Wherever people live together in or near homelands that harbour joint natural resources such as forest, water, minerals, oil etc., they must collaborate, co-exist and share these resources irrespective of their geneti...Wherever people live together in or near homelands that harbour joint natural resources such as forest, water, minerals, oil etc., they must collaborate, co-exist and share these resources irrespective of their genetic, social, cultural, and political peculiarities. This is not always the case when self-interest, ethnic divisions, elitist politics, economic interest and power tussle set in. The Nso and Oku people who reside in the Ngongbaa Forest area constitute an example of joint management of resources where at one period, their relationship over the management of the Oku Mountain Forest was cordial and at another, the relationship became conflictive. This study was designed to study the influence of the KIFP forest management policies on the Nso indigenous forest Management system in Ngongbaa Forest, and its implications. The data collected for the study was secured through the administration of a questionnaire to residents of 10 villages adjacent to the Ngongbaa Forest, and forest users who carried out livelihood activities there between 1963 and 2015. These forest user groups include beekeepers, rat trappers, grazers, mushroom gatherers, ground honey/tree honey harvesters, carvers, etc. The investigation also extended to the traditional leaders of Nso and Oku who are in charge of the land tenure systems. The findings show that the Oku Mountain Forest is jointly owned by the Nso and Oku people. The Nso own the eastern half of the forest known as Ngongbaa Forest while the Oku own the western half, known as the Kilum Forest. The cordial relationship that existed between these people ensured the conservation of the forest. But the conflicts that later set in, especially due to the creation of the Kilum Mountain Forest Project in 1987 later changed to the Kilum Ijim Forest Project (KIFP) in 1992 sidelined the local communities which was contrary to the dispositions of the new Cameroon forest law enacted in 1994. Thus, the indigenous conservation practices became ignored which the local population never digested well. This seriously jeopardized the wellbeing of the forest in general.展开更多
Shared manufacturing is recognized as a new point-to-point manufac-turing mode in the digital era.Shared manufacturing is referred to as a new man-ufacturing mode to realize the dynamic allocation of manufacturing tas...Shared manufacturing is recognized as a new point-to-point manufac-turing mode in the digital era.Shared manufacturing is referred to as a new man-ufacturing mode to realize the dynamic allocation of manufacturing tasks and resources.Compared with the traditional mode,shared manufacturing offers more abundant manufacturing resources and flexible configuration options.This paper proposes a model based on the description of the dynamic allocation of tasks and resources in the shared manufacturing environment,and the characteristics of shared manufacturing resource allocation.The execution of manufacturing tasks,in which candidate manufacturing resources enter or exit at various time nodes,enables the dynamic allocation of manufacturing tasks and resources.Then non-dominated sorting genetic algorithm(NSGA-II)and multi-objective particle swarm optimization(MOPSO)algorithms are designed to solve the model.The optimal parameter settings for the NSGA-II and MOPSO algorithms have been obtained according to the experiments with various population sizes and iteration numbers.In addition,the proposed model’s efficiency,which considers the entries and exits of manufacturing resources in the shared manufacturing environment,is further demonstrated by the overlap between the outputs of the NSGA-II and MOPSO algorithms for optimal resource allocation.展开更多
In this paper,the research achievements and progress of Yunnan tea germplasm resource in past sixty years are systematically reviewed from the following aspects:exploration,collecting,conservation,protection,identifi...In this paper,the research achievements and progress of Yunnan tea germplasm resource in past sixty years are systematically reviewed from the following aspects:exploration,collecting,conservation,protection,identification,evaluation and shared utilization.Simultaneously,the current problems and the suggestions about subsequent development of tea germplasm resources in Yunnan were discussed,including superior and rare germplasm collection,tea genetic diversity research,biotechnology utilization in tea germplasm innovation,super gene exploration and function,the construction of utilization platform,biological base of species and population conservation.展开更多
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency...High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.展开更多
