scholarly journals An Evolution Process Model for the Internet Topology

Author(s):  
Sangjoon Park ◽  
Insook Cho ◽  
Byunggi Kim
2015 ◽  
Vol 2015 ◽  
pp. 1-18 ◽  
Author(s):  
Yu Nakata ◽  
Shin’ichi Arakawa ◽  
Masayuki Murata

In the Internet, Autonomous Systems (ASes) exchange traffic through interconnected links. As traffic demand increases, more traffic becomes concentrated on such links. The traffic concentrations depend heavily on the global structure of the Internet topology. Therefore, a topological evolution considering the global structure is necessary to continually accommodate future traffic amount. In this paper, we first develop a method to identify the hierarchical nature of traffic aggregation on the Internet topology and use this method to discuss the long-term changes in traffic flow. Our basic approach is to extract the “flow hierarchy,” which is a hierarchical structure associated with traffic aggregation. Our results show that the current connection policy will lead to a severe traffic concentration in the future. We then examine a new evolution process that attempts to reduce this traffic concentration. Our proposed evolution process increases the number of links in the deeper level in the hierarchy, thus relaxing the traffic concentration. We apply our evolution process to the Internet topology in 2000 and evolve this scenario over 13 years. The results show that our evolution process could reduce the traffic concentration by more than half compared with that without our evolution process.


Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1798
Author(s):  
Stephen Dankwa ◽  
Lu Yang

The Internet of Things environment (e.g., smart phones, smart televisions, and smart watches) ensures that the end user experience is easy, by connecting lives on web services via the internet. Integrating Internet of Things devices poses ethical risks related to data security, privacy, reliability and management, data mining, and knowledge exchange. An adversarial machine learning attack is a good practice to adopt, to strengthen the security of text-based CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart), to withstand against malicious attacks from computer hackers, to protect Internet of Things devices and the end user’s privacy. The goal of this current study is to perform security vulnerability verification on adversarial text-based CAPTCHA, based on attacker–defender scenarios. Therefore, this study proposed computation-efficient deep learning with a mixed batch adversarial generation process model, which attempted to break the transferability attack, and mitigate the problem of catastrophic forgetting in the context of adversarial attack defense. After performing K-fold cross-validation, experimental results showed that the proposed defense model achieved mean accuracies in the range of 82–84% among three gradient-based adversarial attack datasets.


The implementation of several modern concepts of enterprise architecture creation is analyzed and real-time business process generation is described. Cloud-based self-generated business service is constructed as a basis of the resulting concept with an aim to increase the flexibility of enterprise and introduce AaaS (architecture as a service). Under particular business request in form of correctly formulated strategic goal the generation of business process model is produced. The result of the generation is cross-cutting business process architecture model, which is approved or rejected/corrected by business owner expertise. During generation all necessary requirements for supporting resources, such as information, know-how, intellectual and professional skills, inputs and outputs, quality and operational risk limitations, control and monitoring, are formed. All formed requirements have to be satisfied by appropriate selections from the cloud facilities and again approved. Finally, after several iterations, the business model will be able to be realized in reality and could be executed with predicted results. Briefly, that means that certain sets of valued and weighted business process replicas are located in clouds and served in clouds. Thus, enterprise architecture becomes a regular service from clouds extending row of SOA in the name of AaaS. In addition, the advanced view on the topic is provided with an attempt to install a virtual SOA torrent that catches services from the internet and makes them available to customers and represents a business service basis for real-time business processes.


2014 ◽  
Vol 989-994 ◽  
pp. 4851-4854
Author(s):  
Qian Yu ◽  
Tong Li ◽  
Xuan Zhang ◽  
Ying Lin ◽  
Yong Yu ◽  
...  

Software evolution process model (EPM) is a knowledge-intensive process which is described in EPDL(Software Evolution Process Description Language) and modelled by semi-formal approach based on EPMM(Software Evolution Process Meta-Model). In order to support process improvement and process automation, the execution model is represented by logic programming. Activity in EEM (EPM’s execution model) is not implemented until its needing all kinds of resources are satisfied by system execution environment. The paper discussed the representations of all kinds of resources in EEM and their structures are proposed. The preparation resources method is presented in order to execute the EEM automatically. The converter program is realized and the correct results have presented to prove the correctness of the method.


