The classical supply chain network(SCN)design problem is extended,where the candidate facilities are subject to failure and the products are prone to elapsed time deteriorion.First,the reliable SCN design problem is d...The classical supply chain network(SCN)design problem is extended,where the candidate facilities are subject to failure and the products are prone to elapsed time deteriorion.First,the reliable SCN design problem is defined by introducing the probability that a facility may be prone to inactivity based on the analysis of perishable product characteristics.The perishable product SCN design problem is formulated as a 0-1 integer programming model.The objective is to minimize the weighted sum of the operating cost(the fixed plus transportation cost)and the expected failure cost.And then,the perishable product SCN design model is discussed and solved using the genetic algorithm(GA).The results show how to generate the tradeoff curve between the operating costs and the expected failure costs.And these tradeoff curves demonstrate empirically that substantial improvements in reliability are often possible with minimal increase in the operating costs.展开更多
Abstract: In this present paper, one new species in the genus Saxetophilus Umnov from Qinghai Province, Saxetophilus qinghaiensis sp. nov., is described. This new species is allied to Saxetophilus gansuensis Wang et ...Abstract: In this present paper, one new species in the genus Saxetophilus Umnov from Qinghai Province, Saxetophilus qinghaiensis sp. nov., is described. This new species is allied to Saxetophilus gansuensis Wang et al., 2006 and Saxetophilus mistshenkoi Naumovitsh, 1988. It differs from both of them in: l) widest between lateral keels of pronotum by 3.30-3.75 times (~) or 3.00-3.60 times (~) length of median keel in metazona; and 2) interspace of mesosternal lobes wider than that of lateral lobes. Type specimens are at the Institute of Zoology, Shaanxi Normal University.展开更多
Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is ...Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is analyzed with the CK (Canetti-Krawczyk) model and the BAN (Burrows-Abadi- Needham) logic. Results show that it can achieve the alleged authentication and key negotiation goals. Besides those alleged, further analyses indicate that the authentication access process can satisfy other security requirements, such as mutual identity authentication, mutual key control, key confirmation, message integrity check, etc. If the used elliptic curve encryption algorithm and the hash algorithm are secure enough, the protocol can efficiently realize mutual authentication between STAs (station) and APs (access point). Therefore, WAPI can be applied to replace the security mechanism used in the original WLAN international standard to enhance its security.展开更多
With the new characteristics of global cooperation in supply chains being synthetically considered,a hybrid model to the cooperative negotiation process for the order distribution in supply chain is mainly studied.Aft...With the new characteristics of global cooperation in supply chains being synthetically considered,a hybrid model to the cooperative negotiation process for the order distribution in supply chain is mainly studied.After reviewing and analyzing some main domestic and overseas processes in cooperative negotiation modeling in supply chain,some problems are subsequently pointed out.For example,the traditional simple multi-agent system(MAS)frameworks which have some limitations,are not suitable for solving modeling complex systems.To solve these problems,thinking with the aid of the multi-agent structure and complex system modeling,the manufacturing supply chain is taken as an example,and a time Petri net production model is adopted to decompose the materials.And then a cooperative negotiation model for the order distribution in supply chain is constructed based on combining multi-agent techniques with time Petri net modeling.The simulation results reveal that the above model helps solve the problems of cooperative negotiation in supply chains.展开更多
The Internet is becoming increasingly more valuable in the field ofarchitectural design so that what we conventionally called CAD might soon be changed to Internetaided design (iAD). In order to have a clear vision of...The Internet is becoming increasingly more valuable in the field ofarchitectural design so that what we conventionally called CAD might soon be changed to Internetaided design (iAD). In order to have a clear vision of what IAD will be or could be, we should firstexamine what is currently available. This research focuses on an investigation of selected Webvendors, which are typical and most influential in providing Internet related services for the AECindustry. By comparing and analyzing their functionality, services provided, business models,technology and financial situation, we have seen that Internet application in the AEC industry isstill in early stage, especially in the area of on-line engineering consulting for architects.展开更多
City networks have been a critical topic in the fields of urban geography and regional economics. Numerous studies have explored city networks, focusing mainly on infrastructure and industrial networks. Unlike traditi...City networks have been a critical topic in the fields of urban geography and regional economics. Numerous studies have explored city networks, focusing mainly on infrastructure and industrial networks. Unlike traditional urban network of which the major measuring indexes are population sizes and entity industries, online commodity service networks could reflect well the influencing of emerging economies, especially the Internet economy, on city networks. This study analyzes and reveals structural features of China's city networks through online commodity services, providing the internet economic approach on city networks. Results indicate that the core cities of online commodity service networks are mainly concentrated in eastern coastal areas. In addition, spatial polarization and layer structure of network connections are obvious, descending from the centers in eastern China to peripheral cities in central and western China. Online commodity services of different cities show apparent differences and uncertainties in terms of specialization rates of international connection, which presents a tendency toward diversification. Online commodity service networks are not only associated with goods production, supply, and consumption in physical space but also reflect virtual information, capital, and technology flows, thus providing a new empirical approach for understanding city networks in information and internet economic age.展开更多
