Wherever people live together in or near homelands that harbour joint natural resources such as forest, water, minerals, oil etc., they must collaborate, co-exist and share these resources irrespective of their geneti...Wherever people live together in or near homelands that harbour joint natural resources such as forest, water, minerals, oil etc., they must collaborate, co-exist and share these resources irrespective of their genetic, social, cultural, and political peculiarities. This is not always the case when self-interest, ethnic divisions, elitist politics, economic interest and power tussle set in. The Nso and Oku people who reside in the Ngongbaa Forest area constitute an example of joint management of resources where at one period, their relationship over the management of the Oku Mountain Forest was cordial and at another, the relationship became conflictive. This study was designed to study the influence of the KIFP forest management policies on the Nso indigenous forest Management system in Ngongbaa Forest, and its implications. The data collected for the study was secured through the administration of a questionnaire to residents of 10 villages adjacent to the Ngongbaa Forest, and forest users who carried out livelihood activities there between 1963 and 2015. These forest user groups include beekeepers, rat trappers, grazers, mushroom gatherers, ground honey/tree honey harvesters, carvers, etc. The investigation also extended to the traditional leaders of Nso and Oku who are in charge of the land tenure systems. The findings show that the Oku Mountain Forest is jointly owned by the Nso and Oku people. The Nso own the eastern half of the forest known as Ngongbaa Forest while the Oku own the western half, known as the Kilum Forest. The cordial relationship that existed between these people ensured the conservation of the forest. But the conflicts that later set in, especially due to the creation of the Kilum Mountain Forest Project in 1987 later changed to the Kilum Ijim Forest Project (KIFP) in 1992 sidelined the local communities which was contrary to the dispositions of the new Cameroon forest law enacted in 1994. Thus, the indigenous conservation practices became ignored which the local population never digested well. This seriously jeopardized the wellbeing of the forest in general.展开更多
The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense ...The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense resource allocation with multi-armed bandits to maximize the network's overall benefit.Firstly,we propose the method for dynamic setting of node defense resource thresholds to obtain the defender(attacker)benefit function of edge servers(nodes)and distribution.Secondly,we design a defense resource sharing mechanism for neighboring nodes to obtain the defense capability of nodes.Subsequently,we use the decomposability and Lipschitz conti-nuity of the defender's total expected utility to reduce the difference between the utility's discrete and continuous arms and analyze the difference theoretically.Finally,experimental results show that the method maximizes the defender's total expected utility and reduces the difference between the discrete and continuous arms of the utility.展开更多
Service and information resources are two kinds of major shared resources in virtual enterprises, where, service resources include third party’s service resources and enterprise’s legacy service resources,and inform...Service and information resources are two kinds of major shared resources in virtual enterprises, where, service resources include third party’s service resources and enterprise’s legacy service resources,and information resources include database resources and file resources. Since service and information resources have distributed, autonomic, remotely bound as well as some other similar characteristics, an implementation mechanism on managing shared resources based on UDDI are presented. XML instances are used to describe resources authorization information, WSDL based special XML instance represents information resource metadata, and these XML instances are referenced by tModel for realizing the purpose of managing shared resources metadata based on UDDI.展开更多
Web of Things(WoT)resources are not only numerous,but also have a wide range of applications and deployments.The centralized WoT resource sharing mechanism lacks flexibility and scalability,and hence cannot satisfy re...Web of Things(WoT)resources are not only numerous,but also have a wide range of applications and deployments.The centralized WoT resource sharing mechanism lacks flexibility and scalability,and hence cannot satisfy requirement of distributed resource sharing in large-scale environment.In response to this problem,a trusted and secure mechanism for WoT resources sharing based on context and blockchain(CWoT-Share)was proposed.Firstly,the mechanism can respond quickly to the changes of the application environment by dynamically determining resource access control rules according to the context.Then,the flexible resource charging strategies,which reduced the fees paid by the users who shared more resources and increased the fees paid by users who frequently used resources maliciously,were used to fulfill efficient sharing of WoT resources.Meanwhile,the charging strategies also achieve load balancing by dynamic selection of WoT resources.Finally,the open source blockchain platform Ethereum was used for the simulation and the simulation results show that CWoT-Share can flexibly adapt to the application environment and dynamically adjust strategies of resource access control and resource charging.展开更多
