The Lanzhou-Urumqi high-speed railway is an important part of the railway network connecting Gansu,Qinghai,and Xinjiang,and it is of far-reaching significance in facilitating China’s western development.An accessibil...The Lanzhou-Urumqi high-speed railway is an important part of the railway network connecting Gansu,Qinghai,and Xinjiang,and it is of far-reaching significance in facilitating China’s western development.An accessibility model and a double difference model were built to analyze the impact of the Lanzhou-Urumqi high-speed railway on regional accessibility and economic development of the areas along the line before(2012-2014)and after(2017-2019)its opening.The results show that the regional accessibility remains unchanged before and after the operation of this railway line.However,there is a spatial difference in improvement,that of central cities being better.The opening of the high-speed railway is conducive to driving the overall economic development of the region and promoting the comprehensive and coordinated development of regional economies.展开更多
This paper studies the relationship between accessibility and housing prices in Dalian by using an improved geographically weighted regression model and house prices, traffic, remote sensing images, etc. Multi-source ...This paper studies the relationship between accessibility and housing prices in Dalian by using an improved geographically weighted regression model and house prices, traffic, remote sensing images, etc. Multi-source data improves the accuracy of the spatial differentiation that reflects the impact of traffic accessibility on house prices. The results are as follows: first, the average house price is 12 436 yuan(RMB)/m^2, and reveals a declining trend from coastal areas to inland areas. The exception was Guilin Street, which demonstrates a local peak of house prices that decreases from the center of the street to its periphery. Second, the accessibility value is 33 minutes on average, excluding northern and eastern fringe areas, which was over 50 minutes. Third, the significant spatial correlation coefficient between accessibility and house prices is 0.423, and the coefficient increases in the southeastern direction. The strongest impact of accessibility on house prices is in the southeastern coast, and can be seen in the Lehua, Yingke, and Hushan communities, while the weakest impact is in the northwestern fringe, and can be seen in the Yingchengzi, Xixiaomo, and Daheishi community areas.展开更多
This study examines the socio-spatial context of uneven development and the residential accessibility of green space in Dalian of Liaoning Province, China. The social fairness was analyzed with a community scale as th...This study examines the socio-spatial context of uneven development and the residential accessibility of green space in Dalian of Liaoning Province, China. The social fairness was analyzed with a community scale as the basis. We combined social scientific methods with a GIS method using a behavior accessibility model from the perspectives of fairness of urban green space allocation based on social geography, geographic information science, management science and many other related discipline theories. The results show that: 1) Most of the urban green space distribution presents an unbalanced phenomenon, and it does not match with the population distribution; 2) We found some differences in the accessibility of the population with different attributes and opportunities to use and enjoy the urban green spaces, mainly due to: the dual social and spatial attributes of the residents and the serious stratum differentiation generated were the internal causes; the residential space differentiation and the pursuit of economic and real estate development were the direct causes; and unreasonable planning, in regard to the fact that government policies did not give consideration to efficiency and fairness, was also an important factor.展开更多
To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put...To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud.展开更多
Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures.It offers tremendous advantages for enterprises and service providers.It is anticipated tha...Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures.It offers tremendous advantages for enterprises and service providers.It is anticipated that this situation will evolve to foster cross-tenant collaboration supported by Authorization as a service.To realize access control in a multi-tenant cloud computing environment,this study proposes a multi-tenant cloud computing access control model based on the traditional usage access control model by building trust relations among tenants.The model consists of three sub-models,which achieve trust relationships between tenants with different granularities and satisfy the requirements of different application scenarios.With an established trust relation in MT-UCON(Multi-tenant Usage Access Control),the trustee can precisely authorize cross-tenant accesses to the trustor’s resources consistent with constraints over the trust relation and other components designated by the trustor.In addition,the security of the model is analyzed by an information flow method.The model adapts to the characteristics of a dynamic and open multi-tenant cloud computing environment and achieves fine-grained access control within and between tenants.展开更多
