期刊文献+
共找到17篇文章
< 1 >
每页显示 20 50 100
Study on the Influence of Lanzhou-Urumqi High-Speed Railway on Regional Accessibility and Economic Development
1
作者 Lili Ma Xiaolong Han Miao Gong 《Proceedings of Business and Economic Studies》 2024年第2期22-31,共10页
The Lanzhou-Urumqi high-speed railway is an important part of the railway network connecting Gansu,Qinghai,and Xinjiang,and it is of far-reaching significance in facilitating China’s western development.An accessibil... The Lanzhou-Urumqi high-speed railway is an important part of the railway network connecting Gansu,Qinghai,and Xinjiang,and it is of far-reaching significance in facilitating China’s western development.An accessibility model and a double difference model were built to analyze the impact of the Lanzhou-Urumqi high-speed railway on regional accessibility and economic development of the areas along the line before(2012-2014)and after(2017-2019)its opening.The results show that the regional accessibility remains unchanged before and after the operation of this railway line.However,there is a spatial difference in improvement,that of central cities being better.The opening of the high-speed railway is conducive to driving the overall economic development of the region and promoting the comprehensive and coordinated development of regional economies. 展开更多
关键词 Lanzhou-Urumqi high-speed railway Regional economy Double difference model accessibility model Empirical analysis
下载PDF
Impact of Accessibility on Housing Prices in Dalian City of China Based on a Geographically Weighted Regression Model 被引量:13
2
作者 YANG Jun BAO Yajun +2 位作者 ZHANG Yuqing LI Xueming GE Quansheng 《Chinese Geographical Science》 SCIE CSCD 2018年第3期505-515,共11页
This paper studies the relationship between accessibility and housing prices in Dalian by using an improved geographically weighted regression model and house prices, traffic, remote sensing images, etc. Multi-source ... This paper studies the relationship between accessibility and housing prices in Dalian by using an improved geographically weighted regression model and house prices, traffic, remote sensing images, etc. Multi-source data improves the accuracy of the spatial differentiation that reflects the impact of traffic accessibility on house prices. The results are as follows: first, the average house price is 12 436 yuan(RMB)/m^2, and reveals a declining trend from coastal areas to inland areas. The exception was Guilin Street, which demonstrates a local peak of house prices that decreases from the center of the street to its periphery. Second, the accessibility value is 33 minutes on average, excluding northern and eastern fringe areas, which was over 50 minutes. Third, the significant spatial correlation coefficient between accessibility and house prices is 0.423, and the coefficient increases in the southeastern direction. The strongest impact of accessibility on house prices is in the southeastern coast, and can be seen in the Lehua, Yingke, and Hushan communities, while the weakest impact is in the northwestern fringe, and can be seen in the Yingchengzi, Xixiaomo, and Daheishi community areas. 展开更多
关键词 geographically weighted regression model accessibility house price Dalian City
下载PDF
Urban Green Space, Uneven Development and Accessibility: A Case of Dalian′s Xigang District 被引量:3
3
作者 YANG Jun LI Chuang +3 位作者 LI Yuechen XI Jianhao GE Quansheng LI Xueming 《Chinese Geographical Science》 SCIE CSCD 2015年第5期644-656,共13页
This study examines the socio-spatial context of uneven development and the residential accessibility of green space in Dalian of Liaoning Province, China. The social fairness was analyzed with a community scale as th... This study examines the socio-spatial context of uneven development and the residential accessibility of green space in Dalian of Liaoning Province, China. The social fairness was analyzed with a community scale as the basis. We combined social scientific methods with a GIS method using a behavior accessibility model from the perspectives of fairness of urban green space allocation based on social geography, geographic information science, management science and many other related discipline theories. The results show that: 1) Most of the urban green space distribution presents an unbalanced phenomenon, and it does not match with the population distribution; 2) We found some differences in the accessibility of the population with different attributes and opportunities to use and enjoy the urban green spaces, mainly due to: the dual social and spatial attributes of the residents and the serious stratum differentiation generated were the internal causes; the residential space differentiation and the pursuit of economic and real estate development were the direct causes; and unreasonable planning, in regard to the fact that government policies did not give consideration to efficiency and fairness, was also an important factor. 展开更多
关键词 behavior accessibility fairness of green space behavior accessibility model Xigang District of Dalian GIS
下载PDF
Security analysis of access control model in hybrid cloud based on security entropy 被引量:2
4
作者 车天伟 Ma Jianfeng +1 位作者 Li Na Wang Chao 《High Technology Letters》 EI CAS 2015年第2期200-204,共5页
