با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
Post-Quantum Era in V2X Security: Convergence of Orchestration and Parallel Computation
دوران پسا کوانتومی در امنیت V2X: همگرایی ارکستراسیون و محاسبات موازی-2022 Along with the potential emergence of quantum computing, safety and security of new and
complex communication services such as automated driving need to be redefined in the post-quantum era. To ensure reliable, continuous, and
secure operation of these scenarios, quantum-resistant security algorithms (QRSAs) that enable
secure connectivity must be integrated into the
network management and orchestration systems
of mobile networks. This article explores a roadmap study of post-quantum era convergence with
cellular connectivity using the Service & Computation Orchestrator (SCO) framework for enhanced
data security in radio access and backhaul transmission with a particular focus on vehicle-to-everything services. Using NTRU as a QSRA, we
show that the parallelization performance of the
Toom-Cook and Karatsuba computation methods
can vary based on different CPU load conditions
through extensive simulations, and that the SCO
framework can facilitate the selection of the most
efficient computation for a given QRSA. Finally,
we discuss the evaluation results, identify the current standardization efforts, and present possible
directions for the coexistence of post-quantum
and mobile network connectivity through an SCO
framework that leverages parallel computing.
|
مقاله انگلیسی |
2 |
Making room to manoeuvre: How firms increase their influence with others in business networks
ایجاد فضای مانور: چگونه شرکتها نفوذ خود را با دیگران در شبکه های تجاری افزایش می دهند-2020 Earlier research has highlighted the dynamic nature of influencing in business networks, and shown that firms may vary considerably in their influence, defined as their potential to achieve changes in the activities, re- sources, or goals of other firms in the business network. There is, however, limited understanding of the specific means of influencing which may allow firms, over time, to increase their influence with other firms in the same network. Drawing on a longitudinal case study, we describe how a firm, through influencing others by the dynamic enactment of network management activities, gradually increased its influence with other firms in the business network. Based on our observations, we offer a processual model for influencing in business networks that links specific network management activities to conditions under which they are used. Keywords: Business networks | Process of influencing | Development of influence | Network management activities |
مقاله انگلیسی |
3 |
Crowdfunding networks: Structure, dynamics and critical capabilities
شبکه های سرمایه گذاری گسترده: ساختار ، پویایی و قابلیت های حیاتی-2020 Crowdfunding platforms – bringing together entrepreneurs, investors and customers – have grown rapidly over recent years. Crowdfunding networks are open, multisided markets that match founders and funders on crowdfunding platforms. The unique structure of these networks blends social and business networks and comprises a complex array of closer and more distant network relationships. Research investigating the chaacteristics of these open and highly dynamic network structures is in its infancy and capabilities critical to operating in them are under-explored. Thus, this study follows an abductive reasoning process to understand critical capabilities for influencing and orchestrating crowdfunding networks. It draws on a thematic content analysis of 1484 blog entries written by crowdfunding experts and a comprehensive review of (i) literature on crowdfunding networks and (ii) five literature streams dealing with dynamic capabilities in evolving network structures. As a substantial contribution, this research delineates a portfolio of four collaborative capabilities – visioning, dynamic business modelling, engaging, and attaining social continuity – essential for operating successfully in crowdfunding networks. These new collaborative capability sets assume a new understanding of agency as a continuum of managerial and collective agency, an understanding that is novel within the network management and the capabilities literature. Keywords: Crowdfunding | Platform businesses | Dynamic capabilities | Network management | Collaborative economy |
مقاله انگلیسی |
4 |
Application of smart safety training and education in network teaching management
کاربرد آموزش ایمنی هوشمند و آموزش در مدیریت آموزش شبکه-2020 Aiming at the problems of poor resource scheduling and low degree of information fusion in the traditional
network management method of intelligent security training and education optimization, an intelligent security
training and education optimization network management model based on big data mining is proposed. Building
intelligent safety training and education of big data fusion analysis model, using the method of association rules
mining, complete the intelligent safety training and education statistics analysis, under the Internet environment
using quantitative sensing fusion tracking method, the network teaching management information fusion processing,
build large data information scheduling model based on network teaching management, fuzzy information
fusion method to reconstruct 3 d information of the network teaching management, to establish the
network teaching management big data spectral analysis model, the introduction of phase space reconstruction
method, the network resource scheduling optimization of teaching management. The experimental results show
that the proposed method has better resource scheduling performance, higher degree of information fusion, and
can improve the ability of intelligent security training and education management. Keywords: Smart safety training | Education | Network teaching management | Big data | Integration | Resource scheduling |