2011 ◽  
Vol 55-57 ◽  
pp. 1370-1375 ◽  
Author(s):  
Jian Wang ◽  
Na Zhao ◽  
Jin Guo You ◽  
Ling Yu Li ◽  
Lei Zhao

With the wide spread of cloud computing technologies, we assume that increasing amount of attentions will be given to the area of software evolution processes in the context of cloud computing environments. Some major problems we are here facing now include: What kind of process a software evolution model under the circumstances of cloud computing must possess? What properties a software process must have as an attribute in order to effectively support the software evolution? How to modeling a process in the context of software evolution? While aiming to solve these mentioned problems, we focused our research on establishing a software evolution process model with independent functions as a component. In this article, the detailed discussion of our thoughts has been given and the in-depth analysis of our model is shown. Through a realistic case to which this model is applied, we concluded that our model provided the software evolution process with an effective support under the circumstances of cloud computing.


2004 ◽  
Vol 70 (6) ◽  
Author(s):  
Shi Zhou ◽  
Raúl J. Mondragón

2016 ◽  
Vol 27 (2) ◽  
pp. 552-569 ◽  
Author(s):  
Rafay Ishfaq ◽  
Uzma Raja ◽  
Shashank Rao

Purpose – The purpose of this paper is to evaluate the interaction between inventory availability (scarcity) and pricing levels (price-leadership (PL)), and its effect on product returns in the internet retail supply chain. Specifically, this paper investigates how supply chain managers can use inventory (seller-induced scarcity) and pricing (PL) levers to control product returns. Design/methodology/approach – Empirical data of sales and product returns from an internet retailer is analyzed to identify the scale of the effect that product scarcity and PL has on product returns. These factors are considered in developing a sales-return process model which is used with empirical data in a simulation study. The study evaluates changes in product returns for different policy settings related to PL and inventory levels. Findings of the simulation study are validated using statistical analysis of empirical data. Findings – PL and seller-induced product scarcity affect the rate of product returns; however, the scale of this effect depends on inventory and pricing decisions. The results identify an inflection boundary based on scarcity and PL levels which reverses this effect. This reversal is explained by underlying principles at play regarding buyers’ valuation of the sale and corresponding product attributes. Practical implications – Supply chain managers in internet retail can leverage lower inventory under the seller-induced scarcity approach to improve revenues. However, reducing inventory levels beyond a threshold is counterproductive, due to an associated increase in product returns. Similarly, setting market competitive prices (PL) can help reduce product returns. Under the seller-induced scarcity condition, this effect is reversed for inventory levels below a threshold. Retailers can implement the methodology developed in this paper to identify the inventory-price threshold that can help increase revenues while keeping the rate of product returns at a manageable level. Originality/value – This research extends prior work regarding the role of product scarcity and pricing on product returns and develops a deeper understanding of how these factors can be managed to control product returns in the internet retail setting.


2006 ◽  
Vol 72 (2) ◽  
pp. 239-251 ◽  
Author(s):  
Milena Mihail ◽  
Christos Papadimitriou ◽  
Amin Saberi

2011 ◽  
Vol 201-203 ◽  
pp. 1447-1450
Author(s):  
Qi Liang Wang ◽  
Liang Hou ◽  
Hao Lun Wang

In order to grasp the direction of product upgrading and promote the innovation capability of enterprise, a model of innovative evolution process for Product Platform is proposed based on Evolutionary Design. The model consists of five parts. The product platform module genes expression is an important part of this model, the acquisition and operation of genes was highlighted during its evolution process. Finally, a sample was given expressing the method as mentioned before.


Author(s):  
Benjamin Fabian ◽  
Georg Tilch ◽  
Tatiana Ermakova

Sign in / Sign up

Export Citation Format

Share Document