Network virtualization can effectively establish dedicated virtual networks to implement various network functions.However,the existing research works have some shortcomings,for example,although computing resource pro...Network virtualization can effectively establish dedicated virtual networks to implement various network functions.However,the existing research works have some shortcomings,for example,although computing resource properties of individual nodes are considered,node storage properties and the network topology properties are usually ignored in Virtual Network(VN)modelling,which leads to the inaccurate measurement of node availability and priority.In addition,most static virtual network mapping methods allocate fixed resources to users during the entire life cycle,and the users’actual resource requirements vary with the workload,which results in resource allocation redundancy.Based on the above analysis,in this paper,we propose a dynamic resource sharing virtual network mapping algorithm named NMA-PRS-VNE,first,we construct a new,more realistic network framework in which the properties of nodes include computing resources,storage resources and topology properties.In the node mapping process,three properties of the node are used to measure its mapping ability.Second,we consider the resources of adjacent nodes and links instead of the traditional method of measuring the availability and priority of nodes by considering only the resource properties,so as to more accurately select the physical mapping nodes that meet the constraints and conditions and improve the success rate of subsequent link mapping.Finally,we divide the resource requirements of Virtual Network Requests(VNRs)into basic subrequirements and variable sub-variable requirements to complete dynamic resource allocation.The former represents monopolizing resource requirements by the VNRs,while the latter represents shared resources by many VNRs with the probability of occupying resources,where we keep a balance between resource sharing and collision among users by calculating the collision probability.Simulation results show that the proposed NMAPRS-VNE can increase the average acceptance rate and network revenue by 15%and 38%,and reduce the network cost and link pressure by 25%and 17%.展开更多
To ensure the security of resource and intelligence sharing in 6G,blockchain has been widely adopted in wireless communications and applications.Although blockchain can ensure the traceability and non-tamperability of...To ensure the security of resource and intelligence sharing in 6G,blockchain has been widely adopted in wireless communications and applications.Although blockchain can ensure the traceability and non-tamperability of data in the concatenated blocks,it cannot guarantee the honest behaviors of users in the application before the generation of transactions.Thus,additional technologies are required to ensure that the source of blockchain data is reliable.In this paper,the detailed procedure is designed for the application-oriented task validation in the blockchainenhanced computing resource sharing and transactions in ultra dense networks(UDN).The corresponding queuing model is built and analyzed with the consideration of the wireless re-transmission and the probability of malicious deception by users.Based on the analysis results,the UDN deployment is optimized to save network cost while ensuring latency performance.Numerical results verify our analysis,and the optimized system deployment including the number and service capacities of both base stations and mobile edge computing(MEC)servers are also given with various system settings.展开更多
Service and information resources are two kinds of major shared resources in virtual enterprises, where, service resources include third party’s service resources and enterprise’s legacy service resources,and inform...Service and information resources are two kinds of major shared resources in virtual enterprises, where, service resources include third party’s service resources and enterprise’s legacy service resources,and information resources include database resources and file resources. Since service and information resources have distributed, autonomic, remotely bound as well as some other similar characteristics, an implementation mechanism on managing shared resources based on UDDI are presented. XML instances are used to describe resources authorization information, WSDL based special XML instance represents information resource metadata, and these XML instances are referenced by tModel for realizing the purpose of managing shared resources metadata based on UDDI.展开更多
The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense ...The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense resource allocation with multi-armed bandits to maximize the network's overall benefit.Firstly,we propose the method for dynamic setting of node defense resource thresholds to obtain the defender(attacker)benefit function of edge servers(nodes)and distribution.Secondly,we design a defense resource sharing mechanism for neighboring nodes to obtain the defense capability of nodes.Subsequently,we use the decomposability and Lipschitz conti-nuity of the defender's total expected utility to reduce the difference between the utility's discrete and continuous arms and analyze the difference theoretically.Finally,experimental results show that the method maximizes the defender's total expected utility and reduces the difference between the discrete and continuous arms of the utility.展开更多
