With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality...With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the in- ternal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that if one vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem. To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC—the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC’s constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.展开更多
To overcome the problem of existing neighboring access point (AP) discovery methods in WLAN, for example they (PnP) of mul proposed. Us can not provide the accurate neighboring APs information needed for the Plug-...To overcome the problem of existing neighboring access point (AP) discovery methods in WLAN, for example they (PnP) of mul proposed. Us can not provide the accurate neighboring APs information needed for the Plug-and-Play ti-mode APs, three kinds of neighboring AP discovery and information exchange methods are ing these three neighboring AP discovery methods, passive discovery method, active discovery method and station assistant discovery method, the multi-mode AP can discover all neighboring APs and obtain needed information. We further propose two whole process flows, which combine three discovery methods in different manner, to achieve different goals. One process flow is to discover the neighboring AP as fast as possible, called fast discovery process flow. The other is to discover the neighboring AP with minimal interference to neighboring and accuracy of the method is confirmed APs, called the minimal interference process flow. The validity by the simulation.展开更多
For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels tha...For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels that are not occupied by primary users,but they have to hand off to other spectrum holes to continue communication when primary users come back,which brings new security problems.Tracking user attack(TUA) is a typical attack during spectrum handoff,which will invalidate handoff by preventing user accessing,and break down the whole network.In this paper,we propose a Channel Selection Information Hiding scheme(CSIH) to defense TUA.With the proposed scheme,we can destroy the routes to the root node of the attack tree by hiding the information of channel selection and enhance the security of cognitive radio networks.展开更多
HashQuery,a Hash-area-based data dissemination protocol,was designed in wireless sensor networks. Using a Hash function which uses time as the key,both mobile sinks and sensors can determine the same Hash area. The se...HashQuery,a Hash-area-based data dissemination protocol,was designed in wireless sensor networks. Using a Hash function which uses time as the key,both mobile sinks and sensors can determine the same Hash area. The sensors can send the information about the events that they monitor to the Hash area and the mobile sinks need only to query that area instead of flooding among the whole network,and thus much energy can be saved. In addition,the location of the Hash area changes over time so as to balance the energy consumption in the whole network. Theoretical analysis shows that the proposed protocol can be energy-efficient and simulation studies further show that when there are 5 sources and 5 sinks in the network,it can save at least 50% energy compared with the existing two-tier data dissemination(TTDD) protocol,especially in large-scale wireless sensor networks.展开更多
One hundred and fifteen first-year students of Greek took the SILL (Strategy Inventory for Language Learning) questionnaire in an attempt to reveal and activate potential a successful and widely used questionnaire l...One hundred and fifteen first-year students of Greek took the SILL (Strategy Inventory for Language Learning) questionnaire in an attempt to reveal and activate potential a successful and widely used questionnaire like SILL might have but not identified and investigated so far. The first original point to be investigated, tackled in a previous experiment (Kambakis-Vougiouklis, 2012), concerns users' confidence whether their choice of a specific strategy is effective while the second point concerns the use of the bar as an alternative statistical tool. More specifically, in this particular experiment the bar is not divided only into five equal length spaces as in the first experiment but also into five equal area spaces according to Gauss distribution, giving the researcher the chance to investigate possible differences between two ways of data processing--an advantage only the use of the bar could provide in the analysis stage. Additionally, there are advantages concerning results collection, as subjects and researcher will have a completely free choice among infinite points on a line rather than a limited 3, 4, 5, and 6 of a Likert scale, avoiding at the same time fine verbal differences between different subdivisions. Although the two different methods of processing performed homogeneous behaviour with not statistically considerable differences, it needs further applications in order to reach safe conclusions展开更多
In the era of over communications and hyper concurrency, people are overloaded with the offer of information, ideas, products, and services. Information is easy and unbelievable prompt available all over the world. Cu...In the era of over communications and hyper concurrency, people are overloaded with the offer of information, ideas, products, and services. Information is easy and unbelievable prompt available all over the world. Customers, concurrency, and innovators have immediate access to each other changes in technology, especially those in informatics and technology of communication are transforming the era of informatics to the era of knowledge. The aim of this paper is to make an overview of the most up-to-date novelties in technology, especially those that were enabled by ICT, as well as to direct to some of the potential of the future evolution in business process that is open to the innovations.展开更多
