Currently, under the cloud service architecture, the increasing importance of network security and security issues are still emerging. With the rapid development of the network platform, it is connected to the number ...Currently, under the cloud service architecture, the increasing importance of network security and security issues are still emerging. With the rapid development of the network platform, it is connected to the number and size of the trusted computing environment for all kinds of applications that are rapidly expanding, ever-changing network health, network time being emergencies, assault, failure, threat of disaster, its safety, survivability and availability of face serious challenges. Although TNC Working Group made safe and reliable framework from the network access layer, it is not at the level of user access, system access levels and further given the level of situational awareness and effective solutions.展开更多
With the progress of the semiconductor industry,the resistive random-access memory(RAM) has drawn increasing attention.The discovery of the memristor has brought much attention to this study.Research has focused on ...With the progress of the semiconductor industry,the resistive random-access memory(RAM) has drawn increasing attention.The discovery of the memristor has brought much attention to this study.Research has focused on the resistive switching characteristics of different materials and the analysis of resistive switching mechanisms.We discuss the resistive switching mechanisms of different materials in this paper and analyze the differences of those mechanisms from the view point of circuitry to establish their respective circuit models.Finally,simulations are presented.We give the prospect of using different materials in resistive RAM on account of their resistive switching mechanisms,which are applied to explain their resistive switchings.展开更多
Spatial equality of access to basic public services, especially medical care services which are directly related to life safety, is the first step to achieve the goal of equalization of basic public services for all t...Spatial equality of access to basic public services, especially medical care services which are directly related to life safety, is the first step to achieve the goal of equalization of basic public services for all the people proposed by central government of China. Using the spatial analysis and the statistical analysis, this study evaluates the spatial differentiation of medical care facilities accessibility by constructing STT(Shortest Travel-Time) and SAI(Spatial Accessibility Index). And then this study explores the neighborhood effects on the medical care facilities accessibility in Beijing, with a particular focus on the effect of neighborhood migrant proportion by constructing spatial dependent regression model. The spatial accessibility analysis of medical care facilities show that the spatial distribution of medical care facilities was basically consistent with administrative regions but not with population demands. Bivariate LISA cluster maps identify that suburban areas are the overlapped clusters of high percent of migrants and limited medical care services. This is associated with the public service allocation rule in China, which stresses equality within urban areas and within rural areas but overlooks equality between urban areas and rural areas; and stresses local resident demands but overlooks migrant demands. To estimate the effects on medical care accessibility of neighborhood migrant proportion, spatial dependence models are applied due to spatial dependence of accessibility of medical care facilities. The regression results show that neighborhoods with high percent of migrants, even conditioning on neighborhood SES, are related to limited spatial accessibility of medical care services. Besides neighborhood characteristics, another important factor influencing spatial accessibility of medical care services is the process of spatial spillover effects. This indicates that the attenuate accessibility of medical care services for migrants is not only because of their own constraints but also because of their proximity to other disadvantaged neighborhoods. Therefore, it is urgently needed to increase the medical facilities in the suburban areas, to take into account migrants' demands and to reduce residential segregation between local residents and migrants for local governments to achieve the goal of equalization of medical care service.展开更多
With the rapid development of 5G NR(New Radio),the explosive increment of traffic amount is calling the utilization of unlicensed band.3GPP has proposed LAA(Licensed Assisted Access)to use LTE in unlicensed band and p...With the rapid development of 5G NR(New Radio),the explosive increment of traffic amount is calling the utilization of unlicensed band.3GPP has proposed LAA(Licensed Assisted Access)to use LTE in unlicensed band and pointed out that NR-U(NR-Unlicensed)can reuse most designs of it.However,the existing channel access mechanism of LAA is conservative under the coexistence scenario of NR-U,which leads to the waste of time resource.To address the problem this paper proposes a hybrid channel access mechanism to take advantage of the LBT(Listen-Before-Talk)mechanism of LAA when channel is quite busy and transmit directly with reduced power when it is relatively idle.The channel busy degree is judged by a series of periodically updated adaptive thresholds.System-level simulation verifies that under the coexistence scenario of NR-U the proposed mechanism can achieve higher UPT(User Perceived Throughput)and lower delay than other channel access mechanisms.展开更多