Cloud distribution characteristics over the Tibetan Plateau in the summer monsoon period simulated by the Australian Community Climate and Earth System Simulator(ACCESS) model are evaluated using COSP [the CFMIP(Cloud...Cloud distribution characteristics over the Tibetan Plateau in the summer monsoon period simulated by the Australian Community Climate and Earth System Simulator(ACCESS) model are evaluated using COSP [the CFMIP(Cloud Feedback Model Intercomparison Project) Observation Simulator Package]. The results show that the ACCESS model simulates less cumulus cloud at atmospheric middle levels when compared with observations from CALIPSO and CloudSat, but more ice cloud at high levels and drizzle drops at low levels. The model also has seasonal biases after the onset of the summer monsoon in May. While observations show that the prevalent high cloud at 9–10 km in spring shifts downward to 7–9 km,the modeled maximum cloud fractions move upward to 12–15 km. The reason for this model deficiency is investigated by comparing model dynamical and thermodynamical fields with those of ERA-Interim. It is found that the lifting effect of the Tibetan Plateau in the ACCESS model is stronger than in ERA-Interim, which means that the vertical velocity in the ACCESS model is stronger and more water vapor is transported to the upper levels of the atmosphere, resulting in more high-level ice clouds and less middle-level cumulus cloud over the Tibetan Plateau. The modeled radiation fields and precipitation are also evaluated against the relevant satellite observations.展开更多
To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)' s recommendation, we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with inf...To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)' s recommendation, we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with information flow model, we put forwarda combinedprocess-based lattice model to enforce security This moelel creates a trust chain by which we canmanage a series of processes from a core root of trust module to some other application modules Inthe model, once the trust chain is created andmanaged cor-rectly, the integrity of the computer'shardware and sofware has bctn maintained, so does the confidentiality and authenticity. Moreover, arelevant implementation of the model is explained.展开更多
An optimized device structure for reducing the RESET current of phase-change random access memory (PCRAM) with blade-type like (BTL) phase change layer is proposed. The electrical thermal analysis of the BTL cell ...An optimized device structure for reducing the RESET current of phase-change random access memory (PCRAM) with blade-type like (BTL) phase change layer is proposed. The electrical thermal analysis of the BTL cell and the blade heater contactor structure by three-dimensional finite element modeling are compared with each other during RESET operation. The simulation results show that the programming region of the phase change layer in the BTL cell is much smaller, and thermal electrical distributions of the BTL cell are more concentrated on the TiN/GST interface. The results indicate that the BTL cell has the superiorities of increasing the heating efficiency, decreasing the power consumption and reducing the RESET current from 0.67mA to 0.32mA. Therefore, the BTL cell will be appropriate for high performance PCRAM device with lower power consumption and lower RESET current.展开更多
Towards the crossing and coupling permissions in tasks existed widely in many fields and considering the design of role view must rely on the activities of the tasks process,based on Role Based Accessing Control (RBAC...Towards the crossing and coupling permissions in tasks existed widely in many fields and considering the design of role view must rely on the activities of the tasks process,based on Role Based Accessing Control (RBAC) model,this paper put forward a Role Tree-Based Access Control (RTBAC) model. In addition,the model definition and its constraint formal description is also discussed in this paper. RTBAC model is able to realize the dynamic organizing,self-determination and convenience of the design of role view,and guarantee the least role permission when task separating in the mean time.展开更多
So far, file access prediction models is mainly based on either the file access frequency or the historical record of the latest access. In this paper, a new file access prediction model called frequency- and recency-...So far, file access prediction models is mainly based on either the file access frequency or the historical record of the latest access. In this paper, a new file access prediction model called frequency- and recency-based successor (FRS) is presented which combines the advantages of the file frequency with the historical record. FRS model has the capability of rapid response to workload changes and can predict future events with greater accuracy than most of other prediction models. To evaluate the performance of FRS mode, the Linux kernel is modified to predict and prefetch upcoming accesses. The experiment shows that FRS can accurately predict approximately 80% of all file access events, while maintaining an immediate successor queue (ISQ) per-file which only requires regular dynamic updates.展开更多
To protect personal privacy and confidential preservation,access control is used to authorize legal users for safe browsing the authorized contents on photos.The access control generates an authorization rule accordin...To protect personal privacy and confidential preservation,access control is used to authorize legal users for safe browsing the authorized contents on photos.The access control generates an authorization rule according to each permission assignment.However,the general access control is inappropriate to apply in some social services(e.g.,photos posted on Flickr and Instagram,personal image management in mobile phone) because of the increasing popularity of digital images being stored and managed.With low maintenance loads,this paper integrates the data hiding technique to propose an access control mechanism for privacy preservation.The proposed scheme changes the partial regions of a given image as random pads (called selective image encryption) and only allows the authorized people to remedy the random pads back to meaningful ones which are with similar visual qualities of original ones.展开更多