To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put... To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud. 展开更多
关键词 hybrid cloud security entropy classificatory access control model directly unauthorized access right about access indirectly unauthorized access
下载PDF
A Multi-Tenant Usage Access Model for Cloud Computing 被引量:1
5
作者 Zhengtao Liu Yun Yang +1 位作者 Wen Gu Jinyue Xia 《Computers, Materials & Continua》 SCIE EI 2020年第8期1233-1245,共13页
Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures.It offers tremendous advantages for enterprises and service providers.It is anticipated tha... Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures.It offers tremendous advantages for enterprises and service providers.It is anticipated that this situation will evolve to foster cross-tenant collaboration supported by Authorization as a service.To realize access control in a multi-tenant cloud computing environment,this study proposes a multi-tenant cloud computing access control model based on the traditional usage access control model by building trust relations among tenants.The model consists of three sub-models,which achieve trust relationships between tenants with different granularities and satisfy the requirements of different application scenarios.With an established trust relation in MT-UCON(Multi-tenant Usage Access Control),the trustee can precisely authorize cross-tenant accesses to the trustor’s resources consistent with constraints over the trust relation and other components designated by the trustor.In addition,the security of the model is analyzed by an information flow method.The model adapts to the characteristics of a dynamic and open multi-tenant cloud computing environment and achieves fine-grained access control within and between tenants. 展开更多
关键词 Multi-tenant usage access control model cloud computing
下载PDF
Evaluation of Summer Monsoon Clouds over the Tibetan Plateau Simulated in the ACCESS Model Using Satellite Products
6
作者 Liang HU Zhian SUN +1 位作者 Difei DENG Greg ROFF 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2019年第3期326-338,341,共14页
Cloud distribution characteristics over the Tibetan Plateau in the summer monsoon period simulated by the Australian Community Climate and Earth System Simulator(ACCESS) model are evaluated using COSP [the CFMIP(Cloud... Cloud distribution characteristics over the Tibetan Plateau in the summer monsoon period simulated by the Australian Community Climate and Earth System Simulator(ACCESS) model are evaluated using COSP [the CFMIP(Cloud Feedback Model Intercomparison Project) Observation Simulator Package]. The results show that the ACCESS model simulates less cumulus cloud at atmospheric middle levels when compared with observations from CALIPSO and CloudSat, but more ice cloud at high levels and drizzle drops at low levels. The model also has seasonal biases after the onset of the summer monsoon in May. While observations show that the prevalent high cloud at 9–10 km in spring shifts downward to 7–9 km,the modeled maximum cloud fractions move upward to 12–15 km. The reason for this model deficiency is investigated by comparing model dynamical and thermodynamical fields with those of ERA-Interim. It is found that the lifting effect of the Tibetan Plateau in the ACCESS model is stronger than in ERA-Interim, which means that the vertical velocity in the ACCESS model is stronger and more water vapor is transported to the upper levels of the atmosphere, resulting in more high-level ice clouds and less middle-level cumulus cloud over the Tibetan Plateau. The modeled radiation fields and precipitation are also evaluated against the relevant satellite observations. 展开更多
关键词 Tibetan Plateau cloud fraction ACCESS model COSP
下载PDF
Analysis and Application for Integrity Model on Trusted Platform
7
作者 TUGuo-qing ZHANGHuan-guo WANGLi-na YUDan-dan 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期35-38,共4页
To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)' s recommendation, we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with inf... To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)' s recommendation, we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with information flow model, we put forwarda combinedprocess-based lattice model to enforce security This moelel creates a trust chain by which we canmanage a series of processes from a core root of trust module to some other application modules Inthe model, once the trust chain is created andmanaged cor-rectly, the integrity of the computer'shardware and sofware has bctn maintained, so does the confidentiality and authenticity. Moreover, arelevant implementation of the model is explained. 展开更多
关键词 tiusted computing access control model information flow model trust chain INTEGRITY
下载PDF
Three-Dimensional Simulations of RESET Operation in Phase-Change Random Access Memory with Blade-Type Like Phase Change Layer by Finite Element Modeling 被引量:2
8
作者 金秋雪 刘波 +8 位作者 刘燕 王维维 汪恒 许震 高丹 王青 夏洋洋 宋志棠 封松林 《Chinese Physics Letters》 SCIE CAS CSCD 2016年第9期128-131,共4页