In order to solve the issues concerning the cross-unit sharing of information resources in rural areas, we analyze the incentive problem of the sharing of information resources in rural areas using the incentive theor...In order to solve the issues concerning the cross-unit sharing of information resources in rural areas, we analyze the incentive problem of the sharing of information resources in rural areas using the incentive theory method; establish corresponding incentive mechanism model (It is divided into positive incentive model and negative incentive model, and only when the two models guarantee each other and are used at the same time can they be effective). Based on this, we put forward the institutional design for sharing of information resources in rural areas as follows: firstly, establishing an administrative agency of rural information resources sharing, above the authority of all units, responsible for related work on sharing of information resources in rural areas; secondly, establishing and improving the positive and negative incentive mechanisms, to ensure the realization of sharing of information resources in rural areas.展开更多
Web of Things(WoT)resources are not only numerous,but also have a wide range of applications and deployments.The centralized WoT resource sharing mechanism lacks flexibility and scalability,and hence cannot satisfy re...Web of Things(WoT)resources are not only numerous,but also have a wide range of applications and deployments.The centralized WoT resource sharing mechanism lacks flexibility and scalability,and hence cannot satisfy requirement of distributed resource sharing in large-scale environment.In response to this problem,a trusted and secure mechanism for WoT resources sharing based on context and blockchain(CWoT-Share)was proposed.Firstly,the mechanism can respond quickly to the changes of the application environment by dynamically determining resource access control rules according to the context.Then,the flexible resource charging strategies,which reduced the fees paid by the users who shared more resources and increased the fees paid by users who frequently used resources maliciously,were used to fulfill efficient sharing of WoT resources.Meanwhile,the charging strategies also achieve load balancing by dynamic selection of WoT resources.Finally,the open source blockchain platform Ethereum was used for the simulation and the simulation results show that CWoT-Share can flexibly adapt to the application environment and dynamically adjust strategies of resource access control and resource charging.展开更多
In order to reduce east--west section area of “digital divider” in China, Ministry of Culture laun- ches the National Cultural Information Resources Sharing Project in the mid-west provinces, and the state finance g...In order to reduce east--west section area of “digital divider” in China, Ministry of Culture laun- ches the National Cultural Information Resources Sharing Project in the mid-west provinces, and the state finance gives certain funds subsidy in the project construction period. Embarks highly from strategy during construction plan chosen and operational system management, as while as union digital library to construct a persistent effect mechanism. With the principle of state guidance, enterprise operation and benefit farmers, expand culture industry within the provincial and safeguard Cultural Information Resources Sharing Project sustainable development's, then promotes the rural economy culture full scale development.展开更多
Since the electronic resources and Internet Web sites became popular, distance education courses offered via the Internet could play an important role in providing global digital resources and teaching the knowledge o...Since the electronic resources and Internet Web sites became popular, distance education courses offered via the Internet could play an important role in providing global digital resources and teaching the knowledge of international library and information standards for bibliographic databases with electronic and web resources.This paper uses the example of the author's new online course: ILS 608 Cataloging and Development of a Digital Union Catalog for Ancient Chinese Books to demonstrate the global re...展开更多
Cloud computing is a new computing model. The application of cloud computing to the field of higher education informatization has been very popular currently. In this paper, the concept and characteristics of cloud co...Cloud computing is a new computing model. The application of cloud computing to the field of higher education informatization has been very popular currently. In this paper, the concept and characteristics of cloud computing are introduced, the current situation of the teaching resources sharing and construction in colleges and universities is analyzed, and finally the influence of cloud computing on the construction of teaching information resources is discussed.展开更多
Reorganization of network information resources for scientific and technical (scitech for abbreviation) documents and development of information infrastructure have brought a great change in China's scitech documen...Reorganization of network information resources for scientific and technical (scitech for abbreviation) documents and development of information infrastructure have brought a great change in China's scitech documentation information sharing. It integrated not only information resources, but also systems, technologies and funds. High quality services and effective resources sharing are the main goals of the platform construction. The paper describes briefly the principles and aims of the integration of the scitech information resources and networks. The services of the sharing platforms have been also introduced.展开更多
