The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called M...The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.展开更多
To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development...To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.展开更多
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern networks.Traditional detection systems often struggle to mitigate such atta...Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern networks.Traditional detection systems often struggle to mitigate such attacks in conventional and software-defined networking(SDN)environments.While Machine Learning(ML)models can distinguish between benign and malicious traffic,their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent retraining.In this paper,we propose a novel DDoS detection framework that combines Machine Learning(ML)and Ensemble Learning(EL)techniques to improve DDoS attack detection and mitigation in SDN environments.Our model leverages the“DDoS SDN”dataset for training and evaluation and employs a dynamic feature selection mechanism that enhances detection accuracy by focusing on the most relevant features.This adaptive approach addresses the limitations of conventional ML models and provides more accurate detection of various DDoS attack scenarios.Our proposed ensemble model introduces an additional layer of detection,increasing reliability through the innovative application of ensemble techniques.The proposed solution significantly enhances the model’s ability to identify and respond to dynamic threats in SDNs.It provides a strong foundation for proactive DDoS detection and mitigation,enhancing network defenses against evolving threats.Our comprehensive runtime analysis of Simultaneous Multi-Threading(SMT)on identical configurations shows superior accuracy and efficiency,with significantly reduced computational time,making it ideal for real-time DDoS detection in dynamic,rapidly changing SDNs.Experimental results demonstrate that our model achieves outstanding performance,outperforming traditional algorithms with 99%accuracy using Random Forest(RF)and K-Nearest Neighbors(KNN)and 98%accuracy using XGBoost.展开更多
The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting syste...The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting system using automatic addressable single-lamp control technology,and outlines the main development direction for this technology in modern tunnel lighting.The aim is to offer insights that can inform the rational deployment of this technology,thereby enhancing the lighting control effectiveness in modern tunnels and meeting their specific lighting requirements more effectively.展开更多
Efficient and flexible interactions require precisely converting human intentions into computer-recognizable signals,which is critical to the breakthrough development of metaverse.Interactive electronics face common d...Efficient and flexible interactions require precisely converting human intentions into computer-recognizable signals,which is critical to the breakthrough development of metaverse.Interactive electronics face common dilemmas,which realize highprecision and stable touch detection but are rigid,bulky,and thick or achieve high flexibility to wear but lose precision.Here,we construct highly bending-insensitive,unpixelated,and waterproof epidermal interfaces(BUW epidermal interfaces)and demonstrate their interactive applications of conformal human–machine integration.The BUW epidermal interface based on the addressable electrical contact structure exhibits high-precision and stable touch detection,high flexibility,rapid response time,excellent stability,and versatile“cut-and-paste”character.Regardless of whether being flat or bent,the BUW epidermal interface can be conformally attached to the human skin for real-time,comfortable,and unrestrained interactions.This research provides promising insight into the functional composite and structural design strategies for developing epidermal electronics,which offers a new technology route and may further broaden human–machine interactions toward metaverse.展开更多
Recent architectures of multi-core systems may have a relatively large number of cores that typically ranges from tens to hundreds;therefore called many-core systems.Such systems require an efficient interconnection n...Recent architectures of multi-core systems may have a relatively large number of cores that typically ranges from tens to hundreds;therefore called many-core systems.Such systems require an efficient interconnection network that tries to address two major problems.First,the overhead of power and area cost and its effect on scalability.Second,high access latency is caused by multiple cores’simultaneous accesses of the same shared module.This paper presents an interconnection scheme called N-conjugate Shuffle Clusters(NCSC)based on multi-core multicluster architecture to reduce the overhead of the just mentioned problems.NCSC eliminated the need for router devices and their complexity and hence reduced the power and area costs.It also resigned and distributed the shared caches across the interconnection network to increase the ability for simultaneous access and hence reduce the access latency.For intra-cluster communication,Multi-port Content Addressable Memory(MPCAM)is used.The experimental results using four clusters and four cores each indicated that the average access latency for a write process is 1.14785±0.04532 ns which is nearly equal to the latency of a write operation in MPCAM.Moreover,it was demonstrated that the average read latency within a cluster is 1.26226±0.090591 ns and around 1.92738±0.139588 ns for read access between cores from different clusters.展开更多
