This paper presents a management process for creating adaptive, real-time security policies within the Six Sigma (6σ) framework. A key challenge for the creation of a management process is the integration with models...This paper presents a management process for creating adaptive, real-time security policies within the Six Sigma (6σ) framework. A key challenge for the creation of a management process is the integration with models of known Industrial processes. One of the most used industrial process models is Six Sigma which is a business management model wherein customer centric needs are put in perspective with business data to create an efficient system. The security policy creation and management process proposed in this paper is based on the Six Sigma model and presents a method to adapt security goals and risk management of a computing service. By formalizing a security policy management process within an industrial process model, the adaptability of this model to existing industrial tools is seamless and offers a clear risk based policy decision framework. In particular, this paper presents the necessary tools and procedures to map Six Sigma DMAIC (Define-Measure-Analyze-Improve-Control) methodology to security policy management.展开更多
Climate services (CS) are crucial for mitigating and managing the impacts and risks associated with climate-induced disasters. While evidence over the past decade underscores their effectiveness across various domains...Climate services (CS) are crucial for mitigating and managing the impacts and risks associated with climate-induced disasters. While evidence over the past decade underscores their effectiveness across various domains, particularly agriculture, to maximize their potential, it is crucial to identify emerging priority areas and existing research gaps for future research agendas. As a contribution to this effort, this paper employs the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology to review the state-of-the-art in the field of climate services for disaster risk management. A comprehensive search across five literature databases combined with a snowball search method using ResearchRabbit was conducted and yielded 242 peer-reviewed articles, book sections, and reports over 2013-2023 after the screening process. The analysis revealed flood, drought, and food insecurity as major climate-related disasters addressed in the reviewed literature. Major climate services addressed included early warning systems, (sub)seasonal forecasts and impact-based warnings. Grounded in the policy processes’ theoretical perspective, the main focus identified and discussed three prevailing policy-oriented priority areas: 1) development of climate services, 2) use-adoption-uptake, and 3) evaluation of climate services. In response to the limitations of the prevalent supply-driven and top-down approach to climate services promotion, co-production emerges as a cross-cutting critical aspect of the identified priority areas. Despite the extensive research in the field, more attention is needed, particularly pronounced in the science-policy interface perspective, which in practice bridges scientific knowledge and policy decisions for effective policy processes. This perspective offers a valuable analytical lens as an entry point for further investigation. Hence, future research agendas would generate insightful evidence by scrutinizing this critical aspect given its importance to institutions and climate services capacity, to better understand intricate facets of the development and the integration of climate services into disaster risk management.展开更多
This paper discussed the necessity of establishing a computer network in a mining railway transport management system. The network structure and the system security design, associated with the real development conditi...This paper discussed the necessity of establishing a computer network in a mining railway transport management system. The network structure and the system security design, associated with the real development condition of a mining area, were brought forward, and the system evaluation was given.展开更多
Here I discuss Central and Eastern European(CEE)countries as a region undergoing rapid change,resulting from the collapse of the Soviet Union and admission of some of the states into the European Union.These events br...Here I discuss Central and Eastern European(CEE)countries as a region undergoing rapid change,resulting from the collapse of the Soviet Union and admission of some of the states into the European Union.These events brought changes in governance and ecosystem management,triggering impacts on land use and biodiversity.What are some of the policy options toward sustainability in the face of these political,governance,and socioeconomic changes?Some policy considerations for ecosystem management and sustainability include taking a social-ecological systems approach to integrate biophysical subsystems and social subsystems;paying attention to institutions relevant to shared resources(commons)management;and using resilience theory to study change and guidance for governance.Documented experience in CEE seems to indicate shortcomings for both the centralized state management option and the purely market-driven option for ecosystem management.If so,a“smart mix”of state regulations,market incentives,and self-governance using local commons institutions may be the most promising policy option to foster ecosystem stewardship at multiple levels from local to international.展开更多
The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficien...The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficient way. In this paper, object oriented technique is applied to the structural model of IINM system, The Domain object class and the MU object class are used to represent the manager and the managed resources. Especially, NM IA is introduced which is a special object class with intelligent behaviors to manage the resources efficiently.展开更多
