The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network...The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection.展开更多
The ability of accurate and scalable mobile device recognition is critically important for mobile network operators and ISPs to understand their customers' behaviours and enhance their user experience.In this pape...The ability of accurate and scalable mobile device recognition is critically important for mobile network operators and ISPs to understand their customers' behaviours and enhance their user experience.In this paper,we propose a novel method for mobile device model recognition by using statistical information derived from large amounts of mobile network traffic data.Specifically,we create a Jaccardbased coefficient measure method to identify a proper keyword representing each mobile device model from massive unstructured textual HTTP access logs.To handle the large amount of traffic data generated from large mobile networks,this method is designed as a set of parallel algorithms,and is implemented through the MapReduce framework which is a distributed parallel programming model with proven low-cost and high-efficiency features.Evaluations using real data sets show that our method can accurately recognise mobile client models while meeting the scalability and producer-independency requirements of large mobile network operators.Results show that a 91.5% accuracy rate is achieved for recognising mobile client models from 2 billion records,which is dramatically higher than existing solutions.展开更多
In this paper, we present the resuks of the BitTorrent measurement study. Two sources of BitTorrent data were utilised: meta- data files and the logs of one of the currently most popular BitTorrent clients--gTorrent....In this paper, we present the resuks of the BitTorrent measurement study. Two sources of BitTorrent data were utilised: meta- data files and the logs of one of the currently most popular BitTorrent clients--gTorrent. Experimental data were collected for fifteen days from the popular torrent-discovery site thepiratebay.org (more than 30 000 torrents were captured and analysed). During this pe- riod the activity and logs of an unmodified version of μTorrent client downloading ses- sions were also captured. The obtained ex- perimental results are swarm-oriented, which allows us to look at BitTorrent and its users from an exchanged resources perspective. Moreover, comparative analysis of the clients' connections with and without the μTP proto- col is carried out to verify the extent to which μTP improves BitTorrent transmissions. To the authors' best knowledge, none of the previous studies have addressed these issues.展开更多
By importing the idea of P2P,and transmitting messages among clients directly into the client-server architecture,a new hybrid architecture was presented with the help of AOI technology and message category.Theoretica...By importing the idea of P2P,and transmitting messages among clients directly into the client-server architecture,a new hybrid architecture was presented with the help of AOI technology and message category.Theoretical analysis of this architecture was presented in detail.A series of simulation experiments was carried out to verify its effectiveness.Results indicate that the new architecture produces less server message workload than traditional architectures,which can improve the scalability of DVE systems.展开更多
Most of the time, clients only have one opportunity to evaluate a service received in terms of quality and satisfaction; under this premise organizations have been concerned with developing, in a permanent manner, a q...Most of the time, clients only have one opportunity to evaluate a service received in terms of quality and satisfaction; under this premise organizations have been concerned with developing, in a permanent manner, a quality evaluation culture in the services offered to their clients. To do this, procedures and methods that let them achieve it, have been implemented. That is the case of the model that concedes to measure and evaluate service quality, which is redefined and named Servqual, considering a multidimensional theoretical construct that explains the client's perception of quality service considering the differences between what is expected and what is received. Therefore, the goal of this study is to identify the factors that define the quality of emergency services provided by a private hospital in Hermosillo, Sonora, Mtxico, a sample of 384 patients, with a confidence level of 95% and a margin of permissible error of 5%. A questionnaire with 22 items was applied to measure the perceptions and expectations of users in terms of the quality of the service, which was subjected to an extensive evaluation of reliability and construct validity, with an estimate Cronbach's alpha of 95.6% and 97.9% respectively. The results showed that Servqual is a valid, reliable, and dependable instrument to monitor and measure the quality of the services offered in private hospitals in Hermosillo, and permit hospital administrators to identify opportunities or improvement areas, from the patients' perspective.展开更多