The purpose of this study is to improve environmental sustainability by identifying the most sustainable/least fragile of the three major wildlife conservation access models—open, government, and private—under varyi...The purpose of this study is to improve environmental sustainability by identifying the most sustainable/least fragile of the three major wildlife conservation access models—open, government, and private—under varying environmental and socioeconomic conditions. The private access model is the most sustainable of the three major conservation models because it provides the best information and incentives to balance the needs of humans and wildlife, maintain general wildlife habitat, and adapt quickly to changing environmental and/or socioeconomic conditions. Government-controlled access, however, can be employed as a model of last resort if the private access model shows signs of failing to protect specific species from local extirpation or extinction, which it is most likely to do for migratory species, species with close commercial substitutes, and species with no direct commercial value. Government regulators may also be needed to enforce property rights arrangements like catch shares and to monitor resources that remain open access in case socioeconomic or environmental conditions change sufficiently to trigger the tragedy of the commons. Most treatments of wildlife regulation default to various iterations of the government access model and fail even to consider the costs and benefits of private and open access models. The analysis here instead shows the conditions in which each conservation access model is most appropriate: open when a resource is in high supply and low demand, private most of the time, and government when the others fail to slow resource depopulation/depletion.展开更多
The aim of this work is to explore the impact of regional transit service on tour-based commuter travel behavior by using the Bayesian hierarchical multinomial logit model, accounting for the spatial heterogeneity of ...The aim of this work is to explore the impact of regional transit service on tour-based commuter travel behavior by using the Bayesian hierarchical multinomial logit model, accounting for the spatial heterogeneity of the people living in the same area.With two indicators, accessibility and connectivity measured at the zone level, the regional transit service is captured and then related to the travel mode choice behavior. The sample data are selected from Washington-Baltimore Household Travel Survey in 2007,including all the trips from home to workplace in morning hours in Baltimore city. Traditional multinomial logit model using Bayesian approach is also estimated. A comparison of the two different models shows that ignoring the spatial context can lead to a misspecification of the effects of the regional transit service on travel behavior. The results reveal that improving transit service at regional level can be effective in reducing auto use for commuters after controlling for socio-demographics and travel-related factors.This work provides insights for interpreting tour-based commuter travel behavior by using recently developed methodological approaches. The results of this work will be helpful for engineers, urban planners, and transit operators to decide the needs to improve regional transit service and spatial location efficiently.展开更多
Effective use of urban rapid railway systems requires that the railway systems be effectively connected with other transportation modes so that they are accessible. This paper uses the Iogit model and data to analyze ...Effective use of urban rapid railway systems requires that the railway systems be effectively connected with other transportation modes so that they are accessible. This paper uses the Iogit model and data to analyze the factors influencing railway access choices in a railway choice access model. The results indicate that access time, access cost, and access distance are factors significantly affecting railway access choices. The user's income significantly affects the probability of choosing to walk rather than to take a taxi, but is not related to choosing buses or bicycles. Vehicle ownership significantly affects the probability of choosing a taxi, but is not significantly related to the other modes. The conclusions provide an analysis tool for urban railway planning and construction.展开更多
