Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne...Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment.展开更多
In 2006,at the age of 37,Alraiah Abdelgadir joined the Sudan/South Sudan work zone of China National Logging Corporation(CNLC)as a probationary employee.At that time,his greatest contentment stemmed from having a secu...In 2006,at the age of 37,Alraiah Abdelgadir joined the Sudan/South Sudan work zone of China National Logging Corporation(CNLC)as a probationary employee.At that time,his greatest contentment stemmed from having a secure job that enabled his children to attend school without worry,his wife to manage the family with ease,and his parents to peacefully enjoy their retirement years.Over 18 years,he evolved from a "struggling newcomer"to an "ambitious dream pursuer,"now serving as an assistant manager in the work zone.展开更多
Objective:This study aimed to describe the conflict management styles and identify factors affecting the conflict management styles of nurse managers.Materials and Methods:A cross-sectional study was conducted by inte...Objective:This study aimed to describe the conflict management styles and identify factors affecting the conflict management styles of nurse managers.Materials and Methods:A cross-sectional study was conducted by interviewing nurse managers with a questionnaire,including the Rahim Organizational Conflict Inventory-II Form B,used to assess an individual’s approach to conflict management across five styles:cooperating,competing,compromising,obliging,and avoiding.Results:A total of 30 nurse managers participated in this study.The mean scores of the cooperating style were the highest at 4.3±0.4,followed by a compromising style at 3.4±0.5,an avoiding style at 3.1±0.6,an accommodating style at 2.9±0.7,and a competing style at 2.8±0.8(χ^(2)=66.624,P<0.001).The mean scores for avoiding style among bachelor’s degree nurse managers(3.2±0.6)were higher than those of master’s degree nurse managers(2.7±0.6)(P=0.036).Nurse managers over 40 years old,holding a managerial position for≥10 years,and frequent conflict handling rated higher mean scores for the cooperating style than their counterparts(P<0.05).Conclusion:The cooperating style was the most commonly used conflict management style among nurse managers.Factors affecting the conflict management style were age,education level,and experience in management and conflict handling.These findings are useful for developing interventions that enhance the competencies of nurse managers in conflict management.展开更多
Based on open grid service architecture (OGSA) and Globus Toolkit 3. 0 (GT3), a manufacturing grid (MG) is proposed to realize resource sharing and collaborative working among manufacturing enterprises. Nevertheless, ...Based on open grid service architecture (OGSA) and Globus Toolkit 3. 0 (GT3), a manufacturing grid (MG) is proposed to realize resource sharing and collaborative working among manufacturing enterprises. Nevertheless, resource management in MG is much more complicated than that in other grid applications due to the geographically distributed manufacturing resources, which range from CAD, CAPP and CAE to various kinds of machine tools. With the interaction of manufacturing grid information service (MGIS, developed by ourselves) and globus resource allocation manager (GRAM, provided by GT3), a resource management framework is presented to perform the functions of resource encapsulation, registry, discovery and monitoring. Furthermore, the application architecture and an example are depicted to illustrate the utilization of the resource management system.展开更多
针对现场总线系统中现场设备集成与系统集成问题,研究了FDT(field device tool)技术特点.在此基础上,将FDT技术应用到NCS4000系统中,以满足设备综合管理的需要,并提出了系统软件框架模型和系统集成模型.详细说明了网关DTM(device type m...针对现场总线系统中现场设备集成与系统集成问题,研究了FDT(field device tool)技术特点.在此基础上,将FDT技术应用到NCS4000系统中,以满足设备综合管理的需要,并提出了系统软件框架模型和系统集成模型.详细说明了网关DTM(device type manager)的实现方法,分析了DTM程序与现场设备的交互过程.通过开发DTM并将其集成到系统中,验证了设计的可行性.展开更多
In enterprise dynamic alliance towards agile manufacturing systems, any group needs to know which activities it must take part in, in what order those activities take place and how many other groups it must interact ...In enterprise dynamic alliance towards agile manufacturing systems, any group needs to know which activities it must take part in, in what order those activities take place and how many other groups it must interact with. The traditional procedural models can’t meet the requirement of the modeling for an enterprise dynamic alliance. In this paper, we use role based models for an enterprise modeling. Role based models group activities into roles, which describe the desired behavior of individual enterprise. We have developed a graphical modeling tool built on Web/DCOM platform according to Petri net theory and role based methodology.展开更多
基金This work was funded by the Deanship of Scientific Research at Jouf University under Grant Number(DSR2022-RG-0102).
