Privacy-preserving data publishing (PPDP) is one of the hot issues in the field of the network security. The existing PPDP technique cannot deal with generality attacks, which explicitly contain the sensitivity atta...Privacy-preserving data publishing (PPDP) is one of the hot issues in the field of the network security. The existing PPDP technique cannot deal with generality attacks, which explicitly contain the sensitivity attack and the similarity attack. This paper proposes a novel model, (w,γ, k)-anonymity, to avoid generality attacks on both cases of numeric and categorical attributes. We show that the optimal (w, γ, k)-anonymity problem is NP-hard and conduct the Top-down Local recoding (TDL) algorithm to implement the model. Our experiments validate the improvement of our model with real data.展开更多
Wireless sensor networks can be used to monitor the interested region by deploying dense sensor nodes. Coverage is a primary metric to evaluate the capacity of monitoring. In this paper, we focus on the coverage probl...Wireless sensor networks can be used to monitor the interested region by deploying dense sensor nodes. Coverage is a primary metric to evaluate the capacity of monitoring. In this paper, we focus on the coverage problem under border effects, where the sensor nodes are distributed in a circle-shaped region randomly. Under this scenario, we derive the expected coverage of the sensor node and the total network coverage provided by n sensor nodes accurately by probability. These findings are useful to determine the related parameters (sensing range, number of sensor nodes and radius of monitored region) for a specific network coverage ratio. Simulation results demonstrate that our analysis is correct and effective.展开更多
Ethernet Ring Protection (ERP) introduced by ITU-T G.8032 Recommendation is a new type of packet-switched network protection technology, which can provide ring automatic protection switch. However, the Filtering Datab...Ethernet Ring Protection (ERP) introduced by ITU-T G.8032 Recommendation is a new type of packet-switched network protection technology, which can provide ring automatic protection switch. However, the Filtering Database (FDB) flush method adopted in the current ERP standard has the drawback of introducing a large amount of transient traffic overshoot caused by flooded Ethernet frames right after protection switching. In this article, we propose a G.8032 ERP scheme that uses FDB flush based on area to resolve this issue and investigate how the proposed scheme deals with the traffic flooding problem. The theoretical analysis and simulation show that the proposed scheme can effectively improve the performance of the Ethernet ring by decreasing the unnecessary FDB flush in comparison with the existing approaches.展开更多
The development of the technology of network had been of great convenience to get access to information. However, it was undeniable that a bad phenomenon had become even more and more serious that others' information...The development of the technology of network had been of great convenience to get access to information. However, it was undeniable that a bad phenomenon had become even more and more serious that others' information would be obtained by illegal means, and the research on the protection of privacy had increasingly aroused people's concern. The right of privacy not only had the usually outside personality characteristics, but also had a certain characteristics of property. This paper had attempted to study the right of privacy from the perspective of law and economics by interpreting the property in the right of privacy, in order to perfect the protection system of privacy in our country.展开更多
This paper presents an integrated protection technique for power distribution systems. A novel integrated protection scheme based on overcurrent protection technique for distribution system is described, in which a sp...This paper presents an integrated protection technique for power distribution systems. A novel integrated protection scheme based on overcurrent protection technique for distribution system is described, in which a specially designed protection relay is installed at each substation of a network and responsible for the protection of every line sections connected to the substation busbar The conventional directional overcurrent and the new adaptive accelerated protection algorithms with multiple settings are implemented into the relay to cover all the protected line sections. The paper includes studies of a typical multi section distribution network to demonstrate the principle of the scheme. Studies show that the new scheme not only offer the new protection features for individual power line section, but also provide the characteristics of integrated protection.展开更多
The uncertainty of time, quantity and quality of recycling products leads to the bad stability and flexibility of remanufacturing logistics networks, while general design only covers the minimizing logistics cost, so ...The uncertainty of time, quantity and quality of recycling products leads to the bad stability and flexibility of remanufacturing logistics networks, while general design only covers the minimizing logistics cost, so robust design is presented to solve it. The mathematical model of remanufacturing logistics networks is built on the stochastic distribution of uncontrollable factors, and robust objectives are presented. The basic elements of robust design of remanufacturing logistics are redefined, and each part of mathematical model is explained in detail as well. Robust design of remanufacturing logistics networks is a problem of multi-objective optimization in essence.展开更多
2003年12月18日,微软终于释放出人们盼望已久的Windowse XP SP2的第一个测试版。可惜同时放出的只有英文和德文版。在简体中文版的WinXP上无法升级,不过没关系,无论什么语言版本,新特性都是一样的,就让我们看看SP2 beta 1(以下简...2003年12月18日,微软终于释放出人们盼望已久的Windowse XP SP2的第一个测试版。可惜同时放出的只有英文和德文版。在简体中文版的WinXP上无法升级,不过没关系,无论什么语言版本,新特性都是一样的,就让我们看看SP2 beta 1(以下简称SP2 b1)到底带来些什么吧!展开更多
基金supported in part by Research Fund for the Doctoral Program of Higher Education of China(No.20120009110007)Program for Innovative Research Team in University of Ministry of Education of China (No.IRT201206)+3 种基金Program for New Century Excellent Talents in University(NCET-110565)the Fundamental Research Funds for the Central Universities(No.2012JBZ010)the Open Project Program of Beijing Key Laboratory of Trusted Computing at Beijing University of TechnologyBeijing Higher Education Young Elite Teacher Project(No. YETP0542)
文摘Privacy-preserving data publishing (PPDP) is one of the hot issues in the field of the network security. The existing PPDP technique cannot deal with generality attacks, which explicitly contain the sensitivity attack and the similarity attack. This paper proposes a novel model, (w,γ, k)-anonymity, to avoid generality attacks on both cases of numeric and categorical attributes. We show that the optimal (w, γ, k)-anonymity problem is NP-hard and conduct the Top-down Local recoding (TDL) algorithm to implement the model. Our experiments validate the improvement of our model with real data.