In the development of robotic limbs, the side of members is of importance to define the shape of artificial limbs and the range of movements. It is mainly significant tbr biomedical applications concerning patients su...In the development of robotic limbs, the side of members is of importance to define the shape of artificial limbs and the range of movements. It is mainly significant tbr biomedical applications concerning patients suffering arms or legs injuries, fn this paper, the concept of an ambidextrous design lbr robot hands is introduced. The fingers can curl in one xvay or another, to imitate either a right hand or a left hand. The advantages and inconveniences of different models have been investigated to optimise the range and the maximum force applied by fingers. Besides, a remote control interthce is integrated to the system, allowing both to send comrnands through internet and to display a video streaming of the ambidextrous hand as feedback. Therefore, a robotic prosthesis could be used for the first time in telerehabilitation. The main application areas targeted are physiotherapy alter strokes or management of phantom pains/br amputees by/earning to control the ambidextrous hand. A client application is also accessible on Facehook social network, making the robotic limb easily reachable for the patients. Additionally the ambidextrous hand can be used tbr robotics research as well as artistic performances.展开更多
In order to achieve high quality that not only gives acceptable return value to society but also satisfies the needs of all the stakeholders of infrastructure projects, comprehensive understanding of issues pertaining...In order to achieve high quality that not only gives acceptable return value to society but also satisfies the needs of all the stakeholders of infrastructure projects, comprehensive understanding of issues pertaining to the quality of the project is needed. The aim of this study is to provide an overview the most common procurement methods used in constructing infrastructure transport projects and analyze how these methods contribute to the desired quality of the final product in relation to client competence. An on-line survey of construction actors was carried out to ascertain quality level of Swedish infrastructure transport projects and determinant factors of quality problems. An equal number of respondents indicated that the quality of infrastructure projects has either increased or remained same level over the past twenty years. Respondents also pointed out lack of client competence that is vital in realizing the desired quality level through proper procurement, monitoring and evaluation procedures. Public clients heavily rely on traditional design-build procurement that requires considerable client involvement of a project. Thus, the association of quality problems and lack of client competence may not be a mere coincidence but an overlooked outcome of current situation.展开更多
The system will be to build a complete logistics monitoring system based on WebGIS, using the development technology of the third party map which is popular at present, the client technology Ajax is introduced into th...The system will be to build a complete logistics monitoring system based on WebGIS, using the development technology of the third party map which is popular at present, the client technology Ajax is introduced into the two map development platform based on WebGIS, draw lessons from the mature MapABC map service interface for API programming, establish the optimization model of distribution route with hard time windows, and studies the application of tabu search algorithm to solve the distribution path optimization model. At the same time, t;he system can realize vehicle abnormal alarm, shortest path planning and analysis of statistical query functions, can display the corresponding curves on the map that query be some statistical analysis results or a heat map by the user, get a more intuitive feel and better user experience.展开更多
In order to fast transmission and processing of medical images and do not need to install client and plug-ins, the paper designed a kind of medical image reading system based on BS structure. This system improved the ...In order to fast transmission and processing of medical images and do not need to install client and plug-ins, the paper designed a kind of medical image reading system based on BS structure. This system improved the existing IWEB in the framework of PACS client image processing, medical image based on the service WEB completion port model. To realize the fast loading images with high concurrency, compared with the traditional WEB PACS, this system has the advantages of no client without plug-in installation, at the same time in the transmission and processing performance image has been greatly improved.展开更多
The rapid development of electronic businesses raises the need for exchanging information between enterprise networks via internet. Ira secure connection is necessary then a virtual private network(VPN) is essential...The rapid development of electronic businesses raises the need for exchanging information between enterprise networks via internet. Ira secure connection is necessary then a virtual private network(VPN) is essential. IPSec use encrypting and encapsulating technology in client device and establishes a secure tunnel connection. The private network built by IPSec technology can ensure good transmission performance and service quality over public networks. This paper analyses the architecture of IPSec and describes the process of creating a site- to-site IPSec VPN between header and branch of enterprise over internet. In addition, this study analyses the encryption at the boundary of the network and concludes a propose some practical problems need to consider inside enterprise network.展开更多
