Information-centric networking(ICN) aims to improve the efficiency of content delivery and reduce the redundancy of data transmission by caching contents in network nodes. An important issue is to design caching metho...Information-centric networking(ICN) aims to improve the efficiency of content delivery and reduce the redundancy of data transmission by caching contents in network nodes. An important issue is to design caching methods with better cache hit rate and achieve allocating on-demand. Therefore, an in-network caching scheduling scheme for ICN was designed, distinguishing different kinds of contents and dynamically allocating the cache size on-demand. First discussing what was appropriated to be cached in nodes, and then a classification about the contents could be cached was proposed. Furthermore, we used AHP to weight different contents classes through analyzing users' behavior. And a distributed control process was built, to achieve differentiated caching resource allocation and management. The designed scheme not only avoids the waste of caching resource, but also further enhances the cache availability. Finally, the simulation results are illustrated to show that our method has the superior performance in the aspects of server hit rate and convergence.展开更多
Having criticized the current architecture of Advanced Traveler Information Systems (ATISs), this work discusses a new base of requirements to develop a new paradigm for traffic information systems. It mainly integr...Having criticized the current architecture of Advanced Traveler Information Systems (ATISs), this work discusses a new base of requirements to develop a new paradigm for traffic information systems. It mainly integrates three dimensions within a traffic system: drivers' pattern of behavior and preferences, urban traffic desires, and capabilities of traffic information service providers. Based on the above, functional segments from several related backgrounds are brought together to structure a new architecture, called Interactive Traveler Information System (ITIS). The main interactive feature of this new architecture is a two-way communication track between drivers and the traffic information system provider-in fact, a decision on choosing a road at a particular time for an individual will be made based on the utility of both sides. This new configuration consists of driver-side smartphone application, centric traffic prediction, and decision-maker units, which will shape a new approach of decision-making processes. These all work together to satisfy the designated goal of ITIS, which is preserving the Wardrop equilibrium condition in the traffic network level. Finally, we concentrate on a comparison study, which shows a differentiation between performance of the proposed ITIS and the current ATIS model in a real situation. This has been done with simulations of analogical scenarios. The most noticeable advantage of the proposed architecture is not being limited to a saturation limit, and the positive effect of increasing system penetration in the performance of the newly introduced information system. In conclusion, new research subjects are suggested to be carried out.展开更多
Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and...Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and improving users' experience. To analyse the requests' patterns and fully utilize the universal cached contents, a novel intelligent resources management system is proposed, which enables effi cient cache resource allocation in real time, based on changing user demand patterns. The system is composed of two parts. The fi rst part is a fi ne-grain traffi c estimation algorithm called Temporal Poisson traffi c prediction(TP2) that aims at analysing the traffi c pattern(or aggregated user requests' demands) for different contents. The second part is a collaborative cache placement algorithm that is based on traffic estimated by TP2. The experimental results show that TP2 has better performance than other comparable traffi c prediction algorithms and the proposed intelligent system can increase the utilization of cache resources and improve the network capacity.展开更多
In this paper,multi-UAV trajectory planning and resource allocation are jointly investigated to improve the information freshness for vehicular networks,where the vehicles collect time-critical traffic information by ...In this paper,multi-UAV trajectory planning and resource allocation are jointly investigated to improve the information freshness for vehicular networks,where the vehicles collect time-critical traffic information by on-board sensors and upload to the UAVs through their allocated spectrum resource.We adopt the expected sum age of information(ESAoI)to measure the network-wide information freshness.ESAoI is jointly affected by both the UAVs trajectory and the resource allocation,which are coupled with each other and make the analysis of ESAoI challenging.To tackle this challenge,we introduce a joint trajectory planning and resource allocation procedure,where the UAVs firstly fly to their destinations and then hover to allocate resource blocks(RBs)during a time-slot.Based on this procedure,we formulate a trajectory planning and resource allocation problem for ESAoI minimization.To solve the mixed integer nonlinear programming(MINLP)problem with hybrid decision variables,we propose a TD3 trajectory planning and Round-robin resource allocation(TTPRRA).Specifically,we exploit the exploration and learning ability of the twin delayed deep deterministic policy gradient algorithm(TD3)for UAVs trajectory planning,and utilize Round Robin rule for the optimal resource allocation.With TTP-RRA,the UAVs obtain their flight velocities by sensing the locations and the age of information(AoI)of the vehicles,then allocate the RBs to the vehicles in a descending order of AoI until the remaining RBs are not sufficient to support another successful uploading.Simulation results demonstrate that TTP-RRA outperforms the baseline approaches in terms of ESAoI and average AoI(AAoI).展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
