LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is...LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is subject to LDoS attacks as well. LDoS attacks can cause table reset, route flapping of BGP protocol. A deliberately constructed distributed low-rate DOS attacks can even generate surge of updates throughout the Internet. In this paper, we investigate the promotion of attack efficiency of this novel attack, and then propose an attack model to simulate the LDoS attack. Experiments prove that this attack model can exponentially lower the attack costs and improve the attack effect.展开更多
Distributed Luby Transform (DLT) codes have been proposed to improve the robustness and system throughputs for multisource single-sink networks by exploiting the benefits of Network Coding (NC) at a single relay. ...Distributed Luby Transform (DLT) codes have been proposed to improve the robustness and system throughputs for multisource single-sink networks by exploiting the benefits of Network Coding (NC) at a single relay. All the proposed schemes such as the DLT and Soliton-Like Rateless Coding (SLRC) have attempted to maintain Robust Soliton Distribution (RSD) or Soliton-Like Distribution (SLD) for the output data at the relay. This rzsult in some source symbols to be discarded, thereby degrading the throughput. In this paper, we have proposed a novel method called the Full DLT (FDLT) coding scheme to be applied in the InterPlaNetary (IPN) Internet scenario comprising two sources and one relay The aim of the proposed scheme is to fully utilise the source symbols so as to reduce the overheads and improve energy efficiencies at the sources while maintaining low overhead at the relay. In addition, almost no buffer is needed in the proposed scheme so the relay can have limited storage space, and the proposed scheme is resilient to the churn rates of the nodes. The simulation results have shown that the proposed scheme outperforms the aforementioned schemes with respect to source overheads and total overhead in addition to preserving the benefits of NC and LT codes.展开更多
Studies the design of distributed virtual environments (DVEs) for tele-multi-robotics. The proposed design, incorporating two models ( distributlon-supported model and VE-supported model), attempts to represent co...Studies the design of distributed virtual environments (DVEs) for tele-multi-robotics. The proposed design, incorporating two models ( distributlon-supported model and VE-supported model), attempts to represent common functionality, communication issues, and requirements found in multi-operator DVEs. The distribution-supported model concentrates on the introduction of computer-supported collaborative work (CSCW) to realize the coordination of multi-operators, while the VE-supported model concentrates on the utilization of an object-oriented approach to strengthen the expandability and robustness of the system. Finally, the configuration anti running environments of the system are given.展开更多
The smart grid is the next generation of power and distribution systems. The integration of advanced network, communications, and computing techniques allows for the enhancement of efficiency and reliability. The smar...The smart grid is the next generation of power and distribution systems. The integration of advanced network, communications, and computing techniques allows for the enhancement of efficiency and reliability. The smart grid interconnects the flow of information via the power line, intelligent metering, renewable and distributed energy systems, and a monitoring and controlling infrastructure. For all the advantages that these components come with, they remain at risk to a spectrum of physical and digital attacks. This paper will focus on digital vulnerabilities within the smart grid and how they may be exploited to form full fledged attacks on the system. A number of countermeasures and solutions from the literature will also be reported, to give an overview of the options for dealing with such problems. This paper serves as a triggering point for future research into smart grid cyber security.展开更多
Music has often changed, from a social point of view, and also the relationship between music and the city. This paper attempts to describe how music changes under the impact of Internet. The milieu of musicians and t...Music has often changed, from a social point of view, and also the relationship between music and the city. This paper attempts to describe how music changes under the impact of Internet. The milieu of musicians and the audiences are concerned. The economic model of music has not burst into pieces, but it has deeply changed. There is a trend to pure consumerism thanks to internet (probably the sales of downloaded music will become more and more important). Also, independent artists can use Internet and have a livelihood (fat tail phenomenon). Therefore the diversity of music can be preserved. Concerts (music in the city) allow escaping from the losses of money because of piracy. There are several experiences for listeners, which are possible, some of them involving going to concerts and festivals.展开更多
The lnternet age has penetrated deeply into people's life. Some existing Intemet patterrrs can not meet the needs of consumers.With the development of "Internet +", the innovation and entrepreneurship of Internet ...The lnternet age has penetrated deeply into people's life. Some existing Intemet patterrrs can not meet the needs of consumers.With the development of "Internet +", the innovation and entrepreneurship of Internet are emerging. New electric business, incubator, maker space are becoming popular innovative modes and develop rapidly. In this paper, we will discuss the change of innovation and entrepreneurship under the" lnternet +" era by taking maker space 3 6 Kr as an example.展开更多
Teleoperation system plays an important role in executing task under hazard environment. As the computer networks such as the Internet are being used as the communication channel of teleoperation system, varying time ...Teleoperation system plays an important role in executing task under hazard environment. As the computer networks such as the Internet are being used as the communication channel of teleoperation system, varying time delay causes the overall system unstable and reduces the performance of transparency. This paper proposed twelve operation modes with different control schemes for teleoperation on the Internet with time delay. And an optimal operation mode with control scheme was specified for teleoperation with time delay, based on the tradeoff between passivity and transparency properties. It experimentally confirmed the validity of the proposed optimal mode and control scheme by using a simple one DOF master-slave manipulator system.展开更多
