دانلود و نمایش مقالات مرتبط با Network Management::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Network Management

تعداد مقالات یافته شده: 17
ردیف عنوان نوع
1 Post-Quantum Era in V2X Security: Convergence of Orchestration and Parallel Computation
دوران پسا کوانتومی در امنیت V2X: همگرایی ارکستراسیون و محاسبات موازی-2022
Along with the potential emergence of quantum computing, safety and security of new and complex communication services such as automated driving need to be redefined in the post-quantum era. To ensure reliable, continuous, and secure operation of these scenarios, quantum-resistant security algorithms (QRSAs) that enable secure connectivity must be integrated into the network management and orchestration systems of mobile networks. This article explores a roadmap study of post-quantum era convergence with cellular connectivity using the Service & Computation Orchestrator (SCO) framework for enhanced data security in radio access and backhaul transmission with a particular focus on vehicle-to-everything services. Using NTRU as a QSRA, we show that the parallelization performance of the Toom-Cook and Karatsuba computation methods can vary based on different CPU load conditions through extensive simulations, and that the SCO framework can facilitate the selection of the most efficient computation for a given QRSA. Finally, we discuss the evaluation results, identify the current standardization efforts, and present possible directions for the coexistence of post-quantum and mobile network connectivity through an SCO framework that leverages parallel computing.
مقاله انگلیسی
2 Making room to manoeuvre: How firms increase their influence with others in business networks
ایجاد فضای مانور: چگونه شرکتها نفوذ خود را با دیگران در شبکه های تجاری افزایش می دهند-2020
Earlier research has highlighted the dynamic nature of influencing in business networks, and shown that firms may vary considerably in their influence, defined as their potential to achieve changes in the activities, re- sources, or goals of other firms in the business network. There is, however, limited understanding of the specific means of influencing which may allow firms, over time, to increase their influence with other firms in the same network. Drawing on a longitudinal case study, we describe how a firm, through influencing others by the dynamic enactment of network management activities, gradually increased its influence with other firms in the business network. Based on our observations, we offer a processual model for influencing in business networks that links specific network management activities to conditions under which they are used.
Keywords: Business networks | Process of influencing | Development of influence | Network management activities
مقاله انگلیسی
3 Crowdfunding networks: Structure, dynamics and critical capabilities
شبکه های سرمایه گذاری گسترده: ساختار ، پویایی و قابلیت های حیاتی-2020
Crowdfunding platforms – bringing together entrepreneurs, investors and customers – have grown rapidly over recent years. Crowdfunding networks are open, multisided markets that match founders and funders on crowdfunding platforms. The unique structure of these networks blends social and business networks and comprises a complex array of closer and more distant network relationships. Research investigating the chaacteristics of these open and highly dynamic network structures is in its infancy and capabilities critical to operating in them are under-explored. Thus, this study follows an abductive reasoning process to understand critical capabilities for influencing and orchestrating crowdfunding networks. It draws on a thematic content analysis of 1484 blog entries written by crowdfunding experts and a comprehensive review of (i) literature on crowdfunding networks and (ii) five literature streams dealing with dynamic capabilities in evolving network structures. As a substantial contribution, this research delineates a portfolio of four collaborative capabilities – visioning, dynamic business modelling, engaging, and attaining social continuity – essential for operating successfully in crowdfunding networks. These new collaborative capability sets assume a new understanding of agency as a continuum of managerial and collective agency, an understanding that is novel within the network management and the capabilities literature.
Keywords: Crowdfunding | Platform businesses | Dynamic capabilities | Network management | Collaborative economy
مقاله انگلیسی
4 Application of smart safety training and education in network teaching management
کاربرد آموزش ایمنی هوشمند و آموزش در مدیریت آموزش شبکه-2020
Aiming at the problems of poor resource scheduling and low degree of information fusion in the traditional network management method of intelligent security training and education optimization, an intelligent security training and education optimization network management model based on big data mining is proposed. Building intelligent safety training and education of big data fusion analysis model, using the method of association rules mining, complete the intelligent safety training and education statistics analysis, under the Internet environment using quantitative sensing fusion tracking method, the network teaching management information fusion processing, build large data information scheduling model based on network teaching management, fuzzy information fusion method to reconstruct 3 d information of the network teaching management, to establish the network teaching management big data spectral analysis model, the introduction of phase space reconstruction method, the network resource scheduling optimization of teaching management. The experimental results show that the proposed method has better resource scheduling performance, higher degree of information fusion, and can improve the ability of intelligent security training and education management.
