با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
Retargetable Optimizing Compilers for Quantum Accelerators via a Multilevel Intermediate Representation
کامپایلرهای بهینه سازی مجدد قابل هدف گیری برای شتاب دهنده های کوانتومی از طریق یک نمایش میانی چند سطحی-2022 We present a multilevel quantum–classical intermediate representation (IR) that
enables an optimizing, retargetable compiler for available quantum languages.
Our work builds upon the multilevel intermediate representation (MLIR)
framework and leverages its unique progressive lowering capabilities to map
quantum languages to the low-level virtual machine (LLVM) machine-level IR.
We provide both quantum and classical optimizations via the MLIR pattern
rewriting subsystem and standard LLVM optimization passes, and demonstrate
the programmability, compilation, and execution of our approach via standard
benchmarks and test cases. In comparison to other standalone language and
compiler efforts available today, our work results in compile times that are
1,000 faster than standard Pythonic approaches, and 5–10 faster than
comparative standalone quantum language compilers. Our compiler provides
quantum resource optimizations via standard programming patterns that result
in a 10 reduction in entangling operations, a common source of program
noise. We see this work as a vehicle for rapid quantum compiler prototyping.
|
مقاله انگلیسی |
2 |
Mining and Utilization of Special Information for Archives Management Based on 5G Network and Internet of Things
استخراج و استفاده از اطلاعات ویژه برای مدیریت بایگانی بر اساس شبکه 5G و اینترنت اشیا-2020 5G technology is currently in the process of demographic data, data mining, the next-generation mobile networks are considered to be one of the main factors. Through research and data analysis, are expected to overcome the complexity of these networks, and it will be possible to carry out dynamic management and business operations. It is a trade item in that category, which is a particular file. Data collection chosen field of study is the core part. These files are considered to know how it organize their files and save them for future posterity. Finally, deal with digitized archive material; these traditional archives sought to highlight the problems faced by the digital age. Issues related to critical skills of a digitized archive of documents as extended support for mobile telephone networks, and can be considered the next generation of ultra-fast 5G network technology. 5G network includes all kinds of advanced technology, to provide excellent service. Therefore, new architecture and applications of new technology service management solutions should be advised to resolve reliability issues and ensure data transmission capacity, high data rates, and Quality of services (QoS). Cloud computing, networking, as well as software-defined network technology are some of the core networks 5G. Cloud-based service, providing flexible and efficient solutions for information and communication technologies by reducing the cost of the investment and management of information technology infrastructure. In terms of functionality are decoupled control and data planes to support programmability, flexibility and adaptability in a changing network architecture promising architecture. Keywords: Quality of services (QoS) | Internet of things (IoT) | Programmability | Flexibility | 5G network |
مقاله انگلیسی |
3 |
P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking
P4-to-بلاکچین : یک جعبه بسته فعال با قابلیت بلاکچین برای شبکه تعریف شده توسط نرم افزار-2019 Security is one of the most challenging issues in software defined networking (SDN), and causes include the inability to detect the contents of the packets. In addition, file transferring to SDN is a potential attack vector that can be exploited at the network level. On the SDN data plane (i.e. the switch), packets are processed so that their behavior in the network can be determined. Packet parser (PP) acts as the main role of this operation on the switch. PP plays a very important role in identifying packets and support- ing protocols and testing new ideas in SDN, which requires packet parsers on the data plane to provide the necessary flexibility and programmability. In recent times, cryptographic ledger technology (also re- ferred to as Blockchain in the literature) has been applied to securely transfer transactions and files in the networks, mainly for crypto payments. In this paper, we propose a new packet parser architecture called Blockchain-enabled Packet Parser (BPP) based on the security characteristics of the blockchain and support for data processing functions with the description of Programming Protocol-Independent Packet Processors (P4) language that has the BPP-independent attribute of the protocol. In the proposed archi- tecture, we provide a mathematical model based on a multivariate correlation approach for attack detec- tion from the observed packet traffic. The implementation of BPP architecture is on Field Programmable Gate Array (FPGA), which is known for its higher processing speed, flexibility, and lower consumption resources. The result indicates that the proposed BPP is able to detect attacks and policy performed on the control plane in how to detect an attack from a packet structure efficiently. Furthermore, the impact of the bandwidth with and without the BPP in hardware environment is evaluated to demonstrate BPP’s efficiency. Keywords: Software defined network | SDN | Packet parser | Blockchain | DoS | P4 | FPGA |
مقاله انگلیسی |
4 |
DoS-IL: A Domain Specific Internet of Things Language for Resource Constrained Devices
DoS-IL: دامنه خاص زبان اینترنت اشیاء برای دستگاه های محدود شده منابع -2017 The common approach enabling a resource constrained device to get connected to the Internet is through programming instructions
and transferring it to an embedded device. This procedure involves various tools and cross-compiling of the code depending
on the platform architecture. In practical IoT applications, where a huge number of nodes exist, this process becomes almost
impossible due to the heterogeneous platforms and protocols involved and the deployment conditions. This paper introduces a
flexible and scalable approach that enhances modifiability and programmability through client-server-server-client architecture. It
allows changing the behavior of the system after deployment through a lightweight script written with a domain specific language,
DoS-IL, and stored in a gateway at the fog layer. An embedded resource browser is used to request and execute the script. The
results of analysis for this model and the tools developed along the way are discussed.