Unchecked breast cell growth is one of the leading causes of death in women globally and is the cause of breast cancer.The only method to avoid breast cancer-related deaths is through early detection and treatment.The...Unchecked breast cell growth is one of the leading causes of death in women globally and is the cause of breast cancer.The only method to avoid breast cancer-related deaths is through early detection and treatment.The proper classification of malignancies is one of the most significant challenges in the medical industry.Due to their high precision and accuracy,machine learning techniques are extensively employed for identifying and classifying various forms of cancer.Several data mining algorithms were studied and implemented by the author of this review and compared them to the present parameters and accuracy of various algorithms for breast cancer diagnosis such that clinicians might use them to accurately detect cancer cells early on.This article introduces several techniques,including support vector machine(SVM),K star(K∗)classifier,Additive Regression(AR),Back Propagation Neural Network(BP),and Bagging.These algorithms are trained using a set of data that contains tumor parameters from breast cancer patients.Comparing the results,the author found that Support Vector Machine and Bagging had the highest precision and accuracy,respectively.Also,assess the number of studies that provide machine learning techniques for breast cancer detection.展开更多
Modern shared-memory multi-core processors typically have shared Level 2(L2)or Level 3(L3)caches.Cache bottlenecks and replacement strategies are the main problems of such architectures,where multiple cores try to acc...Modern shared-memory multi-core processors typically have shared Level 2(L2)or Level 3(L3)caches.Cache bottlenecks and replacement strategies are the main problems of such architectures,where multiple cores try to access the shared cache simultaneously.The main problem in improving memory performance is the shared cache architecture and cache replacement.This paper documents the implementation of a Dual-Port Content Addressable Memory(DPCAM)and a modified Near-Far Access Replacement Algorithm(NFRA),which was previously proposed as a shared L2 cache layer in a multi-core processor.Standard Performance Evaluation Corporation(SPEC)Central Processing Unit(CPU)2006 benchmark workloads are used to evaluate the benefit of the shared L2 cache layer.Results show improved performance of the multicore processor’s DPCAM and NFRA algorithms,corresponding to a higher number of concurrent accesses to shared memory.The new architecture significantly increases system throughput and records performance improvements of up to 8.7%on various types of SPEC 2006 benchmarks.The miss rate is also improved by about 13%,with some exceptions in the sphinx3 and bzip2 benchmarks.These results could open a new window for solving the long-standing problems with shared cache in multi-core processors.展开更多
Your comments are welcome!Please feel free to contact us with your personal stories or vivid pictures!Address:24 Baiwanzhuang St.,Xicheng Dist.,Beijing,100037 E-mail:chinatodaynews@aliyun.com I am a professor at Renmi...Your comments are welcome!Please feel free to contact us with your personal stories or vivid pictures!Address:24 Baiwanzhuang St.,Xicheng Dist.,Beijing,100037 E-mail:chinatodaynews@aliyun.com I am a professor at Renmin University in Beijing and former head of the Beijing office of Spanish news agency Agencia EFE.展开更多
Climate change,which is the result of human activities,has wide-ranging impact.It poses a serious threat to human rights.Environmental rights are where the protection of the ecological environment and the development ...Climate change,which is the result of human activities,has wide-ranging impact.It poses a serious threat to human rights.Environmental rights are where the protection of the ecological environment and the development of human rights intersect.In view of the close relationship between the actions for addressing climate change and environmental rights,China should integrate the protection of environmental rights into the actions for addressing climate change,so as to achieve simultaneous development of both.In the process of coping with climate change,the right to climate stability