In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pa...In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pages. Our framework model consists of three sub-models: one for user file access, one for web pages, and one for storage servers. Web pages are assumed to consist of different types and sizes of objects, which are characterized using several categories: articles, media, and mosaics. The model is implemented with a discrete event simulation and then used to investigate the performance of our system over a variety of parameters in our model. Our performance measure of choice is mean response time and by varying the composition of web pages through our categories, we find that our framework model is able to capture a wide range of conditions that serve as a basis for generating a variety of user request patterns. In addition, we are able to establish a set of parameters that can be used as base cases. One of the goals of this research is for the framework model to be general enough that the parameters can be varied such that it can serve as input for investigating other distributed applications that require the generation of user request access patterns.展开更多
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario...Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication.展开更多
Hanoi’s rapid urbanization has led to a surge in private vehicle ownership, particularly motorcycles, amidst inadequate public transportation infrastructure. Despite government efforts, many still prefer motorized tr...Hanoi’s rapid urbanization has led to a surge in private vehicle ownership, particularly motorcycles, amidst inadequate public transportation infrastructure. Despite government efforts, many still prefer motorized transport, citing mobility and safety concerns, exacerbated by insufficient pedestrian infrastructure. This study examines the motivations behind this reliance on motorized vehicles, particularly motorcycles, in Hanoi. Findings reveal safety and convenience as primary factors driving motorized transport use, especially for accessing bus stations. Economic incentives could promote non-motorized travel and public transport adoption. Policy implications highlight the importance of addressing economic factors and improving access infrastructure to manage motorized vehicle reliance and foster sustainable urban mobility in Hanoi.展开更多
The systematical structure of the role-based access control was analyzed,giving a full description of the definitions of user,user access,and the relation between post role and access. It puts forward a role-based acc...The systematical structure of the role-based access control was analyzed,giving a full description of the definitions of user,user access,and the relation between post role and access. It puts forward a role-based access control management which is relatively independent in the applied system. This management achieves the control on user's access by distribution and cancel of role-play,which is a better solution to the problems of the access control management for the applied system. Besides,a complete scheme for the realization of this access control was provided.展开更多
This paper describes the requirements for building accessible user interface for users with autism spectrum disorders (ASD) and presents the user interface (UI) of Open Book, a reading assistive tool for people with A...This paper describes the requirements for building accessible user interface for users with autism spectrum disorders (ASD) and presents the user interface (UI) of Open Book, a reading assistive tool for people with ASD. The requirements are extracted from both existing research on improving reading comprehension for people with ASD, and from the feedback of users and clinical professionals. The findings are applied in practice to create the user interface of Open Book tool. Key screens of the user interface are presented. It is implied that the features of the UI for people with ASD can be successfully applied to improving overall accessibility of any graphical user interface.展开更多
A description of the Systems Dynamics paradigm is given and the reduced Qualitative System Dynamics (QSD) form explained. A simple example is given to illustrate the diagram construction. The principles of states (lev...A description of the Systems Dynamics paradigm is given and the reduced Qualitative System Dynamics (QSD) form explained. A simple example is given to illustrate the diagram construction. The principles of states (levels), rates and feedback loops are outlined. The QSD method is used to address the problem of accessibility by using human control of automation as an example, and applying the QSD method to evaluate the effects of the researcher and user in the de- sign of an accessible artefact. This simple automation model illustrates what can be found out from such a picture, in this indicating how the feedback from users has an influence on the time to deliver such designs.展开更多
This paper outlined a Non-Orthogonal Multiple Access (NOMA) grouping transmission scheme for cognitive radio networks. To address the problems of small channel gain difference of the middle part users caused by the tr...This paper outlined a Non-Orthogonal Multiple Access (NOMA) grouping transmission scheme for cognitive radio networks. To address the problems of small channel gain difference of the middle part users caused by the traditional far-near pairing algorithm, and the low transmission rate of the traditional Orthogonal Multiple Access (OMA) transmission, a joint pairing algorithm was proposed, which provided multiple pairing schemes according to the actual scene. Firstly, the secondary users were sorted according to their channel gain, and then different secondary user groups were divided, and the far-near pairing combined with (Uniform Channel Gain Difference (UCGD) algorithm was used to group the secondary users. After completing the user pairing, the power allocation problem was solved. Finally, the simulation data results showed that the proposed algorithm can effectively improve the system transmission rate.展开更多
Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource.This paper analyzes the relatio...Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource.This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments.展开更多
Fog radio access network(F-RAN) is one of the key technology that brings cloud computing benefit to the future of wireless communications for handling massive access and high volume of data traffic. The high fronthaul...Fog radio access network(F-RAN) is one of the key technology that brings cloud computing benefit to the future of wireless communications for handling massive access and high volume of data traffic. The high fronthaul burden of a typical cellular system can be partially diminished by utilizing the storage and signal processing capabilities of the F-RANs, which is still not desirable as user throughput requirement is in the increasing trend with the increment of the internet of things(IoT) devices. This paper proposes an efficient scheduling scheme that minimizes the fronthaul load of F-RAN system optimally to improve user experience, and minimize latency. The scheduling scheme is modeled in a way that the scheduler which provides the lower fronthaul load while fulfilling the minimum user throughput requirement is selected for the data transmission process. Simulation results in terms of user selection fairness, outage probability, and fronthaul load for a different portion of user equipments(UEs) contents in fog access point(F-AP) are shown and compared with the most common scheduling scheme such as round robin(RR) scheme to validate the proposed method.展开更多
A critical component of the smart grid (SG) infrastructure is the embedded communications network, where an important objective of the latter is the expansion of its throughput, in conjunction with the satisfaction of...A critical component of the smart grid (SG) infrastructure is the embedded communications network, where an important objective of the latter is the expansion of its throughput, in conjunction with the satisfaction of specified latency and accuracy requirements. For the effective design of the communications network, the user and traffic profiles, such as known-user vs. unknown-user populations and bursty vs. non-bursty data traffics, must be carefully considered and subsequently modeled. This paper relates user and traffic models to the deployment of effective multiple access transmission algorithms in the communications network of the SG.展开更多
文摘In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pages. Our framework model consists of three sub-models: one for user file access, one for web pages, and one for storage servers. Web pages are assumed to consist of different types and sizes of objects, which are characterized using several categories: articles, media, and mosaics. The model is implemented with a discrete event simulation and then used to investigate the performance of our system over a variety of parameters in our model. Our performance measure of choice is mean response time and by varying the composition of web pages through our categories, we find that our framework model is able to capture a wide range of conditions that serve as a basis for generating a variety of user request patterns. In addition, we are able to establish a set of parameters that can be used as base cases. One of the goals of this research is for the framework model to be general enough that the parameters can be varied such that it can serve as input for investigating other distributed applications that require the generation of user request access patterns.
