With the rapid development of 5G NR(New Radio),the explosive increment of traffic amount is calling the utilization of unlicensed band.3GPP has proposed LAA(Licensed Assisted Access)to use LTE in unlicensed band and p...With the rapid development of 5G NR(New Radio),the explosive increment of traffic amount is calling the utilization of unlicensed band.3GPP has proposed LAA(Licensed Assisted Access)to use LTE in unlicensed band and pointed out that NR-U(NR-Unlicensed)can reuse most designs of it.However,the existing channel access mechanism of LAA is conservative under the coexistence scenario of NR-U,which leads to the waste of time resource.To address the problem this paper proposes a hybrid channel access mechanism to take advantage of the LBT(Listen-Before-Talk)mechanism of LAA when channel is quite busy and transmit directly with reduced power when it is relatively idle.The channel busy degree is judged by a series of periodically updated adaptive thresholds.System-level simulation verifies that under the coexistence scenario of NR-U the proposed mechanism can achieve higher UPT(User Perceived Throughput)and lower delay than other channel access mechanisms.展开更多
Currently, under the cloud service architecture, the increasing importance of network security and security issues are still emerging. With the rapid development of the network platform, it is connected to the number ...Currently, under the cloud service architecture, the increasing importance of network security and security issues are still emerging. With the rapid development of the network platform, it is connected to the number and size of the trusted computing environment for all kinds of applications that are rapidly expanding, ever-changing network health, network time being emergencies, assault, failure, threat of disaster, its safety, survivability and availability of face serious challenges. Although TNC Working Group made safe and reliable framework from the network access layer, it is not at the level of user access, system access levels and further given the level of situational awareness and effective solutions.展开更多
The main challenge in AI governance today is striking a balance between controlling AI dangers and fostering AI innovation.Regulators in a number of nations have progressively extended the regulatory sandbox,which was...The main challenge in AI governance today is striking a balance between controlling AI dangers and fostering AI innovation.Regulators in a number of nations have progressively extended the regulatory sandbox,which was first implemented in the banking sector,to AI governance in an effort to reduce the conflict between regulation and innovation.The AI regulatory sandbox is a new and feasible route for AI governance in China that not only helps to manage the risks of technology application but also prevents inhibiting AI innovation.It keeps inventors'trial-and-error tolerance space inside the regulatory purview while offering a controlled setting for the development and testing of novel AI that hasn't yet been put on the market.By providing full-cycle governance of AI with the principles of agility and inclusive prudence,the regulatory sandbox offers an alternative to the conventional top-down hard regulation,expost regulation,and tight regulation.However,the current system also has inherent limitations and practical obstacles that need to be overcome by a more rational and effective approach.To achieve its positive impact on AI governance,the AI regulatory sandbox system should build and improve the access and exit mechanism,the coordination mechanism between the sandbox and personal information protection,and the mechanisms of exemption,disclosure,and communication.展开更多
Cloud computing belongs to a set of policies,protocols,technologies through which one can access shared resources such as storage,applications,net-works,and services at relatively low cost.Despite the tremendous advan...Cloud computing belongs to a set of policies,protocols,technologies through which one can access shared resources such as storage,applications,net-works,and services at relatively low cost.Despite the tremendous advantages of cloud computing,one big threat which must be taken care of is data security in the cloud.There are a dozen of threats that we are being exposed to while avail-ing cloud services.Insufficient identity and access management,insecure inter-faces and Applications interfaces(APIs),hijacking,advanced persistent threats,data threats,and many more are certain security issues with the cloud platform.APIs and service providers face a huge challenge to ensure the security and integ-rity of both network and data.To overcome these challenges access control mechanisms are employed.Traditional access control mechanisms fail to monitor the user operations on the cloud platform and are prone to attacks like IP spoofing and other attacks that impact the integrity of the data.For ensuring data integrity on cloud platforms,access control mechanisms should go beyond authentication,identification,and authorization.Thus,in this work,a trust-based access control mechanism is proposed that analyzes the data of the user behavior,network beha-vior,demand behavior,and security behavior for computing trust value before granting user access.The method that computes thefinal trust value makes use of the fuzzy logic algorithm.The trust value-based policies are defined for the access control mechanism and based on the trust value outcome the access control is granted or denied.展开更多
Guided by President Xi Jinping's key speech about energy revolution— "Four Revolutions and One Cooperation"-the Chinese oil and gas industry continued to accelerate its pace of reform in 2016.China has ...Guided by President Xi Jinping's key speech about energy revolution— "Four Revolutions and One Cooperation"-the Chinese oil and gas industry continued to accelerate its pace of reform in 2016.China has deepened its supply-side structural reforms,prevented and resolved the problem of excess production capacity,increased the effective supply of clean energy such as natural gas,and formed an energy innovation system.It has pushed forward the reform of pricing mechanisms with significant adjustments in the pricing mechanisms of oil products,pipeline transportation,gas storage and gas used for fertilizer production.It has also accelerated market access reform and encouraged various investors to enter into the fields of exploration & production,pipeline transportation and crude oil imports.China has sped up the legislative process of environmental protection to promote green and low-carbon development.It has accelerated oil & gas industry institutional reform,with some provinces initiating the pilot reform of oil and gas.展开更多