Network virtualization can effectively establish dedicated virtual networks to implement various network functions.However,the existing research works have some shortcomings,for example,although computing resource pro...Network virtualization can effectively establish dedicated virtual networks to implement various network functions.However,the existing research works have some shortcomings,for example,although computing resource properties of individual nodes are considered,node storage properties and the network topology properties are usually ignored in Virtual Network(VN)modelling,which leads to the inaccurate measurement of node availability and priority.In addition,most static virtual network mapping methods allocate fixed resources to users during the entire life cycle,and the users’actual resource requirements vary with the workload,which results in resource allocation redundancy.Based on the above analysis,in this paper,we propose a dynamic resource sharing virtual network mapping algorithm named NMA-PRS-VNE,first,we construct a new,more realistic network framework in which the properties of nodes include computing resources,storage resources and topology properties.In the node mapping process,three properties of the node are used to measure its mapping ability.Second,we consider the resources of adjacent nodes and links instead of the traditional method of measuring the availability and priority of nodes by considering only the resource properties,so as to more accurately select the physical mapping nodes that meet the constraints and conditions and improve the success rate of subsequent link mapping.Finally,we divide the resource requirements of Virtual Network Requests(VNRs)into basic subrequirements and variable sub-variable requirements to complete dynamic resource allocation.The former represents monopolizing resource requirements by the VNRs,while the latter represents shared resources by many VNRs with the probability of occupying resources,where we keep a balance between resource sharing and collision among users by calculating the collision probability.Simulation results show that the proposed NMAPRS-VNE can increase the average acceptance rate and network revenue by 15%and 38%,and reduce the network cost and link pressure by 25%and 17%.展开更多
To ensure the security of resource and intelligence sharing in 6G,blockchain has been widely adopted in wireless communications and applications.Although blockchain can ensure the traceability and non-tamperability of...To ensure the security of resource and intelligence sharing in 6G,blockchain has been widely adopted in wireless communications and applications.Although blockchain can ensure the traceability and non-tamperability of data in the concatenated blocks,it cannot guarantee the honest behaviors of users in the application before the generation of transactions.Thus,additional technologies are required to ensure that the source of blockchain data is reliable.In this paper,the detailed procedure is designed for the application-oriented task validation in the blockchainenhanced computing resource sharing and transactions in ultra dense networks(UDN).The corresponding queuing model is built and analyzed with the consideration of the wireless re-transmission and the probability of malicious deception by users.Based on the analysis results,the UDN deployment is optimized to save network cost while ensuring latency performance.Numerical results verify our analysis,and the optimized system deployment including the number and service capacities of both base stations and mobile edge computing(MEC)servers are also given with various system settings.展开更多
Environments with reciprocal patchiness of resources, in which the availability of two resources such as light and soil nutrients are patchily distributed in horizontal space and negatively correlated in each patch, a...Environments with reciprocal patchiness of resources, in which the availability of two resources such as light and soil nutrients are patchily distributed in horizontal space and negatively correlated in each patch, are common in many ecosystems. The strategies by which clonal plants adapt to this type of heterogeneous environment were examined in three stoloniferous herbs,Potentilla reptans L. var. sericophylla Franch., P. anserina L. and Halerpestes ruthenica (Jacq.) Qvcz., commonly inhabiting forest understories, grasslands and low saline meadows, respectively. As pairs of connected ramets were subjected to reciprocal patchiness of light and nutrients, stolon connection between the two ramets significantly enhanced biomass of both ramet growing in low light intensity but high soil nutrient condition (LH ramet) and ramet growing in high light intensity but low soil nutrient condition (HL ramet) as well as whole ramet pairs (consisting of LH ramets and HL ramets). Additionally, stolon connection greatly increased root/shoot ratio of LH ramet while significantly decreased that of HL ramet. The results indicate that a reciprocal transportation of resources between interconnected ramets and a functional specialization of ramets in uptake of abundant resources occurred. By resource sharing and functional specialization, clonal plants can efficiently acquire locally abundant resources and buffer the stress caused by reciprocal patchiness of resources.展开更多
