The planar hub location problem a probabilistic.[taliem.ir]

The planar hub location problem: a probabilistic clustering approach

Given the demand between each origin-destination pair on a network, the planar hub location problem is to locate the multiple hubs anywhere on the plane and to assign the traffic to them so as to minimize the total travelling cost. The trips between any two points can be nonstop (no hubs used) or started by visiting any of the hubs. The travel cost between hubs is discounted with a factor. It is assumed that each point can be served by multiple hubs. We propose a probabilistic clustering method for the planar hub-location problem which is analogous to the method of Iyigun and Ben-Israel (in Operations Research Letters 38, 207–214, 2010; Computational Optmization and Applications, 2013) for the solution of the multi-facility location problem. The proposed method is an iterative probabilistic approach assuming that all trips can be taken with probabilities that depend on the travel costs based on the hub locations. Each hub location is the convex combination of all data points and other hubs. The probabilities are updated at each iteration together with the hub locations. Computations stop when the hub locations stop moving. Fermat-Weber problem and multi-facility location problem are the special cases of the proposed approach.
Crime Facilitation Purposes of Social.[taliem.ir]

Crime Facilitation Purposes of Social Networking Sites: A Review and Analysis of the “Cyberbanging” Phenomenon

There have been growing claims in media circles and law-enforcement settings that street gangs and criminal organizations are turning to Internet-based social networking sites for various reasons, ranging from the showcasing of their images and exploits to the suspected recruitment of members. The present study investigates whether such a trend is, in fact, in place. The presence of street gangs on these Internet sites is referred to as cyberbanging. While there is some anecdotal evidence suggesting that gangs are turning to social networking sites, there is little available research on exactly how street gangs and criminal groups use the Internet. The few studies that are available acknowledge the importance of the Internet as a key channel of diffusion for street gang values and general subculture. The presence of social networking sites has been documented, but no signs of proactive recruitment have emerged. Instead, past research has demonstrated that street gangs are primarily using social networking sites for bragging about their exploits and sharing their plights with law-enforcement and criminal justice with a wider, often supportive public.
The semantic web a catalyst for future e-business.[taliem.ir]

The semantic web: a catalyst for future e-business

Purpose – This paper aims to advance research that portrays the semantic web as the future web where computer software agents can carry out sophisticated tasks for users. Design/methodology/approach – The paper discusses the major factors that affect the performance and reliability of information services for the web, namely the distribution of information, which has resulted from the globalization of information systems, the heterogeneity of information sources and the sources’ instability caused by autonomous evolution. Findings – Man stands at the threshold of being able to create the semantic web, in terms of declaratively representing objects that are already human-readable on the web. The next step is to make it the dynamic semantic web by encoding procedures in web material as first-class objects. Practical implications – Semantic web technology will work with extensible mark-up language, which will enable electronic commerce by: defining languages that provide support in defining, mapping, and exchanging product data; functioning from the development of standard ontology that will cover various business areas; and utilizing efficient translation services that will require areas of standard ontology. Originality/value – The paper tackles one of the most pressing issues of the creation of programs that collect web content, process the information and exchange the results with other programs from diverse sources.
Routing in Neighborhood, Area Networks, AMI, communications.[taliem.ir]

Routing in Neighborhood Area Networks: A survey in the context of AMI communications

Smart Grid is the modern infrastructure of the electric grid, which has the objective to improve efficiency, reliability, and security. This is achieved through the control automation of the transmission and distribution lines, the enhancement of metering technologies, the implementation of renewable energy sources, and new energy management techniques. The growing demand of energy, changes in global weather, problems in the storing and distribution, and the need to implement more efficient metering systems are some of the factors that influence the transit toward a more complex and robust electric grid. A fundamental component of the Smart Grid is an Advanced Metering Infrastructure (AMI), which provides a two-way communication flow between utilities and meters at the customer side. In this survey, we outline the main features of this new infrastructure, including a classification of communication technologies and routing protocols employed in the Neighborhood Area Network domain. We introduce a set of metrics for the AMI network (such as scalability, interoperability, latency, security, and quality of service), and present a full analysis and comparison of AMI- related routing protocols and technologies. Open issues related to wireless and wired technologies, as well as routing for the neighborhood area network domain are also provided.
International Cooperation in Cyber Space.[taliem.ir]

International Cooperation in Cyber Space to combat Cyber crime and terrorism

Cyber crime and terrorism is an international problem which does not respect national borders. Cyber criminals operate from relatively safe territories beyond the easy reach of the law enforcement agencies of the countries in which their victims reside. Collaboration between governments, intelligence agencies and law enforcement officers is critical to prosecuting cybercrime, and new organizations have been created to enable this. However, this co-operation seems to have run into roadblocks by the leak of large scale national level data snooping secrets by whistleblower Edward Snowden. The paper attempts to derive insights from ongoing initiatives reported in open source and recommend options available to charter the path for sustainable international cooperation in evolving secure cyber infrastructure.
Social media Get serious! Understanding the.[taliem.ir]