مقاله انگلیسی |
5 |
Systemic building blocks for creating and capturing value from circular economy
بلوک های ساختاری سیستماتیک برای ایجاد و گرفتن ارزش از اقتصاد دایره ای-2020 The idea of a circular economy has generated widespread academic, policy and business interest for its potential to address economic, ecological and societal concerns posed by current production and consumption systems. The growth in the number of academic publications reflects a period of critique, clarification and validation leading to research challenges, questions and a call for real world evidence of how the ideas translate into practice, evidence of outcomes and operational effectiveness. Whilst there has been extensive research into the classifications of circular business models, these are rarely linked to a discussion of actual circular value realisation within real world settings. In this paper we draw on three illustrative examples used within a global executive education programmer to reflect on the locus of circular value creation and capture. Specifically, we explore the role and interplay of four configurable ‘building blocks’: circular design, business models, reverse network management and system enablers, as a potentially useful heuristic to describe how businesses are realising value from their circular economy practices. These cases illustrate that the success of large scale value creation and capture derives from the iteration of multiple, boundary spanning activities emerging over time in varying configurations. There is now a need to move from classification and description to quantification and testing of how value is created and captured from circular economy in different contexts. Circular economy validation requires rapid growth in building a credible research evidence base of successful case examples. Keywords: Circular economy | Circular business models | Building blocks | Value creation | Value capture |
مقاله انگلیسی |
6 |
AWESoME: Big Data for Automatic Web Service Management in SDN
AWESoME: داده های بزرگ برای مدیریت و سرویس های خودکار در SDN-2018 Software defined network (SDN) has enabled
consistent and programmable management in computer
networks. However, the explosion of cloud services and content delivery networks (CDNs)—coupled with the momentum of
encryption—challenges the simple per-flow management and calls
for a more comprehensive approach for managing Web traffic.
We propose a new approach based on a “per service” management concept, which allows to identify and prioritize all traffic
of important Web services, while segregating others, even if they
are running on the same cloud platform, or served by the same
CDN. We design and evaluate AWESoME, automatic Web service
manager, a novel SDN application to address the above problem.
On the one hand, it leverages big data algorithms to automatically build models describing the traffic of thousands of Web
services. On the other hand, it uses the models to install rules in
SDN switches to steer all flows related to the originating services.
Using traffic traces from volunteers and operational networks, we
provide extensive experimental results to show that AWESoME
associates flows to the corresponding Web service in real-time
and with high accuracy. AWESoME introduces a negligible load
on the SDN controller and installs a limited number of rules on
switches, hence scaling well in realistic deployments. Finally, for
easy reproducibility, we release ground truth traces and scripts
implementing AWESoME core components.
Index Terms: Computer network management, software defined networking, machine learning |
مقاله انگلیسی |
7 |
Mining Host Behavior Patterns From Massive Network and Security Logs
الگوهای رفتار میزبان معدن از شبکه های عظیم و گزارش های امنیتی-2017 Mining host behavior patterns from massive logs plays an important and crucial role in anoma- lies diagnosing and management for large-scale networks. Almost all prior work gives a macro- scopic link analysis of network events, but fails to microscopically analyze the evolution of behavior patterns for each host in networks. In this paper, we propose a novel approach, namely Log Mining for Behavior Pattern (LogM4BP), to address the limitations of prior work. LogM4BP builds a statistical model that captures each host’s network behavior patterns with the nonnegative matrix factorization algorithm, and finally improve the interpretation and com- parability of behavior patterns, and reduce the complexity of analysis. The work is evaluated on a public data set captured from a big marketing company. Experimental results show that it can describe network behavior patterns clearly and accurately, and the significant evolution of behavior patterns can be mapped to anomaly events in real world intuitively.© 2017 The Authors. Published by Elsevier B.V.Peer-review under responsibility of the scientific committee of the International Conference on Computational Science Keywords: Behavior Pattern | Network Management | Log Mining |
مقاله انگلیسی |
8 |
Spatio-Temporal Analyses for Dynamic Urban Road Network Management
تجزیه تحلیل موقت -فضایی برای مدیریت شبکه های جاده ای شهری پویا-2017 The dynamic urban network management in urban areas is in high demand, since speed information is currently available via
Information and Communication Technology (ICT) Infrastructure. However, such information has not been incorporated into
routing decision making systems efficiently. Although several efforts exit, these are not correlated and integrated. Since the
integration problem has spatial and temporal dimensions, Spatial Information Science could aid to solve this problem via mature
methods, approaches and tools. The main aim of this study is to demonstrate the opportunities of spatio-temporal analyses within
dynamic urban road network management, where the concepts are supported with a case study from Istanbul Metropolitan Area.