Online shopping has already become the new mode that a lot of customers try to adopt. At the same time, the online shopping could not be successfully completed without logistics service. Logistics service quality (LSQ...Online shopping has already become the new mode that a lot of customers try to adopt. At the same time, the online shopping could not be successfully completed without logistics service. Logistics service quality (LSQ) has significant impact on revenue and profitability. This paper presents the issue from the perspective of the customer, and explores the initial factors of LSQ based on the online shopping through in-depth interview and the Delphi method. The survey uses a standard 7-point Likert-type scale to measure the LSQ. Empirical research results are shown in detail to confirm seven LSQ dimensions with Chinese characteristics, including timeliness quality, personal contact quality, order quality, order discrepancy handling, order condition and convenience. Statistical analyses of the investigation were conducted to test the reliability and validity of the LSQ evaluation model.展开更多
Due to e-business' s variety of customers with different navigational patterns and demands, multiclass queuing network is a natural performance model for it. The open multi-class queuing network(QN) models are bas...Due to e-business' s variety of customers with different navigational patterns and demands, multiclass queuing network is a natural performance model for it. The open multi-class queuing network(QN) models are based on the assumption that no service center is saturated as a result of the combined loads of all the classes. Several formulas are used to calculate performance measures, including throughput, residence time, queue length, response time and the average number of requests. The solution technique of closed multi-class QN models is an approximate mean value analysis algorithm (MVA) based on three key equations, because the exact algorithm needs huge time and space requirement. As mixed multi-class QN models, include some open and some closed classes, the open classes should be eliminated to create a closed multi-class QN so that the closed model algorithm can be applied. Some corresponding examples are given to show how to apply the algorithms mentioned in this article. These examples indicate that multi-class QN is a reasonably accurate model of e-business and can be solved efficiently.展开更多
Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made availabl...Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made available at Web servers, or that are actively broadcasted byWeb servers to interested clients. These documents often contain information at different degrees ofsensitivity, therefore a strong XML security platform and mechanism is needed. In this paper wedeveloped CIT/XML security platform and take a close look to syntax and processing of CIT/digitalsignature model, CIT/encryption model, CIT/smart card crypto and SPKI interface security models.Security services such as authentication, integrity and confidentiality to XML documents and non-XMLdocuments, which exchanged among various servers, are provided.展开更多
The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, l...The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, loV promises huge commercial interest and research value, thereby attracting a large number of companies and researchers. This paper proposes an abstract network model of the IoV, discusses the technologies required to create the IoV, presents different applications based on certain currently existing technologies, provides several open research challenges and describes essential future research in the area of loV.展开更多
Automated negotiation is the key techniques for reaching agreements in agent-mediated electronic commerce. Current automated negotiation models assume that users know the value of the product or service they want to b...Automated negotiation is the key techniques for reaching agreements in agent-mediated electronic commerce. Current automated negotiation models assume that users know the value of the product or service they want to buy and provide their agents with a reservation price, and the agents make offers and reach agreements with other agents according to this reservation price. However, in real world electronic marketplaces users probably do not know the exact value of the item, which is in terms of price, and the reservation price they set to their agents only means the maximum price they are willing to pay for the item. In this paper, we propose a negotiation model to deal with the valuation problem. The shopping agent in our model can deliberate the market price and the seller agent’s reservation price from public available information and the seller agent’s proposals. Also in order to conform with the real world negotiation conditions, we introduce negotiation features of real world human shopping such as multiple sellers, valuation, ultimatum, and learning from available information, etc. into our model.展开更多
Customer loyalty of B2C e-commerce is studied by testing the hypotheses on five latent variables using the structural equation modeling method. After correcting model, online store image is obviously fundamental basis...Customer loyalty of B2C e-commerce is studied by testing the hypotheses on five latent variables using the structural equation modeling method. After correcting model, online store image is obviously fundamental basis on expectations of shopping online, experience of shopping online, customer satisfaction and customer loyalty between which there are seven positive relationships accepted in the AMOS model. The results provide scientific evidence for B2C e-commerce.展开更多
The basic conditions of the enterprise informatization in Heilongjiang province are analyzed and 4 models are designed to drive the industrial and commercial information enterprise. The 4 models are the Resource Integ...The basic conditions of the enterprise informatization in Heilongjiang province are analyzed and 4 models are designed to drive the industrial and commercial information enterprise. The 4 models are the Resource Integration Informatization Model, the Flow Management Informatization Model, the Intranet E-commerce Informatization Model and the Network Enterprise Informatization Model. The conditions for using and problems needing attentions of these 4 models are also analyzed.展开更多