This paper discusses the Project's organization system, technical system, creation of digital resources and service mode. It also summarizes achievements gained since the commencement of the Project, and also anal...This paper discusses the Project's organization system, technical system, creation of digital resources and service mode. It also summarizes achievements gained since the commencement of the Project, and also analyzes some of the more important issues during implementation stage and gives a few suggestions of the future development during the next stage of the 11thFive-Year Plan.展开更多
Environments with reciprocal patchiness of resources, in which the availability of two resources such as light and soil nutrients are patchily distributed in horizontal space and negatively correlated in each patch, a...Environments with reciprocal patchiness of resources, in which the availability of two resources such as light and soil nutrients are patchily distributed in horizontal space and negatively correlated in each patch, are common in many ecosystems. The strategies by which clonal plants adapt to this type of heterogeneous environment were examined in three stoloniferous herbs,Potentilla reptans L. var. sericophylla Franch., P. anserina L. and Halerpestes ruthenica (Jacq.) Qvcz., commonly inhabiting forest understories, grasslands and low saline meadows, respectively. As pairs of connected ramets were subjected to reciprocal patchiness of light and nutrients, stolon connection between the two ramets significantly enhanced biomass of both ramet growing in low light intensity but high soil nutrient condition (LH ramet) and ramet growing in high light intensity but low soil nutrient condition (HL ramet) as well as whole ramet pairs (consisting of LH ramets and HL ramets). Additionally, stolon connection greatly increased root/shoot ratio of LH ramet while significantly decreased that of HL ramet. The results indicate that a reciprocal transportation of resources between interconnected ramets and a functional specialization of ramets in uptake of abundant resources occurred. By resource sharing and functional specialization, clonal plants can efficiently acquire locally abundant resources and buffer the stress caused by reciprocal patchiness of resources.展开更多
A natural history museum is a museum for collection, researching and presenting natural environment and natural heritages about natural history. In the research, based on the analysis on necessity of university museum...A natural history museum is a museum for collection, researching and presenting natural environment and natural heritages about natural history. In the research, based on the analysis on necessity of university museums’ services to society in resources sharing, the difficulties and dilemmas were summarized in sharing resources of museums and the approaches for resources sharing were explored with the case of Natural History Museum of Zhengzhou Normal University in order to investigate the way for better services of university museum to the public.展开更多
Caching and virtualization have been considered as the promising techniques in 5G Networks. In 5G networks with virtualization, the caching resources deployed by infrastructure providers (InPs) can be abstracted into ...Caching and virtualization have been considered as the promising techniques in 5G Networks. In 5G networks with virtualization, the caching resources deployed by infrastructure providers (InPs) can be abstracted into isolated slices and transparently shared by mobile virtual network operators (MVNOs). In this case, one of the most important issues is how the MVNOs to share the caching resource. To solve this issue, different from previous works, a hierarchical caching architecture that core network and radio access network (RAN) have the caching capability in 5G networks with virtualization is first considered in this paper. Then, we study the problem of hierarchical caching resource sharing for MVNOs, and a competitive game to maximize their expectation revenue based on the oligopoly market model is formulated. As it is a hard problem to find the optimal solution in the hierarchical caching resource sharing problem, we decompose the optimization problem into two independent caching resource sharing problems in RAN and core network, respectively. Then the local optimal solutions are solved and the global Nash equilibrium solution is achieved. Finally, simulation results are illustrated to demonstrate the performance of the proposed scheme.展开更多
Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mu...Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mutability to control the usage process and an architecture to illustrate how TC technologies support policy enforcement with bidirectional attestation. The properties required for attestation should include not only integrity measurement value of platform and related application, but also reputation of users and access history, in order to avoid the limitation of the existing approaches. To make a permission, it is required to evaluate both the authorization and conditions of the subject and the object in resource usage to ensure trustable resources to be transferred to trusted users and platform.展开更多
Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on-...Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on- demand allocation of network resources are particularly important in Cloud computing. Ho- wever, nearly all-current available cloud com- puting platforms are either proprietary or their software infrastructure is invisible to the rese- arch community except for a few open-source platforms. For universities and research insti- tutes, more open and testable experimental plat- forms are needed in a lab-level with PCs. In this paper, a platform of infrastructure resou- rce sharing system (Platform as a Service (PaaS)) is developed in virtual Cloud comput- hug environment. Its architecture, core modules, main functions, design and operational envir- onment and applications are introduced in de- tail. It has good expandability and can impr- ove resource sharing and utilization and is app- lied to regular computer science teaching and research process.展开更多
文摘Wherever people live together in or near homelands that harbour joint natural resources such as forest, water, minerals, oil etc., they must collaborate, co-exist and share these resources irrespective of their genetic, social, cultural, and political peculiarities. This is not always the case when self-interest, ethnic divisions, elitist politics, economic interest and power tussle set in. The Nso and Oku people who reside in the Ngongbaa Forest area constitute an example of joint management of resources where at one period, their relationship over the management of the Oku Mountain Forest was cordial and at another, the relationship became conflictive. This study was designed to study the influence of the KIFP forest management policies on the Nso indigenous forest Management system in Ngongbaa Forest, and its implications. The data collected for the study was secured through the administration of a questionnaire to residents of 10 villages adjacent to the Ngongbaa Forest, and forest users who carried out livelihood activities there between 1963 and 2015. These forest user groups include beekeepers, rat trappers, grazers, mushroom gatherers, ground honey/tree honey harvesters, carvers, etc. The investigation also extended to the traditional leaders of Nso and Oku who are in charge of the land tenure systems. The findings show that the Oku Mountain Forest is jointly owned by the Nso and Oku people. The Nso own the eastern half of the forest known as Ngongbaa Forest while the Oku own the western half, known as the Kilum Forest. The cordial relationship that existed between these people ensured the conservation of the forest. But the conflicts that later set in, especially due to the creation of the Kilum Mountain Forest Project in 1987 later changed to the Kilum Ijim Forest Project (KIFP) in 1992 sidelined the local communities which was contrary to the dispositions of the new Cameroon forest law enacted in 1994. Thus, the indigenous conservation practices became ignored which the local population never digested well. This seriously jeopardized the wellbeing of the forest in general.
基金This work was supported by the Key Program of Social Science Planning Foundation of Liaoning Province under Grant L21AGL017.
文摘Shared manufacturing is recognized as a new point-to-point manufac-turing mode in the digital era.Shared manufacturing is referred to as a new man-ufacturing mode to realize the dynamic allocation of manufacturing tasks and resources.Compared with the traditional mode,shared manufacturing offers more abundant manufacturing resources and flexible configuration options.This paper proposes a model based on the description of the dynamic allocation of tasks and resources in the shared manufacturing environment,and the characteristics of shared manufacturing resource allocation.The execution of manufacturing tasks,in which candidate manufacturing resources enter or exit at various time nodes,enables the dynamic allocation of manufacturing tasks and resources.Then non-dominated sorting genetic algorithm(NSGA-II)and multi-objective particle swarm optimization(MOPSO)algorithms are designed to solve the model.The optimal parameter settings for the NSGA-II and MOPSO algorithms have been obtained according to the experiments with various population sizes and iteration numbers.In addition,the proposed model’s efficiency,which considers the entries and exits of manufacturing resources in the shared manufacturing environment,is further demonstrated by the overlap between the outputs of the NSGA-II and MOPSO algorithms for optimal resource allocation.
基金Supported by Project of National Natural Science Foundation of China (31160175)Project of Tea Research Institute of Yunnan Academy of Agricultural Sciences (2009A0937)National Modern Agriculture Technology System Projects in Tea Industry (nycytx-23)~~
文摘In this paper,the research achievements and progress of Yunnan tea germplasm resource in past sixty years are systematically reviewed from the following aspects:exploration,collecting,conservation,protection,identification,evaluation and shared utilization.Simultaneously,the current problems and the suggestions about subsequent development of tea germplasm resources in Yunnan were discussed,including superior and rare germplasm collection,tea genetic diversity research,biotechnology utilization in tea germplasm innovation,super gene exploration and function,the construction of utilization platform,biological base of species and population conservation.