With the increasing sharing and reuse of personal information resources for better public services, the effective protection and management of personal information as organizational and individual assets as well as so...With the increasing sharing and reuse of personal information resources for better public services, the effective protection and management of personal information as organizational and individual assets as well as social resources are becoming more and more important in networked Chinese public sectors. Existing studies of personal information protection in China is mainly conducted from the legal perspective with a focus on the development of appropriate legislation and policies at the national level. There is little research on how specific legislation and polices can actually be implemented in an effective manner and what impacts such legislation and policies have on individuals, organizations, and the society. To adequately address this issue, this study investigates the legal requirements for personal information protection based on the relevant laws, regulations, and standards in China. It proposes a comprehensive regime for personal information protection in the networked public sectors in China. Such a regime takes the advantages of existing discipline-based approaches, legal requirements, and control mechanisms for personal information protection. It can be used to facilitate the provision of public services in the networked Chinese public sectors through the adequate protection of personal information and the effective management of personal information.展开更多
European Community policy concerning water is placing increasing demands on the acquisition of information about the quality of aquatic environments. The cost of this information has led to a reflection on the rationa...European Community policy concerning water is placing increasing demands on the acquisition of information about the quality of aquatic environments. The cost of this information has led to a reflection on the rationalization of monitoring networks and, therefore, on the economic value of information produced by these networks. The aim of this article is to contribute to this reflection. To do so, we used the Bayesian framework to define the value of additional information in relation to the following three parameters: initial assumptions (prior probabilities) on the states of nature, costs linked to a poor decision (error costs) and accuracy of additional information. We then analyzed the impact of these parameters on this value, particularly the combined role of prior probabilities and error costs that increased or decreased the value of information depending on the initial uncertainty level. We then illustrated the results using a case study of a stream in the Bas-Rhin department in France.展开更多
Reorganization of network information resources for scientific and technical (scitech for abbreviation) documents and development of information infrastructure have brought a great change in China's scitech documen...Reorganization of network information resources for scientific and technical (scitech for abbreviation) documents and development of information infrastructure have brought a great change in China's scitech documentation information sharing. It integrated not only information resources, but also systems, technologies and funds. High quality services and effective resources sharing are the main goals of the platform construction. The paper describes briefly the principles and aims of the integration of the scitech information resources and networks. The services of the sharing platforms have been also introduced.展开更多
This paper discusses the Project's organization system, technical system, creation of digital resources and service mode. It also summarizes achievements gained since the commencement of the Project, and also anal...This paper discusses the Project's organization system, technical system, creation of digital resources and service mode. It also summarizes achievements gained since the commencement of the Project, and also analyzes some of the more important issues during implementation stage and gives a few suggestions of the future development during the next stage of the 11thFive-Year Plan.展开更多
For the problem of large network load generated by the Gnutella resource-searching model in Peer to Peer (P2P) network, a improved model to decrease the network expense is proposed, which establishes a duster in P2P...For the problem of large network load generated by the Gnutella resource-searching model in Peer to Peer (P2P) network, a improved model to decrease the network expense is proposed, which establishes a duster in P2P network, auto-organizes logical layers, and applies a hybrid mechanism of directional searching and flooding. The performance analysis and simulation results show that the proposed hierarchical searching model has availably reduced the generated message load and that its searching-response time performance is as fairly good as that of the Gnutella model.展开更多