An interference alignment(IA)spectrum sharing method based on Rayleigh quotient is proposed for distributed multi-user multi-antenna cognitive radio(CR) networks.The interference from cognitive users(CUs)to the primar...An interference alignment(IA)spectrum sharing method based on Rayleigh quotient is proposed for distributed multi-user multi-antenna cognitive radio(CR) networks.The interference from cognitive users(CUs)to the primary(PR) system is constrained through the Rayleigh quotients of channel matrices to deal with the absence of PR users(PUs) in the IA process.As a result,the IA scheme can be applied in CR networks without harmful interference to PUs.Compared with existing IA based spectrum sharing methods,the proposed method is more general because of breaking the restriction that CUs can only transmit on the idle sub-channels of the PR system.Moreover,in comparison to other four spectrum sharing methods applicable in general scene,the proposed method leads to improved performance of achievable sum rate of the CR system as well as guarantees the transmission of PUs.展开更多
The advent of the Intemet has witnessed a revolution in the business world. One typical example is the emergence of the B2B website. The present paper looks at the B2B website, a conventionalized digital text, in term...The advent of the Intemet has witnessed a revolution in the business world. One typical example is the emergence of the B2B website. The present paper looks at the B2B website, a conventionalized digital text, in terms of its communicative purposes, move features as well as linguistic specialties, with the aim of presenting the generic structure of the B2B website and its principal linguistic features contributing to the realization of its communicative purposes. It is demonstrated that the B2B website is one instance of the promotional genres and it has a lot in common with advertisement English and "netsneak" in the aspect of lexico-grammatical features.展开更多
This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed ...This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed by cloud services providers,such as wireless network access points(APs),to improve the performance of mobile cloud servicesand be different from traditional mobile operator mode.Then based on this new architecture.we improve our previous(Attribute-basedencryption) ABE access control scheme on cloud for mobile cloud,which is proposed to offload the main amount of computations to the cloudlet as the function of cloud.Simulationresults demonstratethe new access control scheme takes into consideration response time constraints and network statusof access task execution,while satisfying certain network security for mobile cloud.展开更多
Plastic bags, though commonly used for packaging of goods, are highly durable and non- biodegradable. Plastic bag litter serves as a negative environmental externality detrimental to animal health and natural beauty o...Plastic bags, though commonly used for packaging of goods, are highly durable and non- biodegradable. Plastic bag litter serves as a negative environmental externality detrimental to animal health and natural beauty of the environment. In an effort to curtail the excessive use of plastic bags in Botswana, the government introduced a plastic levy targeted at consumers at retail points. This study uses primary data collected from 367 respondents randomly selected from six geospatially and purposively selected shopping malls to determine the consumers' willingness to pay (WTP) for continued plastic bag usage and their willingness to accept (WTA) to shift to eco-friendly alternatives. The results of the study revealed that open dumping and burning of plastic litter are more common in Maun than in Gaborone, It also showed that there is a significant relationship between the level of education and W'FP. Further, there is a significant variation in income and education in respect to environmental awareness. The government should improve its efforts of sensitizing the public about the improper disposal of plastic bags.展开更多
The ability of accurate and scalable mobile device recognition is critically important for mobile network operators and ISPs to understand their customers' behaviours and enhance their user experience.In this pape...The ability of accurate and scalable mobile device recognition is critically important for mobile network operators and ISPs to understand their customers' behaviours and enhance their user experience.In this paper,we propose a novel method for mobile device model recognition by using statistical information derived from large amounts of mobile network traffic data.Specifically,we create a Jaccardbased coefficient measure method to identify a proper keyword representing each mobile device model from massive unstructured textual HTTP access logs.To handle the large amount of traffic data generated from large mobile networks,this method is designed as a set of parallel algorithms,and is implemented through the MapReduce framework which is a distributed parallel programming model with proven low-cost and high-efficiency features.Evaluations using real data sets show that our method can accurately recognise mobile client models while meeting the scalability and producer-independency requirements of large mobile network operators.Results show that a 91.5% accuracy rate is achieved for recognising mobile client models from 2 billion records,which is dramatically higher than existing solutions.展开更多
基金The National Key Technology R&D Program of China during the 11th Five-Year Plan Period(No.2006BAH02A06)
文摘The classical supply chain network(SCN)design problem is extended,where the candidate facilities are subject to failure and the products are prone to elapsed time deteriorion.First,the reliable SCN design problem is defined by introducing the probability that a facility may be prone to inactivity based on the analysis of perishable product characteristics.The perishable product SCN design problem is formulated as a 0-1 integer programming model.The objective is to minimize the weighted sum of the operating cost(the fixed plus transportation cost)and the expected failure cost.And then,the perishable product SCN design model is discussed and solved using the genetic algorithm(GA).The results show how to generate the tradeoff curve between the operating costs and the expected failure costs.And these tradeoff curves demonstrate empirically that substantial improvements in reliability are often possible with minimal increase in the operating costs.