The satellite-terrestrial networks possess the ability to transcend geographical constraints inherent in traditional communication networks,enabling global coverage and offering users ubiquitous computing power suppor...The satellite-terrestrial networks possess the ability to transcend geographical constraints inherent in traditional communication networks,enabling global coverage and offering users ubiquitous computing power support,which is an important development direction of future communications.In this paper,we take into account a multi-scenario network model under the coverage of low earth orbit(LEO)satellite,which can provide computing resources to users in faraway areas to improve task processing efficiency.However,LEO satellites experience limitations in computing and communication resources and the channels are time-varying and complex,which makes the extraction of state information a daunting task.Therefore,we explore the dynamic resource management issue pertaining to joint computing,communication resource allocation and power control for multi-access edge computing(MEC).In order to tackle this formidable issue,we undertake the task of transforming the issue into a Markov decision process(MDP)problem and propose the self-attention based dynamic resource management(SABDRM)algorithm,which effectively extracts state information features to enhance the training process.Simulation results show that the proposed algorithm is capable of effectively reducing the long-term average delay and energy consumption of the tasks.展开更多
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne...Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment.展开更多
COVID-19 pandemic restrictions limited all social activities to curtail the spread of the virus.The foremost and most prime sector among those affected were schools,colleges,and universities.The education system of en...COVID-19 pandemic restrictions limited all social activities to curtail the spread of the virus.The foremost and most prime sector among those affected were schools,colleges,and universities.The education system of entire nations had shifted to online education during this time.Many shortcomings of Learning Management Systems(LMSs)were detected to support education in an online mode that spawned the research in Artificial Intelligence(AI)based tools that are being developed by the research community to improve the effectiveness of LMSs.This paper presents a detailed survey of the different enhancements to LMSs,which are led by key advances in the area of AI to enhance the real-time and non-real-time user experience.The AI-based enhancements proposed to the LMSs start from the Application layer and Presentation layer in the form of flipped classroom models for the efficient learning environment and appropriately designed UI/UX for efficient utilization of LMS utilities and resources,including AI-based chatbots.Session layer enhancements are also required,such as AI-based online proctoring and user authentication using Biometrics.These extend to the Transport layer to support real-time and rate adaptive encrypted video transmission for user security/privacy and satisfactory working of AI-algorithms.It also needs the support of the Networking layer for IP-based geolocation features,the Virtual Private Network(VPN)feature,and the support of Software-Defined Networks(SDN)for optimum Quality of Service(QoS).Finally,in addition to these,non-real-time user experience is enhanced by other AI-based enhancements such as Plagiarism detection algorithms and Data Analytics.展开更多
The CifNet network multi-well data management system is developed for 100MB or 1000MB local network environments which are used in Chinese oil industry. The kernel techniques of CifNet system include: 1, establishing ...The CifNet network multi-well data management system is developed for 100MB or 1000MB local network environments which are used in Chinese oil industry. The kernel techniques of CifNet system include: 1, establishing a high efficient and low cost network multi-well data management architecture based on the General Logging Curve Theory and the Cif data format; 2, implementing efficient visit and transmission of multi-well data in C/S local network based on TCP/IP protocol; 3,ensuring the safety of multi-well data in store, visit and application based on Unix operating system security. By using CifNet system, the researcher in office or at home can visit curves of any borehole in any working area of any oilfield. The application foreground of CifNet system is also commented.展开更多
Edge devices in Internet of Things(IoT)applications can form peers to communicate in peer-to-peer(P2P)networks over P2P protocols.Using P2P networks ensures scalability and removes the need for centralized management....Edge devices in Internet of Things(IoT)applications can form peers to communicate in peer-to-peer(P2P)networks over P2P protocols.Using P2P networks ensures scalability and removes the need for centralized management.However,due to the open nature of P2P networks,they often suffer from the existence of malicious peers,especially malicious peers that unite in groups to raise each other’s ratings.This compromises users’safety and makes them lose their confidence about the files or services they are receiving.To address these challenges,we propose a neural networkbased algorithm,which uses the advantages of a machine learning algorithm to identify whether or not a peer is malicious.In this paper,a neural network(NN)was chosen as the machine learning algorithm due to its efficiency in classification.The experiments showed that the NNTrust algorithm is more effective and has a higher potential of reducing the number of invalid files and increasing success rates than other well-known trust management systems.展开更多