As a promising technology to improve spectrum efficiency and transmission coverage,Heterogeneous Network(HetNet)has attracted the attention of many scholars in recent years.Additionally,with the introduction of the No...As a promising technology to improve spectrum efficiency and transmission coverage,Heterogeneous Network(HetNet)has attracted the attention of many scholars in recent years.Additionally,with the introduction of the Non-Orthogonal Multiple Access(NOMA)technology,the NOMA-assisted HetNet cannot only improve the system capacity but also allow more users to utilize the same frequency band resource,which makes the NOMA-assisted HetNet a hot topic.However,traditional resource allocation schemes assume that base stations can exactly estimate direct link gains and cross-tier link gains,which is impractical for practical HetNets due to the impact of channel delays and random perturbation.To further improve energy utilization and system robustness,in this paper,we investigate a robust resource allocation problem to maximize the total Energy Efficiency(EE)of Small-Cell Users(SCUs)in NOMA-assisted HetNets under imperfect channel state information.By considering bounded channel uncertainties,the robust resource optimization problem is formulated as a mixed-integer and nonlinear programming problem under the constraints of the cross-tier interference power of macrocell users,the maximum transmit power of small base station,the Resource Block(RB)assignment,and the quality of service requirement of each SCU.The original problem is converted into an equivalent convex optimization problem by using Dinkelbach's method and the successive convex approximation method.A robust Dinkelbach-based iteration algorithm is designed by jointly optimizing the transmit power and the RB allocation.Simulation results verify that the proposed algorithm has better EE and robustness than the existing algorithms.展开更多
In the past decade,the e-government affairs keep developing,which prom otes the reform of governmental affairs and the enhancement of administrative efficiency.However,the phenomenon of inform ation silo has bad influ...In the past decade,the e-government affairs keep developing,which prom otes the reform of governmental affairs and the enhancement of administrative efficiency.However,the phenomenon of inform ation silo has bad influence upon the governm ental information resources sharing and the efficiency of the e-government affairs,hindering inform ation connectivity,so that the government management cannot meet the need of society,nor can the e-governm ent develop in the long run.This paper attempts to analyze the embodiment and causes of the phenomenon of information silo,putting forward measures of solving the problem of inform ation silo.展开更多
This paper selects 998 articles as its data sources from four Chinese core journals in the field of Library and Information Science from 2003 to 2007.Some pertinent aspects of reference citations particularly from web...This paper selects 998 articles as its data sources from four Chinese core journals in the field of Library and Information Science from 2003 to 2007.Some pertinent aspects of reference citations particularly from web resources are selected for a focused analysis and discussion.This includes primarily such items as the number of web citations,web citations per each article,the distribution of domain names of web citations and also certain aspects about the institutional and/or geographical affiliations of the author.The evolving situation of utilizing online networked academic information resources in China is the central thematic discussion of this study.The writing of this paper is augmented by the explicatory presentation of 3 graphic figures,6 tables and 18 references.展开更多
Based on open grid service architecture (OGSA) and Globus Toolkit 3. 0 (GT3), a manufacturing grid (MG) is proposed to realize resource sharing and collaborative working among manufacturing enterprises. Nevertheless, ...Based on open grid service architecture (OGSA) and Globus Toolkit 3. 0 (GT3), a manufacturing grid (MG) is proposed to realize resource sharing and collaborative working among manufacturing enterprises. Nevertheless, resource management in MG is much more complicated than that in other grid applications due to the geographically distributed manufacturing resources, which range from CAD, CAPP and CAE to various kinds of machine tools. With the interaction of manufacturing grid information service (MGIS, developed by ourselves) and globus resource allocation manager (GRAM, provided by GT3), a resource management framework is presented to perform the functions of resource encapsulation, registry, discovery and monitoring. Furthermore, the application architecture and an example are depicted to illustrate the utilization of the resource management system.展开更多
Focusing on its main requirements and challenges and by analyzing the characteristics of different space platforms,an overall architecture for space information networks is proposed based on national strategic plannin...Focusing on its main requirements and challenges and by analyzing the characteristics of different space platforms,an overall architecture for space information networks is proposed based on national strategic planning and the present development status of associated technologies.Furthermore,the core scientific problems that need to be solved are expounded.In addition,the primary considerations and a preliminary integrated demonstration environment for verification of key technologies are presented.展开更多
The scale expansion of the space information networks(SINs)makes the demands for tacking,telemetry and command(TT&C)missions increase dramatically.An increasing number of missions and a sharp conflict of resources...The scale expansion of the space information networks(SINs)makes the demands for tacking,telemetry and command(TT&C)missions increase dramatically.An increasing number of missions and a sharp conflict of resources make it much more challenging to schedule missions reasonably.In order to ensure both the mission completion rate of the high concurrent emergency missions and the performance of regular missions,a conflict degree scheduling algorithm based on transfer strategy(CDSA-TS)is proposed concurrently reconfiguring multi-dimensional resources reasonably.Furthermore,we design an emergency mission planning algorithm based on simulated annealing algorithm(EMPA-SA)to increase the probability of jumping out of the trap through the iterative neighborhood searching strategy and destabilization.Finally,we design a simulation system to verify the network performance in terms of the integrated weights of completed missions and the time consumption of the proposed algorithms.We also investigate the impact of the scheduling strategy for emergency missions on regular missions to improve the overall network performance,which provides guidance for emergency mission planning in the future for the large scale constellation oriented SINs.展开更多