Keywords: Internet of Things (IoT) | Architecture | IoT-A |Programmability | Interoperability | Domain Specific Language | Scalability |
مقاله انگلیسی |
5 |
ArOMA: An SDN based autonomic DDoS mitigation framework
ArOMA: چارچوب مقابله با تهدید دائمی DDoS مبتنی بر SDN-2017 Distributed Denial of Service (DDoS) attacks have been the plague of the Internet for more
than two decades, despite the tremendous and continuous efforts from both academia and
industry to counter them. The lessons learned from the past DDoS mitigation designs in
dicate that the heavy reliance on additional software modules and dedicated hardware devices
seriously impede their widespread deployment. This paper proposes an autonomic DDoS
defense framework, called ArOMA, that leverages the programmability and centralized man
ageability features of Software Defined Networking (SDN) paradigm. Specifically, ArOMA can
systematically bridge the gaps between different security functions, ranging from traffic moni
toring to anomaly detection to mitigation, while sparing human operators from non
trivial interventions. It also facilitates the collaborations between ISPs and their customers
on DDoS mitigation by logically distributing the essential security functions, allowing the
ISP to handle DDoS traffic based on the requests of its customers. Our experimental results
demonstrate that, in the face of DDoS flooding attacks, ArOMA can effectively maintain the
performance of video streams at a satisfactory level.
Keywords: DDoS attacks | DDoS mitigation | Software Defined Networking | Anomaly detection | Security policy |
مقاله انگلیسی |
6 |
Type oriented parallel programming for Exascale
برنامه نویسی موازی نوع گرا برای Exascale-2017 Whilst there have been great advances in HPC hardware and software in recent years, the languages and
models that we use to program these machines have remained much more static. This is not from a lack
of effort, but instead by virtue of the fact that the foundation that many programming languages are
built on is not sufficient for the level of expressivity required for parallel work. The result is an implicit
trade-off between programmability and performance which is made worse due to the fact that, whilst
many scientific users are experts within their own fields, they are not HPC experts.
Type oriented programming looks to address this by encoding the complexity of a language via the
type system. Most of the language functionality is contained within a loosely coupled type library that
can be flexibly used to control many aspects such as parallelism. Due to the high level nature of this
approach there is much information available during compilation which can be used for optimisation
and, in the absence of type information, the compiler can apply sensible default options thus supporting
both the expert programmer and novice alike.
We demonstrate that, at no performance or scalability penalty when running on up to 8196 cores of
a Cray XE6 system, codes written in this type oriented manner provide improved programmability. The
programmer is able to write simple, implicit parallel, HPC code at a high level and then explicitly tune
by adding additional type information if required.