that mainly pursues a“harmless”environment and the right to a more livable climate that pursues a“beautiful eco-environment”are specific manifestations of environmental rights and should be the priority of protection efforts.However,there are still some obstacles to achieving the coordinated development of the efforts to address climate change and the protection of environmental rights because traditional rights protection methods mainly give individuals subjective rights with the power to claim and are thus difficult to meet the needs of environmental rights protection in the context of climate change,and there are inherent value differences between responding to climate change and the realization of other human rights.Building a multi-level national obligation system to address climate change,giving full play to the role of courts in responding to climate change through moderate judicial activism,and coordinating the efforts to cope with climate change and the development of human rights under the guidance of a holistic system view are effective ways to overcome the aforementioned difficulties.展开更多
Address terms are an important resource for conveying relationships.In daily interactions,the use of address terms is unavoidable.Therefore,the choose of address terms is particularly critical to make communicate smoo...Address terms are an important resource for conveying relationships.In daily interactions,the use of address terms is unavoidable.Therefore,the choose of address terms is particularly critical to make communicate smoothly with people.Previous scholars have studied address terms from a wide range of perspectives.But there is not much research on Chinese address terms based on speech act theory,which is put forward by John Langshaw Austin.By observing communicative conversations,several findings have been emerged from the analysis.They are professional title,affectionate address terms,and common address terms.These findings express the existential significance of address terms,which are the premise for people to maximize their illocutionary act when communicating.Correct understanding and grasp of the use of address terms is conductive to unfolding the communicative dialogue more smoothly.展开更多
在分析现有P2P(peer to peer)路由算法的基础上,提出了一种基于二阶矩定位、支持多维资源数据描述的高效资源路由算法——FAN(flabellate addressable network)路由算法.FAN算法将节点映射到统一的多维笛卡尔空间,并以节点相对空间原点...在分析现有P2P(peer to peer)路由算法的基础上,提出了一种基于二阶矩定位、支持多维资源数据描述的高效资源路由算法——FAN(flabellate addressable network)路由算法.FAN算法将节点映射到统一的多维笛卡尔空间,并以节点相对空间原点的二阶矩作为子空间管理和资源搜索的依据.FAN路由算法具有O(log(N/k))的高路由效率,在节点加入和退出FAN网络时,更新路由信息的代价为O(klog(N/k)).实验结果表明,FAN路由算法具有路由效率高、维护代价小的优点,是一种P2P环境中支持多维资源数据描述的高效结构化资源路由算法.而且,目前部分基于CAN(content-addressable network)网络的改进算法也可以在FAN网络中适用,并获得更好的路由效率和更低的维护代价.展开更多
基金supported by the National Key Research and Development Program of China(No.2016YFB0800601)the Key Program of NSFC-Tongyong Union Foundation(No.U1636209)+1 种基金the National Natural Science Foundation of China(61602358)the Key Research and Development Programs of Shaanxi(No.2019ZDLGY13-04,No.2019ZDLGY13-07)。
文摘The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.
基金supported by the National Key R&D Program of China(Project Number:2022YFB2902100).
文摘To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.
文摘Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern networks.Traditional detection systems often struggle to mitigate such attacks in conventional and software-defined networking(SDN)environments.While Machine Learning(ML)models can distinguish between benign and malicious traffic,their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent retraining.In this paper,we propose a novel DDoS detection framework that combines Machine Learning(ML)and Ensemble Learning(EL)techniques to improve DDoS attack detection and mitigation in SDN environments.Our model leverages the“DDoS SDN”dataset for training and evaluation and employs a dynamic feature selection mechanism that enhances detection accuracy by focusing on the most relevant features.This adaptive approach addresses the limitations of conventional ML models and provides more accurate detection of various DDoS attack scenarios.Our proposed ensemble model introduces an additional layer of detection,increasing reliability through the innovative application of ensemble techniques.The proposed solution significantly enhances the model’s ability to identify and respond to dynamic threats in SDNs.It provides a strong foundation for proactive DDoS detection and mitigation,enhancing network defenses against evolving threats.Our comprehensive runtime analysis of Simultaneous Multi-Threading(SMT)on identical configurations shows superior accuracy and efficiency,with significantly reduced computational time,making it ideal for real-time DDoS detection in dynamic,rapidly changing SDNs.Experimental results demonstrate that our model achieves outstanding performance,outperforming traditional algorithms with 99%accuracy using Random Forest(RF)and K-Nearest Neighbors(KNN)and 98%accuracy using XGBoost.
