دانلود و نمایش مقالات مرتبط با design strategy::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - design strategy

تعداد مقالات یافته شده: 3
ردیف عنوان نوع
1 تبیین فرایندهای طراحی استراتژیک در ارتباط با تعاریف استراتژی در پژوهش‌های نظامی، کسب و کار و مدیریت
سال انتشار: 2020 - تعداد صفحات فایل pdf انگلیسی: 28 - تعداد صفحات فایل doc فارسی: 25
این مقاله به بررسی مشخصه‌های موجود برای استراتژی در پژوهش‌های نظامی، کسب و کار و مدیریت می‌پردازد و نشان می‌دهد که این مشخصه‌ها به چه نحو می‌توانند به درک فرایندهای طراحی استراتژیک کمک کنند. مقاله‌ی پیش رو به عنوان یک نقطه‌ی شروع برای پژوهشگران طراحی و دست‌اندرکاران علاقمند به درک چشم‌اندازهای غنی و ظریفی عمل می‌کند که اینگونه مشخصه‌های متنوع استراتژی پدید خواهند آورد.
کلیدواژه ها: استراتژی | استراتژی طراحی | طراحی استراتژی
مقاله ترجمه شده
2 Design and leakage assessment of side channel attack resistant binary edwards Elliptic Curve digital signature algorithm architectures
طراحی و ارزیابی نشت کانالهای جانبی معماری الگوریتم امضای دیجیتالی edwards Elliptic منحنی مقاوم در برابر حمله کانال-2019
Considering that Elliptic Curve Digital Signature Algorithm (ECDSA) implementations need to be efficient, flexible and Side Channel Attack (SCA) resistant, in this paper, a design approach and architecture for ECDSA and the underlined scalar multiplication operation is proposed for GF (2 k ), satisfying the above three directives. To achieve that, in the paper, Binary Edwards Curves (BECs) are adopted as an alter- native to traditional Weierstrass Elliptic Curves (ECs) for GF (2 k ) since they offer intrinsic SCA resistance against simple attacks due to their uniformity, operation regularity and completeness. To achieve high performance and flexibility, we propose a hardware/software ECDSA codesign approach where scalar mul- tiplication is implemented in hardware and integrated in the ECDSA functionality through appropriate drivers of an ECDSA software stack. To increase BEC scalar multiplier performance and introduce SCA resistance we adopt and expand a parallelism design strategy/methodology where GF (2 k ) operations of a scalar multiplier round for both point operations performed in this round are reordered and assigned into parallelism layer in order to be executed concurrently. Within this strategy we include hardware and software based SCA countermeasures that rely on masking/randomization and hiding. While scalar randomization is realized by the ECDSA software stack in an easy way, in order to achieve resistance us- ing hardware means, we propose and introduce in every scalar multiplier round, within the parallelism layers, projective coordinates randomization of all the round’s output points. So, in our approach, con- sidering that with the proposed parallelism plan in every scalar multiplier round BEC point operations are performed in parallel and that the round’s output points are randomized with a different number in each round, we manage to achieve maximum SCA resistance. To validate this resistance, we introduce and realize a leakage assessment process on BEC scalar multipliers for the first time in research literature. This process is based on real measurements collected from a controlled SAKURA X environment with a GF (2 233 ) based scalar multiplier implementation. Using Welch’s t -test we investigate possible information leakage of the multiplier’s input point and scalar and after an extended analysis we find trivial leakage. Finally, we validate the ECDSA architecture and its scalar multiplier efficiency by implementing it on a Zynq 70 0 0 series FPGA Avnet Zedboard and collecting very promising, well balanced, results on speed and hardware resources in comparison with other works.
Keywords: VLSI Design | Side channel attacks | Elliptic Curve cryptography | Hardware security
مقاله انگلیسی
3 MongoDB-Based Repository Design for IoT-Generated RFID/Sensor Big Data
طراحی مخزن مبتنی پایگاه داده مانگو برای داده های بزرگ حسگر/ RFID تولید شده توسط اینترنت اشیا-2016
Internet of Things (IoT)-generated data are characterized by its continuous generation, large amount, and unstructured format. The existing relational database technologies are inadequate to handle such IoT-generated data due to the limited processing speed and the significant storageexpansion cost. Thus, big data processing technologies, which are normally based on distributed file systems, distributed database management, and parallel processing technologies, have arisen as a core technology to implement IoT-generated data repositories. In this paper, we propose a sensor-integrated radio frequency identification (RFID) data repository-implementation model using MongoDB, the most popular big data-savvy document-oriented database system now. First, we devise a data repository schema that can effectively integrate and store the heterogeneous IoT data sources, such as RFID, sensor, and GPS, by extending the event data types in electronic product code information services standard, a de facto standard for the information exchange services for RFID-based traceability. Second, we propose an effective shard key to maximize query speed and uniform data distribution over data servers. Last, through a series of experiments measuring query speed and the level of data distribution, we show that the proposed design strategy, which is based on horizontal data partitioning and a compound shard key, is effective and efficient for the IoT-generated RFID/sensor big data.
Index Terms: Big data | EPCIS | IoT | MongoDB | RFID | sensor | supply chain.
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 2634 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 2634 :::::::: افراد آنلاین: 65