25 resultados para Network Architectures and Security


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Knowledge accessing from external organisations is important to firms, especially entrepreneurial ones which often cannot generate internally all the knowledge necessary for innovation. There is, however, a lack of evidence concerning the association between the evolution of firms and the evolution of their networks. The aim of this paper is to begin to fill this gap by undertaking an exploratory analysis of the relationship between the vintage of firms and their knowledge sourcing networks. Drawing on an analysis of firms in the UK, the paper finds some evidence of a U-shaped relationship existing between firm age and the frequency of accessing knowledge from certain sources. Emerging entrepreneurial firms tend to be highly active with regard to accessing knowledge for a range of sources and geographic locations, with the rate of networking dropping somewhat during the period of peak firm growth. For instance, it is found that firms tend to less frequently access knowledge sources such as universities and research institutes in their own region during a stage of peak turnover growth. Overall, the results suggest a complex relationship between the lifecycle of the firm and its networking patterns. It is concluded that policymakers need to become more aware that network formation and utilisation by firms is likely to vary dependent upon their lifecycle position.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim of this special issue is to widen the existing debates on security privatization by looking at how and why an increasing number of private actors beyond private military and/or security companies (PMSCs) have come to perform various security related functions. While PMSCs produce security for profit, most other private sector actors make profit by selling goods and services that were originally not connected with security in the traditional understanding of the term. However, due to the continuous introduction of new legal and technical regulations by public authorities, many non- security related private businesses nowadays have to perform at least some security functions. Little research, however, has been done thus far, both in terms of security practices of non- security related private businesses and their impact on security governance. This introduction explains how this special issue contributes to closing this glaring gap by 1) extending the conceptual and theoretical arguments in the existing body of literature; and 2) offering a range of original case studies on the specific roles of non- security related private companies of all sizes, areas of businesses, and geographic origin.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper reports the initial results of a joint research project carried out by Aston University and Lloyd's Register to develop a practical method of assessing neural network applications. A set of assessment guidelines for neural network applications were developed and tested on two applications. These case studies showed that it is practical to assess neural networks in a statistical pattern recognition framework. However there is need for more standardisation in neural network technology and a wider takeup of good development practice amongst the neural network community.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The exchange of proteins and lipids between the trans-Golgi network (TGN) and the endosomal system requires multiple cellular machines, whose activities are coordinated in space and time to generate pleomorphic, tubulo-vesicular carriers that deliver their content to their target compartments. These machines and their associated protein networks are recruited and/or activated on specific membrane domains where they select proteins and lipids into carriers, contribute to deform/elongate and partition membrane domains using the mechanical forces generated by actin polymerization or movement along microtubules. The coordinated action of these protein networks contributes to regulate the dynamic state of multiple receptors recycling between the cell surface, endosomes and the TGN, to maintain cell homeostasis as exemplified by the biogenesis of lysosomes and related organelles, and to establish/maintain cell polarity. The dynamic assembly and disassembly of these protein networks mediating the exchange of membrane domains between the TGN and endosomes regulates cell-cell signalling and thus the development of multi-cellular organisms. Somatic mutations in single network components lead to changes in transport dynamics that may contribute to pathological modifications underlying several human diseases such as mental retardation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Primarily targeted toward the network or MIS manager who wants to stay abreast of the latest networking technology, Enterprise Networking: Multilayer Switching and Applications offers up to date information relevant for the design of modern corporate networks and for the evaluation of new networking equipment. The book describes the architectures and standards of switching across the various protocol layers and will also address issues such as multicast quality of service, high-availability and network policies that are requirements of modern switched networks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Image segmentation is one of the most computationally intensive operations in image processing and computer vision. This is because a large volume of data is involved and many different features have to be extracted from the image data. This thesis is concerned with the investigation of practical issues related to the implementation of several classes of image segmentation algorithms on parallel architectures. The Transputer is used as the basic building block of hardware architectures and Occam is used as the programming language. The segmentation methods chosen for implementation are convolution, for edge-based segmentation; the Split and Merge algorithm for segmenting non-textured regions; and the Granlund method for segmentation of textured images. Three different convolution methods have been implemented. The direct method of convolution, carried out in the spatial domain, uses the array architecture. The other two methods, based on convolution in the frequency domain, require the use of the two-dimensional Fourier transform. Parallel implementations of two different Fast Fourier Transform algorithms have been developed, incorporating original solutions. For the Row-Column method the array architecture has been adopted, and for the Vector-Radix method, the pyramid architecture. The texture segmentation algorithm, for which a system-level design is given, demonstrates a further application of the Vector-Radix Fourier transform. A novel concurrent version of the quad-tree based Split and Merge algorithm has been implemented on the pyramid architecture. The performance of the developed parallel implementations is analysed. Many of the obtained speed-up and efficiency measures show values close to their respective theoretical maxima. Where appropriate comparisons are drawn between different implementations. The thesis concludes with comments on general issues related to the use of the Transputer system as a development tool for image processing applications; and on the issues related to the engineering of concurrent image processing applications.