The rapid development of high-speed rail(HSR) is influencing regional development, regional structure, commuting, and regional integration. East Asia is the region with the world's first and largest current operati...The rapid development of high-speed rail(HSR) is influencing regional development, regional structure, commuting, and regional integration. East Asia is the region with the world's first and largest current operating and planned HSR network. In this paper, we examine the evolutionary mechanism and impacts on the transport circle and accessibility of HSR in East Asia. The results indicate that the HSR network first follows a "core-core" model and then forms a corridor in Japan, South Korea, and China Taiwan, but then forms a complete network in China Mainland. The current operating HSR lines are mostly distributed in regions with developed economies and dense populations, and more than half of the population and GDP in China can be served by HSR within 1 hour's travel time. The planned HSR network will expand to the western region of China and Japan and the southern region of South Korea. The development of the current operating and planned HSR network considerably enlarges the transport circle of core cities, especially cities along trunk HSR lines. This 1 h transport circle of core cities has formed continuous regions in the Yangtze River Delta, the Pearl River Delta, Tokyo, Seoul, and along trunk HSR lines. The HSR network will bring about substantial improvement in accessiblity, but also increase the inequality of nodal accessibility in China Mainland. Spatially, the spatial patterns of the weighted shortest travel time of cities in China Mainland, Japan, and South Korea all present the "core-peripheral structure", taking Zhengzhou, Tokyo, and Seoul, respectively, as core cities, and cities located along the trunk HSR lines gain large improvement in accessibility.展开更多
This paper describes the design for testability (DFT) challenges and techniques of Godson-3 microprocessor, which is a scalable multicore processor based on the scalable mesh of crossbar (SMOC) on-chip network and...This paper describes the design for testability (DFT) challenges and techniques of Godson-3 microprocessor, which is a scalable multicore processor based on the scalable mesh of crossbar (SMOC) on-chip network and targets high-end applications. Advanced techniques are adopted to make the DFT design scalable and achieve low-power and low-cost test with limited IO resources. To achieve a scalable and flexible test access, a highly elaborate test access mechanism (TAM) is implemented to support multiple test instructions and test modes. Taking advantage of multiple identical cores embedding in the processor, scan partition and on-chip comparisons are employed to reduce test power and test time. Test compression technique is also utilized to decrease test time. To further reduce test power, clock controlling logics are designed with ability to turn off clocks of non-testing partitions. In addition, scan collars of CACHEs are designed to perform functional test with low-speed ATE for speed-binning purposes, which poses low complexity and has good correlation results.展开更多
基金the Project “Evaluation and verification of candidate solutions for international standardization of 5G” supported by National Science and Technology Major Project of the Ministry of Science and Technology (2018ZX03001024-006)
文摘With the rapid development of 5G NR(New Radio),the explosive increment of traffic amount is calling the utilization of unlicensed band.3GPP has proposed LAA(Licensed Assisted Access)to use LTE in unlicensed band and pointed out that NR-U(NR-Unlicensed)can reuse most designs of it.However,the existing channel access mechanism of LAA is conservative under the coexistence scenario of NR-U,which leads to the waste of time resource.To address the problem this paper proposes a hybrid channel access mechanism to take advantage of the LBT(Listen-Before-Talk)mechanism of LAA when channel is quite busy and transmit directly with reduced power when it is relatively idle.The channel busy degree is judged by a series of periodically updated adaptive thresholds.System-level simulation verifies that under the coexistence scenario of NR-U the proposed mechanism can achieve higher UPT(User Perceived Throughput)and lower delay than other channel access mechanisms.
文摘Currently, under the cloud service architecture, the increasing importance of network security and security issues are still emerging. With the rapid development of the network platform, it is connected to the number and size of the trusted computing environment for all kinds of applications that are rapidly expanding, ever-changing network health, network time being emergencies, assault, failure, threat of disaster, its safety, survivability and availability of face serious challenges. Although TNC Working Group made safe and reliable framework from the network access layer, it is not at the level of user access, system access levels and further given the level of situational awareness and effective solutions.
文摘The main challenge in AI governance today is striking a balance between controlling AI dangers and fostering AI innovation.Regulators in a number of nations have progressively extended the regulatory sandbox,which was first implemented in the banking sector,to AI governance in an effort to reduce the conflict between regulation and innovation.The AI regulatory sandbox is a new and feasible route for AI governance in China that not only helps to manage the risks of technology application but also prevents inhibiting AI innovation.It keeps inventors'trial-and-error tolerance space inside the regulatory purview while offering a controlled setting for the development and testing of novel AI that hasn't yet been put on the market.By providing full-cycle governance of AI with the principles of agility and inclusive prudence,the regulatory sandbox offers an alternative to the conventional top-down hard regulation,expost regulation,and tight regulation.However,the current system also has inherent limitations and practical obstacles that need to be overcome by a more rational and effective approach.To achieve its positive impact on AI governance,the AI regulatory sandbox system should build and improve the access and exit mechanism,the coordination mechanism between the sandbox and personal information protection,and the mechanisms of exemption,disclosure,and communication.