Software-as-a-Service (SaaS) introduces multi- tenancy architecture (MTA). Sub-tenancy architecture (STA), is an extension of MTA, allows tenants to offer services for subtenant developers to customize their app...Software-as-a-Service (SaaS) introduces multi- tenancy architecture (MTA). Sub-tenancy architecture (STA), is an extension of MTA, allows tenants to offer services for subtenant developers to customize their applications in the SaaS infrastructure. In a STA system, tenants can create sub- tenants, and grant their resources (including private services and data) to their subtenants. The isolation and sharing re- lations between parent-child tenants, sibling tenants or two non-related tenants are more complicated than those between tenants in MTA. It is important to keep service components or data private, and at the same time, allow them to be shared, and support application customizations for tenants. To ad- dress this problem, this paper provides a formal definition of a new tenant-based access control model based on administra- tive role-based access control (ARBAC) for MTA and STA in service-oriented SaaS (called TMS-ARBAC). Autonomous areas (AA) and AA-tree are proposed to describe the auton- omy of tenants, including their isolation and sharing relation- ships. Authorization operations on AA and different resource sharing strategies are defined to create and deploy the access control scheme in STA models. TMS-ARBAC model is ap- plied to design a geographic e-Science platform.展开更多
In a multi-user system,system resources should be allocated to different users.In traditional communication systems,system resources generally include time,frequency,space,and power,so multiple access technologies suc...In a multi-user system,system resources should be allocated to different users.In traditional communication systems,system resources generally include time,frequency,space,and power,so multiple access technologies such as time division multiple access(TDMA),frequency division multiple access(FDMA),space division multiple access(SDMA),code division multiple access(CDMA),and non-orthogonal multiple access(NOMA)are widely used.In semantic communication,which is considered a new paradigm of the next-generation communication system,we extract high-dimensional features from signal sources in a model-based artificial intelligence approach from a semantic perspective and construct a model information space for signal sources and channel features.From the high-dimensional semantic space,we excavate the shared and personalized information of semantic information and propose a novel multiple access technology,named model division multiple access(MDMA),which is based on the resource of the semantic domain.From the perspective of information theory,we prove that MDMA can attain more performance gains than traditional multiple access technologies.Simulation results show that MDMA saves more bandwidth resources than traditional multiple access technologies,and that MDMA has at least a 5-dB advantage over NOMA in the additive white Gaussian noise(AWGN)channel under the low signal-to-noise(SNR)condition.展开更多
As the speed of optical access networks soars with ever increasing multiple services, the service-supporting ability of optical access networks suffers greatly from the shortage of service awareness. Aiming to solve t...As the speed of optical access networks soars with ever increasing multiple services, the service-supporting ability of optical access networks suffers greatly from the shortage of service awareness. Aiming to solve this problem, a hierarchy Bayesian model based services awareness mechanism is proposed for high-speed optical access networks. This approach builds a so-called hierarchy Bayesian model, according to the structure of typical optical access networks. Moreover, the proposed scheme is able to conduct simple services awareness operation in each optical network unit(ONU) and to perform complex services awareness from the whole view of system in optical line terminal(OLT). Simulation results show that the proposed scheme is able to achieve better quality of services(Qo S), in terms of packet loss rate and time delay.展开更多
文摘The Lanzhou-Urumqi high-speed railway is an important part of the railway network connecting Gansu,Qinghai,and Xinjiang,and it is of far-reaching significance in facilitating China’s western development.An accessibility model and a double difference model were built to analyze the impact of the Lanzhou-Urumqi high-speed railway on regional accessibility and economic development of the areas along the line before(2012-2014)and after(2017-2019)its opening.The results show that the regional accessibility remains unchanged before and after the operation of this railway line.However,there is a spatial difference in improvement,that of central cities being better.The opening of the high-speed railway is conducive to driving the overall economic development of the region and promoting the comprehensive and coordinated development of regional economies.
基金Under the auspices of National Natural Science Foundation of China(No.41471140,41771178)Liaoning Province Outstanding Youth Program(No.LJQ2015058)
文摘This paper studies the relationship between accessibility and housing prices in Dalian by using an improved geographically weighted regression model and house prices, traffic, remote sensing images, etc. Multi-source data improves the accuracy of the spatial differentiation that reflects the impact of traffic accessibility on house prices. The results are as follows: first, the average house price is 12 436 yuan(RMB)/m^2, and reveals a declining trend from coastal areas to inland areas. The exception was Guilin Street, which demonstrates a local peak of house prices that decreases from the center of the street to its periphery. Second, the accessibility value is 33 minutes on average, excluding northern and eastern fringe areas, which was over 50 minutes. Third, the significant spatial correlation coefficient between accessibility and house prices is 0.423, and the coefficient increases in the southeastern direction. The strongest impact of accessibility on house prices is in the southeastern coast, and can be seen in the Lehua, Yingke, and Hushan communities, while the weakest impact is in the northwestern fringe, and can be seen in the Yingchengzi, Xixiaomo, and Daheishi community areas.