In opportunistic networks, most existing buffer management policies including scheduling and passive dropping policies are mainly for routing protocols. In this paper, we proposed a Utility-based Buffer Management str...In opportunistic networks, most existing buffer management policies including scheduling and passive dropping policies are mainly for routing protocols. In this paper, we proposed a Utility-based Buffer Management strategy(UBM) for data dissemination in opportunistic networks. In UBM, we first design a method of computing the utility values of caching messages according to the interest of nodes and the delivery probability of messages, and then propose an overall buffer management policy based on the utility. UBM driven by receivers completely implements not only caching policies, passive and proactive dropping policies, but also scheduling policies of senders. Simulation results show that, compared with some classical dropping strategies, UBM can obtain higher delivery ratio and lower delay latency by using smaller network cost.展开更多
This paper introduces a parking management system based on a wireless sensor network developed by our group. The system consists of a large amount of parking space monitoring nodes, a few parking guiding nodes, a sink...This paper introduces a parking management system based on a wireless sensor network developed by our group. The system consists of a large amount of parking space monitoring nodes, a few parking guiding nodes, a sink node and a management station. All the nodes exchange information with each other through wireless communication. The prototype of the parking management system has been implemented and the preliminary test results show that the performance of the system can satisfy the requirements of the application.展开更多
The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Archite...The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Architecture) technique, we mainly discuss about the applicability of the approach by which CORBA combined with Java has been applied to the system model and Web architecture: and address the applied frame and the interface definitions that are the, key technologies for implementing the Distributed Object Computing (DOC). In addition, we also conduct the research on its advantages and disadvantages and further expected improvements. Key words distributed Web network management - CORBA - Java CLC number TP 393.07 Foundation item: Supported by the QTNG (Integrated Network Management System) Project Foundation and QT-NMS (SDH NMS) Project Foundation of Wuhan Qingtian Information Industry Co., LTD of Hubei of China (SDH.001)Biography: WANG Feng (1979-), male Master candidate, research direction: administration of network and software engineering.展开更多
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat...This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow).展开更多
Recent economic crises like the 2008 financial tsunami has demonstrated a critical need for better understanding of the topologies and various economic,social,and technical mechanisms of the increasingly interconnecte...Recent economic crises like the 2008 financial tsunami has demonstrated a critical need for better understanding of the topologies and various economic,social,and technical mechanisms of the increasingly interconnected global financial system.Such a system largely relies on the interconnectedness of various financial entities such as banks,firms,and investors through complex financial relationships such as interbank payment networks,investment relations,or supply chains.A network-based perspective or approach is needed to study various financial networks in order to improve or extend financial theories,as well as develop business applications.Moreover,with the advance of big data related technologies,and the availability of huge amounts of financial and economic network data,advanced computing technologies and data analytics that can comprehend such big data are also needed.We referred this approach as financial network analytics.We suggest that it will enable stakeholders better understand the network dynamics within the interconnected global financial system and help designing financial policies such as managing and monitoring banking systemic risk,as well as developing intelligent business applications like banking advisory systems.In this paper,we review the existing research about financial network analytics and then discuss its main research challenges from the economic,social,and technological perspectives.展开更多
This paper presents the design and implementation of the policy management layer of the softswitch system, which is currently under development in our lab. The distinguish key feature of our policy management subsyste...This paper presents the design and implementation of the policy management layer of the softswitch system, which is currently under development in our lab. The distinguish key feature of our policy management subsystem is that the Parlay policy management architecture and the specific technical requirements of softswitch system management are closely incorporated. In this way, not only network providers but also authorized 3rd party application providers and application developers can develop services and applications to manage the access and use of network resources on a per user or application basis to best support established business objectives. The material presented in this document is heavily based on the work of Parlay policy management and IETF policy framework working group.展开更多
Traditional SNMP-based network management can not deal with the task of managing large-scaled distributed network,while policy-based management is one of the effective solutions in network and distributed systems mana...Traditional SNMP-based network management can not deal with the task of managing large-scaled distributed network,while policy-based management is one of the effective solutions in network and distributed systems management.However,cross-vendor hardware compatibility is one of the limitations in policy-based management.Devices existing in current network mostly support SNMP rather than Common Open Policy Service(COPS)protocol.By analyzing traditional network management and policy-based network management,a scalable network management framework is proposed.It is combined with Internet Engineering Task Force(IETF)framework for policy-based management and SNMP-based network management.By interpreting and translating policy decision to SNMP message,policy can be executed in traditional SNMP-based device.展开更多