Torture has always been regarded as a tool for confession and applied throughout history. In cases when requesting and convincing do not work, threatening or torturing has been considered to be a "right" to do. Tort...Torture has always been regarded as a tool for confession and applied throughout history. In cases when requesting and convincing do not work, threatening or torturing has been considered to be a "right" to do. Torture was used in Ancient Rome, in Europe in Medieval Age, and in England even though it was against unwritten law, and applied in USA secretly today. Since ancient times, people have been used to torturing for similar purposes. Today, torture is put into practice again for similar purposes such as forcing people to live according to religious beliefs and looking after the benefits of the government. Torture museums found in many European countries make visitors confused as these museums display terrifying tools applied to the Christian community in Medieval Age and then used by Christians to torture "Deviants".展开更多
The rapid growth oflnternet technology development has made Chinese consumers search for products over the Internet and purchase products or services from Web-retailers. E-commerce is growing to represent an increasin...The rapid growth oflnternet technology development has made Chinese consumers search for products over the Internet and purchase products or services from Web-retailers. E-commerce is growing to represent an increasing share of overall sale avenue, and online shopping is expected to continue growing for foreseeable future. As such, it is vital to identify the performance of shopping online and investigate the effects that shopping online has on e-commerce.The methods used in this study are consulting some authentic materials and looking into some cases in point. It is found that shopping online has so many disadvantages, such as credit crisis, the insecurity of e-bank, express problem, a series of relevant law problems, limited payment options and so on.Because of these limitations, shopping online has interfered with e-commerce. Overall, shopping online is more or less a bar to e-commerce.展开更多
The paper analyze and design and implement a remote control system based on embedded web server network. A computer network remote control system mainly includes server, client and the control information. Server regi...The paper analyze and design and implement a remote control system based on embedded web server network. A computer network remote control system mainly includes server, client and the control information. Server registration information realize the user command; client provides network hardware, software and other system resources, the system response message and then feedback service instruction. The research results show that, the embedded web server can be assigned to the field device user information through the browser, field device data also can access to the browser through the web server. In order to achieve remote monitoring, control, diagnostics and configuration of the equipment.展开更多
In actual implementation of spectrum sharing systems, due to the selfishness of primary users, primary users often refuse the access of secondary users to their licensed spectrum bands even if the access of secondary ...In actual implementation of spectrum sharing systems, due to the selfishness of primary users, primary users often refuse the access of secondary users to their licensed spectrum bands even if the access of secondary users doesn't affect their transmission. Aimed at the selfishness problem of primary users, a seller's market trading mechanism is introduced which can not only stimulate primary users to tolerate larger interference power but also give the primary users an appropriate compensation at the same time, and which has very important practical significance. Based on the mechanism, the achievable maximal gross profit of secondary users and their optimal power allocation scheme in the Rayleigh fading environment are derived, and the interference price of primary users and the average revenue of secondary users' impact on them are also studied. Numerical calculation results are conducted to verify our theoretical results.展开更多
The high potential of geothermal energy in quantity and availability can be a great option, facing the huge problem of growing energy use linked with the climatic problems. Therefore, it is necessary to reduce costs a...The high potential of geothermal energy in quantity and availability can be a great option, facing the huge problem of growing energy use linked with the climatic problems. Therefore, it is necessary to reduce costs and risks for the use of geothermal energy sources. Because most of the problems have to do with insufficient knowledge about the conditions in the earth crust, the key to take root of geothermal energy is widespread research. The cooling system allows the use of all needed devices in deep boreholes without strict time or temperature limitations, which promotes the achieving of comprehensive information. To develop the purpose-built components among conducting experiments about the thermodynamic processes, a prototype is provided step by step.展开更多
Receiver operating characteristic (ROC) curve is often used to study and compare two- sample problems in medicine. When more information may be available on one treatment than the other, one can improve estimator of...Receiver operating characteristic (ROC) curve is often used to study and compare two- sample problems in medicine. When more information may be available on one treatment than the other, one can improve estimator of ROC curve if the auxiliary population information is taken into account. The authors show that the empirical likelihood method can be naturally adapted to make efficient use of the auxiliary information to such problems. The authors propose a smoothed empirical likelihood estimator for ROC curve with some auxiliary information in medical studies. The proposed estimates are more efficient than those ROC estimators without any auxiliary information, in the sense of comparing asymptotic variances and mean squared error (MSE). Some asymptotic properties for the empirical likelihood estimation of ROC curve are established. A simulation study is presented to demonstrate the performance of the proposed estimators.展开更多
基金Project (No. 60373088) supported by the National Natural ScienceFoundation of China
文摘With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the in- ternal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that if one vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem. To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC—the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC’s constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.
