Recently,an innovative trend like cloud computing has progressed quickly in InformationTechnology.For a background of distributed networks,the extensive sprawl of internet resources on the Web and the increasing numbe...Recently,an innovative trend like cloud computing has progressed quickly in InformationTechnology.For a background of distributed networks,the extensive sprawl of internet resources on the Web and the increasing number of service providers helped cloud computing technologies grow into a substantial scaled Information Technology service model.The cloud computing environment extracts the execution details of services and systems from end-users and developers.Additionally,through the system’s virtualization accomplished using resource pooling,cloud computing resources become more accessible.The attempt to design and develop a solution that assures reliable and protected authentication and authorization service in such cloud environments is described in this paper.With the help of multi-agents,we attempt to represent Open-Identity(ID)design to find a solution that would offer trustworthy and secured authentication and authorization services to software services based on the cloud.This research aims to determine how authentication and authorization services were provided in an agreeable and preventive manner.Based on attack-oriented threat model security,the evaluation works.By considering security for both authentication and authorization systems,possible security threats are analyzed by the proposed security systems.展开更多
In Cognitive Radio(CR)networks,there is a common assumption that secondary devices always obey commands and are under full control.However,this assumption may become unrealistic for future CR networks with more intell...In Cognitive Radio(CR)networks,there is a common assumption that secondary devices always obey commands and are under full control.However,this assumption may become unrealistic for future CR networks with more intelligent,sophisticated and autonomous devices.Imperfect spectrum sensing and illegal behaviour of secondary users can result in harmful interference to primary users.In this paper,we propose a novel concept of Proactive-Optimization CR(POCR)networks,in which highly intelligent secondary users always try to proactively consider potentially harmful interference when making their behaviour decision.Furthermore,we propose an optimal transmission behaviour decision scheme for secondary users in POCR networks considering the possible harmful interference and penalties from primary users.Specifically,we formulate the system as a Partially-Observable Markov Decision Process(POMDP)problem.With this formulation,a low-complexity dynamic programming framework is presented to obtain the optimal behaviour policy.Extensive simulation results are presented to illustrate the significant performance improvement of the proposed scheme compared with the existing one that ignores the proactive-optimization of secondary users.展开更多
For telecommunication operators, how to improve the utilization of bandwidth resources is always a problem which worthy of study, nowadays, this issue has become more and more important, since the traffic load burstin...For telecommunication operators, how to improve the utilization of bandwidth resources is always a problem which worthy of study, nowadays, this issue has become more and more important, since the traffic load bursting in the mobile Internet. So the key to solving this problem is that we need to find a kind of traffic model to predict the traffic load that users need. According to the predicted traffic load to allocate bandwidth to each base station dynamically.But the traffic consumption behavior of a single base station is random, it is difficult to predict[ 1 ]. For this reason, we based on reality that, when the user moves, it may get traffic load from different base stations, therefore, there will have some kind of relationship between those base stations.We use this relationship to establish a kind of Spatial Collaborative Network.consequently, we make use of stability algorithm to divided those base station cluster into different communities, According to the traffic load usage rules which these communities indicated to us, we get a traffic model.At the same time, we studied bow to use this traffic model in the future networks to dynamically allocate bandwidth resources, then we propose a new kind of EPS architecture based on SDN, on this platform, we can deploy our strategy through it's programmable interface.Finally, we designed an experiment to test the performance of our dynamic strategy, and the result shows that our method enables bandwidth utilization has been greatly improved.展开更多
2022 The paper seeks to demonstrates the likelihood of embedding a 3D gaze point on a 3D visual field,the visual field is inform of a game console where the user has to play from one level to the other by overcoming o...2022 The paper seeks to demonstrates the likelihood of embedding a 3D gaze point on a 3D visual field,the visual field is inform of a game console where the user has to play from one level to the other by overcoming obstacles that will lead them to the next level.Complex game interface is sometimes difficult for the player to progress to next level of the game and the developers also find it difficult to regulate the game for an average player.The model serves as an analytical tool for game adaptations and also players can track their response to the game.Custom eye tracking and 3D object tracking algorithms were developed to enhance the analysis of the procedure.This is a part of the contributions to user interface design in the aspect of visual transparency.The development and testing of human computer interaction uses and application is more easily investigated than ever,part of the contribution to this is the embedding of 3-D gaze point on a 3-D visual field.This could be used in a number of applications,for instance in medical applications that includes long and short sightedness diagnosis and treatment.Experiments and Test were conducted on five different episodes of user attributes,result show that fixation points and pupil changes are the two most likely user attributes that contributes most significantly in the performance of the custom eye tracking algorithm the study.As the advancement in development of eye movement algorithm continues user attributes that showed the least likely appearance will prove to be redundant.展开更多
文摘Recently,an innovative trend like cloud computing has progressed quickly in InformationTechnology.For a background of distributed networks,the extensive sprawl of internet resources on the Web and the increasing number of service providers helped cloud computing technologies grow into a substantial scaled Information Technology service model.The cloud computing environment extracts the execution details of services and systems from end-users and developers.Additionally,through the system’s virtualization accomplished using resource pooling,cloud computing resources become more accessible.The attempt to design and develop a solution that assures reliable and protected authentication and authorization service in such cloud environments is described in this paper.With the help of multi-agents,we attempt to represent Open-Identity(ID)design to find a solution that would offer trustworthy and secured authentication and authorization services to software services based on the cloud.This research aims to determine how authentication and authorization services were provided in an agreeable and preventive manner.Based on attack-oriented threat model security,the evaluation works.By considering security for both authentication and authorization systems,possible security threats are analyzed by the proposed security systems.