文摘Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment.
文摘In 2006,at the age of 37,Alraiah Abdelgadir joined the Sudan/South Sudan work zone of China National Logging Corporation(CNLC)as a probationary employee.At that time,his greatest contentment stemmed from having a secure job that enabled his children to attend school without worry,his wife to manage the family with ease,and his parents to peacefully enjoy their retirement years.Over 18 years,he evolved from a "struggling newcomer"to an "ambitious dream pursuer,"now serving as an assistant manager in the work zone.
文摘Objective:This study aimed to describe the conflict management styles and identify factors affecting the conflict management styles of nurse managers.Materials and Methods:A cross-sectional study was conducted by interviewing nurse managers with a questionnaire,including the Rahim Organizational Conflict Inventory-II Form B,used to assess an individual’s approach to conflict management across five styles:cooperating,competing,compromising,obliging,and avoiding.Results:A total of 30 nurse managers participated in this study.The mean scores of the cooperating style were the highest at 4.3±0.4,followed by a compromising style at 3.4±0.5,an avoiding style at 3.1±0.6,an accommodating style at 2.9±0.7,and a competing style at 2.8±0.8(χ^(2)=66.624,P<0.001).The mean scores for avoiding style among bachelor’s degree nurse managers(3.2±0.6)were higher than those of master’s degree nurse managers(2.7±0.6)(P=0.036).Nurse managers over 40 years old,holding a managerial position for≥10 years,and frequent conflict handling rated higher mean scores for the cooperating style than their counterparts(P<0.05).Conclusion:The cooperating style was the most commonly used conflict management style among nurse managers.Factors affecting the conflict management style were age,education level,and experience in management and conflict handling.These findings are useful for developing interventions that enhance the competencies of nurse managers in conflict management.
基金TheDevelopingFoundationofShanghaiScienceandTechnologyCommittee (No .0 2 5 1110 5 5 ) .
文摘Based on open grid service architecture (OGSA) and Globus Toolkit 3. 0 (GT3), a manufacturing grid (MG) is proposed to realize resource sharing and collaborative working among manufacturing enterprises. Nevertheless, resource management in MG is much more complicated than that in other grid applications due to the geographically distributed manufacturing resources, which range from CAD, CAPP and CAE to various kinds of machine tools. With the interaction of manufacturing grid information service (MGIS, developed by ourselves) and globus resource allocation manager (GRAM, provided by GT3), a resource management framework is presented to perform the functions of resource encapsulation, registry, discovery and monitoring. Furthermore, the application architecture and an example are depicted to illustrate the utilization of the resource management system.
基金国家自然科学基金(the National Natural Science Foundation of China under Grant No.40571119)山东省自然科学基金(the Natural Science Foundation of Shandong Province of China under Grant No.Y2004E04)。
文摘针对现场总线系统中现场设备集成与系统集成问题,研究了FDT(field device tool)技术特点.在此基础上,将FDT技术应用到NCS4000系统中,以满足设备综合管理的需要,并提出了系统软件框架模型和系统集成模型.详细说明了网关DTM(device type manager)的实现方法,分析了DTM程序与现场设备的交互过程.通过开发DTM并将其集成到系统中,验证了设计的可行性.
文摘In enterprise dynamic alliance towards agile manufacturing systems, any group needs to know which activities it must take part in, in what order those activities take place and how many other groups it must interact with. The traditional procedural models can’t meet the requirement of the modeling for an enterprise dynamic alliance. In this paper, we use role based models for an enterprise modeling. Role based models group activities into roles, which describe the desired behavior of individual enterprise. We have developed a graphical modeling tool built on Web/DCOM platform according to Petri net theory and role based methodology.