基金NTT-DoCoMo Beijing Communication Labs the National High Technology Research and Development Program of China(No.2006AA01Z276).
文摘To overcome the problem of existing neighboring access point (AP) discovery methods in WLAN, for example they (PnP) of mul proposed. Us can not provide the accurate neighboring APs information needed for the Plug-and-Play ti-mode APs, three kinds of neighboring AP discovery and information exchange methods are ing these three neighboring AP discovery methods, passive discovery method, active discovery method and station assistant discovery method, the multi-mode AP can discover all neighboring APs and obtain needed information. We further propose two whole process flows, which combine three discovery methods in different manner, to achieve different goals. One process flow is to discover the neighboring AP as fast as possible, called fast discovery process flow. The other is to discover the neighboring AP with minimal interference to neighboring and accuracy of the method is confirmed APs, called the minimal interference process flow. The validity by the simulation.
基金the National Natural Science Foundation of China under Grant No.61172068,6137317 0.The Fundamental Research Funds for the Central Universities,Program for New Century Excellent Talents in University
文摘For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels that are not occupied by primary users,but they have to hand off to other spectrum holes to continue communication when primary users come back,which brings new security problems.Tracking user attack(TUA) is a typical attack during spectrum handoff,which will invalidate handoff by preventing user accessing,and break down the whole network.In this paper,we propose a Channel Selection Information Hiding scheme(CSIH) to defense TUA.With the proposed scheme,we can destroy the routes to the root node of the attack tree by hiding the information of channel selection and enhance the security of cognitive radio networks.
基金Project(07JJ1010) supported by Hunan Provincial Natural Science Foundation of ChinaProjects(2006AA01Z202, 2006AA01Z199) supported by the National High-Tech Research and Development Program of China+2 种基金Project(7002102) supported by the City University of Hong Kong, Strategic Research Grant (SRG)Project(IRT-0661) supported by the Program for Changjiang Scholars and Innovative Research Team in UniversityProject(NCET-06-0686) supported by the Program for New Century Excellent Talents in University
文摘HashQuery,a Hash-area-based data dissemination protocol,was designed in wireless sensor networks. Using a Hash function which uses time as the key,both mobile sinks and sensors can determine the same Hash area. The sensors can send the information about the events that they monitor to the Hash area and the mobile sinks need only to query that area instead of flooding among the whole network,and thus much energy can be saved. In addition,the location of the Hash area changes over time so as to balance the energy consumption in the whole network. Theoretical analysis shows that the proposed protocol can be energy-efficient and simulation studies further show that when there are 5 sources and 5 sinks in the network,it can save at least 50% energy compared with the existing two-tier data dissemination(TTDD) protocol,especially in large-scale wireless sensor networks.
文摘One hundred and fifteen first-year students of Greek took the SILL (Strategy Inventory for Language Learning) questionnaire in an attempt to reveal and activate potential a successful and widely used questionnaire like SILL might have but not identified and investigated so far. The first original point to be investigated, tackled in a previous experiment (Kambakis-Vougiouklis, 2012), concerns users' confidence whether their choice of a specific strategy is effective while the second point concerns the use of the bar as an alternative statistical tool. More specifically, in this particular experiment the bar is not divided only into five equal length spaces as in the first experiment but also into five equal area spaces according to Gauss distribution, giving the researcher the chance to investigate possible differences between two ways of data processing--an advantage only the use of the bar could provide in the analysis stage. Additionally, there are advantages concerning results collection, as subjects and researcher will have a completely free choice among infinite points on a line rather than a limited 3, 4, 5, and 6 of a Likert scale, avoiding at the same time fine verbal differences between different subdivisions. Although the two different methods of processing performed homogeneous behaviour with not statistically considerable differences, it needs further applications in order to reach safe conclusions
文摘In the era of over communications and hyper concurrency, people are overloaded with the offer of information, ideas, products, and services. Information is easy and unbelievable prompt available all over the world. Customers, concurrency, and innovators have immediate access to each other changes in technology, especially those in informatics and technology of communication are transforming the era of informatics to the era of knowledge. The aim of this paper is to make an overview of the most up-to-date novelties in technology, especially those that were enabled by ICT, as well as to direct to some of the potential of the future evolution in business process that is open to the innovations.