基金supported in part by the National Natural Science Foundation of China(62371116 and 62231020)in part by the Science and Technology Project of Hebei Province Education Department(ZD2022164)+2 种基金in part by the Fundamental Research Funds for the Central Universities(N2223031)in part by the Open Research Project of Xidian University(ISN24-08)Key Laboratory of Cognitive Radio and Information Processing,Ministry of Education(Guilin University of Electronic Technology,China,CRKL210203)。
文摘High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.
基金We are grateful for the support of the Natural Science Foundation of Shandong Province(No.ZR2020LZH008,ZR2020QF112,ZR2019MF071)the National Natural Science Foundation of China(61373149).
文摘Network virtualization can effectively establish dedicated virtual networks to implement various network functions.However,the existing research works have some shortcomings,for example,although computing resource properties of individual nodes are considered,node storage properties and the network topology properties are usually ignored in Virtual Network(VN)modelling,which leads to the inaccurate measurement of node availability and priority.In addition,most static virtual network mapping methods allocate fixed resources to users during the entire life cycle,and the users’actual resource requirements vary with the workload,which results in resource allocation redundancy.Based on the above analysis,in this paper,we propose a dynamic resource sharing virtual network mapping algorithm named NMA-PRS-VNE,first,we construct a new,more realistic network framework in which the properties of nodes include computing resources,storage resources and topology properties.In the node mapping process,three properties of the node are used to measure its mapping ability.Second,we consider the resources of adjacent nodes and links instead of the traditional method of measuring the availability and priority of nodes by considering only the resource properties,so as to more accurately select the physical mapping nodes that meet the constraints and conditions and improve the success rate of subsequent link mapping.Finally,we divide the resource requirements of Virtual Network Requests(VNRs)into basic subrequirements and variable sub-variable requirements to complete dynamic resource allocation.The former represents monopolizing resource requirements by the VNRs,while the latter represents shared resources by many VNRs with the probability of occupying resources,where we keep a balance between resource sharing and collision among users by calculating the collision probability.Simulation results show that the proposed NMAPRS-VNE can increase the average acceptance rate and network revenue by 15%and 38%,and reduce the network cost and link pressure by 25%and 17%.
文摘To ensure the security of resource and intelligence sharing in 6G,blockchain has been widely adopted in wireless communications and applications.Although blockchain can ensure the traceability and non-tamperability of data in the concatenated blocks,it cannot guarantee the honest behaviors of users in the application before the generation of transactions.Thus,additional technologies are required to ensure that the source of blockchain data is reliable.In this paper,the detailed procedure is designed for the application-oriented task validation in the blockchainenhanced computing resource sharing and transactions in ultra dense networks(UDN).The corresponding queuing model is built and analyzed with the consideration of the wireless re-transmission and the probability of malicious deception by users.Based on the analysis results,the UDN deployment is optimized to save network cost while ensuring latency performance.Numerical results verify our analysis,and the optimized system deployment including the number and service capacities of both base stations and mobile edge computing(MEC)servers are also given with various system settings.
文摘Service and information resources are two kinds of major shared resources in virtual enterprises, where, service resources include third party’s service resources and enterprise’s legacy service resources,and information resources include database resources and file resources. Since service and information resources have distributed, autonomic, remotely bound as well as some other similar characteristics, an implementation mechanism on managing shared resources based on UDDI are presented. XML instances are used to describe resources authorization information, WSDL based special XML instance represents information resource metadata, and these XML instances are referenced by tModel for realizing the purpose of managing shared resources metadata based on UDDI.
基金supported by the National Natural Science Foundation of China(NSFC)[grant numbers 62172377,61872205]the Shandong Provincial Natural Science Foundation[grant number ZR2019MF018]the Startup Research Foundation for Distinguished Scholars No.202112016.
文摘The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense resource allocation with multi-armed bandits to maximize the network's overall benefit.Firstly,we propose the method for dynamic setting of node defense resource thresholds to obtain the defender(attacker)benefit function of edge servers(nodes)and distribution.Secondly,we design a defense resource sharing mechanism for neighboring nodes to obtain the defense capability of nodes.Subsequently,we use the decomposability and Lipschitz conti-nuity of the defender's total expected utility to reduce the difference between the utility's discrete and continuous arms and analyze the difference theoretically.Finally,experimental results show that the method maximizes the defender's total expected utility and reduces the difference between the discrete and continuous arms of the utility.