The rapid growth oflnternet technology development has made Chinese consumers search for products over the Internet and purchase products or services from Web-retailers. E-commerce is growing to represent an increasin...The rapid growth oflnternet technology development has made Chinese consumers search for products over the Internet and purchase products or services from Web-retailers. E-commerce is growing to represent an increasing share of overall sale avenue, and online shopping is expected to continue growing for foreseeable future. As such, it is vital to identify the performance of shopping online and investigate the effects that shopping online has on e-commerce.The methods used in this study are consulting some authentic materials and looking into some cases in point. It is found that shopping online has so many disadvantages, such as credit crisis, the insecurity of e-bank, express problem, a series of relevant law problems, limited payment options and so on.Because of these limitations, shopping online has interfered with e-commerce. Overall, shopping online is more or less a bar to e-commerce.展开更多
Currently, an unprecedented financial craze is sweeping the Internet nationwide and bringing impact to traditional banking business model, and commercial banks face constant change response options. This paper argues ...Currently, an unprecedented financial craze is sweeping the Internet nationwide and bringing impact to traditional banking business model, and commercial banks face constant change response options. This paper argues that change is inevitable, and may promote the developments of commercial banks, but maintaining the current situation may be a good strategy. So, According to their own conditions and the environment, the Internet finance choose their own mode of development, in order to acquire social and economic benefits.展开更多
Teaching tools available on the internet presented in this paper may help the students in the study of cancer prevention to understand the consequences of lifestyle on health.They are all in English,they have been dow...Teaching tools available on the internet presented in this paper may help the students in the study of cancer prevention to understand the consequences of lifestyle on health.They are all in English,they have been downloaded for free and consist mainly in scientific texts and other documents,tables,graphics,atlases and animations.展开更多
To address the challenges posed by resource shortage or surplus to enterprises productivity,Internet platforms have been widely used,which can balance shortage and surplus in broader environments. However,the existing...To address the challenges posed by resource shortage or surplus to enterprises productivity,Internet platforms have been widely used,which can balance shortage and surplus in broader environments. However,the existing resource management models lack openness,sharing ability and scalability,which make it difficult for many heterogeneous resources to co-exist in the same system. It is also difficult to resolve the conflicts between distributed self-management and centralized scheduling in the system. This paper analyzes the characteristics of resources in the distributed environment and proposes a new resource management architecture by considering the resource aggregation capacity of cloud computing. The architecture includes a universal resource scheduling optimization model which has been applied successfully in double-district multi-ship-scheduling multi-container-yard empty containers transporting of international shipping logistics. Applications in all these domains prove that this new resource management architecture is feasible and can achieve the expected effect.展开更多
文摘LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is subject to LDoS attacks as well. LDoS attacks can cause table reset, route flapping of BGP protocol. A deliberately constructed distributed low-rate DOS attacks can even generate surge of updates throughout the Internet. In this paper, we investigate the promotion of attack efficiency of this novel attack, and then propose an attack model to simulate the LDoS attack. Experiments prove that this attack model can exponentially lower the attack costs and improve the attack effect.
基金supported by the National Natural Science Foundation of China under Grant No.61032004the National High Technology Research and Development Program of China (863 Program) under Grants No.2012AA121605,No.2012AA01A503,No.2012AA01A510
文摘Distributed Luby Transform (DLT) codes have been proposed to improve the robustness and system throughputs for multisource single-sink networks by exploiting the benefits of Network Coding (NC) at a single relay. All the proposed schemes such as the DLT and Soliton-Like Rateless Coding (SLRC) have attempted to maintain Robust Soliton Distribution (RSD) or Soliton-Like Distribution (SLD) for the output data at the relay. This rzsult in some source symbols to be discarded, thereby degrading the throughput. In this paper, we have proposed a novel method called the Full DLT (FDLT) coding scheme to be applied in the InterPlaNetary (IPN) Internet scenario comprising two sources and one relay The aim of the proposed scheme is to fully utilise the source symbols so as to reduce the overheads and improve energy efficiencies at the sources while maintaining low overhead at the relay. In addition, almost no buffer is needed in the proposed scheme so the relay can have limited storage space, and the proposed scheme is resilient to the churn rates of the nodes. The simulation results have shown that the proposed scheme outperforms the aforementioned schemes with respect to source overheads and total overhead in addition to preserving the benefits of NC and LT codes.
文摘Studies the design of distributed virtual environments (DVEs) for tele-multi-robotics. The proposed design, incorporating two models ( distributlon-supported model and VE-supported model), attempts to represent common functionality, communication issues, and requirements found in multi-operator DVEs. The distribution-supported model concentrates on the introduction of computer-supported collaborative work (CSCW) to realize the coordination of multi-operators, while the VE-supported model concentrates on the utilization of an object-oriented approach to strengthen the expandability and robustness of the system. Finally, the configuration anti running environments of the system are given.
