open networks
Recently Published Documents


TOTAL DOCUMENTS

190
(FIVE YEARS 32)

H-INDEX

19
(FIVE YEARS 1)

Symmetry ◽  
2022 ◽  
Vol 14 (1) ◽  
pp. 92
Author(s):  
Andrzej Gecow ◽  
Laszlo Barna Iantovics

Up until now, studies of Kauffman network stability have focused on the conditions resulting from the structure of the network. Negative feedbacks have been modeled as ice (nodes that do not change their state) in an ordered phase but this blocks the possibility of breaking out of the range of correct operation. This first, very simplified approximation leads to some incorrect conclusions, e.g., that life is on the edge of chaos. We develop a second approximation, which discovers half-chaos and shows its properties. In previous works, half-chaos has been confirmed in autonomous networks, but only using node function disturbance, which does not change the network structure. Now we examine half-chaos during network growth by adding and removing nodes as a disturbance in autonomous and open networks. In such evolutions controlled by a ‘small change’ of functioning after disturbance, the half-chaos is kept but spontaneous modularity emerges and blurs the picture. Half-chaos is a state to be expected in most of the real systems studied, therefore the determinants of the variability that maintains the half-chaos are particularly important in the application of complex network knowledge.


2021 ◽  
Vol 15 (23) ◽  
pp. 89-103
Author(s):  
Muneer Ahmad Dar ◽  
Aadil Askar ◽  
Daliya Alyahya ◽  
Sameer Ahmad Bhat

Open networks enable data communication between different types of mobile devices that showcase the need to enforce elevated security measures. Securing sensitive or confidential data in mobile phones is accomplished by implementing a diverse range of cryptographic techniques. While encryption algorithms, such as Rivest–Shamir–Adleman (RSA) may offer secure solutions that are often difficult to compromise, these in turn prerequisite high speed computational resources for effective operation. Elliptical curve cryptography (ECC) is well thought-out standard that offers a workable and feasible methods of encryption/decryption, whilst being applicable to resource constraint devices. This paper implements a novel key exchange mechanism that helps to secure exchange of data between the communicating mobile devices. The study aims to address the limitation of Elliptic Curve Deffie Hellman, which is susceptible to Man-in-the-Middle attack and proposes an enhanced Elliptic Curve Deffie Hellman (ECDH) technique for secure data communication in open networks. The study results reveal, how the implementation of ECDH allows exchange of keys between the two communicating devices with limited resources.


2021 ◽  
Vol 13 (21) ◽  
pp. 11787
Author(s):  
Maria Elena Menconi ◽  
Ambra Sipone ◽  
David Grohmann

This paper presents a GIS-based method for supporting local administrations in the design of urban green areas while taking into account the complexity of the whole system. The proposed method merges the criteria of availability, accessibility, attractiveness, usability, and suitability in a multi-level approach (city, neighborhood green area) to assist in the selection of which services within green areas to enhance from those requested by citizens. The case study is an urban park in a medium-sized Italian city (Perugia). The results demonstrate that the available urban green spaces amount to 34.7 m2 per person, but only 24% of citizens have adequate access to a green area providing at least an adequate level of service, and 18% of them are without access to any appropriately equipped green area. Furthermore, citizens have limited knowledge of their city’s urban green system as a whole. Indeed, 41% of the requested services were already available in other accessible green areas with attractive and readily available dedicated equipment. These areas were suggested as alternative solutions. To achieve a complex systems approach, our results suggest observing similar systems with various and adaptable scales and studying them as open networks composed of heterogeneous internal and external variables.


2021 ◽  
pp. 102492
Author(s):  
Eduardo Andrade ◽  
Jorge Granjal ◽  
João P. Vilela ◽  
Carlos Arantes

2021 ◽  
Author(s):  
Céline Comte ◽  
Jan-Pieter Dorsman

AbstractOrder-independent (OI) queues, introduced by Berezner et al. (Queueing Syst 19(4):345–359, 1995), expanded the family of multi-class queues that are known to have a product-form stationary distribution by allowing for intricate class-dependent service rates. This paper further broadens this family by introducing pass-and-swap (P&S) queues, an extension of OI queues where, upon a service completion, the customer that completes service is not necessarily the one that leaves the system. More precisely, we supplement the OI queue model with an undirected graph on the customer classes, which we call a swapping graph, such that there is an edge between two classes if customers of these classes can be swapped with one another. When a customer completes service, it passes over customers in the remainder of the queue until it finds a customer it can swap positions with, that is, a customer whose class is a neighbor in the graph. In its turn, the customer that is ejected from its position takes the position of the next customer it can be swapped with, and so on. This is repeated until a customer can no longer find another customer to be swapped with; this customer is the one that leaves the queue. After proving that P&S queues have a product-form stationary distribution, we derive a necessary and sufficient stability condition for (open networks of) P&S queues that also applies to OI queues. We then study irreducibility properties of closed networks of P&S queues and derive the corresponding product-form stationary distribution. Lastly, we demonstrate that closed networks of P&S queues can be applied to describe the dynamics of new and existing load-distribution and scheduling protocols in clusters of machines in which jobs have assignment constraints.