基金Supported by Soft Science Project of the Ministry of Science and Technology (2011GXS1D003)Soft Science Project of Chongqing Municipality (cstc2011cx-rkxB00008)
文摘In order to solve the issues concerning the cross-unit sharing of information resources in rural areas, we analyze the incentive problem of the sharing of information resources in rural areas using the incentive theory method; establish corresponding incentive mechanism model (It is divided into positive incentive model and negative incentive model, and only when the two models guarantee each other and are used at the same time can they be effective). Based on this, we put forward the institutional design for sharing of information resources in rural areas as follows: firstly, establishing an administrative agency of rural information resources sharing, above the authority of all units, responsible for related work on sharing of information resources in rural areas; secondly, establishing and improving the positive and negative incentive mechanisms, to ensure the realization of sharing of information resources in rural areas.
基金This study is funded by“The National Natural Science Foundation of China(No.61972211,No.61771258)”.
文摘Web of Things(WoT)resources are not only numerous,but also have a wide range of applications and deployments.The centralized WoT resource sharing mechanism lacks flexibility and scalability,and hence cannot satisfy requirement of distributed resource sharing in large-scale environment.In response to this problem,a trusted and secure mechanism for WoT resources sharing based on context and blockchain(CWoT-Share)was proposed.Firstly,the mechanism can respond quickly to the changes of the application environment by dynamically determining resource access control rules according to the context.Then,the flexible resource charging strategies,which reduced the fees paid by the users who shared more resources and increased the fees paid by users who frequently used resources maliciously,were used to fulfill efficient sharing of WoT resources.Meanwhile,the charging strategies also achieve load balancing by dynamic selection of WoT resources.Finally,the open source blockchain platform Ethereum was used for the simulation and the simulation results show that CWoT-Share can flexibly adapt to the application environment and dynamically adjust strategies of resource access control and resource charging.
文摘In order to reduce east--west section area of “digital divider” in China, Ministry of Culture laun- ches the National Cultural Information Resources Sharing Project in the mid-west provinces, and the state finance gives certain funds subsidy in the project construction period. Embarks highly from strategy during construction plan chosen and operational system management, as while as union digital library to construct a persistent effect mechanism. With the principle of state guidance, enterprise operation and benefit farmers, expand culture industry within the provincial and safeguard Cultural Information Resources Sharing Project sustainable development's, then promotes the rural economy culture full scale development.
文摘Since the electronic resources and Internet Web sites became popular, distance education courses offered via the Internet could play an important role in providing global digital resources and teaching the knowledge of international library and information standards for bibliographic databases with electronic and web resources.This paper uses the example of the author's new online course: ILS 608 Cataloging and Development of a Digital Union Catalog for Ancient Chinese Books to demonstrate the global re...
文摘Cloud computing is a new computing model. The application of cloud computing to the field of higher education informatization has been very popular currently. In this paper, the concept and characteristics of cloud computing are introduced, the current situation of the teaching resources sharing and construction in colleges and universities is analyzed, and finally the influence of cloud computing on the construction of teaching information resources is discussed.
文摘Reorganization of network information resources for scientific and technical (scitech for abbreviation) documents and development of information infrastructure have brought a great change in China's scitech documentation information sharing. It integrated not only information resources, but also systems, technologies and funds. High quality services and effective resources sharing are the main goals of the platform construction. The paper describes briefly the principles and aims of the integration of the scitech information resources and networks. The services of the sharing platforms have been also introduced.
文摘This paper discusses the Project's organization system, technical system, creation of digital resources and service mode. It also summarizes achievements gained since the commencement of the Project, and also analyzes some of the more important issues during implementation stage and gives a few suggestions of the future development during the next stage of the 11thFive-Year Plan.
