Because the modified remote user authentication scheme proposed by Shen, Lin and Hwang is insecure, the Shen-Lin-Hwang' s scheme is improved and a new secure remote user authentication scheme based on the bi- linear ...Because the modified remote user authentication scheme proposed by Shen, Lin and Hwang is insecure, the Shen-Lin-Hwang' s scheme is improved and a new secure remote user authentication scheme based on the bi- linear parings is proposed. Moreover, the effectiveness of the new scheme is analyzed, and it is proved that the new scheme can prevent from all kinds of known attack. The one-way hash function is effective in the new scheme. The new scheme is proved that it has high effectiveness and fast convergence speed. Moreover, the ap- plication of the new scheme is easy and operational.展开更多
With enormous growth of the number of Internet users and appearance of new applications, characterization of Internet traffic has attracted more and more attention and has become one of the major challenging issues in...With enormous growth of the number of Internet users and appearance of new applications, characterization of Internet traffic has attracted more and more attention and has become one of the major challenging issues in telecommunication network over the past few years. In this paper, we study the network traffic pattern of the aggregate traffic and of specific application traffic, especially the popular applications such as P2P, VoIP that contribute most network traffic. Our study verified that majority Internet backbone traffic is contributed by a small portion of users and a power function can be used to approximate the contribution of each user to the overall traffic. We show that P2P applications are the dominant traffic contributor in current Internet Backbone of China. In addition, we selectively present the traffic pattern of different applications in detail.展开更多
Social networks are becoming increasingly popular and influential,and users are frequently registered on multiple networks simultaneously,in many cases leaving large quantities of personal information on each network....Social networks are becoming increasingly popular and influential,and users are frequently registered on multiple networks simultaneously,in many cases leaving large quantities of personal information on each network.There is also a trend towards the personalization of web applications;to do this,the applications need to acquire information about the particular user.To maximise the use of the various sets of user information distributed on the web,this paper proposes a method to support the reuse and sharing of user profiles by different applications,and is based on user profile integration.To realize this goal,the initial task is user identification,and this forms the focus of the current paper.A new user identification method based on Multiple Attribute Decision Making(MADM) is described in which a subjective weight-directed objective weighting,which is obtained from the Similarity Weight method,is proposed to determine the relative weights of the common properties.Attribute Synthetic Evaluation is used to determine the equivalence of users.Experimental results show that the method is both feasible and effective despite the incompleteness of the candidate user dataset.展开更多
In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation...In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones.展开更多
As one of the key technologies for the fifth generation(5G) wireless networks,device-to-device(D2D) communications allow user equipment(UE) in close proximity to communicate with each other directly.Forwarded by a rel...As one of the key technologies for the fifth generation(5G) wireless networks,device-to-device(D2D) communications allow user equipment(UE) in close proximity to communicate with each other directly.Forwarded by a relay,the relay-aided D2D(RA-D2D) communications can not only be applied to communications in much longer distance but also achieve a high quality of service(Qo S) .In this paper,we first propose a two-layer system model allowing RA-D2 D links to underlay traditional cellular uplinks.Then we maximize the energy efficiency of the RA-D2 D link while satisfying the minimum data-rate of the cellular link.The optimal transmit power at both D2 D transmitter and D2 D relay sides is obtained by transforming the nonlinear fractional programming into a nonlinear parameter programming.Simulation results show that our proposed power allocation method is more energy efficient than the existing works,and the proposed RA-D2 D scheme outperformed direct D2 D scheme when the distance between two D2 D users is longer.展开更多
The rapid development of industry application products has greatly influenced society. It has become essential for some telecommunication companies to focus on customer satisfaction with industrial products used by th...The rapid development of industry application products has greatly influenced society. It has become essential for some telecommunication companies to focus on customer satisfaction with industrial products used by the government and enterprise customers. Following the review of a previous study of customer satisfaction and with the help of experiential level theory,this article attempts to establish a Satisfaction Factors Model for researching customer satisfaction with industry applications. We chose a product named "Mobile Monitor" and investigated the emotional satisfaction of 127 users and company leaders from different walks of life,and showed that 7 of the product's features affected the customers' overall emotional satisfaction. Lastly,this paper points out management implications of this application based on quantitative results. It presents a preliminary exploration program for customer satisfaction research in this specific field. The empirical research on a specific product based on experimental level theory may serve as a reference for other companies that desire to carry out similar surveys in future.展开更多