Keywords: Smart safety training | Education | Network teaching management | Big data | Integration | Resource scheduling
مقاله انگلیسی
5 Systemic building blocks for creating and capturing value from circular economy
بلوک های ساختاری سیستماتیک برای ایجاد و گرفتن ارزش از اقتصاد دایره ای-2020
The idea of a circular economy has generated widespread academic, policy and business interest for its potential to address economic, ecological and societal concerns posed by current production and consumption systems. The growth in the number of academic publications reflects a period of critique, clarification and validation leading to research challenges, questions and a call for real world evidence of how the ideas translate into practice, evidence of outcomes and operational effectiveness. Whilst there has been extensive research into the classifications of circular business models, these are rarely linked to a discussion of actual circular value realisation within real world settings. In this paper we draw on three illustrative examples used within a global executive education programmer to reflect on the locus of circular value creation and capture. Specifically, we explore the role and interplay of four configurable ‘building blocks’: circular design, business models, reverse network management and system enablers, as a potentially useful heuristic to describe how businesses are realising value from their circular economy practices. These cases illustrate that the success of large scale value creation and capture derives from the iteration of multiple, boundary spanning activities emerging over time in varying configurations. There is now a need to move from classification and description to quantification and testing of how value is created and captured from circular economy in different contexts. Circular economy validation requires rapid growth in building a credible research evidence base of successful case examples.
Keywords: Circular economy | Circular business models | Building blocks | Value creation | Value capture
مقاله انگلیسی
6 AWESoME: Big Data for Automatic Web Service Management in SDN
AWESoME: داده های بزرگ برای مدیریت و سرویس های خودکار در SDN-2018
Software defined network (SDN) has enabled consistent and programmable management in computer networks. However, the explosion of cloud services and content delivery networks (CDNs)—coupled with the momentum of encryption—challenges the simple per-flow management and calls for a more comprehensive approach for managing Web traffic. We propose a new approach based on a “per service” management concept, which allows to identify and prioritize all traffic of important Web services, while segregating others, even if they are running on the same cloud platform, or served by the same CDN. We design and evaluate AWESoME, automatic Web service manager, a novel SDN application to address the above problem. On the one hand, it leverages big data algorithms to automatically build models describing the traffic of thousands of Web services. On the other hand, it uses the models to install rules in SDN switches to steer all flows related to the originating services. Using traffic traces from volunteers and operational networks, we provide extensive experimental results to show that AWESoME associates flows to the corresponding Web service in real-time and with high accuracy. AWESoME introduces a negligible load on the SDN controller and installs a limited number of rules on switches, hence scaling well in realistic deployments. Finally, for easy reproducibility, we release ground truth traces and scripts implementing AWESoME core components.
