A survey on VPN: Taxonomy, roles, trends and future directions DOI
Jianhua Li, Bohao Feng, Hui Zheng

и другие.

Computer Networks, Год журнала: 2024, Номер unknown, С. 110964 - 110964

Опубликована: Дек. 1, 2024

Язык: Английский

Harnessing artificial intelligence to develop strategic marketing goals DOI Creative Commons

Kikelomo Fadilat Anjorin,

Mustafa Ayobami Raji,

Hameedat Bukola Olodo

и другие.

International Journal of Management & Entrepreneurship Research, Год журнала: 2024, Номер 6(5), С. 1625 - 1650

Опубликована: Май 11, 2024

In today's rapidly evolving business landscape, harnessing artificial intelligence (AI) has become imperative for organizations striving to remain competitive. This concept paper explores the integration of AI in developing strategic marketing goals, aiming provide a comprehensive framework leveraging AI's capabilities effectively. The begins by outlining current state marketing, highlighting its transformative potential across various facets such as customer segmentation, personalized targeting, predictive analytics, and automation. It underscores necessity businesses embrace AI-driven approaches stay ahead an increasingly data-driven marketplace. Moreover, delves into implications adoption marketing. emphasizes need alignment between initiatives overarching objectives, emphasizing role enhancing experience, optimizing resource allocation, driving revenue growth. Furthermore, addresses key considerations challenges associated with integrating strategies, including data privacy concerns, ethical implications, organizational readiness. advocates structured approach implementation, encompassing robust governance, talent acquisition, continuous monitoring mitigate risks Drawing upon industry best practices case studies, elucidates practical methodologies setting goals. importance decision-making, iterative experimentation, agile adaptation capitalize on innovation competitive advantage. conclusion, proactive stance towards embracing strategy formulation. By strategically capabilities, can not only enhance their effectiveness but also cultivate long-term sustainable growth dynamic environment. Keywords: AI, Strategic, Marketing, Environment, Goals, Business.

Язык: Английский

Процитировано

5

Software-Defined Virtual Private Network for SD-WAN DOI Open Access

Chunle Fu,

Bailing Wang, Hongri Liu

и другие.

Electronics, Год журнала: 2024, Номер 13(13), С. 2674 - 2674

Опубликована: Июль 8, 2024

Software-Defined Wide Area Networks (SD-WANs) are an emerging Network (SDN) technology to reinvent (WANs) for ubiquitous network interconnections in cloud computing, edge and the Internet of Everything. The state-of-the-art overlay-based SD-WANs simply conjunctions Virtual Private (VPN) SDN architecture leverage controllability programmability SDN, which only applicable specific platforms do not comply with extensibility SDN. This paper motivates us refactor traditional VPNs by proposing SD-WAN solution named (SD-VPN). An SDN-based auto-constructed VPN model its evaluating metrics put forward automatically construct overlay WANs node placement service orchestration SD-VPN. Therefore, a joint algorithm nodes algorithms WAN loading offloading proposed SD-VPN controllers. Finally, three-layer system is implemented deployed actual environments. Simulation experiments tests conducted prove high-efficiency controllability, real-time programmability, deployability Performance trade-off between control channels data evaluated, controllers proven be extensible other protocols advanced services.

Язык: Английский

Процитировано

1

Securing Networks in the Digital Age: A Review of Intrusion Detection and Prevention Strategies DOI Open Access

P.Hari Kishore,

Sk.Muzubar Rahiman,

P. Mahidhar

и другие.

International Journal of Innovative Science and Research Technology (IJISRT), Год журнала: 2024, Номер unknown, С. 2523 - 2530

Опубликована: Июль 13, 2024

In today's interconnected world, billions of individuals rely on the internet for various activities, from communication and commerce to entertainment education. However, this widespread connectivity also brings about an increased risk cyber threats malicious activities. response these challenges, intrusion detection technology has emerged as a vital component modern cybersecurity strategies. This paper presents comprehensive literature survey focusing Internal Intrusion Detection Systems (IIDS) traditional (IDS). These systems utilize diverse array data mining forensic techniques algorithms monitor analyze system activities in real-time, thereby detecting preventing potential security breaches. Additionally, explores integration methods analytics, offering valuable insights into development enhancement capabilities. Through thorough examination existing research methodologies, study aims provide deeper understanding evolving landscape contribute advancement practices increasingly digitized world.

Язык: Английский

Процитировано

1

Leveraging UX design and prototyping in agile development: A business analyst’s perspective DOI Creative Commons

Adams Gbolahan Adeleke,

Temitope Oluwafunmike Sanyaolu,

Christianah Pelumi Efunniyi

и другие.

Engineering Science & Technology Journal, Год журнала: 2024, Номер 5(8), С. 2670 - 2693

Опубликована: Авг. 31, 2024

In Agile development, leveraging UX design and prototyping is crucial for delivering user-centered solutions that meet business goals user needs. This review explores the integration of within frameworks from a analyst’s perspective, highlighting how these practices enhance project outcomes ensure alignment with both expectations objectives. User Experience (UX) are essential in development creating intuitive effective interfaces. focuses on understanding needs, behaviors, pain points through research, personas, journey mapping. Prototyping involves early versions product to visualize test concepts. Integrating methodologies helps iterating designs quickly, gathering feedback, refining features based real-world use. From offer several benefits. Firstly, they facilitate clearer communication between stakeholders, designers, developers by providing tangible representations ideas requirements. reduces misunderstandings ensures all parties have shared vision outcomes. Secondly, continuous allows rapid validation assumptions, reducing risk costly changes later process. The also discusses analysts can leverage prioritize features, manage stakeholder expectations, drive decision-making. By incorporating feedback into iterative cycles, final not only meets needs but aligns delivers value. Additionally, use principles tools enhances agility process, enabling teams adapt changing requirements market conditions effectively. conclusion, integrating provides strategic advantage aligning experience For analysts, this approach products user-centered, functional, responsive evolving ultimately contributing success projects. Keywords: Design, Prototyping, Development, Business Analyst, Experience, Iterative Stakeholder Communication, Feature Prioritization, Feedback, Development Process.