A natural history museum is a museum for collection, researching and presenting natural environment and natural heritages about natural history. In the research, based on the analysis on necessity of university museum...A natural history museum is a museum for collection, researching and presenting natural environment and natural heritages about natural history. In the research, based on the analysis on necessity of university museums’ services to society in resources sharing, the difficulties and dilemmas were summarized in sharing resources of museums and the approaches for resources sharing were explored with the case of Natural History Museum of Zhengzhou Normal University in order to investigate the way for better services of university museum to the public.展开更多
Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on-...Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on- demand allocation of network resources are particularly important in Cloud computing. Ho- wever, nearly all-current available cloud com- puting platforms are either proprietary or their software infrastructure is invisible to the rese- arch community except for a few open-source platforms. For universities and research insti- tutes, more open and testable experimental plat- forms are needed in a lab-level with PCs. In this paper, a platform of infrastructure resou- rce sharing system (Platform as a Service (PaaS)) is developed in virtual Cloud comput- hug environment. Its architecture, core modules, main functions, design and operational envir- onment and applications are introduced in de- tail. It has good expandability and can impr- ove resource sharing and utilization and is app- lied to regular computer science teaching and research process.展开更多
Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mu...Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mutability to control the usage process and an architecture to illustrate how TC technologies support policy enforcement with bidirectional attestation. The properties required for attestation should include not only integrity measurement value of platform and related application, but also reputation of users and access history, in order to avoid the limitation of the existing approaches. To make a permission, it is required to evaluate both the authorization and conditions of the subject and the object in resource usage to ensure trustable resources to be transferred to trusted users and platform.展开更多
In recent years, the number of permanent residents in Chengdu, Sichuan Province, China has continued to grow, and the number of private cars keeps rising. A series of problems caused by difficult parking and random pa...In recent years, the number of permanent residents in Chengdu, Sichuan Province, China has continued to grow, and the number of private cars keeps rising. A series of problems caused by difficult parking and random parking in old communities are common. This paper will take the parking problem of the old community in <span style="font-family:Verdana;">Yingmenkou</span><span style="font-family:Verdana;"> community, Chengdu, China as an example to summarize the current situation and parking problems of the private car parking facilities in these old communities. Based on Chengdu’s current old community parking management policy, parking facility renovation </span><span style="font-family:Verdana;">and</span><span style="font-family:Verdana;"> expansion policy, </span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">this paper </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">research</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">es</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> and establish</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">es</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> a parking resource sharing model suitable for old communities. The simulation results show that this model has a small footprint and is easy to install and disassemble. It can be freely spliced and combined units according to the size of the old community and the needs of residents. It is suitable for old communities with no centralized parking lot and high parking demand by residents.</span></span></span>展开更多
Fast recovery and minimum utilization of resources are the two main criteria for determining the protection scheme quality. We address the problem of providing a hybrid protection approach on elastic optical networks ...Fast recovery and minimum utilization of resources are the two main criteria for determining the protection scheme quality. We address the problem of providing a hybrid protection approach on elastic optical networks under contiguity and continuity of available spectrum constraints. Two main hypotheses are used in this paper for backup paths computation. In the first case, it is assumed that backup paths resources are dedicated. In the second case, the assumption is that backup paths resources are available shared resources. The objective of the study is to minimize spectrum utilization to reduce blocking probability on a network. For this purpose, an efficient survivable Hybrid Protection Lightpath (HybPL) algorithm is proposed for providing shared or dedicated backup path protection based on the efficient energy calculation and resource availability. Traditional First-Fit and Best-Fit schemes are employed to search and assign the available spectrum resources. The simulation results show that HybPL presents better performance in terms of blocking probability, compared with the Minimum Resources Utilization Dedicated Protection (MRU-DP) algorithm which offers better performance than the Dedicated Protection (DP) algorithm.展开更多