In financial services, handset bank is known as one of major channels and this is the way to go in future and a key way for banks to compete on mobile intemet. Handset bank allows clients to make trades when and where...In financial services, handset bank is known as one of major channels and this is the way to go in future and a key way for banks to compete on mobile intemet. Handset bank allows clients to make trades when and where they choose. In this way, fast and easy banking is available to clients. This paper centers on marketing tactics of handset bank and thus presents a SoLoMo-based handset bank marketing mode, in order to provide a reference to the innovation and practice of handset bank marketing principles and means.展开更多
This article mainly introduces the multi-layer distributed C/S architecture of system design scheme. Its working principle is the client program runs automatically after the computer starts, and establish communicatio...This article mainly introduces the multi-layer distributed C/S architecture of system design scheme. Its working principle is the client program runs automatically after the computer starts, and establish communication with the application server. The network administrator can monitor and intelligent management of the client computer through the server program, the computer will execute the corresponding operation according to the server to send command instructions. The system realize the main module of the whole system framework, network monitoring data initialization module, network data transmission module, image coding and decoding module, the advantages of system make full use of existing LAN resources, timely delivery and manaRement information.展开更多
This paper considers a variant of the classical facility location game called the uncapacitared facility location game with penalties (UFLGWP). Unlike the standard UFLG, each client in the UFLGWP is either assigned ...This paper considers a variant of the classical facility location game called the uncapacitared facility location game with penalties (UFLGWP). Unlike the standard UFLG, each client in the UFLGWP is either assigned to an open facility or rejected by paying a penalty. The authors propose a 3-approximate cross-monotonic cost-sharing method for the UFLGWP.展开更多
Conjugated polyelectrolytes (CPEs),with electron-delocalized backbones and charged ionic side chains,are unique sensory materials for the construction of optical biosensors.In this feature article,CPE-based visual det...Conjugated polyelectrolytes (CPEs),with electron-delocalized backbones and charged ionic side chains,are unique sensory materials for the construction of optical biosensors.In this feature article,CPE-based visual detection of heparin is summarized.Three CPE-based heparin probes,including ratiometric,light-up and colormetric probes,are discussed in terms of molecular design,detection selectivity and quantification capability.The work summarized here provides fundamental guidelines for CPE-based label-free visual sensing.展开更多
基金ACKNOWLEDGMENT This work was supported by the National Basic Research Program of China (973 Project) (NO.2007CB311100), the National Science Foundation for Young Scholars of China (Grant No.61001091), Beijing Nature Science Foundation(No. 4122012), "next-generation broadband wireless mobile communication network" National Science and Technology major Special issue funding(No. 2012ZX03002003), Funding Program for Academic Human Resources Development in Institutions of Higher Learning Under the Jurisdiction of Beijing Municipality of China and the key technology research and validation issue for the emergency treatment telemedicine public service platform which integrates the military and civilian and bases on the broadband wireless networks(No.2013ZX03006001-005), the issue belongs to Major national science and technology projects.
文摘The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection.
基金supported in part by the National Natural Science Foundation of China under Grant No.61072061the National Science and Technology Major Projects under Grant No.2012ZX03002008the Fundamental Research Funds for the Central Universities under Grant No.2012RC0121
文摘The ability of accurate and scalable mobile device recognition is critically important for mobile network operators and ISPs to understand their customers' behaviours and enhance their user experience.In this paper,we propose a novel method for mobile device model recognition by using statistical information derived from large amounts of mobile network traffic data.Specifically,we create a Jaccardbased coefficient measure method to identify a proper keyword representing each mobile device model from massive unstructured textual HTTP access logs.To handle the large amount of traffic data generated from large mobile networks,this method is designed as a set of parallel algorithms,and is implemented through the MapReduce framework which is a distributed parallel programming model with proven low-cost and high-efficiency features.Evaluations using real data sets show that our method can accurately recognise mobile client models while meeting the scalability and producer-independency requirements of large mobile network operators.Results show that a 91.5% accuracy rate is achieved for recognising mobile client models from 2 billion records,which is dramatically higher than existing solutions.