Keywords: Type oriented programming | Mesham | Parallel programming | Type systems | Asynchronous Jacobi | PGAS |
مقاله انگلیسی |
7 |
Multi-domain Software Defined Networking: Research status and challenges
نرم افزار شبکه چند منظوره تعریف شده: وضعیت تحقیق و چالش ها-2017 A key focus of the transition to next generation computer networking is to improve management of network
services thereby enhancing traffic control and flows while simplifying higher-level functionality. Software
defined networking (SDN) is an approach that is being developed to facilitate next generation computer
networking by decoupling the traffic control system from the underlying traffic transmission system. SDN offers
programmability in network services by separating the control plane from the data plane within network devices
and providing programmability for network services. Enhanced connectivity services across the global digital
network require a multi-domain capability. This paper presents a review of the current research status in SDN
and multi-domain SDN, focusing on OpenFlow protocol, and its future related challenges.
Keywords: Software Defined Networking | Networking | OpenFlow | Controller | East-West | Multi-domain |
مقاله انگلیسی |
8 |
Secure communication channel architecture for Software Defined Mobile Networks
معماری کانال ارتباط امن برای شبکه های تلفن همراه تعریف شده توسط نرم افزار-2017 Article history:Received 18 September 2015Revised 7 October 2016Accepted 11 January 2017Available online 16 January 2017Keywords:SDN NFV 5GTelecommunication SecurityMobile networks IPsecHIPOpenFlowA Software-Defined Mobile Network (SDMN) architecture is proposed to enhance the performance, flexi- bility, and scalability of today’s telecommunication networks. However, SDMN features such as centralized controlling, network programmability, and virtualization introduce new security challenges to telecom- munication networks. In this article, we present security challenges related to SDMN communication channels (i.e., control and data channel) and propose a novel secure communication channel architec- ture based on Host Identity Protocol (HIP). IPsec tunneling and security gateways are widely utilized in present-day mobile networks to secure backhaul communication channels. However, the utilization of legacy IPsec mechanisms in SDMNs is challenging due to limitations such as distributed control, lack of visibility, and limited scalability. The proposed architecture also utilizes IPsec tunnels to secure the SDMN communication channels by eliminating these limitations. The proposed architecture is implemented in a testbed and we analyzed its security features. The performance penalty of security due to the proposed security mechanisms is measured on both control and data channels.© 2017 Elsevier B.V. All rights reserved. Keywords: SDN | NFV | 5G | Telecommunication | Security | Mobile networks | IPsec HIP | OpenFlow |
مقاله انگلیسی |
9 |
مکانیسیمی دفاعی برای حمله منع سرویس توزیع شده (DDOS) در شبکه های تعریف شده توسط نرم افزار
سال انتشار: 2015 - تعداد صفحات فایل pdf انگلیسی: 5 - تعداد صفحات فایل doc فارسی: 8 حمله منع سرویس توزیع شده (DDoS) تهدیدی جدی برای برنامه های وقت گیر مبتنی بر اینترنت، مانند وب سایت های مستقل اخبار، تجارت الکترونیک و بازی های انلاین، است. شناسایی و بلوکه کردن چنین حملات ماهرانه ای، مشکل بنظر می اید. شبکه های تعریف شده توسط نرم افزار (SDN) بعنوان ساختار آتی شبکه ارتباطات پدید امده است که کنترل و حمل و نقل شبکه را جدا می سازد. این شبکه دارای برخی خصوصیات ویژه مانند کنترل مرکزی و قابلیت برنامه ریزی برای مبارزه علیه حمله DdoS است. این مقاله، به بررسی حملات DDoS و مکانیسم های دفاعی موجود، و بحث در خصوص نیاز به مکانیسم های دفاعی برای مبارزه ای موفق برعلیه DdoS می پردازد. سپس، خصوصیات ویژه SDN مورد تجزیه و تحلیل قرار می گیرد و نتیجه گیری می شود که ان موجب اقدامی متقابل (اقدام جبران کننده) علیه حملات DdoS است. مطابق با تجزیه و تحلیل ها، در مطالعه حاضر، به ایجاد مکانیسمی دفاعی برای DdoS در SDN دست یافتیم. در نهایت، با استفاده از مثالی عملی بیان می شود که چگونه این مکانیسم می تواند بر علیه حملات DdoS، مبارزه نماید.
کلمات کلیدی: شبکه های تعریف شده توسط نرم افزار | منع سرویس توزیع شده | کنترل مرکزی | قابلیت برنامه ریزی |
مقاله ترجمه شده |