Язык: Английский

Процитировано

1

THE ROLE OF NETWORK MONITORING AND ANALYSIS IN ENSURING OPTIMAL NETWORK PERFORMANCE DOI Open Access

Nwakeze Osita Miracle

International Research Journal of Modernization in Engineering Technology and Science, Год журнала: 2024, Номер unknown

Опубликована: Июнь 23, 2024

Network monitoring and analysis are significant components in successfully functioning networks because they offer real-time data information about the performance of network.The following literature review gives an overview on how network tools have developed, speaking shift from simple availability connection tests, to use Machine Learning Artificial intelligence.To support provided key areas concern, analytical indicators like uptime, response time, packet loss, bandwidth with live examples their importance a network.Present-day approaches discussed, focus made most popular service solutions such as SolarWinds, Nagios, or PRTG.Network Monitor is examined through case studies illustrating its efficient usage various contexts.The paper also examines latest methods improving effective network, security aspects, problems arising increasing trends scalability, integration, varied forms cyber threats.Possible advances, specifically automation ai proposed crucial for combating these challenges.This has highlighted necessity strong process managing complex address emergent technology needs future.

Язык: Английский

Процитировано

0

The role of business analysts in driving financial inclusion through product innovation DOI Creative Commons

Temitope Oluwafunmike Sanyaolu,

Adams Gbolahan Adeleke,

Christianah Pelumi Efunniyi

и другие.

Finance & Accounting Research Journal, Год журнала: 2024, Номер 6(8), С. 1555 - 1581

Опубликована: Авг. 31, 2024

Business analysts play a pivotal role in advancing financial inclusion by driving product innovation tailored to underserved and marginalized populations. Their involvement is crucial identifying addressing gaps services, ensuring that products solutions are designed meet diverse needs effectively. This review explores the contributions of business promoting through innovative development, emphasizing their impact on creating accessible, affordable, user-centric solutions. In context inclusion, utilize data-driven insights market research identify barriers faced communities. By analyzing customer needs, behaviors, preferences, they provide valuable input designing cater specific requirements these expertise enables development not only accessible but also affordable inclusive, such as microloans, mobile banking solutions, digital payment platforms. facilitate collaboration between various stakeholders, including institutions, technology providers, regulatory bodies, ensure align with industry standards regulations. They critical bridging gap technical teams end-users, translating complex into actionable features functionalities. work ensures new user-friendly capable unique challenges groups. Furthermore, contribute ongoing improvements continuously gathering user feedback. iterative approach allows for refinement products, remain relevant effective inclusion. leveraging advanced analytics emerging technologies, help opportunities optimizing existing enhance access participation. conclusion, essential innovation. understanding facilitating stakeholder collaboration, continuous improvement developing inclusive. bridge promote equitable services. Keywords: Analysts, Financial Inclusion, Product Innovation, Market Research, Products, Accessibility, User-Centric Solutions.

Язык: Английский

Процитировано

0

Design and Development of an Emulation Model for VPN and VPN Bonding DOI

Kaustubh Sharma,

Mohit P. Tahiliani, Vishal J. Rathod

и другие.

2021 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), Год журнала: 2024, Номер unknown, С. 1 - 6

Опубликована: Июль 12, 2024

Язык: Английский

Процитировано

0

Implementing federated learning over VPN-based wireless backhaul networks for healthcare systems DOI Creative Commons

Atif Mahmood,

Zati Hakim Azizul, Mohammed Zakariah

и другие.

PeerJ Computer Science, Год журнала: 2024, Номер 10, С. e2422 - e2422

Опубликована: Ноя. 13, 2024

Federated learning (FL) is a popular method where edge devices work together to train machine models. This study introduces an efficient network for analyzing healthcare records. It uses VPN technology and applies federated approach over wireless backhaul network. The compares different channels, including terahertz (THz), E/V band (mmWave), microwave, their effectiveness. We looked closely at suggested FL that awireless compared it with the standard found using FedAvg algorithm Terahertz (THz) communication gave best accuracy. time took reach conclusion improved lot, going from 55 seconds impressive 38 seconds. emphasizes how having faster link makes networks much better. Furthermore, three-step plan was executed boost security, adopting multi-layered safeguard its confidential data. first step involves integrating private into current telecom infrastructure, establishing initial layer of security. To enhance security further, licensed frequency channels are introduced, providing extra protection. highest level achieved by combining complemented additional through VPN-based measures. comprehensive strategy ensures application strong protocols.

Язык: Английский

Процитировано

0

A survey on VPN: Taxonomy, roles, trends and future directions DOI
Jianhua Li, Bohao Feng, Hui Zheng

и другие.

Computer Networks, Год журнала: 2024, Номер unknown, С. 110964 - 110964

Опубликована: Дек. 1, 2024

Язык: Английский

Процитировано

0