基金partially supported by the Polish National Science Center under Grant No.2011/01/D/ST7/05054
文摘In this paper, we present the resuks of the BitTorrent measurement study. Two sources of BitTorrent data were utilised: meta- data files and the logs of one of the currently most popular BitTorrent clients--gTorrent. Experimental data were collected for fifteen days from the popular torrent-discovery site thepiratebay.org (more than 30 000 torrents were captured and analysed). During this pe- riod the activity and logs of an unmodified version of μTorrent client downloading ses- sions were also captured. The obtained ex- perimental results are swarm-oriented, which allows us to look at BitTorrent and its users from an exchanged resources perspective. Moreover, comparative analysis of the clients' connections with and without the μTP proto- col is carried out to verify the extent to which μTP improves BitTorrent transmissions. To the authors' best knowledge, none of the previous studies have addressed these issues.
基金Sponsored by the National Basic Research Program of China(Grant No.2002CB312200)the National Natural Science Foundation of China(Grant No.60575036)
文摘By importing the idea of P2P,and transmitting messages among clients directly into the client-server architecture,a new hybrid architecture was presented with the help of AOI technology and message category.Theoretical analysis of this architecture was presented in detail.A series of simulation experiments was carried out to verify its effectiveness.Results indicate that the new architecture produces less server message workload than traditional architectures,which can improve the scalability of DVE systems.
文摘Most of the time, clients only have one opportunity to evaluate a service received in terms of quality and satisfaction; under this premise organizations have been concerned with developing, in a permanent manner, a quality evaluation culture in the services offered to their clients. To do this, procedures and methods that let them achieve it, have been implemented. That is the case of the model that concedes to measure and evaluate service quality, which is redefined and named Servqual, considering a multidimensional theoretical construct that explains the client's perception of quality service considering the differences between what is expected and what is received. Therefore, the goal of this study is to identify the factors that define the quality of emergency services provided by a private hospital in Hermosillo, Sonora, Mtxico, a sample of 384 patients, with a confidence level of 95% and a margin of permissible error of 5%. A questionnaire with 22 items was applied to measure the perceptions and expectations of users in terms of the quality of the service, which was subjected to an extensive evaluation of reliability and construct validity, with an estimate Cronbach's alpha of 95.6% and 97.9% respectively. The results showed that Servqual is a valid, reliable, and dependable instrument to monitor and measure the quality of the services offered in private hospitals in Hermosillo, and permit hospital administrators to identify opportunities or improvement areas, from the patients' perspective.
文摘In the development of robotic limbs, the side of members is of importance to define the shape of artificial limbs and the range of movements. It is mainly significant tbr biomedical applications concerning patients suffering arms or legs injuries, fn this paper, the concept of an ambidextrous design lbr robot hands is introduced. The fingers can curl in one xvay or another, to imitate either a right hand or a left hand. The advantages and inconveniences of different models have been investigated to optimise the range and the maximum force applied by fingers. Besides, a remote control interthce is integrated to the system, allowing both to send comrnands through internet and to display a video streaming of the ambidextrous hand as feedback. Therefore, a robotic prosthesis could be used for the first time in telerehabilitation. The main application areas targeted are physiotherapy alter strokes or management of phantom pains/br amputees by/earning to control the ambidextrous hand. A client application is also accessible on Facehook social network, making the robotic limb easily reachable for the patients. Additionally the ambidextrous hand can be used tbr robotics research as well as artistic performances.