The defense in depth methodology was popularized in the early 2000’s amid growing concerns for information security;this paper will address the shortcomings of early implementations. In the last two years, many suppo...The defense in depth methodology was popularized in the early 2000’s amid growing concerns for information security;this paper will address the shortcomings of early implementations. In the last two years, many supporters of the defense in depth security methodology have changed their allegiance to an offshoot method dubbed the defense in breadth methodology. A substantial portion of this paper’s body will be devoted to comparing real-world usage scenarios and discussing the flaws in each method. A major goal of this publication will be to assist readers in selecting a method that will best benefit their personal environment. Scenarios certainly exist where one method may be clearly favored;this article will help identify the factors that make one method a clear choice over another. This paper will strive not only to highlight key strengths and weaknesses for the two strategies listed, but also provide the evaluation techniques necessary for readers to apply to other popular methodologies in order to make the most appropriate personal determinations.展开更多
In space information networks,resource mobility is an important factor affecting the network performance,which not only results in challenges in resource management but also brings opportunities to the improvement of ...In space information networks,resource mobility is an important factor affecting the network performance,which not only results in challenges in resource management but also brings opportunities to the improvement of network service capability.In order to explore the restriction and improvement mechanism of resource mobility on network performance,we firstly use the time-expanded resource relationship graph to represent the moving behavior of multidimensional resources and the collaborative relationship between different resources.Then by jointly considering the number of disjoint resource combinations,the length of moving time window,and the parameter of resource independence,we propose(k,n,L)degree of freedom on resource combination as a metric measuring performance gain resulted from resource mobility.Furthermore,the analysis of resource mobility is transformed into the problem of finding disjoint paths in the graph,and the tradeoff relationship between QoS requirements of task and resource mobility utilization is discussed.Finally,the tradeoff between the gain of resource mobility utilization and the payment of service process delay is revealed through simulation.展开更多
基金supported in part by The National High Technology Research and Development Program of China (863 Program) under Grant No. 2015AA016101The National Natural Science Foundation of China under Grant No. 61501042+1 种基金Beijing Nova Program under Grant No. Z151100000315078BUPT Special Program for Youth Scientific Research Innovation under Grant No. 2015RC10
文摘Information-centric networking(ICN) aims to improve the efficiency of content delivery and reduce the redundancy of data transmission by caching contents in network nodes. An important issue is to design caching methods with better cache hit rate and achieve allocating on-demand. Therefore, an in-network caching scheduling scheme for ICN was designed, distinguishing different kinds of contents and dynamically allocating the cache size on-demand. First discussing what was appropriated to be cached in nodes, and then a classification about the contents could be cached was proposed. Furthermore, we used AHP to weight different contents classes through analyzing users' behavior. And a distributed control process was built, to achieve differentiated caching resource allocation and management. The designed scheme not only avoids the waste of caching resource, but also further enhances the cache availability. Finally, the simulation results are illustrated to show that our method has the superior performance in the aspects of server hit rate and convergence.
文摘Having criticized the current architecture of Advanced Traveler Information Systems (ATISs), this work discusses a new base of requirements to develop a new paradigm for traffic information systems. It mainly integrates three dimensions within a traffic system: drivers' pattern of behavior and preferences, urban traffic desires, and capabilities of traffic information service providers. Based on the above, functional segments from several related backgrounds are brought together to structure a new architecture, called Interactive Traveler Information System (ITIS). The main interactive feature of this new architecture is a two-way communication track between drivers and the traffic information system provider-in fact, a decision on choosing a road at a particular time for an individual will be made based on the utility of both sides. This new configuration consists of driver-side smartphone application, centric traffic prediction, and decision-maker units, which will shape a new approach of decision-making processes. These all work together to satisfy the designated goal of ITIS, which is preserving the Wardrop equilibrium condition in the traffic network level. Finally, we concentrate on a comparison study, which shows a differentiation between performance of the proposed ITIS and the current ATIS model in a real situation. This has been done with simulations of analogical scenarios. The most noticeable advantage of the proposed architecture is not being limited to a saturation limit, and the positive effect of increasing system penetration in the performance of the newly introduced information system. In conclusion, new research subjects are suggested to be carried out.