文摘Abstract: In this present paper, one new species in the genus Saxetophilus Umnov from Qinghai Province, Saxetophilus qinghaiensis sp. nov., is described. This new species is allied to Saxetophilus gansuensis Wang et al., 2006 and Saxetophilus mistshenkoi Naumovitsh, 1988. It differs from both of them in: l) widest between lateral keels of pronotum by 3.30-3.75 times (~) or 3.00-3.60 times (~) length of median keel in metazona; and 2) interspace of mesosternal lobes wider than that of lateral lobes. Type specimens are at the Institute of Zoology, Shaanxi Normal University.
基金The National Basic Research Program of China(973Program) (No.G1999035805)the Natural Science Foundation of ShannxiProvince (No.2007F37)China Postdoctoral Science Foundation (No.20060401008,20070410376).
文摘Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is analyzed with the CK (Canetti-Krawczyk) model and the BAN (Burrows-Abadi- Needham) logic. Results show that it can achieve the alleged authentication and key negotiation goals. Besides those alleged, further analyses indicate that the authentication access process can satisfy other security requirements, such as mutual identity authentication, mutual key control, key confirmation, message integrity check, etc. If the used elliptic curve encryption algorithm and the hash algorithm are secure enough, the protocol can efficiently realize mutual authentication between STAs (station) and APs (access point). Therefore, WAPI can be applied to replace the security mechanism used in the original WLAN international standard to enhance its security.
基金The National Natural Science Foundation of China(No.70401013)the National Key Technology R&D Program of China during the 11th Five-Year Plan Period(No.2006BAH02A06)
文摘With the new characteristics of global cooperation in supply chains being synthetically considered,a hybrid model to the cooperative negotiation process for the order distribution in supply chain is mainly studied.After reviewing and analyzing some main domestic and overseas processes in cooperative negotiation modeling in supply chain,some problems are subsequently pointed out.For example,the traditional simple multi-agent system(MAS)frameworks which have some limitations,are not suitable for solving modeling complex systems.To solve these problems,thinking with the aid of the multi-agent structure and complex system modeling,the manufacturing supply chain is taken as an example,and a time Petri net production model is adopted to decompose the materials.And then a cooperative negotiation model for the order distribution in supply chain is constructed based on combining multi-agent techniques with time Petri net modeling.The simulation results reveal that the above model helps solve the problems of cooperative negotiation in supply chains.
文摘The Internet is becoming increasingly more valuable in the field ofarchitectural design so that what we conventionally called CAD might soon be changed to Internetaided design (iAD). In order to have a clear vision of what IAD will be or could be, we should firstexamine what is currently available. This research focuses on an investigation of selected Webvendors, which are typical and most influential in providing Internet related services for the AECindustry. By comparing and analyzing their functionality, services provided, business models,technology and financial situation, we have seen that Internet application in the AEC industry isstill in early stage, especially in the area of on-line engineering consulting for architects.