The nature of networked manufacturing and agile manufacturing is to recognize enterprise resources timely and accurately. This paper mainly discusses an enterprise resource model method and the construction process. F...The nature of networked manufacturing and agile manufacturing is to recognize enterprise resources timely and accurately. This paper mainly discusses an enterprise resource model method and the construction process. Furthermore, the system frameworks of software and application are put forward to realize various enterprise resources management based on a resource business process. Thus, we ensure the integration and sharing of enterprise resources for the requirement of networked manufacturing.展开更多
Since the electronic resources and Internet Web sites became popular, distance education courses offered via the Internet could play an important role in providing global digital resources and teaching the knowledge o...Since the electronic resources and Internet Web sites became popular, distance education courses offered via the Internet could play an important role in providing global digital resources and teaching the knowledge of international library and information standards for bibliographic databases with electronic and web resources.This paper uses the example of the author's new online course: ILS 608 Cataloging and Development of a Digital Union Catalog for Ancient Chinese Books to demonstrate the global re...展开更多
The Intelligent Grouping and Resource Sharing (IGRS) standard is set to enable intelligent grouping, resource sharing and services collaboration among information devices. An IGRS system adopts open architecture, that...The Intelligent Grouping and Resource Sharing (IGRS) standard is set to enable intelligent grouping, resource sharing and services collaboration among information devices. An IGRS system adopts open architecture, that is, the devices abide by the IGRS standard are interoperable with devices following other standards such as Universal Plug and Play (UPnP). The IGRS supports multiple application frameworks and special applications. Developers can use an IGRS media application framework with various media format standards, such as AVS and MPEG-2, to develop multimedia applications. Applied among computers, consumer electronics, and communication devices, the IGRS standard can realize resource sharing and services collaboration in a certain range of wired or wireless network domain.展开更多
Standardization is the basis of e-government construction which aims to link organically government affair systems of different departments through standardized method and provide technical guidelines and specificatio...Standardization is the basis of e-government construction which aims to link organically government affair systems of different departments through standardized method and provide technical guidelines and specifications for collaborative work in all affair aspects. Standardized coordination and optimization can help to guarantee the safety and reliability of e-government construction and promote efficiency. This article discusses the achievements, existing problems and experience of Shandong e-government standardization.展开更多
Research on Web measurement and industrial collaboration in measurement fields in a wide-area and across-organizationally is accepted globally. This paper proposes a novel, scalable management architecture of measurem...Research on Web measurement and industrial collaboration in measurement fields in a wide-area and across-organizationally is accepted globally. This paper proposes a novel, scalable management architecture of measurement resources for the resource organization and resource access of the current wide-area collaborative measurement applications in the context of a grid. The complexity of the measurement management on a grid arises from the scale, dynamism, autonomy, heterogeneity, and distribution of the measurement systems and the relative data systems. This paper mainly discusses the interconnection, collaboration, and transparent access of the multi-measurement resources based on the proposed management architecture in the context of complexity. We first discuss the logical architecture used in the measurement fields, and then the resource management system is put at a high premium with layered architecture. Finally, the problems such as resource interconnection, sharing and collaboration are studied in the context of the proposed management environment. The typical applying instance is given to show the advancement of the proposed approach.展开更多
A feasible hierarchical structure of MG is introduced and an XML format to describe manufacturing resource, an embedded NC system is illustrated. An example of encapsulated resource sharing is given to demonstrate the...A feasible hierarchical structure of MG is introduced and an XML format to describe manufacturing resource, an embedded NC system is illustrated. An example of encapsulated resource sharing is given to demonstrate the processes involved in realizing a user's request for a CAD resource service through parallel design and computing.展开更多