Index Terms: Computer network management, software defined networking, machine learning
مقاله انگلیسی
7 Mining Host Behavior Patterns From Massive Network and Security Logs
الگوهای رفتار میزبان معدن از شبکه های عظیم و گزارش های امنیتی-2017
Mining host behavior patterns from massive logs plays an important and crucial role in anoma- lies diagnosing and management for large-scale networks. Almost all prior work gives a macro- scopic link analysis of network events, but fails to microscopically analyze the evolution of behavior patterns for each host in networks. In this paper, we propose a novel approach, namely Log Mining for Behavior Pattern (LogM4BP), to address the limitations of prior work. LogM4BP builds a statistical model that captures each host’s network behavior patterns with the nonnegative matrix factorization algorithm, and finally improve the interpretation and com- parability of behavior patterns, and reduce the complexity of analysis. The work is evaluated on a public data set captured from a big marketing company. Experimental results show that it can describe network behavior patterns clearly and accurately, and the significant evolution of behavior patterns can be mapped to anomaly events in real world intuitively.© 2017 The Authors. Published by Elsevier B.V.Peer-review under responsibility of the scientific committee of the International Conference on Computational Science
Keywords: Behavior Pattern | Network Management | Log Mining
مقاله انگلیسی
8 Spatio-Temporal Analyses for Dynamic Urban Road Network Management
تجزیه تحلیل موقت -فضایی برای مدیریت شبکه های جاده ای شهری پویا-2017
The dynamic urban network management in urban areas is in high demand, since speed information is currently available via Information and Communication Technology (ICT) Infrastructure. However, such information has not been incorporated into routing decision making systems efficiently. Although several efforts exit, these are not correlated and integrated. Since the integration problem has spatial and temporal dimensions, Spatial Information Science could aid to solve this problem via mature methods, approaches and tools. The main aim of this study is to demonstrate the opportunities of spatio-temporal analyses within dynamic urban road network management, where the concepts are supported with a case study from Istanbul Metropolitan Area. In the proposed methodology, the speed information retrieved from detectors were associated with the OpenStreetMap and quickest paths were simulated within determined time intervals. Different shortest routes are proposed to users in various time spans via incorporated speed information and network analyses. For the same origin and destination, 2.5 minutes difference is observed within the study area. The results were promising, where the added value of this study is presenting an approach for integrating various spatial-temporal data to aid dynamic urban road network management.
Keywords: traffic speed information | Goegraphic Information Systems (GIS) | Traffic | dynamic routing
مقاله انگلیسی
9 Enabling network innovation in data center networks with software defined networking: A survey
فعال کردن نوآوری شبکه در شبکه های مرکز داده با شبکه نرم افزار تعریف شده: یک مرور-2017
With the rapid growth of cloud applications and users, Data Center Network (DCN) has become a critical component in the cloud ecosystem to sustain remarkable computation demand. It is facing great challenges in performance guarantee, security enforcement, and resource and energy management. Software Defined Networking (SDN), as an efficient way to collect network information and perform network management, has been adopted in DCN to enable automated network configuration and management. In this paper we aim at surveying the state-of-the-art techniques of using SDN in DCN and discuss the way SDN help DCN. We first present the introduction of SDN and DCN, then survey the SDN based DCN, and finally show some lessons and future trend.
Keywords: Software defined networking | Data centers | Automatic configuration | Network security | Resource allocation | Energy saving
مقاله انگلیسی
10 Characterizing the behavior of handheld devices and its implications
توصیف رفتار دستگاه های دستی-2017
The Bring-Your-Own-Handheld-device (BYOH) phenomenon continues to make inroads as more people bring their own handheld devices to work or school. While convenient to device owners, this trend presents novel management challenges to network administrators as they have no control over these devices and no solid understanding of the behavior of these emerging devices. In order to cope with the impact of these BYOHs on current existing network management infrastructures, we identify two tightly-coupled questions that network administrators need to answer: (a) how do these BYOHs behave? and (b) how can we manage them more effectively based on the understanding of their behaviors? In response, we design and deploy Brofiler, a framework that could enable network administrators to effec tively manage BYOHs via behavior-aware profiling. Our behavior-aware profiling captures the behaviors of each individual BYOH and improves the visibility on managing these BYOHs. In detail, the contributions of our work are three-fold. First, we present Brofiler, a time-aware device-centric approach for grouping devices into intuitive behavioral groups from multiple perspectives, including data plane, temporal be havior, and the protocol and control plane. Second, we conduct an extensive study of BYOHs using our approach with real data collected over a year, and highlight several novel insights on the behavior of BYOHs. For example, we find that 70% of the BYOHs generate 50% of their monthly data traffic in one day, while remaining mostly idle the rest of the month. In addition, 68% of BYOHs do not conform to DHCP protocol specifications. Third, we present the implications of our study based on the framework in DHCP management, bandwidth management and access control. Overall, our approach could enable network administrators better understand and manage these new emerging devices for their networks in the post-PC era.
Keywords: Handheld devices | Behavior | Measurement | Management
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 6115 :::::::: بازدید دیروز: 3097 :::::::: بازدید کل: 40382 :::::::: افراد آنلاین: 42