Using age adjusted effective modulus(AAEM)method,creep of concrete filled steel tube(CFST)member was formulated considering of creep coefficient and aging coefficient.Ten CFST specimens were tested including eight for...Using age adjusted effective modulus(AAEM)method,creep of concrete filled steel tube(CFST)member was formulated considering of creep coefficient and aging coefficient.Ten CFST specimens were tested including eight for creep and two for shrinkage.The experimental result was compared with the computed result using AAEM in which the creep coefficient was taken from calibration of ACI model based on experimental result on sealed concrete,and aging coefficient was supplied from relaxation test on sealed concrete specimen.Furthermore,the creep of CFST member was analyzed using author's own subroutine to input concrete properties through user programmable feature(UPF)in ANSYS software.Comparison was made on authors' own experimental database,some existing experimental results,and results from AAEM and numerical analysis.Finally,the conditions of applicability of AAEM method are put forward,and numerical approach to compute creep of CFST specimen is delineated.展开更多
Networked customization is an important way for enterprises to satisfy customers?individual requirements. From this point of view, the study on networked customization process and application is started with analyzing...Networked customization is an important way for enterprises to satisfy customers?individual requirements. From this point of view, the study on networked customization process and application is started with analyzing the customization process in detail, in which the customization process is divided into 6 stages including information capture, need submission, need affirmation, need interaction, creating customization orders and customization production. A general customization process chart for common products is presented, which describes the communication between customers and enterprises in the entire customization process. The method of analyzing customization process is presented. The product customization subsystem in the system of ceramic product marketing and customization of Chongqing CHN & CHN Ceramics Co. Ltd. is introduced to explicate the process of customization via Internet.展开更多
To solve the problems concerning water entry of a structure, the RANS equations and volume of fluid (VOF) method are used. Combining the user-defined function (UDF) procedure with dynamic grids, the water impact o...To solve the problems concerning water entry of a structure, the RANS equations and volume of fluid (VOF) method are used. Combining the user-defined function (UDF) procedure with dynamic grids, the water impact on a structure in free fall is simulated, and the velocity, displacement and the pressure distribution on the structure are investigated. The results of the numerical simulation were compared with the experimental data, and solidly consistent results have been achieved, which validates the numerical model. Therefore, this method can be used to study the water impact problems of a structure.展开更多
Massive MIMO systems offer a high spatial resolution that can drastically increase the spectral and/or energy efficiency by employing a large number of antennas at the base station(BS).In a distributed massive MIMO sy...Massive MIMO systems offer a high spatial resolution that can drastically increase the spectral and/or energy efficiency by employing a large number of antennas at the base station(BS).In a distributed massive MIMO system,the capacity of fiber backhaul that links base station and remote radio heads is usually limited,which becomes a bottleneck for realizing the potential performance gain of both downlink and uplink.To solve this problem,we propose a joint antenna selection and user scheduling which is able to achieve a large portion of the potential gain provided by the massive MIMO array with only limited backhaul capacity.Three sub-optimal iterative algorithms with the objective of sumrate maximization are proposed for the joint optimization of antenna selection and user scheduling,either based on greedy fashion or Frobenius-norm criteria.Convergence and complexity analysis are presented for the algorithms.The provided Monte Carlo simulations show that,one of our algorithms achieves a good tradeoff between complexity and performance and thus is especially fit for massive MIMO systems.展开更多
Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS,AGPS,etc.However,all the existing applications gather users' geographical data an...Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS,AGPS,etc.However,all the existing applications gather users' geographical data and transfer them into the pertinent information to give meaning and value.For this kind of solutions,the user's privacy and security issues might be raised because the geographical location has to be exposed to the service provider.A novel and practical solution is proposed in this article to provide the relative location of two mobile users based on their WiFi scanned results without any additional sensors.There is no privacy concern in this solution because end users will not collect and send any sensitive information to the server.This solution adopts a Client/Server(C/S) architecture,where the mobile user as a client reports the ambient WiFi APs and the server calculates the distances based on the WiFi AP's topological relationships.A series of technologies are explored to improve the accuracy of the estimated distance and the corresponding algorithms are proposed.We also prove the feasibility with the prototype of "Circle Your Friends" System(CYFS) on Android phone which lets the mobile user know the distance between him and his social network friends.展开更多
Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese S...Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.展开更多
基金Supported by the National Science Foundation for Young Scholars of China(61001091)~~
文摘Because the modified remote user authentication scheme proposed by Shen, Lin and Hwang is insecure, the Shen-Lin-Hwang' s scheme is improved and a new secure remote user authentication scheme based on the bi- linear parings is proposed. Moreover, the effectiveness of the new scheme is analyzed, and it is proved that the new scheme can prevent from all kinds of known attack. The one-way hash function is effective in the new scheme. The new scheme is proved that it has high effectiveness and fast convergence speed. Moreover, the ap- plication of the new scheme is easy and operational.