From the perspective of information resource sharing, the authors investigated the ratio and degree of users' satisfaction with resource sharing among college libraries, public libraries and research libraries in ...From the perspective of information resource sharing, the authors investigated the ratio and degree of users' satisfaction with resource sharing among college libraries, public libraries and research libraries in Nanjing city. Based on the analysis and discussion about the findings, the authors summarized the library resource sharing system in satisfying users' information requirements, including its pros and cons. At last, further considerations have been provided on how to improve library resource sharing system in the region.展开更多
In the post-pandemic era,libraries need to improve the emergency support of electronic resources and establish a relatively perfect electronic resource support system in order to adapt to the construction goal of the ...In the post-pandemic era,libraries need to improve the emergency support of electronic resources and establish a relatively perfect electronic resource support system in order to adapt to the construction goal of the national emergency system as well as realize their own transformation and development.It must be realized through enhancing awareness and planning,strengthening policy support and top-level design,realizing rapid response and intelligent response,improving technical support,promoting resource synergy,integration,and sharing,strengthening community integration,as well as providing intelligent management and services.展开更多
文摘Wherever people live together in or near homelands that harbour joint natural resources such as forest, water, minerals, oil etc., they must collaborate, co-exist and share these resources irrespective of their genetic, social, cultural, and political peculiarities. This is not always the case when self-interest, ethnic divisions, elitist politics, economic interest and power tussle set in. The Nso and Oku people who reside in the Ngongbaa Forest area constitute an example of joint management of resources where at one period, their relationship over the management of the Oku Mountain Forest was cordial and at another, the relationship became conflictive. This study was designed to study the influence of the KIFP forest management policies on the Nso indigenous forest Management system in Ngongbaa Forest, and its implications. The data collected for the study was secured through the administration of a questionnaire to residents of 10 villages adjacent to the Ngongbaa Forest, and forest users who carried out livelihood activities there between 1963 and 2015. These forest user groups include beekeepers, rat trappers, grazers, mushroom gatherers, ground honey/tree honey harvesters, carvers, etc. The investigation also extended to the traditional leaders of Nso and Oku who are in charge of the land tenure systems. The findings show that the Oku Mountain Forest is jointly owned by the Nso and Oku people. The Nso own the eastern half of the forest known as Ngongbaa Forest while the Oku own the western half, known as the Kilum Forest. The cordial relationship that existed between these people ensured the conservation of the forest. But the conflicts that later set in, especially due to the creation of the Kilum Mountain Forest Project in 1987 later changed to the Kilum Ijim Forest Project (KIFP) in 1992 sidelined the local communities which was contrary to the dispositions of the new Cameroon forest law enacted in 1994. Thus, the indigenous conservation practices became ignored which the local population never digested well. This seriously jeopardized the wellbeing of the forest in general.
基金supported by the National Natural Science Foundation of China(NSFC)[grant numbers 62172377,61872205]the Shandong Provincial Natural Science Foundation[grant number ZR2019MF018]the Startup Research Foundation for Distinguished Scholars No.202112016.
文摘The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense resource allocation with multi-armed bandits to maximize the network's overall benefit.Firstly,we propose the method for dynamic setting of node defense resource thresholds to obtain the defender(attacker)benefit function of edge servers(nodes)and distribution.Secondly,we design a defense resource sharing mechanism for neighboring nodes to obtain the defense capability of nodes.Subsequently,we use the decomposability and Lipschitz conti-nuity of the defender's total expected utility to reduce the difference between the utility's discrete and continuous arms and analyze the difference theoretically.Finally,experimental results show that the method maximizes the defender's total expected utility and reduces the difference between the discrete and continuous arms of the utility.
文摘Service and information resources are two kinds of major shared resources in virtual enterprises, where, service resources include third party’s service resources and enterprise’s legacy service resources,and information resources include database resources and file resources. Since service and information resources have distributed, autonomic, remotely bound as well as some other similar characteristics, an implementation mechanism on managing shared resources based on UDDI are presented. XML instances are used to describe resources authorization information, WSDL based special XML instance represents information resource metadata, and these XML instances are referenced by tModel for realizing the purpose of managing shared resources metadata based on UDDI.
基金This study is funded by“The National Natural Science Foundation of China(No.61972211,No.61771258)”.
