24,628 research outputs found

    A Study on Security Attributes of Software-Defined Wide Area Network

    Get PDF
    For organizations to communicate important data across various branches, a reliable Wide Area Network (WAN) is important. With the increase of several factors such as usage of cloud services, WAN bandwidth demand, cost of leased lines, complexity in building/managing WAN and changing business needs led to need of next generation WAN. Software-defined wide area network (SD- WAN) is an emerging trend in today’s networking world as it simplifies management of network and provides seamless integration with the cloud. Compared to Multiprotocol Label Switching (MPLS) majorly used in traditional WAN architecture, SD-WAN incurs less cost, highly secure and offers great performance. This paper will mainly focus to investigate this next-generation WAN’s security attributes as security plays a crucial role in SD-WAN implementation. The goal of the paper is to analyze SD-WAN security by applying principles of CIA triad principle. Comparison of SD-WAN products offered by three different vendors in SD-WAN market with respect to its security is another important area that will be covered in this paper

    Software Defined Networks based Smart Grid Communication: A Comprehensive Survey

    Get PDF
    The current power grid is no longer a feasible solution due to ever-increasing user demand of electricity, old infrastructure, and reliability issues and thus require transformation to a better grid a.k.a., smart grid (SG). The key features that distinguish SG from the conventional electrical power grid are its capability to perform two-way communication, demand side management, and real time pricing. Despite all these advantages that SG will bring, there are certain issues which are specific to SG communication system. For instance, network management of current SG systems is complex, time consuming, and done manually. Moreover, SG communication (SGC) system is built on different vendor specific devices and protocols. Therefore, the current SG systems are not protocol independent, thus leading to interoperability issue. Software defined network (SDN) has been proposed to monitor and manage the communication networks globally. This article serves as a comprehensive survey on SDN-based SGC. In this article, we first discuss taxonomy of advantages of SDNbased SGC.We then discuss SDN-based SGC architectures, along with case studies. Our article provides an in-depth discussion on routing schemes for SDN-based SGC. We also provide detailed survey of security and privacy schemes applied to SDN-based SGC. We furthermore present challenges, open issues, and future research directions related to SDN-based SGC.Comment: Accepte

    Parental brain: cerebral areas activated by infant cries and faces. A comparison between different populations of parents and not.

    Get PDF
    Literature about parenting traditionally focused on caring behaviors and parental representations. Nowadays, an innovative line of research, interested in evaluating the neural areas and hormones implicated in the nurturing and caregiving responses, has developed. The only way to permit a newborn to survive and grow up is to respond to his needs and in order to succeed it is necessary, \ufb01rst of all, that the adults around him understand what his needs are. That is why adults\u2019 capacity of taking care of infants cannot disregard from some biological mechanisms, which allow them to be more responsive to the progeny and to infants in general. Many researches have proved that exist speci\ufb01c neural basis activating in response to infant evolutionary stimuli, such as infant cries and infant emotional facial expression. There is a sort of innate predisposition in human adults to respond to infants\u2019 signals, in order to satisfy their need and allow them to survive and become young adults capable of taking care of themselves. This article focuses on research that has investigated, in the last decade, the neural circuits underlying parental behavioral responses. Moreover, the paper compares the results of those studies that investigated the neural responses to infant stimuli under different conditions: familiar versus unknown children, parents versus non-parents and normative versus clinical samples (depression, addiction, adolescence, and PTSD)

    A Taxonomy of Self-configuring Service Discovery Systems

    Get PDF
    We analyze the fundamental concepts and issues in service discovery. This analysis places service discovery in the context of distributed systems by describing service discovery as a third generation naming system. We also describe the essential architectures and the functionalities in service discovery. We then proceed to show how service discovery fits into a system, by characterizing operational aspects. Subsequently, we describe how existing state of the art performs service discovery, in relation to the operational aspects and functionalities, and identify areas for improvement

    Search Me If You Can: Privacy-preserving Location Query Service

    Full text link
    Location-Based Service (LBS) becomes increasingly popular with the dramatic growth of smartphones and social network services (SNS), and its context-rich functionalities attract considerable users. Many LBS providers use users' location information to offer them convenience and useful functions. However, the LBS could greatly breach personal privacy because location itself contains much information. Hence, preserving location privacy while achieving utility from it is still an challenging question now. This paper tackles this non-trivial challenge by designing a suite of novel fine-grained Privacy-preserving Location Query Protocol (PLQP). Our protocol allows different levels of location query on encrypted location information for different users, and it is efficient enough to be applied in mobile platforms.Comment: 9 pages, 1 figure, 2 tables, IEEE INFOCOM 201