As a carrier to develop various marine resources, sea area is regulated as a kind of important resources through legislation by many coastal countries with a management system for the paid use of sea area. Since the e...As a carrier to develop various marine resources, sea area is regulated as a kind of important resources through legislation by many coastal countries with a management system for the paid use of sea area. Since the early 1990s, China has begun to implement the paid use and formed an institutional system comprised of three levels after developing it for more than two decades. From 2002 to 2015, the Chinese Government transferred the use right of sea area of 33,910 km2 by paid use and levied a total of 75.89 billion CNY (11.328 billion US dollars) of sea area use payment. Apart from this, the Government has gained rich experience in operating and managing the compensable use of sea area. After retrospectively analyzing the development history of paid use of China’s sea area, the research presents an institutional structure and the implementation of the management system for the paid use of sea area and the main problems therein. On this basis, management policies and feasible policy suggestions are proposed. Research results from this study can provide available references for other developing countries and emerging economies to apply and improve native management system for the paid use of sea area.展开更多
The necessity to construct the network management information system of 3PLs agricultural supply chain is analyzed,showing that 3PLs can improve the overall competitive advantage of agricultural supply chain.3PLs chan...The necessity to construct the network management information system of 3PLs agricultural supply chain is analyzed,showing that 3PLs can improve the overall competitive advantage of agricultural supply chain.3PLs changes the homogeneity management into specialized management of logistics service and achieves the alliance of the subjects at different nodes of agricultural products supply chain.Network management information system structure of agricultural products supply chain based on 3PLs is constructed,including the four layers (the network communication layer,the hardware and software environment layer,the database layer,and the application layer) and 7 function modules (centralized control,transportation process management,material and vehicle scheduling,customer relationship,storage management,customer inquiry,and financial management).Framework for the network management information system of agricultural products supply chain based on 3PLs is put forward.The management of 3PLs mainly includes purchasing management,supplier relationship management,planning management,customer relationship management,storage management and distribution management.Thus,a management system of internal and external integrated agricultural enterprises is obtained.The network management information system of agricultural products supply chain based on 3PLs has realized the effective sharing of enterprise information of agricultural products supply chain at different nodes,establishing a long-term partnership revolving around the 3PLs core enterprise,as well as a supply chain with stable relationship based on the supply chain network system,so as to improve the circulation efficiency of agricultural products,and to explore the sales market for agricultural products.展开更多
Agriculture and farming are mainly dependent on weather especially in Malaysia as it received heavy rainfall throughout the years. An efficient crop or tree management system with a weather forecast needed for suitabl...Agriculture and farming are mainly dependent on weather especially in Malaysia as it received heavy rainfall throughout the years. An efficient crop or tree management system with a weather forecast needed for suitable planning of farming operation. Radial Basis Function Neural Network (RBFNN) algorithm was used in this study to predict rainfall and the main focus of this study is to analyze the factor that affect</span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">s</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> the performance of neural model. This study found that the model works better the more hidden nodes and the optimum learning rate is 0.01 with the RMSE 49% and the percentage accuracy is 57%. Besides that, it is found that the meteorology data also affect the model performance. Future research can be conducted to improve the rainfall forecast of this study and improv</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">e</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> the tree management system.展开更多
文摘This paper presents a management process for creating adaptive, real-time security policies within the Six Sigma (6σ) framework. A key challenge for the creation of a management process is the integration with models of known Industrial processes. One of the most used industrial process models is Six Sigma which is a business management model wherein customer centric needs are put in perspective with business data to create an efficient system. The security policy creation and management process proposed in this paper is based on the Six Sigma model and presents a method to adapt security goals and risk management of a computing service. By formalizing a security policy management process within an industrial process model, the adaptability of this model to existing industrial tools is seamless and offers a clear risk based policy decision framework. In particular, this paper presents the necessary tools and procedures to map Six Sigma DMAIC (Define-Measure-Analyze-Improve-Control) methodology to security policy management.