The main challenge in AI governance today is striking a balance between controlling AI dangers and fostering AI innovation.Regulators in a number of nations have progressively extended the regulatory sandbox,which was...The main challenge in AI governance today is striking a balance between controlling AI dangers and fostering AI innovation.Regulators in a number of nations have progressively extended the regulatory sandbox,which was first implemented in the banking sector,to AI governance in an effort to reduce the conflict between regulation and innovation.The AI regulatory sandbox is a new and feasible route for AI governance in China that not only helps to manage the risks of technology application but also prevents inhibiting AI innovation.It keeps inventors'trial-and-error tolerance space inside the regulatory purview while offering a controlled setting for the development and testing of novel AI that hasn't yet been put on the market.By providing full-cycle governance of AI with the principles of agility and inclusive prudence,the regulatory sandbox offers an alternative to the conventional top-down hard regulation,expost regulation,and tight regulation.However,the current system also has inherent limitations and practical obstacles that need to be overcome by a more rational and effective approach.To achieve its positive impact on AI governance,the AI regulatory sandbox system should build and improve the access and exit mechanism,the coordination mechanism between the sandbox and personal information protection,and the mechanisms of exemption,disclosure,and communication.展开更多
The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initiall...The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT.展开更多
针对IEEE802.11e Medium Access Control层的QoS机制高负载时存在远端节点冲突和低优先级业务资源被耗尽的问题,提出在牺牲较小带宽的基础上增加一条忙音信道,取代CTS帧在数据信道上的广播,减少远端节点的冲突.仿真结果表明,该方案具有...针对IEEE802.11e Medium Access Control层的QoS机制高负载时存在远端节点冲突和低优先级业务资源被耗尽的问题,提出在牺牲较小带宽的基础上增加一条忙音信道,取代CTS帧在数据信道上的广播,减少远端节点的冲突.仿真结果表明,该方案具有较小的冲突概率,有效地减少了远端节点冲突.同时提出一个解决公平性问题的新思路:在避退时间发送忙音抢占信道,以期提高低优先级业务的接入概率.展开更多
As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure ...As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes.展开更多
In this paper, the effect of imperfect channel state information at the receiver, which is caused by noise and other interference, on the multi-access channel capacity is analysed through a statistical-mechanical appr...In this paper, the effect of imperfect channel state information at the receiver, which is caused by noise and other interference, on the multi-access channel capacity is analysed through a statistical-mechanical approach. Replica analyses focus on analytically studying how the minimum mean square error (MMSE) channel estimation error appears in a multiuser channel capacity formula. And the relevant mathematical expressions are derived. At the same time, numerical simulation results are demonstrated to validate the Replica analyses. The simulation results show how the system parameters, such as channel estimation error, system load and signal-to-noise ratio, affect the channel capacity.展开更多
Cloud computing belongs to a set of policies,protocols,technologies through which one can access shared resources such as storage,applications,net-works,and services at relatively low cost.Despite the tremendous advan...Cloud computing belongs to a set of policies,protocols,technologies through which one can access shared resources such as storage,applications,net-works,and services at relatively low cost.Despite the tremendous advantages of cloud computing,one big threat which must be taken care of is data security in the cloud.There are a dozen of threats that we are being exposed to while avail-ing cloud services.Insufficient identity and access management,insecure inter-faces and Applications interfaces(APIs),hijacking,advanced persistent threats,data threats,and many more are certain security issues with the cloud platform.APIs and service providers face a huge challenge to ensure the security and integ-rity of both network and data.To overcome these challenges access control mechanisms are employed.Traditional access control mechanisms fail to monitor the user operations on the cloud platform and are prone to attacks like IP spoofing and other attacks that impact the integrity of the data.For ensuring data integrity on cloud platforms,access control mechanisms should go beyond authentication,identification,and authorization.Thus,in this work,a trust-based access control mechanism is proposed that analyzes the data of the user behavior,network beha-vior,demand behavior,and security behavior for computing trust value before granting user access.The method that computes thefinal trust value makes use of the fuzzy logic algorithm.The trust value-based policies are defined for the access control mechanism and based on the trust value outcome the access control is granted or denied.展开更多