文摘The smart grid is the next generation of power and distribution systems. The integration of advanced network, communications, and computing techniques allows for the enhancement of efficiency and reliability. The smart grid interconnects the flow of information via the power line, intelligent metering, renewable and distributed energy systems, and a monitoring and controlling infrastructure. For all the advantages that these components come with, they remain at risk to a spectrum of physical and digital attacks. This paper will focus on digital vulnerabilities within the smart grid and how they may be exploited to form full fledged attacks on the system. A number of countermeasures and solutions from the literature will also be reported, to give an overview of the options for dealing with such problems. This paper serves as a triggering point for future research into smart grid cyber security.
文摘Music has often changed, from a social point of view, and also the relationship between music and the city. This paper attempts to describe how music changes under the impact of Internet. The milieu of musicians and the audiences are concerned. The economic model of music has not burst into pieces, but it has deeply changed. There is a trend to pure consumerism thanks to internet (probably the sales of downloaded music will become more and more important). Also, independent artists can use Internet and have a livelihood (fat tail phenomenon). Therefore the diversity of music can be preserved. Concerts (music in the city) allow escaping from the losses of money because of piracy. There are several experiences for listeners, which are possible, some of them involving going to concerts and festivals.
文摘The lnternet age has penetrated deeply into people's life. Some existing Intemet patterrrs can not meet the needs of consumers.With the development of "Internet +", the innovation and entrepreneurship of Internet are emerging. New electric business, incubator, maker space are becoming popular innovative modes and develop rapidly. In this paper, we will discuss the change of innovation and entrepreneurship under the" lnternet +" era by taking maker space 3 6 Kr as an example.
基金Foundation for U niversity Key Teacher bythe Ministry of Education and National Natural Science Founda-tion of China ( No.69875 0 0 4) and 863 High-Tech Plan ( No.2 0 0 1AA42 3 2 40 )
文摘Teleoperation system plays an important role in executing task under hazard environment. As the computer networks such as the Internet are being used as the communication channel of teleoperation system, varying time delay causes the overall system unstable and reduces the performance of transparency. This paper proposed twelve operation modes with different control schemes for teleoperation on the Internet with time delay. And an optimal operation mode with control scheme was specified for teleoperation with time delay, based on the tradeoff between passivity and transparency properties. It experimentally confirmed the validity of the proposed optimal mode and control scheme by using a simple one DOF master-slave manipulator system.
文摘The rapid growth oflnternet technology development has made Chinese consumers search for products over the Internet and purchase products or services from Web-retailers. E-commerce is growing to represent an increasing share of overall sale avenue, and online shopping is expected to continue growing for foreseeable future. As such, it is vital to identify the performance of shopping online and investigate the effects that shopping online has on e-commerce.The methods used in this study are consulting some authentic materials and looking into some cases in point. It is found that shopping online has so many disadvantages, such as credit crisis, the insecurity of e-bank, express problem, a series of relevant law problems, limited payment options and so on.Because of these limitations, shopping online has interfered with e-commerce. Overall, shopping online is more or less a bar to e-commerce.
文摘Currently, an unprecedented financial craze is sweeping the Internet nationwide and bringing impact to traditional banking business model, and commercial banks face constant change response options. This paper argues that change is inevitable, and may promote the developments of commercial banks, but maintaining the current situation may be a good strategy. So, According to their own conditions and the environment, the Internet finance choose their own mode of development, in order to acquire social and economic benefits.
文摘Teaching tools available on the internet presented in this paper may help the students in the study of cancer prevention to understand the consequences of lifestyle on health.They are all in English,they have been downloaded for free and consist mainly in scientific texts and other documents,tables,graphics,atlases and animations.
基金Support by the National Key Technology Research and Development Program of China(No.2012BAA13B01,2014BAF07B02)the National Natural Science Foundation of China(No.61273038)+1 种基金Natural Science Foundation of Shandong Province(No.ZR2015FM006)Science and Technology Major Project of the Ministry of Science and Technology of Shandong Province(No.2015ZDXX0201B02)
文摘To address the challenges posed by resource shortage or surplus to enterprises productivity,Internet platforms have been widely used,which can balance shortage and surplus in broader environments. However,the existing resource management models lack openness,sharing ability and scalability,which make it difficult for many heterogeneous resources to co-exist in the same system. It is also difficult to resolve the conflicts between distributed self-management and centralized scheduling in the system. This paper analyzes the characteristics of resources in the distributed environment and proposes a new resource management architecture by considering the resource aggregation capacity of cloud computing. The architecture includes a universal resource scheduling optimization model which has been applied successfully in double-district multi-ship-scheduling multi-container-yard empty containers transporting of international shipping logistics. Applications in all these domains prove that this new resource management architecture is feasible and can achieve the expected effect.