基金supported by the National High Technology Research and Development Program(863)of China(No.2015AA016101)the National Natural Science Fund(No.61300184)Beijing Nova Program(No.Z151100000315078)
文摘Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and improving users' experience. To analyse the requests' patterns and fully utilize the universal cached contents, a novel intelligent resources management system is proposed, which enables effi cient cache resource allocation in real time, based on changing user demand patterns. The system is composed of two parts. The fi rst part is a fi ne-grain traffi c estimation algorithm called Temporal Poisson traffi c prediction(TP2) that aims at analysing the traffi c pattern(or aggregated user requests' demands) for different contents. The second part is a collaborative cache placement algorithm that is based on traffic estimated by TP2. The experimental results show that TP2 has better performance than other comparable traffi c prediction algorithms and the proposed intelligent system can increase the utilization of cache resources and improve the network capacity.
基金supported in part by the Project of International Cooperation and Exchanges NSFC under Grant No.61860206005in part by the Joint Funds of the NSFC under Grant No.U22A2003.
文摘In this paper,multi-UAV trajectory planning and resource allocation are jointly investigated to improve the information freshness for vehicular networks,where the vehicles collect time-critical traffic information by on-board sensors and upload to the UAVs through their allocated spectrum resource.We adopt the expected sum age of information(ESAoI)to measure the network-wide information freshness.ESAoI is jointly affected by both the UAVs trajectory and the resource allocation,which are coupled with each other and make the analysis of ESAoI challenging.To tackle this challenge,we introduce a joint trajectory planning and resource allocation procedure,where the UAVs firstly fly to their destinations and then hover to allocate resource blocks(RBs)during a time-slot.Based on this procedure,we formulate a trajectory planning and resource allocation problem for ESAoI minimization.To solve the mixed integer nonlinear programming(MINLP)problem with hybrid decision variables,we propose a TD3 trajectory planning and Round-robin resource allocation(TTPRRA).Specifically,we exploit the exploration and learning ability of the twin delayed deep deterministic policy gradient algorithm(TD3)for UAVs trajectory planning,and utilize Round Robin rule for the optimal resource allocation.With TTP-RRA,the UAVs obtain their flight velocities by sensing the locations and the age of information(AoI)of the vehicles,then allocate the RBs to the vehicles in a descending order of AoI until the remaining RBs are not sufficient to support another successful uploading.Simulation results demonstrate that TTP-RRA outperforms the baseline approaches in terms of ESAoI and average AoI(AAoI).
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
基金Project Supported: Beijing National Social Science Foundation (Project number: 13ZHB013), the Chinese National Social Science Foundation (Project number: 12&ZD220 & 13 &ZD 184), and the Chinese National Natural Science Foundation (Project number: 71133006/G0314).
文摘With the increasing sharing and reuse of personal information resources for better public services, the effective protection and management of personal information as organizational and individual assets as well as social resources are becoming more and more important in networked Chinese public sectors. Existing studies of personal information protection in China is mainly conducted from the legal perspective with a focus on the development of appropriate legislation and policies at the national level. There is little research on how specific legislation and polices can actually be implemented in an effective manner and what impacts such legislation and policies have on individuals, organizations, and the society. To adequately address this issue, this study investigates the legal requirements for personal information protection based on the relevant laws, regulations, and standards in China. It proposes a comprehensive regime for personal information protection in the networked public sectors in China. Such a regime takes the advantages of existing discipline-based approaches, legal requirements, and control mechanisms for personal information protection. It can be used to facilitate the provision of public services in the networked Chinese public sectors through the adequate protection of personal information and the effective management of personal information.
文摘European Community policy concerning water is placing increasing demands on the acquisition of information about the quality of aquatic environments. The cost of this information has led to a reflection on the rationalization of monitoring networks and, therefore, on the economic value of information produced by these networks. The aim of this article is to contribute to this reflection. To do so, we used the Bayesian framework to define the value of additional information in relation to the following three parameters: initial assumptions (prior probabilities) on the states of nature, costs linked to a poor decision (error costs) and accuracy of additional information. We then analyzed the impact of these parameters on this value, particularly the combined role of prior probabilities and error costs that increased or decreased the value of information depending on the initial uncertainty level. We then illustrated the results using a case study of a stream in the Bas-Rhin department in France.