An optimized device structure for reducing the RESET current of phase-change random access memory (PCRAM) with blade-type like (BTL) phase change layer is proposed. The electrical thermal analysis of the BTL cell ... An optimized device structure for reducing the RESET current of phase-change random access memory (PCRAM) with blade-type like (BTL) phase change layer is proposed. The electrical thermal analysis of the BTL cell and the blade heater contactor structure by three-dimensional finite element modeling are compared with each other during RESET operation. The simulation results show that the programming region of the phase change layer in the BTL cell is much smaller, and thermal electrical distributions of the BTL cell are more concentrated on the TiN/GST interface. The results indicate that the BTL cell has the superiorities of increasing the heating efficiency, decreasing the power consumption and reducing the RESET current from 0.67mA to 0.32mA. Therefore, the BTL cell will be appropriate for high performance PCRAM device with lower power consumption and lower RESET current. 展开更多
关键词 PCRAM cell RESET Three-Dimensional Simulations of RESET Operation in Phase-Change Random Access Memory with Blade-Type Like Phase Change Layer by Finite Element modeling of by in with
下载PDF
The Research of Role Tree-Based Access Control Model
9
作者 陆虹 夏天 《Journal of Donghua University(English Edition)》 EI CAS 2010年第2期274-276,共3页
Towards the crossing and coupling permissions in tasks existed widely in many fields and considering the design of role view must rely on the activities of the tasks process,based on Role Based Accessing Control (RBAC... Towards the crossing and coupling permissions in tasks existed widely in many fields and considering the design of role view must rely on the activities of the tasks process,based on Role Based Accessing Control (RBAC) model,this paper put forward a Role Tree-Based Access Control (RTBAC) model. In addition,the model definition and its constraint formal description is also discussed in this paper. RTBAC model is able to realize the dynamic organizing,self-determination and convenience of the design of role view,and guarantee the least role permission when task separating in the mean time. 展开更多
关键词 Role Based Accessing Control (RBAC) Role Tree-Based Access Control (RTBAC) models Constraints Permission
下载PDF
Design and Implement an Novel File Access Prediction Model in Linux
10
作者 刘谐 刘心松 +1 位作者 杨峰 白英杰 《Journal of Electronic Science and Technology of China》 2004年第2期36-41,共6页
So far, file access prediction models is mainly based on either the file access frequency or the historical record of the latest access. In this paper, a new file access prediction model called frequency- and recency-... So far, file access prediction models is mainly based on either the file access frequency or the historical record of the latest access. In this paper, a new file access prediction model called frequency- and recency-based successor (FRS) is presented which combines the advantages of the file frequency with the historical record. FRS model has the capability of rapid response to workload changes and can predict future events with greater accuracy than most of other prediction models. To evaluate the performance of FRS mode, the Linux kernel is modified to predict and prefetch upcoming accesses. The experiment shows that FRS can accurately predict approximately 80% of all file access events, while maintaining an immediate successor queue (ISQ) per-file which only requires regular dynamic updates. 展开更多
关键词 file access prediction model PREDICTIVE prefetch FRS
下载PDF
Light-Weight Selective Image Encryption for Privacy Preservation
11
作者 Yi-Hui Chen Eric Jui-Lin Lu Chu-Fan Wang 《Journal of Electronic Science and Technology》 CAS CSCD 2020年第3期234-240,共7页
To protect personal privacy and confidential preservation,access control is used to authorize legal users for safe browsing the authorized contents on photos.The access control generates an authorization rule accordin... To protect personal privacy and confidential preservation,access control is used to authorize legal users for safe browsing the authorized contents on photos.The access control generates an authorization rule according to each permission assignment.However,the general access control is inappropriate to apply in some social services(e.g.,photos posted on Flickr and Instagram,personal image management in mobile phone) because of the increasing popularity of digital images being stored and managed.With low maintenance loads,this paper integrates the data hiding technique to propose an access control mechanism for privacy preservation.The proposed scheme changes the partial regions of a given image as random pads (called selective image encryption) and only allows the authorized people to remedy the random pads back to meaningful ones which are with similar visual qualities of original ones. 展开更多
关键词 Fine-grained access control model image access control noise pads privacy protection
下载PDF
Improving Sustainability by Privatizing Wildlife Conservation
12
作者 Robert E. Wright 《Natural Resources》 CAS 2023年第4期45-64,共20页