基金Under the auspices of National Natural Science Foundation of China(No.41571146,41701178)China Postdoctoral Science Foundation(No.2016M600393)Natural Science Foundation of Jiangsu Province(No.BK20170639)
文摘City networks have been a critical topic in the fields of urban geography and regional economics. Numerous studies have explored city networks, focusing mainly on infrastructure and industrial networks. Unlike traditional urban network of which the major measuring indexes are population sizes and entity industries, online commodity service networks could reflect well the influencing of emerging economies, especially the Internet economy, on city networks. This study analyzes and reveals structural features of China's city networks through online commodity services, providing the internet economic approach on city networks. Results indicate that the core cities of online commodity service networks are mainly concentrated in eastern coastal areas. In addition, spatial polarization and layer structure of network connections are obvious, descending from the centers in eastern China to peripheral cities in central and western China. Online commodity services of different cities show apparent differences and uncertainties in terms of specialization rates of international connection, which presents a tendency toward diversification. Online commodity service networks are not only associated with goods production, supply, and consumption in physical space but also reflect virtual information, capital, and technology flows, thus providing a new empirical approach for understanding city networks in information and internet economic age.
基金Project (Nos. 50505044 and 70472061) supported by the National Natural Science Foundation of China
文摘Online shopping has already become the new mode that a lot of customers try to adopt. At the same time, the online shopping could not be successfully completed without logistics service. Logistics service quality (LSQ) has significant impact on revenue and profitability. This paper presents the issue from the perspective of the customer, and explores the initial factors of LSQ based on the online shopping through in-depth interview and the Delphi method. The survey uses a standard 7-point Likert-type scale to measure the LSQ. Empirical research results are shown in detail to confirm seven LSQ dimensions with Chinese characteristics, including timeliness quality, personal contact quality, order quality, order discrepancy handling, order condition and convenience. Statistical analyses of the investigation were conducted to test the reliability and validity of the LSQ evaluation model.
文摘Due to e-business' s variety of customers with different navigational patterns and demands, multiclass queuing network is a natural performance model for it. The open multi-class queuing network(QN) models are based on the assumption that no service center is saturated as a result of the combined loads of all the classes. Several formulas are used to calculate performance measures, including throughput, residence time, queue length, response time and the average number of requests. The solution technique of closed multi-class QN models is an approximate mean value analysis algorithm (MVA) based on three key equations, because the exact algorithm needs huge time and space requirement. As mixed multi-class QN models, include some open and some closed classes, the open classes should be eliminated to create a closed multi-class QN so that the closed model algorithm can be applied. Some corresponding examples are given to show how to apply the algorithms mentioned in this article. These examples indicate that multi-class QN is a reasonably accurate model of e-business and can be solved efficiently.
文摘Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made available at Web servers, or that are actively broadcasted byWeb servers to interested clients. These documents often contain information at different degrees ofsensitivity, therefore a strong XML security platform and mechanism is needed. In this paper wedeveloped CIT/XML security platform and take a close look to syntax and processing of CIT/digitalsignature model, CIT/encryption model, CIT/smart card crypto and SPKI interface security models.Security services such as authentication, integrity and confidentiality to XML documents and non-XMLdocuments, which exchanged among various servers, are provided.
基金supported by the Natural Science Foundation of Beijing under Grant No.4132048,NSFC(61472047),and NSFC(61202435)
文摘The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, loV promises huge commercial interest and research value, thereby attracting a large number of companies and researchers. This paper proposes an abstract network model of the IoV, discusses the technologies required to create the IoV, presents different applications based on certain currently existing technologies, provides several open research challenges and describes essential future research in the area of loV.
文摘Automated negotiation is the key techniques for reaching agreements in agent-mediated electronic commerce. Current automated negotiation models assume that users know the value of the product or service they want to buy and provide their agents with a reservation price, and the agents make offers and reach agreements with other agents according to this reservation price. However, in real world electronic marketplaces users probably do not know the exact value of the item, which is in terms of price, and the reservation price they set to their agents only means the maximum price they are willing to pay for the item. In this paper, we propose a negotiation model to deal with the valuation problem. The shopping agent in our model can deliberate the market price and the seller agent’s reservation price from public available information and the seller agent’s proposals. Also in order to conform with the real world negotiation conditions, we introduce negotiation features of real world human shopping such as multiple sellers, valuation, ultimatum, and learning from available information, etc. into our model.
文摘Customer loyalty of B2C e-commerce is studied by testing the hypotheses on five latent variables using the structural equation modeling method. After correcting model, online store image is obviously fundamental basis on expectations of shopping online, experience of shopping online, customer satisfaction and customer loyalty between which there are seven positive relationships accepted in the AMOS model. The results provide scientific evidence for B2C e-commerce.