文摘Climate services (CS) are crucial for mitigating and managing the impacts and risks associated with climate-induced disasters. While evidence over the past decade underscores their effectiveness across various domains, particularly agriculture, to maximize their potential, it is crucial to identify emerging priority areas and existing research gaps for future research agendas. As a contribution to this effort, this paper employs the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology to review the state-of-the-art in the field of climate services for disaster risk management. A comprehensive search across five literature databases combined with a snowball search method using ResearchRabbit was conducted and yielded 242 peer-reviewed articles, book sections, and reports over 2013-2023 after the screening process. The analysis revealed flood, drought, and food insecurity as major climate-related disasters addressed in the reviewed literature. Major climate services addressed included early warning systems, (sub)seasonal forecasts and impact-based warnings. Grounded in the policy processes’ theoretical perspective, the main focus identified and discussed three prevailing policy-oriented priority areas: 1) development of climate services, 2) use-adoption-uptake, and 3) evaluation of climate services. In response to the limitations of the prevalent supply-driven and top-down approach to climate services promotion, co-production emerges as a cross-cutting critical aspect of the identified priority areas. Despite the extensive research in the field, more attention is needed, particularly pronounced in the science-policy interface perspective, which in practice bridges scientific knowledge and policy decisions for effective policy processes. This perspective offers a valuable analytical lens as an entry point for further investigation. Hence, future research agendas would generate insightful evidence by scrutinizing this critical aspect given its importance to institutions and climate services capacity, to better understand intricate facets of the development and the integration of climate services into disaster risk management.
文摘This paper discussed the necessity of establishing a computer network in a mining railway transport management system. The network structure and the system security design, associated with the real development condition of a mining area, were brought forward, and the system evaluation was given.
文摘Here I discuss Central and Eastern European(CEE)countries as a region undergoing rapid change,resulting from the collapse of the Soviet Union and admission of some of the states into the European Union.These events brought changes in governance and ecosystem management,triggering impacts on land use and biodiversity.What are some of the policy options toward sustainability in the face of these political,governance,and socioeconomic changes?Some policy considerations for ecosystem management and sustainability include taking a social-ecological systems approach to integrate biophysical subsystems and social subsystems;paying attention to institutions relevant to shared resources(commons)management;and using resilience theory to study change and guidance for governance.Documented experience in CEE seems to indicate shortcomings for both the centralized state management option and the purely market-driven option for ecosystem management.If so,a“smart mix”of state regulations,market incentives,and self-governance using local commons institutions may be the most promising policy option to foster ecosystem stewardship at multiple levels from local to international.
文摘The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficient way. In this paper, object oriented technique is applied to the structural model of IINM system, The Domain object class and the MU object class are used to represent the manager and the managed resources. Especially, NM IA is introduced which is a special object class with intelligent behaviors to manage the resources efficiently.
基金supported by the National Key Research and Development Plan(No.2022YFB2902701)the key Natural Science Foundation of Shenzhen(No.JCYJ20220818102209020).
文摘The satellite-terrestrial networks possess the ability to transcend geographical constraints inherent in traditional communication networks,enabling global coverage and offering users ubiquitous computing power support,which is an important development direction of future communications.In this paper,we take into account a multi-scenario network model under the coverage of low earth orbit(LEO)satellite,which can provide computing resources to users in faraway areas to improve task processing efficiency.However,LEO satellites experience limitations in computing and communication resources and the channels are time-varying and complex,which makes the extraction of state information a daunting task.Therefore,we explore the dynamic resource management issue pertaining to joint computing,communication resource allocation and power control for multi-access edge computing(MEC).In order to tackle this formidable issue,we undertake the task of transforming the issue into a Markov decision process(MDP)problem and propose the self-attention based dynamic resource management(SABDRM)algorithm,which effectively extracts state information features to enhance the training process.Simulation results show that the proposed algorithm is capable of effectively reducing the long-term average delay and energy consumption of the tasks.
基金This work was funded by the Deanship of Scientific Research at Jouf University under Grant Number(DSR2022-RG-0102).
文摘Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment.
文摘COVID-19 pandemic restrictions limited all social activities to curtail the spread of the virus.The foremost and most prime sector among those affected were schools,colleges,and universities.The education system of entire nations had shifted to online education during this time.Many shortcomings of Learning Management Systems(LMSs)were detected to support education in an online mode that spawned the research in Artificial Intelligence(AI)based tools that are being developed by the research community to improve the effectiveness of LMSs.This paper presents a detailed survey of the different enhancements to LMSs,which are led by key advances in the area of AI to enhance the real-time and non-real-time user experience.The AI-based enhancements proposed to the LMSs start from the Application layer and Presentation layer in the form of flipped classroom models for the efficient learning environment and appropriately designed UI/UX for efficient utilization of LMS utilities and resources,including AI-based chatbots.Session layer enhancements are also required,such as AI-based online proctoring and user authentication using Biometrics.These extend to the Transport layer to support real-time and rate adaptive encrypted video transmission for user security/privacy and satisfactory working of AI-algorithms.It also needs the support of the Networking layer for IP-based geolocation features,the Virtual Private Network(VPN)feature,and the support of Software-Defined Networks(SDN)for optimum Quality of Service(QoS).Finally,in addition to these,non-real-time user experience is enhanced by other AI-based enhancements such as Plagiarism detection algorithms and Data Analytics.
