scholarly journals Security Management in Network Visualization Environment by using modified root management algorithm for Creation of Virtual Node and Virtual Link

2017 ◽  
Vol 162 (6) ◽  
pp. 37-43 ◽  
Author(s):  
Navin Mani ◽  
Kumari Soni ◽  
Arvind Kumar
Author(s):  
Ali H. Al-Bayatti ◽  
Hussein Zedan ◽  
Antoniuo Cau ◽  
François Siewe

Many military research efforts have concentrated on how to allow war-fighters to take advantage of all available information within the battlefield in a rapid and flexible manner. As a result, the development of the Global Information Grid (GIG) was the key enabler for this process; hence, adding to the development of the mobile networking part of the GIG, the concept of the Mobile Ad hoc Network of Networks (MANoN) is introduced. This article proposes a novel security management algorithm achieving the three management essentials: Security Administration; Prevention and Detection; and Containment and Recovery; based on the International Telecommunication Union’s recommendation M.3400 to manage securely the future of military Network-Centric Warfare (NCW). The authors will employ Interval Temporal Logic (ITL) as a method of handling both sequential and parallel composition in flexible timely constrains, in addition, this technique will be evaluated using the Network Simulator (NS-2) to provide and check whether security requirements are met in a comprehensive manner.


Author(s):  
Ali H. Al-Bayatti ◽  
Hussein Zedan ◽  
Antoniuo Cau ◽  
François Siewe

Many military research efforts have concentrated on how to allow war-fighters to take advantage of all available information within the battlefield in a rapid and flexible manner. As a result, the development of the Global Information Grid (GIG) was the key enabler for this process; hence, adding to the development of the mobile networking part of the GIG, the concept of the Mobile Ad hoc Network of Networks (MANoN) is introduced. This article proposes a novel security management algorithm achieving the three management essentials: Security Administration; Prevention and Detection; and Containment and Recovery; based on the International Telecommunication Union’s recommendation M.3400 to manage securely the future of military Network-Centric Warfare (NCW). The authors will employ Interval Temporal Logic (ITL) as a method of handling both sequential and parallel composition in flexible timely constrains, in addition, this technique will be evaluated using the Network Simulator (NS-2) to provide and check whether security requirements are met in a comprehensive manner.


Swiss Surgery ◽  
2003 ◽  
Vol 9 (2) ◽  
pp. 55-62 ◽  
Author(s):  
Bartanusz ◽  
Porchet

The treatment of metastatic spinal cord compression is complex. The three treatment modalities that are currently applied (in a histologically non-specific manner) are surgery, radiotherapy and the administration of steroids. The development of new spinal instrumentations and surgical approaches considerably changed the extent of therapeutic options in this field. These new surgical techniques have made it possible to resect these tumours totally, with subsequent vertebral reconstruction and spinal stabilization. In this respect, it is important to clearly identify those patients who can benefit from such an extensive surgery. We present our management algorithm to help select patients for surgery and at the same time identifying those for whom primary non-surgical therapy would be indicated. The retrospective review of surgically treated patients in our department in the last four years reveals a meagre application of conventional guidelines for the selection of the appropriate operative approach in the surgical management of these patients. The reasons for this discrepancy are discussed.


2020 ◽  
pp. 5-11
Author(s):  
Yu. V. Zhernakova

A significant number of epidemiological studies have shown that hyperuricemia is highly associated with the risk of developing cardiovascular disease, chronic kidney disease, and diabetes. In this connection, increased attention is required to monitor serum uric acid levels in patients, not only from a rheumatological point of view, but also with regard to reducing cardiovascular and renal risks. This article is a review of studies on the association of hyperuricemia with cardiovascular risk and a new consensus for the management of patients with hyperuricemia and high cardiovascular risk, published in december 2019 by a group of experts of the Russian Medical Society for Arterial Hypertension, which, among other things, includes a management algorithm of this category of patients.


Author(s):  
Nataliia Tsymbalenko

The subject of research-theoretical concepts of economic security managementof universities. The purpose of the article. The study of the essence of the economicsecurity management system of the university and the definition of its main tasks,the formulation of principles of economic security management of the university.Methodology. The dialectical method, methods of analysis and synthesis, methodsof structural-logical and semantic analysis were used to study and summarizescientific papers on the research topic. The results of the work. The essence of theuniversity’s economic security management system has been reviewed. The maintasks of the control system have been identified. A definition of the university’seconomic security system has been proposed. Principles of management of economicsecurity of the university have been formulated. These are: scientific andorganizational and social principles. Conclusions. The proposed principles allow totake into account the economic role and social mission of universities in managingeconomic security.


2018 ◽  
Vol 2 (2) ◽  
pp. 70-82 ◽  
Author(s):  
Binglu Wang ◽  
Yi Bu ◽  
Win-bin Huang

AbstractIn the field of scientometrics, the principal purpose for author co-citation analysis (ACA) is to map knowledge domains by quantifying the relationship between co-cited author pairs. However, traditional ACA has been criticized since its input is insufficiently informative by simply counting authors’ co-citation frequencies. To address this issue, this paper introduces a new method that reconstructs the raw co-citation matrices by regarding document unit counts and keywords of references, named as Document- and Keyword-Based Author Co-Citation Analysis (DKACA). Based on the traditional ACA, DKACA counted co-citation pairs by document units instead of authors from the global network perspective. Moreover, by incorporating the information of keywords from cited papers, DKACA captured their semantic similarity between co-cited papers. In the method validation part, we implemented network visualization and MDS measurement to evaluate the effectiveness of DKACA. Results suggest that the proposed DKACA method not only reveals more insights that are previously unknown but also improves the performance and accuracy of knowledge domain mapping, representing a new basis for further studies.


Sign in / Sign up

Export Citation Format

Share Document