods |Mixed methods |Africa
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 10465 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 10465 :::::::: افراد آنلاین: 76