文摘Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication.
文摘Hanoi’s rapid urbanization has led to a surge in private vehicle ownership, particularly motorcycles, amidst inadequate public transportation infrastructure. Despite government efforts, many still prefer motorized transport, citing mobility and safety concerns, exacerbated by insufficient pedestrian infrastructure. This study examines the motivations behind this reliance on motorized vehicles, particularly motorcycles, in Hanoi. Findings reveal safety and convenience as primary factors driving motorized transport use, especially for accessing bus stations. Economic incentives could promote non-motorized travel and public transport adoption. Policy implications highlight the importance of addressing economic factors and improving access infrastructure to manage motorized vehicle reliance and foster sustainable urban mobility in Hanoi.
文摘The systematical structure of the role-based access control was analyzed,giving a full description of the definitions of user,user access,and the relation between post role and access. It puts forward a role-based access control management which is relatively independent in the applied system. This management achieves the control on user's access by distribution and cancel of role-play,which is a better solution to the problems of the access control management for the applied system. Besides,a complete scheme for the realization of this access control was provided.
文摘This paper describes the requirements for building accessible user interface for users with autism spectrum disorders (ASD) and presents the user interface (UI) of Open Book, a reading assistive tool for people with ASD. The requirements are extracted from both existing research on improving reading comprehension for people with ASD, and from the feedback of users and clinical professionals. The findings are applied in practice to create the user interface of Open Book tool. Key screens of the user interface are presented. It is implied that the features of the UI for people with ASD can be successfully applied to improving overall accessibility of any graphical user interface.
文摘A description of the Systems Dynamics paradigm is given and the reduced Qualitative System Dynamics (QSD) form explained. A simple example is given to illustrate the diagram construction. The principles of states (levels), rates and feedback loops are outlined. The QSD method is used to address the problem of accessibility by using human control of automation as an example, and applying the QSD method to evaluate the effects of the researcher and user in the de- sign of an accessible artefact. This simple automation model illustrates what can be found out from such a picture, in this indicating how the feedback from users has an influence on the time to deliver such designs.
文摘This paper outlined a Non-Orthogonal Multiple Access (NOMA) grouping transmission scheme for cognitive radio networks. To address the problems of small channel gain difference of the middle part users caused by the traditional far-near pairing algorithm, and the low transmission rate of the traditional Orthogonal Multiple Access (OMA) transmission, a joint pairing algorithm was proposed, which provided multiple pairing schemes according to the actual scene. Firstly, the secondary users were sorted according to their channel gain, and then different secondary user groups were divided, and the far-near pairing combined with (Uniform Channel Gain Difference (UCGD) algorithm was used to group the secondary users. After completing the user pairing, the power allocation problem was solved. Finally, the simulation data results showed that the proposed algorithm can effectively improve the system transmission rate.
基金The National Natural Science Foundation of China(No60402019No60672068)
文摘Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource.This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments.
基金supported by Incheon National University(International Cooperative)Research Grant in 2015
文摘Fog radio access network(F-RAN) is one of the key technology that brings cloud computing benefit to the future of wireless communications for handling massive access and high volume of data traffic. The high fronthaul burden of a typical cellular system can be partially diminished by utilizing the storage and signal processing capabilities of the F-RANs, which is still not desirable as user throughput requirement is in the increasing trend with the increment of the internet of things(IoT) devices. This paper proposes an efficient scheduling scheme that minimizes the fronthaul load of F-RAN system optimally to improve user experience, and minimize latency. The scheduling scheme is modeled in a way that the scheduler which provides the lower fronthaul load while fulfilling the minimum user throughput requirement is selected for the data transmission process. Simulation results in terms of user selection fairness, outage probability, and fronthaul load for a different portion of user equipments(UEs) contents in fog access point(F-AP) are shown and compared with the most common scheduling scheme such as round robin(RR) scheme to validate the proposed method.
文摘A critical component of the smart grid (SG) infrastructure is the embedded communications network, where an important objective of the latter is the expansion of its throughput, in conjunction with the satisfaction of specified latency and accuracy requirements. For the effective design of the communications network, the user and traffic profiles, such as known-user vs. unknown-user populations and bursty vs. non-bursty data traffics, must be carefully considered and subsequently modeled. This paper relates user and traffic models to the deployment of effective multiple access transmission algorithms in the communications network of the SG.