文摘Cloud computing belongs to a set of policies,protocols,technologies through which one can access shared resources such as storage,applications,net-works,and services at relatively low cost.Despite the tremendous advantages of cloud computing,one big threat which must be taken care of is data security in the cloud.There are a dozen of threats that we are being exposed to while avail-ing cloud services.Insufficient identity and access management,insecure inter-faces and Applications interfaces(APIs),hijacking,advanced persistent threats,data threats,and many more are certain security issues with the cloud platform.APIs and service providers face a huge challenge to ensure the security and integ-rity of both network and data.To overcome these challenges access control mechanisms are employed.Traditional access control mechanisms fail to monitor the user operations on the cloud platform and are prone to attacks like IP spoofing and other attacks that impact the integrity of the data.For ensuring data integrity on cloud platforms,access control mechanisms should go beyond authentication,identification,and authorization.Thus,in this work,a trust-based access control mechanism is proposed that analyzes the data of the user behavior,network beha-vior,demand behavior,and security behavior for computing trust value before granting user access.The method that computes thefinal trust value makes use of the fuzzy logic algorithm.The trust value-based policies are defined for the access control mechanism and based on the trust value outcome the access control is granted or denied.
文摘Guided by President Xi Jinping's key speech about energy revolution— "Four Revolutions and One Cooperation"-the Chinese oil and gas industry continued to accelerate its pace of reform in 2016.China has deepened its supply-side structural reforms,prevented and resolved the problem of excess production capacity,increased the effective supply of clean energy such as natural gas,and formed an energy innovation system.It has pushed forward the reform of pricing mechanisms with significant adjustments in the pricing mechanisms of oil products,pipeline transportation,gas storage and gas used for fertilizer production.It has also accelerated market access reform and encouraged various investors to enter into the fields of exploration & production,pipeline transportation and crude oil imports.China has sped up the legislative process of environmental protection to promote green and low-carbon development.It has accelerated oil & gas industry institutional reform,with some provinces initiating the pilot reform of oil and gas.
基金National Natural Science Foundation of China,No.41171107,No.41371143,No.4401121
文摘The rapid development of high-speed rail(HSR) is influencing regional development, regional structure, commuting, and regional integration. East Asia is the region with the world's first and largest current operating and planned HSR network. In this paper, we examine the evolutionary mechanism and impacts on the transport circle and accessibility of HSR in East Asia. The results indicate that the HSR network first follows a "core-core" model and then forms a corridor in Japan, South Korea, and China Taiwan, but then forms a complete network in China Mainland. The current operating HSR lines are mostly distributed in regions with developed economies and dense populations, and more than half of the population and GDP in China can be served by HSR within 1 hour's travel time. The planned HSR network will expand to the western region of China and Japan and the southern region of South Korea. The development of the current operating and planned HSR network considerably enlarges the transport circle of core cities, especially cities along trunk HSR lines. This 1 h transport circle of core cities has formed continuous regions in the Yangtze River Delta, the Pearl River Delta, Tokyo, Seoul, and along trunk HSR lines. The HSR network will bring about substantial improvement in accessiblity, but also increase the inequality of nodal accessibility in China Mainland. Spatially, the spatial patterns of the weighted shortest travel time of cities in China Mainland, Japan, and South Korea all present the "core-peripheral structure", taking Zhengzhou, Tokyo, and Seoul, respectively, as core cities, and cities located along the trunk HSR lines gain large improvement in accessibility.
基金Supported by the National High-Tech Research and Development 863 Program of China under Grant Nos. 2008AA010901,2009AA01Z125,2009AA01Z103the National Natural Science Foundation of China under Grant Nos. 60736012,60921002,60803029,61050002+1 种基金the National Basic Research 973 Program of China under Grant No. 2005CB321600the Important National Science and Technology Specific Projects under Grant Nos. 2009ZX01028-002-003,2009ZX01029-001-003
文摘This paper describes the design for testability (DFT) challenges and techniques of Godson-3 microprocessor, which is a scalable multicore processor based on the scalable mesh of crossbar (SMOC) on-chip network and targets high-end applications. Advanced techniques are adopted to make the DFT design scalable and achieve low-power and low-cost test with limited IO resources. To achieve a scalable and flexible test access, a highly elaborate test access mechanism (TAM) is implemented to support multiple test instructions and test modes. Taking advantage of multiple identical cores embedding in the processor, scan partition and on-chip comparisons are employed to reduce test power and test time. Test compression technique is also utilized to decrease test time. To further reduce test power, clock controlling logics are designed with ability to turn off clocks of non-testing partitions. In addition, scan collars of CACHEs are designed to perform functional test with low-speed ATE for speed-binning purposes, which poses low complexity and has good correlation results.