文摘The CifNet network multi-well data management system is developed for 100MB or 1000MB local network environments which are used in Chinese oil industry. The kernel techniques of CifNet system include: 1, establishing a high efficient and low cost network multi-well data management architecture based on the General Logging Curve Theory and the Cif data format; 2, implementing efficient visit and transmission of multi-well data in C/S local network based on TCP/IP protocol; 3,ensuring the safety of multi-well data in store, visit and application based on Unix operating system security. By using CifNet system, the researcher in office or at home can visit curves of any borehole in any working area of any oilfield. The application foreground of CifNet system is also commented.
文摘Edge devices in Internet of Things(IoT)applications can form peers to communicate in peer-to-peer(P2P)networks over P2P protocols.Using P2P networks ensures scalability and removes the need for centralized management.However,due to the open nature of P2P networks,they often suffer from the existence of malicious peers,especially malicious peers that unite in groups to raise each other’s ratings.This compromises users’safety and makes them lose their confidence about the files or services they are receiving.To address these challenges,we propose a neural networkbased algorithm,which uses the advantages of a machine learning algorithm to identify whether or not a peer is malicious.In this paper,a neural network(NN)was chosen as the machine learning algorithm due to its efficiency in classification.The experiments showed that the NNTrust algorithm is more effective and has a higher potential of reducing the number of invalid files and increasing success rates than other well-known trust management systems.
基金supported by the National Natural Science Fund of China under Grant No. 61472097the Education Ministry Doctoral Research Foundation of China (20132304110017)the International Exchange Program of Harbin Engineering University for Innovation-oriented Talents Cultivation
文摘In opportunistic networks, most existing buffer management policies including scheduling and passive dropping policies are mainly for routing protocols. In this paper, we proposed a Utility-based Buffer Management strategy(UBM) for data dissemination in opportunistic networks. In UBM, we first design a method of computing the utility values of caching messages according to the interest of nodes and the delivery probability of messages, and then propose an overall buffer management policy based on the utility. UBM driven by receivers completely implements not only caching policies, passive and proactive dropping policies, but also scheduling policies of senders. Simulation results show that, compared with some classical dropping strategies, UBM can obtain higher delivery ratio and lower delay latency by using smaller network cost.
基金Supported by National Natural Science Foundation of P. R. China (60373049) National Basic Research Program of P.R.China (2006CB 3030000)
文摘This paper introduces a parking management system based on a wireless sensor network developed by our group. The system consists of a large amount of parking space monitoring nodes, a few parking guiding nodes, a sink node and a management station. All the nodes exchange information with each other through wireless communication. The prototype of the parking management system has been implemented and the preliminary test results show that the performance of the system can satisfy the requirements of the application.
文摘The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Architecture) technique, we mainly discuss about the applicability of the approach by which CORBA combined with Java has been applied to the system model and Web architecture: and address the applied frame and the interface definitions that are the, key technologies for implementing the Distributed Object Computing (DOC). In addition, we also conduct the research on its advantages and disadvantages and further expected improvements. Key words distributed Web network management - CORBA - Java CLC number TP 393.07 Foundation item: Supported by the QTNG (Integrated Network Management System) Project Foundation and QT-NMS (SDH NMS) Project Foundation of Wuhan Qingtian Information Industry Co., LTD of Hubei of China (SDH.001)Biography: WANG Feng (1979-), male Master candidate, research direction: administration of network and software engineering.
文摘This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow).
基金This research was partially supported by Department of informatics,Faculty of Economics,Business Administration and Information Technology,University of Zurich.
文摘Recent economic crises like the 2008 financial tsunami has demonstrated a critical need for better understanding of the topologies and various economic,social,and technical mechanisms of the increasingly interconnected global financial system.Such a system largely relies on the interconnectedness of various financial entities such as banks,firms,and investors through complex financial relationships such as interbank payment networks,investment relations,or supply chains.A network-based perspective or approach is needed to study various financial networks in order to improve or extend financial theories,as well as develop business applications.Moreover,with the advance of big data related technologies,and the availability of huge amounts of financial and economic network data,advanced computing technologies and data analytics that can comprehend such big data are also needed.We referred this approach as financial network analytics.We suggest that it will enable stakeholders better understand the network dynamics within the interconnected global financial system and help designing financial policies such as managing and monitoring banking systemic risk,as well as developing intelligent business applications like banking advisory systems.In this paper,we review the existing research about financial network analytics and then discuss its main research challenges from the economic,social,and technological perspectives.