基金Under the auspices of National Natural Science Foundation of China(No.41471140)
文摘This study examines the socio-spatial context of uneven development and the residential accessibility of green space in Dalian of Liaoning Province, China. The social fairness was analyzed with a community scale as the basis. We combined social scientific methods with a GIS method using a behavior accessibility model from the perspectives of fairness of urban green space allocation based on social geography, geographic information science, management science and many other related discipline theories. The results show that: 1) Most of the urban green space distribution presents an unbalanced phenomenon, and it does not match with the population distribution; 2) We found some differences in the accessibility of the population with different attributes and opportunities to use and enjoy the urban green spaces, mainly due to: the dual social and spatial attributes of the residents and the serious stratum differentiation generated were the internal causes; the residential space differentiation and the pursuit of economic and real estate development were the direct causes; and unreasonable planning, in regard to the fact that government policies did not give consideration to efficiency and fairness, was also an important factor.
基金Supported by the National Natural Science Foundation of China(No.60872041,61072066)Fundamental Research Funds for the Central Universities(JYI0000903001,JYI0000901034)
文摘To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud.
文摘Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures.It offers tremendous advantages for enterprises and service providers.It is anticipated that this situation will evolve to foster cross-tenant collaboration supported by Authorization as a service.To realize access control in a multi-tenant cloud computing environment,this study proposes a multi-tenant cloud computing access control model based on the traditional usage access control model by building trust relations among tenants.The model consists of three sub-models,which achieve trust relationships between tenants with different granularities and satisfy the requirements of different application scenarios.With an established trust relation in MT-UCON(Multi-tenant Usage Access Control),the trustee can precisely authorize cross-tenant accesses to the trustor’s resources consistent with constraints over the trust relation and other components designated by the trustor.In addition,the security of the model is analyzed by an information flow method.The model adapts to the characteristics of a dynamic and open multi-tenant cloud computing environment and achieves fine-grained access control within and between tenants.
基金funded by the Third Scientific Experiment of the Tibetan Plateau (Grant No. GYHY201406001)the National Natural Science Foundation of China (Grant Nos. 41575045, 41205030, and 41175046)the Basic Research Fund of the Chinese Academy of Meteorological Sciences (Grant No. 2017Z013)
文摘Cloud distribution characteristics over the Tibetan Plateau in the summer monsoon period simulated by the Australian Community Climate and Earth System Simulator(ACCESS) model are evaluated using COSP [the CFMIP(Cloud Feedback Model Intercomparison Project) Observation Simulator Package]. The results show that the ACCESS model simulates less cumulus cloud at atmospheric middle levels when compared with observations from CALIPSO and CloudSat, but more ice cloud at high levels and drizzle drops at low levels. The model also has seasonal biases after the onset of the summer monsoon in May. While observations show that the prevalent high cloud at 9–10 km in spring shifts downward to 7–9 km,the modeled maximum cloud fractions move upward to 12–15 km. The reason for this model deficiency is investigated by comparing model dynamical and thermodynamical fields with those of ERA-Interim. It is found that the lifting effect of the Tibetan Plateau in the ACCESS model is stronger than in ERA-Interim, which means that the vertical velocity in the ACCESS model is stronger and more water vapor is transported to the upper levels of the atmosphere, resulting in more high-level ice clouds and less middle-level cumulus cloud over the Tibetan Plateau. The modeled radiation fields and precipitation are also evaluated against the relevant satellite observations.
基金Supported by the National Natural Science Foun dation of China (90104005) and the National High Technology Re search and Development Program of China ( 863 Program )(2002AA141051)
文摘To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)' s recommendation, we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with information flow model, we put forwarda combinedprocess-based lattice model to enforce security This moelel creates a trust chain by which we canmanage a series of processes from a core root of trust module to some other application modules Inthe model, once the trust chain is created andmanaged cor-rectly, the integrity of the computer'shardware and sofware has bctn maintained, so does the confidentiality and authenticity. Moreover, arelevant implementation of the model is explained.