文摘Environments with reciprocal patchiness of resources, in which the availability of two resources such as light and soil nutrients are patchily distributed in horizontal space and negatively correlated in each patch, are common in many ecosystems. The strategies by which clonal plants adapt to this type of heterogeneous environment were examined in three stoloniferous herbs,Potentilla reptans L. var. sericophylla Franch., P. anserina L. and Halerpestes ruthenica (Jacq.) Qvcz., commonly inhabiting forest understories, grasslands and low saline meadows, respectively. As pairs of connected ramets were subjected to reciprocal patchiness of light and nutrients, stolon connection between the two ramets significantly enhanced biomass of both ramet growing in low light intensity but high soil nutrient condition (LH ramet) and ramet growing in high light intensity but low soil nutrient condition (HL ramet) as well as whole ramet pairs (consisting of LH ramets and HL ramets). Additionally, stolon connection greatly increased root/shoot ratio of LH ramet while significantly decreased that of HL ramet. The results indicate that a reciprocal transportation of resources between interconnected ramets and a functional specialization of ramets in uptake of abundant resources occurred. By resource sharing and functional specialization, clonal plants can efficiently acquire locally abundant resources and buffer the stress caused by reciprocal patchiness of resources.
基金Supported by Henan Fundamental and Advanced Technology Program(082300460100)Zhengzhou Key Technology Research&Development Program(10PTGN449)Zhengzhou Normal University Program(2012075)~~
文摘A natural history museum is a museum for collection, researching and presenting natural environment and natural heritages about natural history. In the research, based on the analysis on necessity of university museums’ services to society in resources sharing, the difficulties and dilemmas were summarized in sharing resources of museums and the approaches for resources sharing were explored with the case of Natural History Museum of Zhengzhou Normal University in order to investigate the way for better services of university museum to the public.
基金support by the Major National Science and Technology Projects (No. 2018ZX03001019-003, 2018ZX03001014-003)
文摘Caching and virtualization have been considered as the promising techniques in 5G Networks. In 5G networks with virtualization, the caching resources deployed by infrastructure providers (InPs) can be abstracted into isolated slices and transparently shared by mobile virtual network operators (MVNOs). In this case, one of the most important issues is how the MVNOs to share the caching resource. To solve this issue, different from previous works, a hierarchical caching architecture that core network and radio access network (RAN) have the caching capability in 5G networks with virtualization is first considered in this paper. Then, we study the problem of hierarchical caching resource sharing for MVNOs, and a competitive game to maximize their expectation revenue based on the oligopoly market model is formulated. As it is a hard problem to find the optimal solution in the hierarchical caching resource sharing problem, we decompose the optimization problem into two independent caching resource sharing problems in RAN and core network, respectively. Then the local optimal solutions are solved and the global Nash equilibrium solution is achieved. Finally, simulation results are illustrated to demonstrate the performance of the proposed scheme.
基金the National Natural Science Foundation of China (60673071, 60743003,90718005,90718006)the National High Technology Research and Development Program of China (2006AA01Z442,2007AA01Z411)
文摘Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mutability to control the usage process and an architecture to illustrate how TC technologies support policy enforcement with bidirectional attestation. The properties required for attestation should include not only integrity measurement value of platform and related application, but also reputation of users and access history, in order to avoid the limitation of the existing approaches. To make a permission, it is required to evaluate both the authorization and conditions of the subject and the object in resource usage to ensure trustable resources to be transferred to trusted users and platform.
基金supported by the Coalition for National Science Fundingunder Grant No.61150110486the Central University Funding under Grant No.ZYGX2013J073
文摘Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on- demand allocation of network resources are particularly important in Cloud computing. Ho- wever, nearly all-current available cloud com- puting platforms are either proprietary or their software infrastructure is invisible to the rese- arch community except for a few open-source platforms. For universities and research insti- tutes, more open and testable experimental plat- forms are needed in a lab-level with PCs. In this paper, a platform of infrastructure resou- rce sharing system (Platform as a Service (PaaS)) is developed in virtual Cloud comput- hug environment. Its architecture, core modules, main functions, design and operational envir- onment and applications are introduced in de- tail. It has good expandability and can impr- ove resource sharing and utilization and is app- lied to regular computer science teaching and research process.