文摘Web of Things(WoT)resources are not only numerous,but also have a wide range of applications and deployments.The centralized WoT resource sharing mechanism lacks flexibility and scalability,and hence cannot satisfy requirement of distributed resource sharing in large-scale environment.In response to this problem,a trusted and secure mechanism for WoT resources sharing based on context and blockchain(CWoT-Share)was proposed.Firstly,the mechanism can respond quickly to the changes of the application environment by dynamically determining resource access control rules according to the context.Then,the flexible resource charging strategies,which reduced the fees paid by the users who shared more resources and increased the fees paid by users who frequently used resources maliciously,were used to fulfill efficient sharing of WoT resources.Meanwhile,the charging strategies also achieve load balancing by dynamic selection of WoT resources.Finally,the open source blockchain platform Ethereum was used for the simulation and the simulation results show that CWoT-Share can flexibly adapt to the application environment and dynamically adjust strategies of resource access control and resource charging.
基金We are grateful for the support of the Natural Science Foundation of Shandong Province(No.ZR2020LZH008,ZR2020QF112,ZR2019MF071)the National Natural Science Foundation of China(61373149).
文摘Network virtualization can effectively establish dedicated virtual networks to implement various network functions.However,the existing research works have some shortcomings,for example,although computing resource properties of individual nodes are considered,node storage properties and the network topology properties are usually ignored in Virtual Network(VN)modelling,which leads to the inaccurate measurement of node availability and priority.In addition,most static virtual network mapping methods allocate fixed resources to users during the entire life cycle,and the users’actual resource requirements vary with the workload,which results in resource allocation redundancy.Based on the above analysis,in this paper,we propose a dynamic resource sharing virtual network mapping algorithm named NMA-PRS-VNE,first,we construct a new,more realistic network framework in which the properties of nodes include computing resources,storage resources and topology properties.In the node mapping process,three properties of the node are used to measure its mapping ability.Second,we consider the resources of adjacent nodes and links instead of the traditional method of measuring the availability and priority of nodes by considering only the resource properties,so as to more accurately select the physical mapping nodes that meet the constraints and conditions and improve the success rate of subsequent link mapping.Finally,we divide the resource requirements of Virtual Network Requests(VNRs)into basic subrequirements and variable sub-variable requirements to complete dynamic resource allocation.The former represents monopolizing resource requirements by the VNRs,while the latter represents shared resources by many VNRs with the probability of occupying resources,where we keep a balance between resource sharing and collision among users by calculating the collision probability.Simulation results show that the proposed NMAPRS-VNE can increase the average acceptance rate and network revenue by 15%and 38%,and reduce the network cost and link pressure by 25%and 17%.
文摘To ensure the security of resource and intelligence sharing in 6G,blockchain has been widely adopted in wireless communications and applications.Although blockchain can ensure the traceability and non-tamperability of data in the concatenated blocks,it cannot guarantee the honest behaviors of users in the application before the generation of transactions.Thus,additional technologies are required to ensure that the source of blockchain data is reliable.In this paper,the detailed procedure is designed for the application-oriented task validation in the blockchainenhanced computing resource sharing and transactions in ultra dense networks(UDN).The corresponding queuing model is built and analyzed with the consideration of the wireless re-transmission and the probability of malicious deception by users.Based on the analysis results,the UDN deployment is optimized to save network cost while ensuring latency performance.Numerical results verify our analysis,and the optimized system deployment including the number and service capacities of both base stations and mobile edge computing(MEC)servers are also given with various system settings.
文摘Environments with reciprocal patchiness of resources, in which the availability of two resources such as light and soil nutrients are patchily distributed in horizontal space and negatively correlated in each patch, are common in many ecosystems. The strategies by which clonal plants adapt to this type of heterogeneous environment were examined in three stoloniferous herbs,Potentilla reptans L. var. sericophylla Franch., P. anserina L. and Halerpestes ruthenica (Jacq.) Qvcz., commonly inhabiting forest understories, grasslands and low saline meadows, respectively. As pairs of connected ramets were subjected to reciprocal patchiness of light and nutrients, stolon connection between the two ramets significantly enhanced biomass of both ramet growing in low light intensity but high soil nutrient condition (LH ramet) and ramet growing in high light intensity but low soil nutrient condition (HL ramet) as well as whole ramet pairs (consisting of LH ramets and HL ramets). Additionally, stolon connection greatly increased root/shoot ratio of LH ramet while significantly decreased that of HL ramet. The results indicate that a reciprocal transportation of resources between interconnected ramets and a functional specialization of ramets in uptake of abundant resources occurred. By resource sharing and functional specialization, clonal plants can efficiently acquire locally abundant resources and buffer the stress caused by reciprocal patchiness of resources.