基金Supported by the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant No XDA09020402the National Integrate Circuit Research Program of China under Grant No 2009ZX02023-003+1 种基金the National Natural Science Foundation of China under Grant Nos 61261160500,61376006,61401444 and 61504157the Science and Technology Council of Shanghai under Grant Nos 14DZ2294900,15DZ2270900 and 14ZR1447500
文摘An optimized device structure for reducing the RESET current of phase-change random access memory (PCRAM) with blade-type like (BTL) phase change layer is proposed. The electrical thermal analysis of the BTL cell and the blade heater contactor structure by three-dimensional finite element modeling are compared with each other during RESET operation. The simulation results show that the programming region of the phase change layer in the BTL cell is much smaller, and thermal electrical distributions of the BTL cell are more concentrated on the TiN/GST interface. The results indicate that the BTL cell has the superiorities of increasing the heating efficiency, decreasing the power consumption and reducing the RESET current from 0.67mA to 0.32mA. Therefore, the BTL cell will be appropriate for high performance PCRAM device with lower power consumption and lower RESET current.
基金Knowledge Innovation Project and Intelligent Infor mation Service and Support Project of the Shanghai Education Commission, China
文摘Towards the crossing and coupling permissions in tasks existed widely in many fields and considering the design of role view must rely on the activities of the tasks process,based on Role Based Accessing Control (RBAC) model,this paper put forward a Role Tree-Based Access Control (RTBAC) model. In addition,the model definition and its constraint formal description is also discussed in this paper. RTBAC model is able to realize the dynamic organizing,self-determination and convenience of the design of role view,and guarantee the least role permission when task separating in the mean time.
基金Supported by Key Technology R&D Project Foundation of Sichuan Province (No.02GG006-018)
文摘So far, file access prediction models is mainly based on either the file access frequency or the historical record of the latest access. In this paper, a new file access prediction model called frequency- and recency-based successor (FRS) is presented which combines the advantages of the file frequency with the historical record. FRS model has the capability of rapid response to workload changes and can predict future events with greater accuracy than most of other prediction models. To evaluate the performance of FRS mode, the Linux kernel is modified to predict and prefetch upcoming accesses. The experiment shows that FRS can accurately predict approximately 80% of all file access events, while maintaining an immediate successor queue (ISQ) per-file which only requires regular dynamic updates.
基金supported by MOST under Grant No. 107-2221-E-182-081-MY3。
文摘To protect personal privacy and confidential preservation,access control is used to authorize legal users for safe browsing the authorized contents on photos.The access control generates an authorization rule according to each permission assignment.However,the general access control is inappropriate to apply in some social services(e.g.,photos posted on Flickr and Instagram,personal image management in mobile phone) because of the increasing popularity of digital images being stored and managed.With low maintenance loads,this paper integrates the data hiding technique to propose an access control mechanism for privacy preservation.The proposed scheme changes the partial regions of a given image as random pads (called selective image encryption) and only allows the authorized people to remedy the random pads back to meaningful ones which are with similar visual qualities of original ones.
文摘The purpose of this study is to improve environmental sustainability by identifying the most sustainable/least fragile of the three major wildlife conservation access models—open, government, and private—under varying environmental and socioeconomic conditions. The private access model is the most sustainable of the three major conservation models because it provides the best information and incentives to balance the needs of humans and wildlife, maintain general wildlife habitat, and adapt quickly to changing environmental and/or socioeconomic conditions. Government-controlled access, however, can be employed as a model of last resort if the private access model shows signs of failing to protect specific species from local extirpation or extinction, which it is most likely to do for migratory species, species with close commercial substitutes, and species with no direct commercial value. Government regulators may also be needed to enforce property rights arrangements like catch shares and to monitor resources that remain open access in case socioeconomic or environmental conditions change sufficiently to trigger the tragedy of the commons. Most treatments of wildlife regulation default to various iterations of the government access model and fail even to consider the costs and benefits of private and open access models. The analysis here instead shows the conditions in which each conservation access model is most appropriate: open when a resource is in high supply and low demand, private most of the time, and government when the others fail to slow resource depopulation/depletion.
