期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Hybrid Channel Access Mechanism Based on Coexistence Scenario of NR-Unlicensed 被引量:3
1
作者 Zhening Zhang Jingyi Chen +2 位作者 Mingyang Dong Yuehong Gao Jingjing Wang 《China Communications》 SCIE CSCD 2020年第1期49-62,共14页
With the rapid development of 5G NR(New Radio),the explosive increment of traffic amount is calling the utilization of unlicensed band.3GPP has proposed LAA(Licensed Assisted Access)to use LTE in unlicensed band and p... With the rapid development of 5G NR(New Radio),the explosive increment of traffic amount is calling the utilization of unlicensed band.3GPP has proposed LAA(Licensed Assisted Access)to use LTE in unlicensed band and pointed out that NR-U(NR-Unlicensed)can reuse most designs of it.However,the existing channel access mechanism of LAA is conservative under the coexistence scenario of NR-U,which leads to the waste of time resource.To address the problem this paper proposes a hybrid channel access mechanism to take advantage of the LBT(Listen-Before-Talk)mechanism of LAA when channel is quite busy and transmit directly with reduced power when it is relatively idle.The channel busy degree is judged by a series of periodically updated adaptive thresholds.System-level simulation verifies that under the coexistence scenario of NR-U the proposed mechanism can achieve higher UPT(User Perceived Throughput)and lower delay than other channel access mechanisms. 展开更多
关键词 NR-U channel access mechanism LBT power reduction
下载PDF
Network Access Mechanisms and Security Issues under the Cloud Service Architecture
2
作者 Yonghua LIU 《International Journal of Technology Management》 2015年第6期98-100,共3页
Currently, under the cloud service architecture, the increasing importance of network security and security issues are still emerging. With the rapid development of the network platform, it is connected to the number ... Currently, under the cloud service architecture, the increasing importance of network security and security issues are still emerging. With the rapid development of the network platform, it is connected to the number and size of the trusted computing environment for all kinds of applications that are rapidly expanding, ever-changing network health, network time being emergencies, assault, failure, threat of disaster, its safety, survivability and availability of face serious challenges. Although TNC Working Group made safe and reliable framework from the network access layer, it is not at the level of user access, system access levels and further given the level of situational awareness and effective solutions. 展开更多
关键词 Cloud Services access mechanism SECURITY
下载PDF
Regarding the Regulatory Sandbox Route and Mechanism for Governance of Artificial Intelligence
3
作者 Ye Xuanhan 《科技与法律(中英文)》 2024年第5期136-148,共13页
The main challenge in AI governance today is striking a balance between controlling AI dangers and fostering AI innovation.Regulators in a number of nations have progressively extended the regulatory sandbox,which was... The main challenge in AI governance today is striking a balance between controlling AI dangers and fostering AI innovation.Regulators in a number of nations have progressively extended the regulatory sandbox,which was first implemented in the banking sector,to AI governance in an effort to reduce the conflict between regulation and innovation.The AI regulatory sandbox is a new and feasible route for AI governance in China that not only helps to manage the risks of technology application but also prevents inhibiting AI innovation.It keeps inventors'trial-and-error tolerance space inside the regulatory purview while offering a controlled setting for the development and testing of novel AI that hasn't yet been put on the market.By providing full-cycle governance of AI with the principles of agility and inclusive prudence,the regulatory sandbox offers an alternative to the conventional top-down hard regulation,expost regulation,and tight regulation.However,the current system also has inherent limitations and practical obstacles that need to be overcome by a more rational and effective approach.To achieve its positive impact on AI governance,the AI regulatory sandbox system should build and improve the access and exit mechanism,the coordination mechanism between the sandbox and personal information protection,and the mechanisms of exemption,disclosure,and communication. 展开更多
关键词 artificial intelligence governance regulatory sandbox agile regulation inclusive prudential regulation access and exit mechanism coordination mechanism
下载PDF
Fuzzy User Access Trust Model for Cloud Access Control
4
作者 Aakib Jawed Khan Shabana Mehfuz 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期113-128,共16页
Cloud computing belongs to a set of policies,protocols,technologies through which one can access shared resources such as storage,applications,net-works,and services at relatively low cost.Despite the tremendous advan... Cloud computing belongs to a set of policies,protocols,technologies through which one can access shared resources such as storage,applications,net-works,and services at relatively low cost.Despite the tremendous advantages of cloud computing,one big threat which must be taken care of is data security in the cloud.There are a dozen of threats that we are being exposed to while avail-ing cloud services.Insufficient identity and access management,insecure inter-faces and Applications interfaces(APIs),hijacking,advanced persistent threats,data threats,and many more are certain security issues with the cloud platform.APIs and service providers face a huge challenge to ensure the security and integ-rity of both network and data.To overcome these challenges access control mechanisms are employed.Traditional access control mechanisms fail to monitor the user operations on the cloud platform and are prone to attacks like IP spoofing and other attacks that impact the integrity of the data.For ensuring data integrity on cloud platforms,access control mechanisms should go beyond authentication,identification,and authorization.Thus,in this work,a trust-based access control mechanism is proposed that analyzes the data of the user behavior,network beha-vior,demand behavior,and security behavior for computing trust value before granting user access.The method that computes thefinal trust value makes use of the fuzzy logic algorithm.The trust value-based policies are defined for the access control mechanism and based on the trust value outcome the access control is granted or denied. 展开更多