文摘Torture has always been regarded as a tool for confession and applied throughout history. In cases when requesting and convincing do not work, threatening or torturing has been considered to be a "right" to do. Torture was used in Ancient Rome, in Europe in Medieval Age, and in England even though it was against unwritten law, and applied in USA secretly today. Since ancient times, people have been used to torturing for similar purposes. Today, torture is put into practice again for similar purposes such as forcing people to live according to religious beliefs and looking after the benefits of the government. Torture museums found in many European countries make visitors confused as these museums display terrifying tools applied to the Christian community in Medieval Age and then used by Christians to torture "Deviants".
文摘The rapid growth oflnternet technology development has made Chinese consumers search for products over the Internet and purchase products or services from Web-retailers. E-commerce is growing to represent an increasing share of overall sale avenue, and online shopping is expected to continue growing for foreseeable future. As such, it is vital to identify the performance of shopping online and investigate the effects that shopping online has on e-commerce.The methods used in this study are consulting some authentic materials and looking into some cases in point. It is found that shopping online has so many disadvantages, such as credit crisis, the insecurity of e-bank, express problem, a series of relevant law problems, limited payment options and so on.Because of these limitations, shopping online has interfered with e-commerce. Overall, shopping online is more or less a bar to e-commerce.
文摘The paper analyze and design and implement a remote control system based on embedded web server network. A computer network remote control system mainly includes server, client and the control information. Server registration information realize the user command; client provides network hardware, software and other system resources, the system response message and then feedback service instruction. The research results show that, the embedded web server can be assigned to the field device user information through the browser, field device data also can access to the browser through the web server. In order to achieve remote monitoring, control, diagnostics and configuration of the equipment.
基金Supported by the National Basic Research Program of China (2007CB307104), the National Natural Science Foundation of China (60973160), and the Intematiortal Scientific and Technological Cooperation Program (No. $2010GR0902).
文摘In actual implementation of spectrum sharing systems, due to the selfishness of primary users, primary users often refuse the access of secondary users to their licensed spectrum bands even if the access of secondary users doesn't affect their transmission. Aimed at the selfishness problem of primary users, a seller's market trading mechanism is introduced which can not only stimulate primary users to tolerate larger interference power but also give the primary users an appropriate compensation at the same time, and which has very important practical significance. Based on the mechanism, the achievable maximal gross profit of secondary users and their optimal power allocation scheme in the Rayleigh fading environment are derived, and the interference price of primary users and the average revenue of secondary users' impact on them are also studied. Numerical calculation results are conducted to verify our theoretical results.
文摘The high potential of geothermal energy in quantity and availability can be a great option, facing the huge problem of growing energy use linked with the climatic problems. Therefore, it is necessary to reduce costs and risks for the use of geothermal energy sources. Because most of the problems have to do with insufficient knowledge about the conditions in the earth crust, the key to take root of geothermal energy is widespread research. The cooling system allows the use of all needed devices in deep boreholes without strict time or temperature limitations, which promotes the achieving of comprehensive information. To develop the purpose-built components among conducting experiments about the thermodynamic processes, a prototype is provided step by step.
基金This research was partially supported by National Natural Science Funds for Distinguished Young Scholar under Grant No. 70825004 and National Natural Science Foundation of China (NSFC) under Grant No. 10731010, the National Basic Research Program under Grant No. 2007CB814902, Creative Research Groups of China under Grant No.10721101 and Shanghai University of Finance and Economics through Project 211 Phase III and Shanghai Leading Academic Discipline Project under Grant No. B803.
文摘Receiver operating characteristic (ROC) curve is often used to study and compare two- sample problems in medicine. When more information may be available on one treatment than the other, one can improve estimator of ROC curve if the auxiliary population information is taken into account. The authors show that the empirical likelihood method can be naturally adapted to make efficient use of the auxiliary information to such problems. The authors propose a smoothed empirical likelihood estimator for ROC curve with some auxiliary information in medical studies. The proposed estimates are more efficient than those ROC estimators without any auxiliary information, in the sense of comparing asymptotic variances and mean squared error (MSE). Some asymptotic properties for the empirical likelihood estimation of ROC curve are established. A simulation study is presented to demonstrate the performance of the proposed estimators.