基金Project(71173061)supported by the National Natural Science Foundation of ChinaProject(2013U-6)supported by Key Laboratory of Eco Planning & Green Building,Ministry of Education(Tsinghua University),China
文摘The aim of this work is to explore the impact of regional transit service on tour-based commuter travel behavior by using the Bayesian hierarchical multinomial logit model, accounting for the spatial heterogeneity of the people living in the same area.With two indicators, accessibility and connectivity measured at the zone level, the regional transit service is captured and then related to the travel mode choice behavior. The sample data are selected from Washington-Baltimore Household Travel Survey in 2007,including all the trips from home to workplace in morning hours in Baltimore city. Traditional multinomial logit model using Bayesian approach is also estimated. A comparison of the two different models shows that ignoring the spatial context can lead to a misspecification of the effects of the regional transit service on travel behavior. The results reveal that improving transit service at regional level can be effective in reducing auto use for commuters after controlling for socio-demographics and travel-related factors.This work provides insights for interpreting tour-based commuter travel behavior by using recently developed methodological approaches. The results of this work will be helpful for engineers, urban planners, and transit operators to decide the needs to improve regional transit service and spatial location efficiently.
基金Supported by the National Natural Science Foundation of China(No. 50478041)the Natural Science Foundation of Beijing(No. 8053019)
文摘Effective use of urban rapid railway systems requires that the railway systems be effectively connected with other transportation modes so that they are accessible. This paper uses the Iogit model and data to analyze the factors influencing railway access choices in a railway choice access model. The results indicate that access time, access cost, and access distance are factors significantly affecting railway access choices. The user's income significantly affects the probability of choosing to walk rather than to take a taxi, but is not related to choosing buses or bicycles. Vehicle ownership significantly affects the probability of choosing a taxi, but is not significantly related to the other modes. The conclusions provide an analysis tool for urban railway planning and construction.
文摘Software-as-a-Service (SaaS) introduces multi- tenancy architecture (MTA). Sub-tenancy architecture (STA), is an extension of MTA, allows tenants to offer services for subtenant developers to customize their applications in the SaaS infrastructure. In a STA system, tenants can create sub- tenants, and grant their resources (including private services and data) to their subtenants. The isolation and sharing re- lations between parent-child tenants, sibling tenants or two non-related tenants are more complicated than those between tenants in MTA. It is important to keep service components or data private, and at the same time, allow them to be shared, and support application customizations for tenants. To ad- dress this problem, this paper provides a formal definition of a new tenant-based access control model based on administra- tive role-based access control (ARBAC) for MTA and STA in service-oriented SaaS (called TMS-ARBAC). Autonomous areas (AA) and AA-tree are proposed to describe the auton- omy of tenants, including their isolation and sharing relation- ships. Authorization operations on AA and different resource sharing strategies are defined to create and deploy the access control scheme in STA models. TMS-ARBAC model is ap- plied to design a geographic e-Science platform.
基金supported by the National Key R&D Program of China(No.2022YFB2902102)。
文摘In a multi-user system,system resources should be allocated to different users.In traditional communication systems,system resources generally include time,frequency,space,and power,so multiple access technologies such as time division multiple access(TDMA),frequency division multiple access(FDMA),space division multiple access(SDMA),code division multiple access(CDMA),and non-orthogonal multiple access(NOMA)are widely used.In semantic communication,which is considered a new paradigm of the next-generation communication system,we extract high-dimensional features from signal sources in a model-based artificial intelligence approach from a semantic perspective and construct a model information space for signal sources and channel features.From the high-dimensional semantic space,we excavate the shared and personalized information of semantic information and propose a novel multiple access technology,named model division multiple access(MDMA),which is based on the resource of the semantic domain.From the perspective of information theory,we prove that MDMA can attain more performance gains than traditional multiple access technologies.Simulation results show that MDMA saves more bandwidth resources than traditional multiple access technologies,and that MDMA has at least a 5-dB advantage over NOMA in the additive white Gaussian noise(AWGN)channel under the low signal-to-noise(SNR)condition.
基金supported by the Science and Technology Project of State Grid Corporation of China:"Research on the Power-Grid Services Oriented"IP+Optics"Coordination Choreography Technology"
文摘As the speed of optical access networks soars with ever increasing multiple services, the service-supporting ability of optical access networks suffers greatly from the shortage of service awareness. Aiming to solve this problem, a hierarchy Bayesian model based services awareness mechanism is proposed for high-speed optical access networks. This approach builds a so-called hierarchy Bayesian model, according to the structure of typical optical access networks. Moreover, the proposed scheme is able to conduct simple services awareness operation in each optical network unit(ONU) and to perform complex services awareness from the whole view of system in optical line terminal(OLT). Simulation results show that the proposed scheme is able to achieve better quality of services(Qo S), in terms of packet loss rate and time delay.