The purpose of this study is to improve environmental sustainability by identifying the most sustainable/least fragile of the three major wildlife conservation access models—open, government, and private—under varyi... The purpose of this study is to improve environmental sustainability by identifying the most sustainable/least fragile of the three major wildlife conservation access models—open, government, and private—under varying environmental and socioeconomic conditions. The private access model is the most sustainable of the three major conservation models because it provides the best information and incentives to balance the needs of humans and wildlife, maintain general wildlife habitat, and adapt quickly to changing environmental and/or socioeconomic conditions. Government-controlled access, however, can be employed as a model of last resort if the private access model shows signs of failing to protect specific species from local extirpation or extinction, which it is most likely to do for migratory species, species with close commercial substitutes, and species with no direct commercial value. Government regulators may also be needed to enforce property rights arrangements like catch shares and to monitor resources that remain open access in case socioeconomic or environmental conditions change sufficiently to trigger the tragedy of the commons. Most treatments of wildlife regulation default to various iterations of the government access model and fail even to consider the costs and benefits of private and open access models. The analysis here instead shows the conditions in which each conservation access model is most appropriate: open when a resource is in high supply and low demand, private most of the time, and government when the others fail to slow resource depopulation/depletion. 展开更多
关键词 Wildlife Conservation Open Access Conservation model Government Access Conservation model Private Access Conservation model Extinction EXTIRPATION Incentives Information Habitat SUSTAINABILITY
下载PDF
A tour-based analysis of travel mode choice accounting for regional transit service
13
作者 丁川 林姚宇 +2 位作者 谢秉磊 朱晓雨 Sabyasachee Mishra 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第1期402-408,共7页
The aim of this work is to explore the impact of regional transit service on tour-based commuter travel behavior by using the Bayesian hierarchical multinomial logit model, accounting for the spatial heterogeneity of ... The aim of this work is to explore the impact of regional transit service on tour-based commuter travel behavior by using the Bayesian hierarchical multinomial logit model, accounting for the spatial heterogeneity of the people living in the same area.With two indicators, accessibility and connectivity measured at the zone level, the regional transit service is captured and then related to the travel mode choice behavior. The sample data are selected from Washington-Baltimore Household Travel Survey in 2007,including all the trips from home to workplace in morning hours in Baltimore city. Traditional multinomial logit model using Bayesian approach is also estimated. A comparison of the two different models shows that ignoring the spatial context can lead to a misspecification of the effects of the regional transit service on travel behavior. The results reveal that improving transit service at regional level can be effective in reducing auto use for commuters after controlling for socio-demographics and travel-related factors.This work provides insights for interpreting tour-based commuter travel behavior by using recently developed methodological approaches. The results of this work will be helpful for engineers, urban planners, and transit operators to decide the needs to improve regional transit service and spatial location efficiently. 展开更多
关键词 transit service travel mode choice spatial heterogeneity Bayesian hierarchical model transit accessibility transit connectivity tour
下载PDF
Urban Railway Accessibility 被引量:4
14
作者 关宏志 殷远飞 +2 位作者 严海 韩艳 秦焕美 《Tsinghua Science and Technology》 SCIE EI CAS 2007年第2期192-197,共6页
Effective use of urban rapid railway systems requires that the railway systems be effectively connected with other transportation modes so that they are accessible. This paper uses the Iogit model and data to analyze ... Effective use of urban rapid railway systems requires that the railway systems be effectively connected with other transportation modes so that they are accessible. This paper uses the Iogit model and data to analyze the factors influencing railway access choices in a railway choice access model. The results indicate that access time, access cost, and access distance are factors significantly affecting railway access choices. The user's income significantly affects the probability of choosing to walk rather than to take a taxi, but is not related to choosing buses or bicycles. Vehicle ownership significantly affects the probability of choosing a taxi, but is not significantly related to the other modes. The conclusions provide an analysis tool for urban railway planning and construction. 展开更多
关键词 urban railway railway access model Iogit model
原文传递
Tenant-based access control model for multi-tenancy and sub-tenancy architecture in Software-as-a-Service 被引量:3
15