基金the National Natural Science Foundation of China(No.60473001,60572037)
文摘Wireless sensor networks can be used to monitor the interested region by deploying dense sensor nodes. Coverage is a primary metric to evaluate the capacity of monitoring. In this paper, we focus on the coverage problem under border effects, where the sensor nodes are distributed in a circle-shaped region randomly. Under this scenario, we derive the expected coverage of the sensor node and the total network coverage provided by n sensor nodes accurately by probability. These findings are useful to determine the related parameters (sensing range, number of sensor nodes and radius of monitored region) for a specific network coverage ratio. Simulation results demonstrate that our analysis is correct and effective.
基金supported partially by National Science and Technology Major Project of the Ministry of Science and Technology of China under Grant No.2011ZX03005-004-03 a Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions-Information and Communication Engineering,Natural Science Foundation of the Higher Education Institutions of Jiangsu Province,China under Grant No.10KJA510037+1 种基金 Open Research Fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology(Nanjing University of Posts and Telecommunications),Ministry of Education under Grant No.NYKL201108 Natural Science Foundation of Nanjing University of Posts and Telecommunications under Grant No.NY209002
文摘Ethernet Ring Protection (ERP) introduced by ITU-T G.8032 Recommendation is a new type of packet-switched network protection technology, which can provide ring automatic protection switch. However, the Filtering Database (FDB) flush method adopted in the current ERP standard has the drawback of introducing a large amount of transient traffic overshoot caused by flooded Ethernet frames right after protection switching. In this article, we propose a G.8032 ERP scheme that uses FDB flush based on area to resolve this issue and investigate how the proposed scheme deals with the traffic flooding problem. The theoretical analysis and simulation show that the proposed scheme can effectively improve the performance of the Ethernet ring by decreasing the unnecessary FDB flush in comparison with the existing approaches.
文摘The development of the technology of network had been of great convenience to get access to information. However, it was undeniable that a bad phenomenon had become even more and more serious that others' information would be obtained by illegal means, and the research on the protection of privacy had increasingly aroused people's concern. The right of privacy not only had the usually outside personality characteristics, but also had a certain characteristics of property. This paper had attempted to study the right of privacy from the perspective of law and economics by interpreting the property in the right of privacy, in order to perfect the protection system of privacy in our country.
文摘This paper presents an integrated protection technique for power distribution systems. A novel integrated protection scheme based on overcurrent protection technique for distribution system is described, in which a specially designed protection relay is installed at each substation of a network and responsible for the protection of every line sections connected to the substation busbar The conventional directional overcurrent and the new adaptive accelerated protection algorithms with multiple settings are implemented into the relay to cover all the protected line sections. The paper includes studies of a typical multi section distribution network to demonstrate the principle of the scheme. Studies show that the new scheme not only offer the new protection features for individual power line section, but also provide the characteristics of integrated protection.
基金the Shanghai National Scientific Foundation (02ZH14060)
文摘The uncertainty of time, quantity and quality of recycling products leads to the bad stability and flexibility of remanufacturing logistics networks, while general design only covers the minimizing logistics cost, so robust design is presented to solve it. The mathematical model of remanufacturing logistics networks is built on the stochastic distribution of uncontrollable factors, and robust objectives are presented. The basic elements of robust design of remanufacturing logistics are redefined, and each part of mathematical model is explained in detail as well. Robust design of remanufacturing logistics networks is a problem of multi-objective optimization in essence.