文摘In order to achieve high quality that not only gives acceptable return value to society but also satisfies the needs of all the stakeholders of infrastructure projects, comprehensive understanding of issues pertaining to the quality of the project is needed. The aim of this study is to provide an overview the most common procurement methods used in constructing infrastructure transport projects and analyze how these methods contribute to the desired quality of the final product in relation to client competence. An on-line survey of construction actors was carried out to ascertain quality level of Swedish infrastructure transport projects and determinant factors of quality problems. An equal number of respondents indicated that the quality of infrastructure projects has either increased or remained same level over the past twenty years. Respondents also pointed out lack of client competence that is vital in realizing the desired quality level through proper procurement, monitoring and evaluation procedures. Public clients heavily rely on traditional design-build procurement that requires considerable client involvement of a project. Thus, the association of quality problems and lack of client competence may not be a mere coincidence but an overlooked outcome of current situation.
文摘The system will be to build a complete logistics monitoring system based on WebGIS, using the development technology of the third party map which is popular at present, the client technology Ajax is introduced into the two map development platform based on WebGIS, draw lessons from the mature MapABC map service interface for API programming, establish the optimization model of distribution route with hard time windows, and studies the application of tabu search algorithm to solve the distribution path optimization model. At the same time, t;he system can realize vehicle abnormal alarm, shortest path planning and analysis of statistical query functions, can display the corresponding curves on the map that query be some statistical analysis results or a heat map by the user, get a more intuitive feel and better user experience.
文摘In order to fast transmission and processing of medical images and do not need to install client and plug-ins, the paper designed a kind of medical image reading system based on BS structure. This system improved the existing IWEB in the framework of PACS client image processing, medical image based on the service WEB completion port model. To realize the fast loading images with high concurrency, compared with the traditional WEB PACS, this system has the advantages of no client without plug-in installation, at the same time in the transmission and processing performance image has been greatly improved.
文摘The rapid development of electronic businesses raises the need for exchanging information between enterprise networks via internet. Ira secure connection is necessary then a virtual private network(VPN) is essential. IPSec use encrypting and encapsulating technology in client device and establishes a secure tunnel connection. The private network built by IPSec technology can ensure good transmission performance and service quality over public networks. This paper analyses the architecture of IPSec and describes the process of creating a site- to-site IPSec VPN between header and branch of enterprise over internet. In addition, this study analyses the encryption at the boundary of the network and concludes a propose some practical problems need to consider inside enterprise network.
文摘In financial services, handset bank is known as one of major channels and this is the way to go in future and a key way for banks to compete on mobile intemet. Handset bank allows clients to make trades when and where they choose. In this way, fast and easy banking is available to clients. This paper centers on marketing tactics of handset bank and thus presents a SoLoMo-based handset bank marketing mode, in order to provide a reference to the innovation and practice of handset bank marketing principles and means.
文摘This article mainly introduces the multi-layer distributed C/S architecture of system design scheme. Its working principle is the client program runs automatically after the computer starts, and establish communication with the application server. The network administrator can monitor and intelligent management of the client computer through the server program, the computer will execute the corresponding operation according to the server to send command instructions. The system realize the main module of the whole system framework, network monitoring data initialization module, network data transmission module, image coding and decoding module, the advantages of system make full use of existing LAN resources, timely delivery and manaRement information.
基金supported by the National Natural Science Foundation of China under Grant Nos.60773185 and 11071268Program for Beijing Excellent Talents
文摘This paper considers a variant of the classical facility location game called the uncapacitared facility location game with penalties (UFLGWP). Unlike the standard UFLG, each client in the UFLGWP is either assigned to an open facility or rejected by paying a penalty. The authors propose a 3-approximate cross-monotonic cost-sharing method for the UFLGWP.
基金the National University of Singapore (R279-000-301-646)Singapore Ministry of Education (R-279-000-255-112)Ministry of Defence (R-279-000-301-232) for financial support
文摘Conjugated polyelectrolytes (CPEs),with electron-delocalized backbones and charged ionic side chains,are unique sensory materials for the construction of optical biosensors.In this feature article,CPE-based visual detection of heparin is summarized.Three CPE-based heparin probes,including ratiometric,light-up and colormetric probes,are discussed in terms of molecular design,detection selectivity and quantification capability.The work summarized here provides fundamental guidelines for CPE-based label-free visual sensing.