作者 Qiong zuo Meiyi XIE +1 位作者 Guanqiu QI Hong ZHU 《Frontiers of Computer Science》 SCIE EI CSCD 2017年第3期465-484,共20页
Software-as-a-Service (SaaS) introduces multi- tenancy architecture (MTA). Sub-tenancy architecture (STA), is an extension of MTA, allows tenants to offer services for subtenant developers to customize their app... Software-as-a-Service (SaaS) introduces multi- tenancy architecture (MTA). Sub-tenancy architecture (STA), is an extension of MTA, allows tenants to offer services for subtenant developers to customize their applications in the SaaS infrastructure. In a STA system, tenants can create sub- tenants, and grant their resources (including private services and data) to their subtenants. The isolation and sharing re- lations between parent-child tenants, sibling tenants or two non-related tenants are more complicated than those between tenants in MTA. It is important to keep service components or data private, and at the same time, allow them to be shared, and support application customizations for tenants. To ad- dress this problem, this paper provides a formal definition of a new tenant-based access control model based on administra- tive role-based access control (ARBAC) for MTA and STA in service-oriented SaaS (called TMS-ARBAC). Autonomous areas (AA) and AA-tree are proposed to describe the auton- omy of tenants, including their isolation and sharing relation- ships. Authorization operations on AA and different resource sharing strategies are defined to create and deploy the access control scheme in STA models. TMS-ARBAC model is ap- plied to design a geographic e-Science platform. 展开更多
关键词 Software-as-a-Service (SaaS) multi-tenancy architecture (MTA) sub-tenancy architecture (STA) rolebased access control (RBAC) model tenant-based access control model
原文传递
Model division multiple access for semantic communications 被引量:7
16
作者 Ping ZHANG Xiaodong XU +10 位作者 Chen DONG Kai NIU Haotai LIANG Zijian LIANG Xiaoqi QIN Mengying SUN Hao CHEN Nan MA Wenjun XU Guangyu WANG Xiaofeng TAO 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2023年第6期801-812,共12页
In a multi-user system,system resources should be allocated to different users.In traditional communication systems,system resources generally include time,frequency,space,and power,so multiple access technologies suc... In a multi-user system,system resources should be allocated to different users.In traditional communication systems,system resources generally include time,frequency,space,and power,so multiple access technologies such as time division multiple access(TDMA),frequency division multiple access(FDMA),space division multiple access(SDMA),code division multiple access(CDMA),and non-orthogonal multiple access(NOMA)are widely used.In semantic communication,which is considered a new paradigm of the next-generation communication system,we extract high-dimensional features from signal sources in a model-based artificial intelligence approach from a semantic perspective and construct a model information space for signal sources and channel features.From the high-dimensional semantic space,we excavate the shared and personalized information of semantic information and propose a novel multiple access technology,named model division multiple access(MDMA),which is based on the resource of the semantic domain.From the perspective of information theory,we prove that MDMA can attain more performance gains than traditional multiple access technologies.Simulation results show that MDMA saves more bandwidth resources than traditional multiple access technologies,and that MDMA has at least a 5-dB advantage over NOMA in the additive white Gaussian noise(AWGN)channel under the low signal-to-noise(SNR)condition. 展开更多
关键词 model division multiple access(MDMA) Semantic communication Multiple access
原文传递
Hierarchy Bayesian model based services awareness of high-speed optical access networks
17
作者 白晖峰 《Optoelectronics Letters》 EI 2018年第2期114-118,共5页
As the speed of optical access networks soars with ever increasing multiple services, the service-supporting ability of optical access networks suffers greatly from the shortage of service awareness. Aiming to solve t... As the speed of optical access networks soars with ever increasing multiple services, the service-supporting ability of optical access networks suffers greatly from the shortage of service awareness. Aiming to solve this problem, a hierarchy Bayesian model based services awareness mechanism is proposed for high-speed optical access networks. This approach builds a so-called hierarchy Bayesian model, according to the structure of typical optical access networks. Moreover, the proposed scheme is able to conduct simple services awareness operation in each optical network unit(ONU) and to perform complex services awareness from the whole view of system in optical line terminal(OLT). Simulation results show that the proposed scheme is able to achieve better quality of services(Qo S), in terms of packet loss rate and time delay. 展开更多
关键词 As Simulation OLT Hierarchy Bayesian model based services awareness of high-speed optical access networks
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部