文摘The basic conditions of the enterprise informatization in Heilongjiang province are analyzed and 4 models are designed to drive the industrial and commercial information enterprise. The 4 models are the Resource Integration Informatization Model, the Flow Management Informatization Model, the Intranet E-commerce Informatization Model and the Network Enterprise Informatization Model. The conditions for using and problems needing attentions of these 4 models are also analyzed.
基金supported by National Natural Science Foundation of China under Grant 6120123361271262Fundamental Research Funds for the Central Universities (2013G1241114)
文摘An interference alignment(IA)spectrum sharing method based on Rayleigh quotient is proposed for distributed multi-user multi-antenna cognitive radio(CR) networks.The interference from cognitive users(CUs)to the primary(PR) system is constrained through the Rayleigh quotients of channel matrices to deal with the absence of PR users(PUs) in the IA process.As a result,the IA scheme can be applied in CR networks without harmful interference to PUs.Compared with existing IA based spectrum sharing methods,the proposed method is more general because of breaking the restriction that CUs can only transmit on the idle sub-channels of the PR system.Moreover,in comparison to other four spectrum sharing methods applicable in general scene,the proposed method leads to improved performance of achievable sum rate of the CR system as well as guarantees the transmission of PUs.
文摘The advent of the Intemet has witnessed a revolution in the business world. One typical example is the emergence of the B2B website. The present paper looks at the B2B website, a conventionalized digital text, in terms of its communicative purposes, move features as well as linguistic specialties, with the aim of presenting the generic structure of the B2B website and its principal linguistic features contributing to the realization of its communicative purposes. It is demonstrated that the B2B website is one instance of the promotional genres and it has a lot in common with advertisement English and "netsneak" in the aspect of lexico-grammatical features.
基金supported by National Natural Science Foundation of China(No.U 1405254, 61472092)China Postdoctoral Science Foundation(No.2015M581101)National Science and Technology SupportingFoundation of China(No.2014BAH41B00)
文摘This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed by cloud services providers,such as wireless network access points(APs),to improve the performance of mobile cloud servicesand be different from traditional mobile operator mode.Then based on this new architecture.we improve our previous(Attribute-basedencryption) ABE access control scheme on cloud for mobile cloud,which is proposed to offload the main amount of computations to the cloudlet as the function of cloud.Simulationresults demonstratethe new access control scheme takes into consideration response time constraints and network statusof access task execution,while satisfying certain network security for mobile cloud.
文摘Plastic bags, though commonly used for packaging of goods, are highly durable and non- biodegradable. Plastic bag litter serves as a negative environmental externality detrimental to animal health and natural beauty of the environment. In an effort to curtail the excessive use of plastic bags in Botswana, the government introduced a plastic levy targeted at consumers at retail points. This study uses primary data collected from 367 respondents randomly selected from six geospatially and purposively selected shopping malls to determine the consumers' willingness to pay (WTP) for continued plastic bag usage and their willingness to accept (WTA) to shift to eco-friendly alternatives. The results of the study revealed that open dumping and burning of plastic litter are more common in Maun than in Gaborone, It also showed that there is a significant relationship between the level of education and W'FP. Further, there is a significant variation in income and education in respect to environmental awareness. The government should improve its efforts of sensitizing the public about the improper disposal of plastic bags.
基金supported in part by the National Natural Science Foundation of China under Grant No.61072061the National Science and Technology Major Projects under Grant No.2012ZX03002008the Fundamental Research Funds for the Central Universities under Grant No.2012RC0121
文摘The ability of accurate and scalable mobile device recognition is critically important for mobile network operators and ISPs to understand their customers' behaviours and enhance their user experience.In this paper,we propose a novel method for mobile device model recognition by using statistical information derived from large amounts of mobile network traffic data.Specifically,we create a Jaccardbased coefficient measure method to identify a proper keyword representing each mobile device model from massive unstructured textual HTTP access logs.To handle the large amount of traffic data generated from large mobile networks,this method is designed as a set of parallel algorithms,and is implemented through the MapReduce framework which is a distributed parallel programming model with proven low-cost and high-efficiency features.Evaluations using real data sets show that our method can accurately recognise mobile client models while meeting the scalability and producer-independency requirements of large mobile network operators.Results show that a 91.5% accuracy rate is achieved for recognising mobile client models from 2 billion records,which is dramatically higher than existing solutions.