文摘The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting system using automatic addressable single-lamp control technology,and outlines the main development direction for this technology in modern tunnel lighting.The aim is to offer insights that can inform the rational deployment of this technology,thereby enhancing the lighting control effectiveness in modern tunnels and meeting their specific lighting requirements more effectively.
基金supported by National Natural Science Foundation of China(52202117,52232006,52072029,and 12102256)Collaborative Innovation Platform Project of Fu-Xia-Quan National Independent Innovation Demonstration Zone(3502ZCQXT2022005)+3 种基金Natural Science Foundation of Fujian Province of China(2022J01065)State Key Lab of Advanced Metals and Materials(2022-Z09)Fundamental Research Funds for the Central Universities(20720220075)the Ministry of Education,Singapore,under its MOE ARF Tier 2(MOE2019-T2-2-179).
文摘Efficient and flexible interactions require precisely converting human intentions into computer-recognizable signals,which is critical to the breakthrough development of metaverse.Interactive electronics face common dilemmas,which realize highprecision and stable touch detection but are rigid,bulky,and thick or achieve high flexibility to wear but lose precision.Here,we construct highly bending-insensitive,unpixelated,and waterproof epidermal interfaces(BUW epidermal interfaces)and demonstrate their interactive applications of conformal human–machine integration.The BUW epidermal interface based on the addressable electrical contact structure exhibits high-precision and stable touch detection,high flexibility,rapid response time,excellent stability,and versatile“cut-and-paste”character.Regardless of whether being flat or bent,the BUW epidermal interface can be conformally attached to the human skin for real-time,comfortable,and unrestrained interactions.This research provides promising insight into the functional composite and structural design strategies for developing epidermal electronics,which offers a new technology route and may further broaden human–machine interactions toward metaverse.
文摘Recent architectures of multi-core systems may have a relatively large number of cores that typically ranges from tens to hundreds;therefore called many-core systems.Such systems require an efficient interconnection network that tries to address two major problems.First,the overhead of power and area cost and its effect on scalability.Second,high access latency is caused by multiple cores’simultaneous accesses of the same shared module.This paper presents an interconnection scheme called N-conjugate Shuffle Clusters(NCSC)based on multi-core multicluster architecture to reduce the overhead of the just mentioned problems.NCSC eliminated the need for router devices and their complexity and hence reduced the power and area costs.It also resigned and distributed the shared caches across the interconnection network to increase the ability for simultaneous access and hence reduce the access latency.For intra-cluster communication,Multi-port Content Addressable Memory(MPCAM)is used.The experimental results using four clusters and four cores each indicated that the average access latency for a write process is 1.14785±0.04532 ns which is nearly equal to the latency of a write operation in MPCAM.Moreover,it was demonstrated that the average read latency within a cluster is 1.26226±0.090591 ns and around 1.92738±0.139588 ns for read access between cores from different clusters.
基金the Deanship of Scientific Research at King Khalid University for funding this work through the General Research Project under Grant Number(RGP2/230/44).
文摘Unchecked breast cell growth is one of the leading causes of death in women globally and is the cause of breast cancer.The only method to avoid breast cancer-related deaths is through early detection and treatment.The proper classification of malignancies is one of the most significant challenges in the medical industry.Due to their high precision and accuracy,machine learning techniques are extensively employed for identifying and classifying various forms of cancer.Several data mining algorithms were studied and implemented by the author of this review and compared them to the present parameters and accuracy of various algorithms for breast cancer diagnosis such that clinicians might use them to accurately detect cancer cells early on.This article introduces several techniques,including support vector machine(SVM),K star(K∗)classifier,Additive Regression(AR),Back Propagation Neural Network(BP),and Bagging.These algorithms are trained using a set of data that contains tumor parameters from breast cancer patients.Comparing the results,the author found that Support Vector Machine and Bagging had the highest precision and accuracy,respectively.Also,assess the number of studies that provide machine learning techniques for breast cancer detection.