文摘Reorganization of network information resources for scientific and technical (scitech for abbreviation) documents and development of information infrastructure have brought a great change in China's scitech documentation information sharing. It integrated not only information resources, but also systems, technologies and funds. High quality services and effective resources sharing are the main goals of the platform construction. The paper describes briefly the principles and aims of the integration of the scitech information resources and networks. The services of the sharing platforms have been also introduced.
文摘This paper discusses the Project's organization system, technical system, creation of digital resources and service mode. It also summarizes achievements gained since the commencement of the Project, and also analyzes some of the more important issues during implementation stage and gives a few suggestions of the future development during the next stage of the 11thFive-Year Plan.
文摘For the problem of large network load generated by the Gnutella resource-searching model in Peer to Peer (P2P) network, a improved model to decrease the network expense is proposed, which establishes a duster in P2P network, auto-organizes logical layers, and applies a hybrid mechanism of directional searching and flooding. The performance analysis and simulation results show that the proposed hierarchical searching model has availably reduced the generated message load and that its searching-response time performance is as fairly good as that of the Gnutella model.
基金This work was supported by the National Natural Science Foundation of China(No.61601071,62071078)the National Key Research and Development Program of China(No.2019YFC1511300)+2 种基金the Natural Science Foundation of Chongqing(No.cstc2019jcyj-xfkxX0002)the Chongqing Entrepreneurship and Innovation Program for the Returned Overseas Chinese Scholars(No.cx2020095)the Graduate Scientific Research Innovation Project of Chongqing(No.CYS20251,CYS20253).
文摘As a promising technology to improve spectrum efficiency and transmission coverage,Heterogeneous Network(HetNet)has attracted the attention of many scholars in recent years.Additionally,with the introduction of the Non-Orthogonal Multiple Access(NOMA)technology,the NOMA-assisted HetNet cannot only improve the system capacity but also allow more users to utilize the same frequency band resource,which makes the NOMA-assisted HetNet a hot topic.However,traditional resource allocation schemes assume that base stations can exactly estimate direct link gains and cross-tier link gains,which is impractical for practical HetNets due to the impact of channel delays and random perturbation.To further improve energy utilization and system robustness,in this paper,we investigate a robust resource allocation problem to maximize the total Energy Efficiency(EE)of Small-Cell Users(SCUs)in NOMA-assisted HetNets under imperfect channel state information.By considering bounded channel uncertainties,the robust resource optimization problem is formulated as a mixed-integer and nonlinear programming problem under the constraints of the cross-tier interference power of macrocell users,the maximum transmit power of small base station,the Resource Block(RB)assignment,and the quality of service requirement of each SCU.The original problem is converted into an equivalent convex optimization problem by using Dinkelbach's method and the successive convex approximation method.A robust Dinkelbach-based iteration algorithm is designed by jointly optimizing the transmit power and the RB allocation.Simulation results verify that the proposed algorithm has better EE and robustness than the existing algorithms.
文摘In the past decade,the e-government affairs keep developing,which prom otes the reform of governmental affairs and the enhancement of administrative efficiency.However,the phenomenon of inform ation silo has bad influence upon the governm ental information resources sharing and the efficiency of the e-government affairs,hindering inform ation connectivity,so that the government management cannot meet the need of society,nor can the e-governm ent develop in the long run.This paper attempts to analyze the embodiment and causes of the phenomenon of information silo,putting forward measures of solving the problem of inform ation silo.
基金supported by National Social Science Fund of China(Grant No.08CTQ015)
文摘This paper selects 998 articles as its data sources from four Chinese core journals in the field of Library and Information Science from 2003 to 2007.Some pertinent aspects of reference citations particularly from web resources are selected for a focused analysis and discussion.This includes primarily such items as the number of web citations,web citations per each article,the distribution of domain names of web citations and also certain aspects about the institutional and/or geographical affiliations of the author.The evolving situation of utilizing online networked academic information resources in China is the central thematic discussion of this study.The writing of this paper is augmented by the explicatory presentation of 3 graphic figures,6 tables and 18 references.
