In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pa...In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pages. Our framework model consists of three sub-models: one for user file access, one for web pages, and one for storage servers. Web pages are assumed to consist of different types and sizes of objects, which are characterized using several categories: articles, media, and mosaics. The model is implemented with a discrete event simulation and then used to investigate the performance of our system over a variety of parameters in our model. Our performance measure of choice is mean response time and by varying the composition of web pages through our categories, we find that our framework model is able to capture a wide range of conditions that serve as a basis for generating a variety of user request patterns. In addition, we are able to establish a set of parameters that can be used as base cases. One of the goals of this research is for the framework model to be general enough that the parameters can be varied such that it can serve as input for investigating other distributed applications that require the generation of user request access patterns.展开更多
Hanoi’s rapid urbanization has led to a surge in private vehicle ownership, particularly motorcycles, amidst inadequate public transportation infrastructure. Despite government efforts, many still prefer motorized tr...Hanoi’s rapid urbanization has led to a surge in private vehicle ownership, particularly motorcycles, amidst inadequate public transportation infrastructure. Despite government efforts, many still prefer motorized transport, citing mobility and safety concerns, exacerbated by insufficient pedestrian infrastructure. This study examines the motivations behind this reliance on motorized vehicles, particularly motorcycles, in Hanoi. Findings reveal safety and convenience as primary factors driving motorized transport use, especially for accessing bus stations. Economic incentives could promote non-motorized travel and public transport adoption. Policy implications highlight the importance of addressing economic factors and improving access infrastructure to manage motorized vehicle reliance and foster sustainable urban mobility in Hanoi.展开更多
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario...Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication.展开更多
This paper outlined a Non-Orthogonal Multiple Access (NOMA) grouping transmission scheme for cognitive radio networks. To address the problems of small channel gain difference of the middle part users caused by the tr...This paper outlined a Non-Orthogonal Multiple Access (NOMA) grouping transmission scheme for cognitive radio networks. To address the problems of small channel gain difference of the middle part users caused by the traditional far-near pairing algorithm, and the low transmission rate of the traditional Orthogonal Multiple Access (OMA) transmission, a joint pairing algorithm was proposed, which provided multiple pairing schemes according to the actual scene. Firstly, the secondary users were sorted according to their channel gain, and then different secondary user groups were divided, and the far-near pairing combined with (Uniform Channel Gain Difference (UCGD) algorithm was used to group the secondary users. After completing the user pairing, the power allocation problem was solved. Finally, the simulation data results showed that the proposed algorithm can effectively improve the system transmission rate.展开更多
在基于非正交多址接入技术的多用户下行室内可见光通信(Visible light communication system based on non⁃orthogonal multiple access technology,VLC⁃NOMA)系统中,针对和速率与用户公平性冲突的问题,提出一种基于加权和速率最大化的...在基于非正交多址接入技术的多用户下行室内可见光通信(Visible light communication system based on non⁃orthogonal multiple access technology,VLC⁃NOMA)系统中,针对和速率与用户公平性冲突的问题,提出一种基于加权和速率最大化的迭代功率分配方案。该方案以最大化加权和速率为目标,可通过改变权重因子来调节用户公平性。由于目标问题属于非凸优化问题,通过辅助变量法和凸优化理论将该非凸问题转化为凹问题,再通过拉格朗日对偶法进行求解,并根据问题的解设计了一种迭代功率分配算法。对所提算法的收敛性、系统和速率以及用户公平性进行了仿真。结果表明,所提迭代功率分配算法具有良好的收敛性,相较于VLC⁃OMA系统,VLC⁃NOMA系统能够获得更好的和速率性能。通过调整权重因子,在牺牲较小系统和速率的情况下能够获得比现有功率分配方案更好的系统和速率与用户公平性。展开更多
文摘In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pages. Our framework model consists of three sub-models: one for user file access, one for web pages, and one for storage servers. Web pages are assumed to consist of different types and sizes of objects, which are characterized using several categories: articles, media, and mosaics. The model is implemented with a discrete event simulation and then used to investigate the performance of our system over a variety of parameters in our model. Our performance measure of choice is mean response time and by varying the composition of web pages through our categories, we find that our framework model is able to capture a wide range of conditions that serve as a basis for generating a variety of user request patterns. In addition, we are able to establish a set of parameters that can be used as base cases. One of the goals of this research is for the framework model to be general enough that the parameters can be varied such that it can serve as input for investigating other distributed applications that require the generation of user request access patterns.
文摘Hanoi’s rapid urbanization has led to a surge in private vehicle ownership, particularly motorcycles, amidst inadequate public transportation infrastructure. Despite government efforts, many still prefer motorized transport, citing mobility and safety concerns, exacerbated by insufficient pedestrian infrastructure. This study examines the motivations behind this reliance on motorized vehicles, particularly motorcycles, in Hanoi. Findings reveal safety and convenience as primary factors driving motorized transport use, especially for accessing bus stations. Economic incentives could promote non-motorized travel and public transport adoption. Policy implications highlight the importance of addressing economic factors and improving access infrastructure to manage motorized vehicle reliance and foster sustainable urban mobility in Hanoi.
文摘Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication.
文摘This paper outlined a Non-Orthogonal Multiple Access (NOMA) grouping transmission scheme for cognitive radio networks. To address the problems of small channel gain difference of the middle part users caused by the traditional far-near pairing algorithm, and the low transmission rate of the traditional Orthogonal Multiple Access (OMA) transmission, a joint pairing algorithm was proposed, which provided multiple pairing schemes according to the actual scene. Firstly, the secondary users were sorted according to their channel gain, and then different secondary user groups were divided, and the far-near pairing combined with (Uniform Channel Gain Difference (UCGD) algorithm was used to group the secondary users. After completing the user pairing, the power allocation problem was solved. Finally, the simulation data results showed that the proposed algorithm can effectively improve the system transmission rate.
文摘在基于非正交多址接入技术的多用户下行室内可见光通信(Visible light communication system based on non⁃orthogonal multiple access technology,VLC⁃NOMA)系统中,针对和速率与用户公平性冲突的问题,提出一种基于加权和速率最大化的迭代功率分配方案。该方案以最大化加权和速率为目标,可通过改变权重因子来调节用户公平性。由于目标问题属于非凸优化问题,通过辅助变量法和凸优化理论将该非凸问题转化为凹问题,再通过拉格朗日对偶法进行求解,并根据问题的解设计了一种迭代功率分配算法。对所提算法的收敛性、系统和速率以及用户公平性进行了仿真。结果表明,所提迭代功率分配算法具有良好的收敛性,相较于VLC⁃OMA系统,VLC⁃NOMA系统能够获得更好的和速率性能。通过调整权重因子,在牺牲较小系统和速率的情况下能够获得比现有功率分配方案更好的系统和速率与用户公平性。