文摘With enormous growth of the number of Internet users and appearance of new applications, characterization of Internet traffic has attracted more and more attention and has become one of the major challenging issues in telecommunication network over the past few years. In this paper, we study the network traffic pattern of the aggregate traffic and of specific application traffic, especially the popular applications such as P2P, VoIP that contribute most network traffic. Our study verified that majority Internet backbone traffic is contributed by a small portion of users and a power function can be used to approximate the contribution of each user to the overall traffic. We show that P2P applications are the dominant traffic contributor in current Internet Backbone of China. In addition, we selectively present the traffic pattern of different applications in detail.
基金supported in part by the Natural Science Basic Research Plan in Shaanxi Province of China under Grant No.2013JM8021the National Natural Science Foundation of China under Grant No.61272458
文摘Social networks are becoming increasingly popular and influential,and users are frequently registered on multiple networks simultaneously,in many cases leaving large quantities of personal information on each network.There is also a trend towards the personalization of web applications;to do this,the applications need to acquire information about the particular user.To maximise the use of the various sets of user information distributed on the web,this paper proposes a method to support the reuse and sharing of user profiles by different applications,and is based on user profile integration.To realize this goal,the initial task is user identification,and this forms the focus of the current paper.A new user identification method based on Multiple Attribute Decision Making(MADM) is described in which a subjective weight-directed objective weighting,which is obtained from the Similarity Weight method,is proposed to determine the relative weights of the common properties.Attribute Synthetic Evaluation is used to determine the equivalence of users.Experimental results show that the method is both feasible and effective despite the incompleteness of the candidate user dataset.
基金This work was supported by the National Basic Research Pro-gram of China under Crant No.2007CB311100 Funds of Key Lab of Fujlan Province University Network Security and Cryp- toll1009+3 种基金 the National Science Foundation for Young Scholars of China under Crant No.61001091 Beijing Nature Science Foundation under Crant No. 4122012 "Next-Generation Broad-band Wireless Mobile Communication Network" National Sci-ence and Technology Major Special Issue Funding under Grant No. 2012ZX03002003 Funding Program for Academic tturmn Resources Development in Institutions of Higher Learning Under the Jurisdiction of Beijing Municipality of Chi-na.
文摘In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones.
基金supported by the ZTE Corp under Grant CON1412150018the Natural Science Foundation of China under Grant 61572389 and 61471361
文摘As one of the key technologies for the fifth generation(5G) wireless networks,device-to-device(D2D) communications allow user equipment(UE) in close proximity to communicate with each other directly.Forwarded by a relay,the relay-aided D2D(RA-D2D) communications can not only be applied to communications in much longer distance but also achieve a high quality of service(Qo S) .In this paper,we first propose a two-layer system model allowing RA-D2 D links to underlay traditional cellular uplinks.Then we maximize the energy efficiency of the RA-D2 D link while satisfying the minimum data-rate of the cellular link.The optimal transmit power at both D2 D transmitter and D2 D relay sides is obtained by transforming the nonlinear fractional programming into a nonlinear parameter programming.Simulation results show that our proposed power allocation method is more energy efficient than the existing works,and the proposed RA-D2 D scheme outperformed direct D2 D scheme when the distance between two D2 D users is longer.
基金supported by the Research on Group Customers Satisfaction of Hubei Telecom
文摘The rapid development of industry application products has greatly influenced society. It has become essential for some telecommunication companies to focus on customer satisfaction with industrial products used by the government and enterprise customers. Following the review of a previous study of customer satisfaction and with the help of experiential level theory,this article attempts to establish a Satisfaction Factors Model for researching customer satisfaction with industry applications. We chose a product named "Mobile Monitor" and investigated the emotional satisfaction of 127 users and company leaders from different walks of life,and showed that 7 of the product's features affected the customers' overall emotional satisfaction. Lastly,this paper points out management implications of this application based on quantitative results. It presents a preliminary exploration program for customer satisfaction research in this specific field. The empirical research on a specific product based on experimental level theory may serve as a reference for other companies that desire to carry out similar surveys in future.