In the proposed methodology, the speed information retrieved from detectors were associated with the OpenStreetMap and quickest
paths were simulated within determined time intervals. Different shortest routes are proposed to users in various time spans via
incorporated speed information and network analyses. For the same origin and destination, 2.5 minutes difference is observed
within the study area. The results were promising, where the added value of this study is presenting an approach for integrating
various spatial-temporal data to aid dynamic urban road network management.
Keywords: traffic speed information | Goegraphic Information Systems (GIS) | Traffic | dynamic routing |
مقاله انگلیسی |
9 |
Enabling network innovation in data center networks with software defined networking: A survey
فعال کردن نوآوری شبکه در شبکه های مرکز داده با شبکه نرم افزار تعریف شده: یک مرور-2017 With the rapid growth of cloud applications and users, Data Center Network (DCN) has become a critical
component in the cloud ecosystem to sustain remarkable computation demand. It is facing great challenges in
performance guarantee, security enforcement, and resource and energy management. Software Defined
Networking (SDN), as an efficient way to collect network information and perform network management,
has been adopted in DCN to enable automated network configuration and management. In this paper we aim at
surveying the state-of-the-art techniques of using SDN in DCN and discuss the way SDN help DCN. We first
present the introduction of SDN and DCN, then survey the SDN based DCN, and finally show some lessons and
future trend.
Keywords: Software defined networking | Data centers | Automatic configuration | Network security | Resource allocation | Energy saving |
مقاله انگلیسی |
10 |
Characterizing the behavior of handheld devices and its implications
توصیف رفتار دستگاه های دستی-2017 The Bring-Your-Own-Handheld-device (BYOH) phenomenon continues to make inroads as more people
bring their own handheld devices to work or school. While convenient to device owners, this trend
presents novel management challenges to network administrators as they have no control over these
devices and no solid understanding of the behavior of these emerging devices. In order to cope with
the impact of these BYOHs on current existing network management infrastructures, we identify two
tightly-coupled questions that network administrators need to answer: (a) how do these BYOHs behave?
and (b) how can we manage them more effectively based on the understanding of their behaviors? In
response, we design and deploy Brofiler, a framework that could enable network administrators to effec
tively manage BYOHs via behavior-aware profiling. Our behavior-aware profiling captures the behaviors of
each individual BYOH and improves the visibility on managing these BYOHs. In detail, the contributions
of our work are three-fold. First, we present Brofiler, a time-aware device-centric approach for grouping
devices into intuitive behavioral groups from multiple perspectives, including data plane, temporal be
havior, and the protocol and control plane. Second, we conduct an extensive study of BYOHs using our
approach with real data collected over a year, and highlight several novel insights on the behavior of
BYOHs. For example, we find that 70% of the BYOHs generate 50% of their monthly data traffic in one
day, while remaining mostly idle the rest of the month. In addition, 68% of BYOHs do not conform to
DHCP protocol specifications. Third, we present the implications of our study based on the framework
in DHCP management, bandwidth management and access control. Overall, our approach could enable
network administrators better understand and manage these new emerging devices for their networks in
the post-PC era.
Keywords: Handheld devices | Behavior | Measurement | Management |
مقاله انگلیسی |