基金supported in part by the National Natural Science Foundation of China under Grants No. 61101113,No. 61072088,No.61201198the Beijing Natural Science Foundation under Grants No. 4132007,No. 4132015,No. 4132019the Research Fund for the Doctoral Program of Higher Education of China under Grant No. 20111103120017
文摘In Cognitive Radio(CR)networks,there is a common assumption that secondary devices always obey commands and are under full control.However,this assumption may become unrealistic for future CR networks with more intelligent,sophisticated and autonomous devices.Imperfect spectrum sensing and illegal behaviour of secondary users can result in harmful interference to primary users.In this paper,we propose a novel concept of Proactive-Optimization CR(POCR)networks,in which highly intelligent secondary users always try to proactively consider potentially harmful interference when making their behaviour decision.Furthermore,we propose an optimal transmission behaviour decision scheme for secondary users in POCR networks considering the possible harmful interference and penalties from primary users.Specifically,we formulate the system as a Partially-Observable Markov Decision Process(POMDP)problem.With this formulation,a low-complexity dynamic programming framework is presented to obtain the optimal behaviour policy.Extensive simulation results are presented to illustrate the significant performance improvement of the proposed scheme compared with the existing one that ignores the proactive-optimization of secondary users.
基金part of the National Natural Science Foundation of China(NSFC)under Grant No.61371126the Independent Research Program of Central Universities under Grant No.2042014kf0256+2 种基金the National High Technology Research and Development Program of China(863 Program)under Grant No.2014AA01A707the National Key Basic Research Program of China(973 Program)under Grant No.2011CB707106Applied Basic Research Programs of Wuhan under Grant No.2014010101010026
文摘For telecommunication operators, how to improve the utilization of bandwidth resources is always a problem which worthy of study, nowadays, this issue has become more and more important, since the traffic load bursting in the mobile Internet. So the key to solving this problem is that we need to find a kind of traffic model to predict the traffic load that users need. According to the predicted traffic load to allocate bandwidth to each base station dynamically.But the traffic consumption behavior of a single base station is random, it is difficult to predict[ 1 ]. For this reason, we based on reality that, when the user moves, it may get traffic load from different base stations, therefore, there will have some kind of relationship between those base stations.We use this relationship to establish a kind of Spatial Collaborative Network.consequently, we make use of stability algorithm to divided those base station cluster into different communities, According to the traffic load usage rules which these communities indicated to us, we get a traffic model.At the same time, we studied bow to use this traffic model in the future networks to dynamically allocate bandwidth resources, then we propose a new kind of EPS architecture based on SDN, on this platform, we can deploy our strategy through it's programmable interface.Finally, we designed an experiment to test the performance of our dynamic strategy, and the result shows that our method enables bandwidth utilization has been greatly improved.
文摘2022 The paper seeks to demonstrates the likelihood of embedding a 3D gaze point on a 3D visual field,the visual field is inform of a game console where the user has to play from one level to the other by overcoming obstacles that will lead them to the next level.Complex game interface is sometimes difficult for the player to progress to next level of the game and the developers also find it difficult to regulate the game for an average player.The model serves as an analytical tool for game adaptations and also players can track their response to the game.Custom eye tracking and 3D object tracking algorithms were developed to enhance the analysis of the procedure.This is a part of the contributions to user interface design in the aspect of visual transparency.The development and testing of human computer interaction uses and application is more easily investigated than ever,part of the contribution to this is the embedding of 3-D gaze point on a 3-D visual field.This could be used in a number of applications,for instance in medical applications that includes long and short sightedness diagnosis and treatment.Experiments and Test were conducted on five different episodes of user attributes,result show that fixation points and pupil changes are the two most likely user attributes that contributes most significantly in the performance of the custom eye tracking algorithm the study.As the advancement in development of eye movement algorithm continues user attributes that showed the least likely appearance will prove to be redundant.
基金国家自然科学基金(the National Natural Science Foundation of China under Grant No.60673187)国家重点基础研究发展规划(973)(the National Grand Fundamental Research 973 Program of China under Grant No.2006CB708301)+1 种基金教育部科技创新培育重点项目(No.707005)河北省科学技术研究与发展指导计划项目资助(No.07213570)