关键词 Cloud architecture fuzzy logic trust-based access mechanism
下载PDF
Analysis of China's Oil and Gas Policies in 2016
5
作者 Jiang He Chen Jianrong 《China Oil & Gas》 CAS 2017年第1期3-9,共7页
Guided by President Xi Jinping's key speech about energy revolution— "Four Revolutions and One Cooperation"-the Chinese oil and gas industry continued to accelerate its pace of reform in 2016.China has ... Guided by President Xi Jinping's key speech about energy revolution— "Four Revolutions and One Cooperation"-the Chinese oil and gas industry continued to accelerate its pace of reform in 2016.China has deepened its supply-side structural reforms,prevented and resolved the problem of excess production capacity,increased the effective supply of clean energy such as natural gas,and formed an energy innovation system.It has pushed forward the reform of pricing mechanisms with significant adjustments in the pricing mechanisms of oil products,pipeline transportation,gas storage and gas used for fertilizer production.It has also accelerated market access reform and encouraged various investors to enter into the fields of exploration & production,pipeline transportation and crude oil imports.China has sped up the legislative process of environmental protection to promote green and low-carbon development.It has accelerated oil & gas industry institutional reform,with some provinces initiating the pilot reform of oil and gas. 展开更多
关键词 Oil and gas reform Supply-side reform Market access Price mechanism reform Clean energy
下载PDF
Evolution and geographic effects of high-speed rail in East Asia: An accessibility approach 被引量:19
6
作者 金凤君 焦敬娟 +1 位作者 齐元静 杨宇 《Journal of Geographical Sciences》 SCIE CSCD 2017年第5期515-532,共18页
The rapid development of high-speed rail(HSR) is influencing regional development, regional structure, commuting, and regional integration. East Asia is the region with the world's first and largest current operati... The rapid development of high-speed rail(HSR) is influencing regional development, regional structure, commuting, and regional integration. East Asia is the region with the world's first and largest current operating and planned HSR network. In this paper, we examine the evolutionary mechanism and impacts on the transport circle and accessibility of HSR in East Asia. The results indicate that the HSR network first follows a "core-core" model and then forms a corridor in Japan, South Korea, and China Taiwan, but then forms a complete network in China Mainland. The current operating HSR lines are mostly distributed in regions with developed economies and dense populations, and more than half of the population and GDP in China can be served by HSR within 1 hour's travel time. The planned HSR network will expand to the western region of China and Japan and the southern region of South Korea. The development of the current operating and planned HSR network considerably enlarges the transport circle of core cities, especially cities along trunk HSR lines. This 1 h transport circle of core cities has formed continuous regions in the Yangtze River Delta, the Pearl River Delta, Tokyo, Seoul, and along trunk HSR lines. The HSR network will bring about substantial improvement in accessiblity, but also increase the inequality of nodal accessibility in China Mainland. Spatially, the spatial patterns of the weighted shortest travel time of cities in China Mainland, Japan, and South Korea all present the "core-peripheral structure", taking Zhengzhou, Tokyo, and Seoul, respectively, as core cities, and cities located along the trunk HSR lines gain large improvement in accessibility. 展开更多
关键词 high-speed rail East Asia evolutionary mechanism geographic effects accessibility
原文传递
Design for Testability Features of Godson-3 Multicore Microprocessor 被引量:2
7
作者 齐子初 刘慧 +1 位作者 李向库 胡伟武 《Journal of Computer Science & Technology》 SCIE EI CSCD 2011年第2期302-313,共12页
This paper describes the design for testability (DFT) challenges and techniques of Godson-3 microprocessor, which is a scalable multicore processor based on the scalable mesh of crossbar (SMOC) on-chip network and... This paper describes the design for testability (DFT) challenges and techniques of Godson-3 microprocessor, which is a scalable multicore processor based on the scalable mesh of crossbar (SMOC) on-chip network and targets high-end applications. Advanced techniques are adopted to make the DFT design scalable and achieve low-power and low-cost test with limited IO resources. To achieve a scalable and flexible test access, a highly elaborate test access mechanism (TAM) is implemented to support multiple test instructions and test modes. Taking advantage of multiple identical cores embedding in the processor, scan partition and on-chip comparisons are employed to reduce test power and test time. Test compression technique is also utilized to decrease test time. To further reduce test power, clock controlling logics are designed with ability to turn off clocks of non-testing partitions. In addition, scan collars of CACHEs are designed to perform functional test with low-speed ATE for speed-binning purposes, which poses low complexity and has good correlation results. 展开更多
关键词 DFT (design for testability) TAM (test access mechanism multicore processor low power test
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部