文摘This paper presents the design and implementation of the policy management layer of the softswitch system, which is currently under development in our lab. The distinguish key feature of our policy management subsystem is that the Parlay policy management architecture and the specific technical requirements of softswitch system management are closely incorporated. In this way, not only network providers but also authorized 3rd party application providers and application developers can develop services and applications to manage the access and use of network resources on a per user or application basis to best support established business objectives. The material presented in this document is heavily based on the work of Parlay policy management and IETF policy framework working group.
基金National Nature Science Foundation of China(No.60534020)Cultivation Fundation of the Key Scientific and Technical Innovation Project from Ministry of Education of China(No.706024)International Science Cooperation Foundation of Shanghai,China(No.061307041)
文摘Traditional SNMP-based network management can not deal with the task of managing large-scaled distributed network,while policy-based management is one of the effective solutions in network and distributed systems management.However,cross-vendor hardware compatibility is one of the limitations in policy-based management.Devices existing in current network mostly support SNMP rather than Common Open Policy Service(COPS)protocol.By analyzing traditional network management and policy-based network management,a scalable network management framework is proposed.It is combined with Internet Engineering Task Force(IETF)framework for policy-based management and SNMP-based network management.By interpreting and translating policy decision to SNMP message,policy can be executed in traditional SNMP-based device.
文摘As a carrier to develop various marine resources, sea area is regulated as a kind of important resources through legislation by many coastal countries with a management system for the paid use of sea area. Since the early 1990s, China has begun to implement the paid use and formed an institutional system comprised of three levels after developing it for more than two decades. From 2002 to 2015, the Chinese Government transferred the use right of sea area of 33,910 km2 by paid use and levied a total of 75.89 billion CNY (11.328 billion US dollars) of sea area use payment. Apart from this, the Government has gained rich experience in operating and managing the compensable use of sea area. After retrospectively analyzing the development history of paid use of China’s sea area, the research presents an institutional structure and the implementation of the management system for the paid use of sea area and the main problems therein. On this basis, management policies and feasible policy suggestions are proposed. Research results from this study can provide available references for other developing countries and emerging economies to apply and improve native management system for the paid use of sea area.
文摘The necessity to construct the network management information system of 3PLs agricultural supply chain is analyzed,showing that 3PLs can improve the overall competitive advantage of agricultural supply chain.3PLs changes the homogeneity management into specialized management of logistics service and achieves the alliance of the subjects at different nodes of agricultural products supply chain.Network management information system structure of agricultural products supply chain based on 3PLs is constructed,including the four layers (the network communication layer,the hardware and software environment layer,the database layer,and the application layer) and 7 function modules (centralized control,transportation process management,material and vehicle scheduling,customer relationship,storage management,customer inquiry,and financial management).Framework for the network management information system of agricultural products supply chain based on 3PLs is put forward.The management of 3PLs mainly includes purchasing management,supplier relationship management,planning management,customer relationship management,storage management and distribution management.Thus,a management system of internal and external integrated agricultural enterprises is obtained.The network management information system of agricultural products supply chain based on 3PLs has realized the effective sharing of enterprise information of agricultural products supply chain at different nodes,establishing a long-term partnership revolving around the 3PLs core enterprise,as well as a supply chain with stable relationship based on the supply chain network system,so as to improve the circulation efficiency of agricultural products,and to explore the sales market for agricultural products.
文摘Agriculture and farming are mainly dependent on weather especially in Malaysia as it received heavy rainfall throughout the years. An efficient crop or tree management system with a weather forecast needed for suitable planning of farming operation. Radial Basis Function Neural Network (RBFNN) algorithm was used in this study to predict rainfall and the main focus of this study is to analyze the factor that affect</span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">s</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> the performance of neural model. This study found that the model works better the more hidden nodes and the optimum learning rate is 0.01 with the RMSE 49% and the percentage accuracy is 57%. Besides that, it is found that the meteorology data also affect the model performance. Future research can be conducted to improve the rainfall forecast of this study and improv</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">e</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> the tree management system.