文摘Modern shared-memory multi-core processors typically have shared Level 2(L2)or Level 3(L3)caches.Cache bottlenecks and replacement strategies are the main problems of such architectures,where multiple cores try to access the shared cache simultaneously.The main problem in improving memory performance is the shared cache architecture and cache replacement.This paper documents the implementation of a Dual-Port Content Addressable Memory(DPCAM)and a modified Near-Far Access Replacement Algorithm(NFRA),which was previously proposed as a shared L2 cache layer in a multi-core processor.Standard Performance Evaluation Corporation(SPEC)Central Processing Unit(CPU)2006 benchmark workloads are used to evaluate the benefit of the shared L2 cache layer.Results show improved performance of the multicore processor’s DPCAM and NFRA algorithms,corresponding to a higher number of concurrent accesses to shared memory.The new architecture significantly increases system throughput and records performance improvements of up to 8.7%on various types of SPEC 2006 benchmarks.The miss rate is also improved by about 13%,with some exceptions in the sphinx3 and bzip2 benchmarks.These results could open a new window for solving the long-standing problems with shared cache in multi-core processors.
文摘Your comments are welcome!Please feel free to contact us with your personal stories or vivid pictures!Address:24 Baiwanzhuang St.,Xicheng Dist.,Beijing,100037 E-mail:chinatodaynews@aliyun.com I am a professor at Renmin University in Beijing and former head of the Beijing office of Spanish news agency Agencia EFE.
基金This paper is a phased achievement of the 2022 judicial research major project of the Supreme People’s Court,“Research on Judicial Service to Guarantee Carbon Peak and Carbon Neutrality”(Project Approval No.ZGFYZDKT20220301)the major project of the National Social Science Foundation,“Research on Legal Regulations for Biodiversity Protection under the Overall System View”(Project Approval No.19ZDA162).
文摘Climate change,which is the result of human activities,has wide-ranging impact.It poses a serious threat to human rights.Environmental rights are where the protection of the ecological environment and the development of human rights intersect.In view of the close relationship between the actions for addressing climate change and environmental rights,China should integrate the protection of environmental rights into the actions for addressing climate change,so as to achieve simultaneous development of both.In the process of coping with climate change,the right to climate stability that mainly pursues a“harmless”environment and the right to a more livable climate that pursues a“beautiful eco-environment”are specific manifestations of environmental rights and should be the priority of protection efforts.However,there are still some obstacles to achieving the coordinated development of the efforts to address climate change and the protection of environmental rights because traditional rights protection methods mainly give individuals subjective rights with the power to claim and are thus difficult to meet the needs of environmental rights protection in the context of climate change,and there are inherent value differences between responding to climate change and the realization of other human rights.Building a multi-level national obligation system to address climate change,giving full play to the role of courts in responding to climate change through moderate judicial activism,and coordinating the efforts to cope with climate change and the development of human rights under the guidance of a holistic system view are effective ways to overcome the aforementioned difficulties.
文摘Address terms are an important resource for conveying relationships.In daily interactions,the use of address terms is unavoidable.Therefore,the choose of address terms is particularly critical to make communicate smoothly with people.Previous scholars have studied address terms from a wide range of perspectives.But there is not much research on Chinese address terms based on speech act theory,which is put forward by John Langshaw Austin.By observing communicative conversations,several findings have been emerged from the analysis.They are professional title,affectionate address terms,and common address terms.These findings express the existential significance of address terms,which are the premise for people to maximize their illocutionary act when communicating.Correct understanding and grasp of the use of address terms is conductive to unfolding the communicative dialogue more smoothly.