文摘Using age adjusted effective modulus(AAEM)method,creep of concrete filled steel tube(CFST)member was formulated considering of creep coefficient and aging coefficient.Ten CFST specimens were tested including eight for creep and two for shrinkage.The experimental result was compared with the computed result using AAEM in which the creep coefficient was taken from calibration of ACI model based on experimental result on sealed concrete,and aging coefficient was supplied from relaxation test on sealed concrete specimen.Furthermore,the creep of CFST member was analyzed using author's own subroutine to input concrete properties through user programmable feature(UPF)in ANSYS software.Comparison was made on authors' own experimental database,some existing experimental results,and results from AAEM and numerical analysis.Finally,the conditions of applicability of AAEM method are put forward,and numerical approach to compute creep of CFST specimen is delineated.
基金Funded by the National Natural Science Foundation of China (No. 5017114) the National-Technology Development Program for CIMS China (No. 2001AA414630)
文摘Networked customization is an important way for enterprises to satisfy customers?individual requirements. From this point of view, the study on networked customization process and application is started with analyzing the customization process in detail, in which the customization process is divided into 6 stages including information capture, need submission, need affirmation, need interaction, creating customization orders and customization production. A general customization process chart for common products is presented, which describes the communication between customers and enterprises in the entire customization process. The method of analyzing customization process is presented. The product customization subsystem in the system of ceramic product marketing and customization of Chongqing CHN & CHN Ceramics Co. Ltd. is introduced to explicate the process of customization via Internet.
基金Foundation item: Supported by the of China (11302056), China National Natural Science Foundation Postdoctoral Science Foundation (2013M540272), Heilongjiang Postdoctoral Fund (LBH-ZI3051), the Fundamental Research Funds for the Central Universities (HEUCF140116) and Research Fund of State Key Laboratory of Ocean Engineering, Shanghai Jiao Tong University (1309).
文摘To solve the problems concerning water entry of a structure, the RANS equations and volume of fluid (VOF) method are used. Combining the user-defined function (UDF) procedure with dynamic grids, the water impact on a structure in free fall is simulated, and the velocity, displacement and the pressure distribution on the structure are investigated. The results of the numerical simulation were compared with the experimental data, and solidly consistent results have been achieved, which validates the numerical model. Therefore, this method can be used to study the water impact problems of a structure.
基金supported in part by National Natural Science Foundation of China No.61171080
文摘Massive MIMO systems offer a high spatial resolution that can drastically increase the spectral and/or energy efficiency by employing a large number of antennas at the base station(BS).In a distributed massive MIMO system,the capacity of fiber backhaul that links base station and remote radio heads is usually limited,which becomes a bottleneck for realizing the potential performance gain of both downlink and uplink.To solve this problem,we propose a joint antenna selection and user scheduling which is able to achieve a large portion of the potential gain provided by the massive MIMO array with only limited backhaul capacity.Three sub-optimal iterative algorithms with the objective of sumrate maximization are proposed for the joint optimization of antenna selection and user scheduling,either based on greedy fashion or Frobenius-norm criteria.Convergence and complexity analysis are presented for the algorithms.The provided Monte Carlo simulations show that,one of our algorithms achieves a good tradeoff between complexity and performance and thus is especially fit for massive MIMO systems.
基金supported by HONG KONG RGC and HONG KONG PolyU under the Grant G-U752/PolyU5103/09Ethe National Natural Science Foundation of Chinaunder Grant No.61003040,No.61202354
文摘Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS,AGPS,etc.However,all the existing applications gather users' geographical data and transfer them into the pertinent information to give meaning and value.For this kind of solutions,the user's privacy and security issues might be raised because the geographical location has to be exposed to the service provider.A novel and practical solution is proposed in this article to provide the relative location of two mobile users based on their WiFi scanned results without any additional sensors.There is no privacy concern in this solution because end users will not collect and send any sensitive information to the server.This solution adopts a Client/Server(C/S) architecture,where the mobile user as a client reports the ambient WiFi APs and the server calculates the distances based on the WiFi AP's topological relationships.A series of technologies are explored to improve the accuracy of the estimated distance and the corresponding algorithms are proposed.We also prove the feasibility with the prototype of "Circle Your Friends" System(CYFS) on Android phone which lets the mobile user know the distance between him and his social network friends.
基金supported by the Foundation for Key Program of Ministry of Education, China under Grant No.311007National Science Foundation Project of China under Grants No. 61202079, No.61170225, No.61271199+1 种基金the Fundamental Research Funds for the Central Universities under Grant No.FRF-TP-09-015Athe Fundamental Research Funds in Beijing Jiaotong University under Grant No.W11JB00630
文摘Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.