Expansion of internet connectivity and its usage globally has increased various demands of providing security for the data transmission. Telemedicine is a modern way of medical care that can be extended to any remote place across the globe. This medical care practice is a result of the deployment of communication systems and information technology into healthcare system. With this technology the diagnosed data can be shared with physician and take his consultation remarks and also physicians can access to diagnostic archive and share for medical practice and learning. However, this exchange of information is confined with several risks of data theft when they are shared in open networks and hence they are to be protected with high security algorithms. This paper provides a high capacitive security algorithm for protecting the images with hidden confidential information. The approach provides a two-way security by encrypting the clinical information initially and embedding it imperceptibly in the concerned image so that the user on other can obtain both the visual and text data at same instance


Author(s):  
Norhidayah Mohamad ◽  
Azrina Othman ◽  
Tan Siew Ying ◽  
Neerosha Rajah ◽  
Norsamsinar Samsudin

Over the years, there has been tremendous growth in online social networking which contributed to the revolution of higher education’s learning environment. Massive Online Open Courses (MOOC) is now common in online education, which provides open networks of self-directed learning. MOOCs are referred as a continuation trend in innovation that initiated by learning from geographical distance and online. MOOCs is a current evolvement in higher learning institution in Malaysia with the aims to provide quality education for the students. However, there are some challenges in developing effective instructional design courses and retaining learners in MOOCs. Therefore, the purpose of this study is to discover the relationship between MOOC’s content design and students’ performances among UTeM’s engineering students. Through literature review, variables are identified such as courses content design, enhancement in teaching and learning and students’ performance. In this study, 373 samples have been collected and the data analysed using SPSS. The results revealed that there are significant relationships between courses materials, courses activities, and courses tools with students’ performance. It is believed that this research paper will beneficial to higher education to improve MOOC’s content design in order to enhance the students’ performance in the future.


2021 ◽  
Vol 58 (2) ◽  
pp. 6561-6573
Author(s):  
P. Ramachandran , Dr. R. Balasubramanian

Proliferation of the internet by multiple devices has led to dramatic increases in network traffic.  The Internet medium has also been growing with this usage, but this fast growth has also resulted in new threats making networks vulnerable to intruders and attackers or malicious users. This has made network security an important factor due to excessive usage of ICT (Information and Communications Technology) as threats to IVTs has also grown manifold. Securing data is a major issue, especially when they are transmitted across open networks. IDSs (Intrusion Detection Systems)  are methods or techniques or algorithm which cater to detection of intrusions while on transit. IDSs are useful in identifying harmful operations. Secure automated threat detection and prevention is a more effective procedure to reduce workloads of monitors by scanning the network, server functions and inform monitors on suspicious activity. IDSs monitor systems continually in the angle of threat. This paper’s proposed technique detects suspicious activities using AI (Artificial Intelligence) and analyzes networks concurrently for defense from harmful activities. The proposed algorithm’s experimental results conducted on the UNSW_NB15_training-set shows good performances in terms of accuracy clocking above 96%. 


Author(s):  
Cozmiuc Claudia Diana

This chapter is a descriptive and explicative case study about value creation at Siemens in an uncertain and in a certain environment. Siemens has implemented economic value-added-based management since 1998. The empirical data analysis highlights value creation at Siemens at the beginning of the innovation lifecycle, when the environment is uncertain, and at the end of the innovation lifecycle, when contracts are signed, and the environment becomes predictable. Innovation is first placed in open networks, in which start-ups are essential, to which venture capital is allocated using business models. This is the ideation stage of the product lifecycle, when competitive advantage, the essence of value creation in both theory and the Siemens example, is created. Innovation matures, and Siemens closes contracts with customers about existing customer offerings. These contracts are managed as projects and funded with equity and debt. This is the stage when sufficient data exists to plan economic value added, the focus of Siemens' corporate governance.


Sign in / Sign up

Export Citation Format

Share Document