基金Supported by Henan Fundamental and Advanced Technology Program(082300460100)Zhengzhou Key Technology Research&Development Program(10PTGN449)Zhengzhou Normal University Program(2012075)~~
文摘A natural history museum is a museum for collection, researching and presenting natural environment and natural heritages about natural history. In the research, based on the analysis on necessity of university museums’ services to society in resources sharing, the difficulties and dilemmas were summarized in sharing resources of museums and the approaches for resources sharing were explored with the case of Natural History Museum of Zhengzhou Normal University in order to investigate the way for better services of university museum to the public.
基金supported by the Coalition for National Science Fundingunder Grant No.61150110486the Central University Funding under Grant No.ZYGX2013J073
文摘Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on- demand allocation of network resources are particularly important in Cloud computing. Ho- wever, nearly all-current available cloud com- puting platforms are either proprietary or their software infrastructure is invisible to the rese- arch community except for a few open-source platforms. For universities and research insti- tutes, more open and testable experimental plat- forms are needed in a lab-level with PCs. In this paper, a platform of infrastructure resou- rce sharing system (Platform as a Service (PaaS)) is developed in virtual Cloud comput- hug environment. Its architecture, core modules, main functions, design and operational envir- onment and applications are introduced in de- tail. It has good expandability and can impr- ove resource sharing and utilization and is app- lied to regular computer science teaching and research process.
基金the National Natural Science Foundation of China (60673071, 60743003,90718005,90718006)the National High Technology Research and Development Program of China (2006AA01Z442,2007AA01Z411)
文摘Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mutability to control the usage process and an architecture to illustrate how TC technologies support policy enforcement with bidirectional attestation. The properties required for attestation should include not only integrity measurement value of platform and related application, but also reputation of users and access history, in order to avoid the limitation of the existing approaches. To make a permission, it is required to evaluate both the authorization and conditions of the subject and the object in resource usage to ensure trustable resources to be transferred to trusted users and platform.
文摘In recent years, the number of permanent residents in Chengdu, Sichuan Province, China has continued to grow, and the number of private cars keeps rising. A series of problems caused by difficult parking and random parking in old communities are common. This paper will take the parking problem of the old community in <span style="font-family:Verdana;">Yingmenkou</span><span style="font-family:Verdana;"> community, Chengdu, China as an example to summarize the current situation and parking problems of the private car parking facilities in these old communities. Based on Chengdu’s current old community parking management policy, parking facility renovation </span><span style="font-family:Verdana;">and</span><span style="font-family:Verdana;"> expansion policy, </span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">this paper </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">research</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">es</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> and establish</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">es</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> a parking resource sharing model suitable for old communities. The simulation results show that this model has a small footprint and is easy to install and disassemble. It can be freely spliced and combined units according to the size of the old community and the needs of residents. It is suitable for old communities with no centralized parking lot and high parking demand by residents.</span></span></span>
文摘Fast recovery and minimum utilization of resources are the two main criteria for determining the protection scheme quality. We address the problem of providing a hybrid protection approach on elastic optical networks under contiguity and continuity of available spectrum constraints. Two main hypotheses are used in this paper for backup paths computation. In the first case, it is assumed that backup paths resources are dedicated. In the second case, the assumption is that backup paths resources are available shared resources. The objective of the study is to minimize spectrum utilization to reduce blocking probability on a network. For this purpose, an efficient survivable Hybrid Protection Lightpath (HybPL) algorithm is proposed for providing shared or dedicated backup path protection based on the efficient energy calculation and resource availability. Traditional First-Fit and Best-Fit schemes are employed to search and assign the available spectrum resources. The simulation results show that HybPL presents better performance in terms of blocking probability, compared with the Minimum Resources Utilization Dedicated Protection (MRU-DP) algorithm which offers better performance than the Dedicated Protection (DP) algorithm.