    Blackspot analysis of road traffic crashes in Surabaya - Manyar Toll Road, East Java

    Get PDF
    Traffic crashes are one of the problems that cannot be prevented, especially on toll roads. Knowing the crash element, including crash number, type, factor, and fatality, could lead the investigation to set crash solving and prevention by finding the blackspot point. Surabaya-Manyar toll roads were reported as crash-prone locations, with 149 crashes from 2014-2018. This research concerns the impact on a specific period obtained by PT. Margabumi Matrajaya was ranging from 2014-2018 at Surabaya-Manyar toll road. The objectives aim to analyze the crash element using submitted data from PT. Margabumi Matrajaya to find the blackspot at each line. The collected data were the primary data from field observation and documentation and secondary data, consisting of crash data, road length, time of the crash, what types of vehicles were involved in the crash, and wound victim data. The locations of crash-prone points (Blackspots) on the Surabaya - Manyar Toll road are as follows: The locations of crash-prone points (Blackspots) on the Surabaya Toll road - Manyar line mostly occurred at Km 9 + 925 - 16 + 400 mostly in 2018, on the Romokalisari - Kebomas section, and for Manyar - Surabaya line, occurred at Km 3 + 500 - 0 + 000 mostly in 2016, on the Tandes - Dupak section. Therefore, to decrease the crash number in Surabaya - Manyar toll road, PT. Margabumi Matrajaya should add traffic sign as blackspot area, speed trap, warning sign like slippery road ahead warning, crossroad, and merging traffic

    Teleoperation of passivity-based model reference robust control over the internet

    Get PDF
    This dissertation offers a survey of a known theoretical approach and novel experimental results in establishing a live communication medium through the internet to host a virtual communication environment for use in Passivity-Based Model Reference Robust Control systems with delays. The controller which is used as a carrier to support a robust communication between input-to-state stability is designed as a control strategy that passively compensates for position errors that arise during contact tasks and strives to achieve delay-independent stability for controlling of aircrafts or other mobile objects. Furthermore the controller is used for nonlinear systems, coordination of multiple agents, bilateral teleoperation, and collision avoidance thus maintaining a communication link with an upper bound of constant delay is crucial for robustness and stability of the overall system. For utilizing such framework an elucidation can be formulated by preparing site survey for analyzing not only the geographical distances separating the nodes in which the teleoperation will occur but also the communication parameters that define the virtual topography that the data will travel through. This survey will first define the feasibility of the overall operation since the teleoperation will be used to sustain a delay based controller over the internet thus obtaining a hypothetical upper bound for the delay via site survey is crucial not only for the communication system but also the delay is required for the design of the passivity-based model reference robust control. Following delay calculation and measurement via site survey, bandwidth tests for unidirectional and bidirectional communication is inspected to ensure that the speed is viable to maintain a real-time connection. Furthermore from obtaining the results it becomes crucial to measure the consistency of the delay throughout a sampled period to guarantee that the upper bound is not breached at any point within the communication to jeopardize the robustness of the controller. Following delay analysis a geographical and topological overview of the communication is also briefly examined via a trace-route to understand the underlying nodes and their contribution to the delay and round-trip consistency. To accommodate the communication channel for the controller the input and output data from both nodes need to be encapsulated within a transmission control protocol via a multithreaded design of a robust program within the C language. The program will construct a multithreaded client-server relationship in which the control data is transmitted. For added stability and higher level of security the channel is then encapsulated via an internet protocol security by utilizing a protocol suite for protecting the communication by authentication and encrypting each packet of the session using negotiation of cryptographic keys during each session

    Whatever It Takes: How and When Supervisor Bottom-Line Mentality Motivates Employee Contributions in the Workplace

    Get PDF
    Given that many organizations are competitive and finance centered, organizational leaders may lead with a primary focus on bottom-line attainment, such that they are perceived by their subordinates as having a bottom-line mentality (BLM) that entails pursuing bottom-line outcomes above all else. Yet, the field is limited in understanding why such a leadership approach affects employees’ positive and negative contributions in the workplace. Drawing on social exchange theory, we theorize that supervisors high in BLM can influence employees’ felt obligation toward the bottom line, which in turn can influence employees’ task performance and unethical pro-organizational behavior (UPB). We also examine employee ambition as a moderator of this process. Using three-wave, multisource data collected from the financial services industry, our results revealed that high-BLM supervisors elevate employee task performance as well as UPB by motivating employees’ felt obligation toward the bottom line. Furthermore, we found that employee ambition served as a first-stage moderator, such that the mediated relationships were stronger when employee ambition was high as opposed to low. Our findings break away from the dominant dysfunctional view of BLM and provide a more balanced view of this mentality
    corecore