基金TheDevelopingFoundationofShanghaiScienceandTechnologyCommittee (No .0 2 5 1110 5 5 ) .
文摘Based on open grid service architecture (OGSA) and Globus Toolkit 3. 0 (GT3), a manufacturing grid (MG) is proposed to realize resource sharing and collaborative working among manufacturing enterprises. Nevertheless, resource management in MG is much more complicated than that in other grid applications due to the geographically distributed manufacturing resources, which range from CAD, CAPP and CAE to various kinds of machine tools. With the interaction of manufacturing grid information service (MGIS, developed by ourselves) and globus resource allocation manager (GRAM, provided by GT3), a resource management framework is presented to perform the functions of resource encapsulation, registry, discovery and monitoring. Furthermore, the application architecture and an example are depicted to illustrate the utilization of the resource management system.
基金supported by the National Natural Science Foundation of China(Nos.61231011,61671478)。
文摘Focusing on its main requirements and challenges and by analyzing the characteristics of different space platforms,an overall architecture for space information networks is proposed based on national strategic planning and the present development status of associated technologies.Furthermore,the core scientific problems that need to be solved are expounded.In addition,the primary considerations and a preliminary integrated demonstration environment for verification of key technologies are presented.
基金the Natural Science Foundation of China under Grant U19B2025 and Grant 62001347China Postdoctoral Science Foundation under Grant 2019TQ0241 and Grant 2020M673344the Fundamental Research Funds for the Central Universities under Grant XJS200117。
文摘The scale expansion of the space information networks(SINs)makes the demands for tacking,telemetry and command(TT&C)missions increase dramatically.An increasing number of missions and a sharp conflict of resources make it much more challenging to schedule missions reasonably.In order to ensure both the mission completion rate of the high concurrent emergency missions and the performance of regular missions,a conflict degree scheduling algorithm based on transfer strategy(CDSA-TS)is proposed concurrently reconfiguring multi-dimensional resources reasonably.Furthermore,we design an emergency mission planning algorithm based on simulated annealing algorithm(EMPA-SA)to increase the probability of jumping out of the trap through the iterative neighborhood searching strategy and destabilization.Finally,we design a simulation system to verify the network performance in terms of the integrated weights of completed missions and the time consumption of the proposed algorithms.We also investigate the impact of the scheduling strategy for emergency missions on regular missions to improve the overall network performance,which provides guidance for emergency mission planning in the future for the large scale constellation oriented SINs.
文摘The defense in depth methodology was popularized in the early 2000’s amid growing concerns for information security;this paper will address the shortcomings of early implementations. In the last two years, many supporters of the defense in depth security methodology have changed their allegiance to an offshoot method dubbed the defense in breadth methodology. A substantial portion of this paper’s body will be devoted to comparing real-world usage scenarios and discussing the flaws in each method. A major goal of this publication will be to assist readers in selecting a method that will best benefit their personal environment. Scenarios certainly exist where one method may be clearly favored;this article will help identify the factors that make one method a clear choice over another. This paper will strive not only to highlight key strengths and weaknesses for the two strategies listed, but also provide the evaluation techniques necessary for readers to apply to other popular methodologies in order to make the most appropriate personal determinations.
基金supported by the National Natural Science Foundation of China(Nos.61701365,61801365,91638202,61725103)China Postdoctoral Science Foundation(Nos.2017M623121,2018M643581)Postdoctoral Foundation in Shaanxi Province of China,Fundamental Research Funds for the Central Universities。
文摘In space information networks,resource mobility is an important factor affecting the network performance,which not only results in challenges in resource management but also brings opportunities to the improvement of network service capability.In order to explore the restriction and improvement mechanism of resource mobility on network performance,we firstly use the time-expanded resource relationship graph to represent the moving behavior of multidimensional resources and the collaborative relationship between different resources.Then by jointly considering the number of disjoint resource combinations,the length of moving time window,and the parameter of resource independence,we propose(k,n,L)degree of freedom on resource combination as a metric measuring performance gain resulted from resource mobility.Furthermore,the analysis of resource mobility is transformed into the problem of finding disjoint paths in the graph,and the tradeoff relationship between QoS requirements of task and resource mobility utilization is discussed.Finally,the tradeoff between the gain of resource mobility utilization and the payment of service process delay is revealed through simulation.