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dedicated short-range communications (DSRC) are a promising vehicle communication technique for collaborative road safety applications (CSA). However, road safety applications require highly reliable and timely wireless communications, which present big challenges to DSRC based vehicle networks on effective and robust quality of services (QoS) provisioning due to the random channel access method applied in the DSRC technique. In this paper we examine the QoS control problem for CSA in the DSRC based vehicle networks and presented an overview of the research work towards the QoS control problem. After an analysis of the system application requirements and the DSRC vehicle network features, we propose a framework for cooperative and adaptive QoS control, which is believed to be a key for the success of DSRC on supporting effective collaborative road safety applications. A core design in the proposed QoS control framework is that network feedback and cross-layer design are employed to collaboratively achieve targeted QoS. A design example of cooperative and adaptive rate control scheme is implemented and evaluated, with objective of illustrating the key ideas in the framework. Simulation results demonstrate the effectiveness of proposed rate control schemes in providing highly available and reliable channel for emergency safety messages. © 2013 Wenyang Guan et al.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper introduces a joint load balancing and hotspot mitigation protocol for mobile ad-hoc network (MANET) termed by us as 'load_energy balance + hotspot mitigation protocol (LEB+HM)'. We argue that although ad-hoc wireless networks have limited network resources - bandwidth and power, prone to frequent link/node failures and have high security risk; existing ad hoc routing protocols do not put emphasis on maintaining robust link/node, efficient use of network resources and on maintaining the security of the network. Typical route selection metrics used by existing ad hoc routing protocols are shortest hop, shortest delay, and loop avoidance. These routing philosophy have the tendency to cause traffic concentration on certain regions or nodes, leading to heavy contention, congestion and resource exhaustion which in turn may result in increased end-to-end delay, packet loss and faster battery power depletion, degrading the overall performance of the network. Also in most existing on-demand ad hoc routing protocols intermediate nodes are allowed to send route reply RREP to source in response to a route request RREQ. In such situation a malicious node can send a false optimal route to the source so that data packets sent will be directed to or through it, and tamper with them as wish. It is therefore desirable to adopt routing schemes which can dynamically disperse traffic load, able to detect and remove any possible bottlenecks and provide some form of security to the network. In this paper we propose a combine adaptive load_energy balancing and hotspot mitigation scheme that aims at evenly distributing network traffic load and energy, mitigate against any possible occurrence of hotspot and provide some form of security to the network. This combine approach is expected to yield high reliability, availability and robustness, that best suits any dynamic and scalable ad hoc network environment. Dynamic source routing (DSR) was use as our underlying protocol for the implementation of our algorithm. Simulation comparison of our protocol to that of original DSR shows that our protocol has reduced node/link failure, even distribution of battery energy, and better network service efficiency.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Atomic ordering in network glasses on length scales longer than nearest-neighbour length scales has long been a source of controversy(1-6). Detailed experimental information is therefore necessary to understand both the network properties and the fundamentals of glass formation. Here we address the problem by investigating topological and chemical ordering in structurally disordered AX2 systems by applying the method of isotopic substitution in neutron diffraction to glassy ZnCl2. This system may be regarded as a prototypical ionic network forming glass, provided that ion polarization effects are taken into account(7), and has thus been the focus of much attention(8-14). By experiment, we show that both the topological and chemical ordering are described by two length scales at distances greater than nearest-neighbour length scales. One of these is associated with the intermediate range, as manifested by the appearance in the measured diffraction patterns of a first sharp diffraction peak at 1.09( 3) angstrom(-1); the other is associated with an extended range, which shows ordering in the glass out to 62( 4) angstrom. We also find that these general features are characteristic of glassy GeSe2, a prototypical covalently bonded network material(15,16). The results therefore offer structural insight into those length scales that determine many important aspects of supercooled liquid and glass phenomenology(11).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Innovation is one of the key drivers for gaining competitive advantages in any firms. Understanding knowledge transfer through inter-firm networks and its effects on types of innovation in SMEs is very important in improving SMEs innovation. This study examines relationships between characteristics of inter-firm knowledge transfer networks and types of innovation in SMEs. To achieve this, social network perspective is adopted to understand inter-firm knowledge transfer networks and its impact on innovation by investigating how and to what extend ego network characteristics are affecting types of innovation. Therefore, managers can develop the firms'network according to their strategies and requirements. First, a conceptual model and research hypotheses are proposed to establish the possible relationship between network properties and types of innovation. Three aspects of ego network are identified and adopted for hypotheses development: 1) structural properties which address the potential for resources and the context for the flow of resources, 2) relational properties which reflect the quality of resource flows, and 3) nodal properties which are about quality and variety of resources and capabilities of the ego partners. A questionnaire has been designed based on the hypotheses. Second, semistructured interviews with managers of five SMEs have been carried out, and a thematic qualitative analysis of these interviews has been performed. The interviews helped to revise the questionnaire and provided preliminary evidence to support the hypotheses. Insights from the preliminary investigation also helped to develop research plan for the next stage of this research.