文摘The nature of networked manufacturing and agile manufacturing is to recognize enterprise resources timely and accurately. This paper mainly discusses an enterprise resource model method and the construction process. Furthermore, the system frameworks of software and application are put forward to realize various enterprise resources management based on a resource business process. Thus, we ensure the integration and sharing of enterprise resources for the requirement of networked manufacturing.
文摘Since the electronic resources and Internet Web sites became popular, distance education courses offered via the Internet could play an important role in providing global digital resources and teaching the knowledge of international library and information standards for bibliographic databases with electronic and web resources.This paper uses the example of the author's new online course: ILS 608 Cataloging and Development of a Digital Union Catalog for Ancient Chinese Books to demonstrate the global re...
文摘The Intelligent Grouping and Resource Sharing (IGRS) standard is set to enable intelligent grouping, resource sharing and services collaboration among information devices. An IGRS system adopts open architecture, that is, the devices abide by the IGRS standard are interoperable with devices following other standards such as Universal Plug and Play (UPnP). The IGRS supports multiple application frameworks and special applications. Developers can use an IGRS media application framework with various media format standards, such as AVS and MPEG-2, to develop multimedia applications. Applied among computers, consumer electronics, and communication devices, the IGRS standard can realize resource sharing and services collaboration in a certain range of wired or wireless network domain.
文摘Standardization is the basis of e-government construction which aims to link organically government affair systems of different departments through standardized method and provide technical guidelines and specifications for collaborative work in all affair aspects. Standardized coordination and optimization can help to guarantee the safety and reliability of e-government construction and promote efficiency. This article discusses the achievements, existing problems and experience of Shandong e-government standardization.
基金The paper is supported by National Natural Science Foundation of China under Grant No50275061National High Technology Research and Development Program in China under Contract No2001AA423230
文摘Research on Web measurement and industrial collaboration in measurement fields in a wide-area and across-organizationally is accepted globally. This paper proposes a novel, scalable management architecture of measurement resources for the resource organization and resource access of the current wide-area collaborative measurement applications in the context of a grid. The complexity of the measurement management on a grid arises from the scale, dynamism, autonomy, heterogeneity, and distribution of the measurement systems and the relative data systems. This paper mainly discusses the interconnection, collaboration, and transparent access of the multi-measurement resources based on the proposed management architecture in the context of complexity. We first discuss the logical architecture used in the measurement fields, and then the resource management system is put at a high premium with layered architecture. Finally, the problems such as resource interconnection, sharing and collaboration are studied in the context of the proposed management environment. The typical applying instance is given to show the advancement of the proposed approach.
基金Supported by the Natural Science Foundation of China (500335020)
文摘A feasible hierarchical structure of MG is introduced and an XML format to describe manufacturing resource, an embedded NC system is illustrated. An example of encapsulated resource sharing is given to demonstrate the processes involved in realizing a user's request for a CAD resource service through parallel design and computing.
基金supported by the National Social Science Foundation of China(Grant No.06BTQ017)
文摘From the perspective of information resource sharing, the authors investigated the ratio and degree of users' satisfaction with resource sharing among college libraries, public libraries and research libraries in Nanjing city. Based on the analysis and discussion about the findings, the authors summarized the library resource sharing system in satisfying users' information requirements, including its pros and cons. At last, further considerations have been provided on how to improve library resource sharing system in the region.
文摘In the post-pandemic era,libraries need to improve the emergency support of electronic resources and establish a relatively perfect electronic resource support system in order to adapt to the construction goal of the national emergency system as well as realize their own transformation and development.It must be realized through enhancing awareness and planning,strengthening policy support and top-level design,realizing rapid response and intelligent response,improving technical support,promoting resource synergy,integration,and sharing,strengthening community integration,as well as providing intelligent management and services.