Social media? Get serious! Understanding the functional building blocks of social media

Traditionally, consumers used the Internet to simply expend content: they read it, they watched it, and they used it to buy products and services. Increasingly ,however, consumers are utilizing platforms–—such as content sharing sites, blogs, social networking, and wikis–—to create, modify, share, and discuss Internet content. This represents the social media phenomenon, which can now significantly impact a firm’s reputation, sales, and even survival. Yet, many executives eschew or ignore this form of media because they don’t understand what it is, the various forms it can take, and how to engage with it and learn. In response, we present a framework that defines social media by using seven functional building blocks: identity, conversations, sharing, presence, relationships, reputation, and groups. As different social media activities are defined by the extent to which they focus on some or all of these blocks ,we explain the implications that each block can have for how firms should engage with social media. To conclude, we present a number of recommendations regarding how firms should develop strategies for monitoring, understanding, and responding to different social media activities.
Peer to Peer Authentication for Small Embedded.[taliem.ir]

Peer to Peer Authentication for Small Embedded Systems

With an estimated 50 billion internet-enabled devices deployed by 2020, the arrival of the Internet of Things (IoT) or Internet of Everything (IoE) raises many questions regarding the suitability and adaptability of current computer security standards to provide privacy, data integrity and end entity authentication between communicating peers. In this paper we present a new protocol which combines zero-knowledge proofs and key exchange mechanisms to provide secure and authenticated communication in static machine-to-machine (M2M) networks. This approach addresses all of the aforementioned issues while also being suitable for devices with limited computational resources and can be deployed in wireless sensor networks.
Trustworthy Coordination of Pay Services.[taliem.ir]

Trustworthy Coordination of Pay Services

A milestone in e-payment through online is secured cloud environment. The trust of transaction lies in context in which it is started and completed. We have proposed a fault tolerant environment for e-payment at merchant node. A light weight Byzantine algorithm is implemented to make the process of transaction reliable. The user can search the bank details in a distributed environment in source ordering mode. A single user can access their bank accounts in different providers using a universal pay identity number. The proposed prototype is a composition of web services provided by different bank services. For secured communication the message are encrypted with the sophisticated RSA algorithm. For reliability we deployed Byzantine fault tolerance environment. The application may provide the commercial users an easy and secured mode of e-payment. It also reduces the overhead for infrastructure maintenance when deployed as Infrastructure as Service (IaaS) in cloud.
Semantic ,Web technologies,ldigital libraries.[taliem.ir]

Semantic Web technologies for digital libraries

Purpose – The purpose of this article is to provide an overview about the Semantic Web, its importance and history and an overview of recent Semantic Web technologies which can be used to enhance digital libraries. Design/methodology/approach – The paper answers, at least partially, questions like “What is the Semantic Web?”, “How could the Semantic Web look like?”, “Why is the Semantic Web important?”, “What are ontologies?” and “Where are we now?”. Several pointers to further literature and web sites complete the overview. Findings – Semantic Web technologies are valuable add-ons for digital libraries. There already exist numerous academic and commercial tools which can be applied right now. Practical limitations/implications – The overview of Semantic Web technologies cannot be complete in such an article, therefore we limit ourselves to the most prominent technologies available. However, following the pointers given readers can easily find more information. Originality/value – The article is of particular value for newcomers in this area.
Broca-Wernicke.Doctrine.A.Historical.and.Clinical.Perspective.[taliem.ir]

The Broca-Wernicke Doctrine

In 2009, Craig Bennett and his co-workers put a mature Atlantic salmon in an MRI scanner and showed it a series of photographs . The (dead) salmon had been instructed to determine the emotion of photographed people during MR scanning. Much to everybody’s surprise, three activated areas were found exactly in the brain cavity of the salmon, as shown in Fig. 1.1. The results of this experiment were presented at a human brain mapping conference in Toronto . Statistically speaking, the images made a strong point that the salmon was engaged in a cognitive task. The poster, of course, argued differently and pointed to the dangers of modern functional neuroimaging techniques. Type in ‘phrenology’ on the Internet and you will quickly fnd a vast number of beautiful images such as the one shown in Fig. 1.2. This image illustrates the phrenologists’ idea that the mind consists of several different ‘organs’ or ‘faculties’ that each harbour a specifc mental quality. A broad range of human qualities was covered, as variable as benevolence, amativeness, causality or language. Phrenologists associated these mental qualities with specifc locations in the brain. This was a radically new concept in an era where philosophical and religious thinking was dualistic in nature and still considered the mind or soul to be undivided, immaterial and immortal. Of course, they were wrong on the details. It is easy for us to criticize the fact that they confned complex behavioural functions to specifc brain regions.