To adapt to the development of mobile communication technologies in the next 10-year timeframe and better meet an ever-increasing demand for data services,3GPP has started the Long Term Evolution(LTE) and System Archi...To adapt to the development of mobile communication technologies in the next 10-year timeframe and better meet an ever-increasing demand for data services,3GPP has started the Long Term Evolution(LTE) and System Architecture Evolution(SAE) study projects.In view of the high-speed and bursty feature of future data services,the Evolved Packet System(EPS) makes quite a few enhancements and improvements in Quality of Service(QoS).By introducing such technologies as default bearer and aggregate resource scheduling,the EPS truly realizes the objective of 'Always Online' for users,improves data rates and thus enhances user experience ultimately.Furthermore,an appropriate mapping between the EPS QoS Class Identifier(QCI) parameter and Universal Mobile Telecommunication System (UMTS) QoS parameter is designed regarding future interoperability scenario between UMTS Terrestrial Radio Access Network(UTRAN) and Evolved UTRAN (E-UTRAN).展开更多
文摘Currently, under the cloud service architecture, the increasing importance of network security and security issues are still emerging. With the rapid development of the network platform, it is connected to the number and size of the trusted computing environment for all kinds of applications that are rapidly expanding, ever-changing network health, network time being emergencies, assault, failure, threat of disaster, its safety, survivability and availability of face serious challenges. Although TNC Working Group made safe and reliable framework from the network access layer, it is not at the level of user access, system access levels and further given the level of situational awareness and effective solutions.
基金Project supported by the National Natural Science Foundation of China (Grant No. 60921062)
文摘With the progress of the semiconductor industry,the resistive random-access memory(RAM) has drawn increasing attention.The discovery of the memristor has brought much attention to this study.Research has focused on the resistive switching characteristics of different materials and the analysis of resistive switching mechanisms.We discuss the resistive switching mechanisms of different materials in this paper and analyze the differences of those mechanisms from the view point of circuitry to establish their respective circuit models.Finally,simulations are presented.We give the prospect of using different materials in resistive RAM on account of their resistive switching mechanisms,which are applied to explain their resistive switchings.
基金Under the auspices of National Natural Science Foundation of China(No.41701151)MOE(Ministry of Education in China)Project of Humanities and Social Sciences(No.17YJCZH256)Doctoral Project of Tianjin Normal University(No.52XB1621)
文摘Spatial equality of access to basic public services, especially medical care services which are directly related to life safety, is the first step to achieve the goal of equalization of basic public services for all the people proposed by central government of China. Using the spatial analysis and the statistical analysis, this study evaluates the spatial differentiation of medical care facilities accessibility by constructing STT(Shortest Travel-Time) and SAI(Spatial Accessibility Index). And then this study explores the neighborhood effects on the medical care facilities accessibility in Beijing, with a particular focus on the effect of neighborhood migrant proportion by constructing spatial dependent regression model. The spatial accessibility analysis of medical care facilities show that the spatial distribution of medical care facilities was basically consistent with administrative regions but not with population demands. Bivariate LISA cluster maps identify that suburban areas are the overlapped clusters of high percent of migrants and limited medical care services. This is associated with the public service allocation rule in China, which stresses equality within urban areas and within rural areas but overlooks equality between urban areas and rural areas; and stresses local resident demands but overlooks migrant demands. To estimate the effects on medical care accessibility of neighborhood migrant proportion, spatial dependence models are applied due to spatial dependence of accessibility of medical care facilities. The regression results show that neighborhoods with high percent of migrants, even conditioning on neighborhood SES, are related to limited spatial accessibility of medical care services. Besides neighborhood characteristics, another important factor influencing spatial accessibility of medical care services is the process of spatial spillover effects. This indicates that the attenuate accessibility of medical care services for migrants is not only because of their own constraints but also because of their proximity to other disadvantaged neighborhoods. Therefore, it is urgently needed to increase the medical facilities in the suburban areas, to take into account migrants' demands and to reduce residential segregation between local residents and migrants for local governments to achieve the goal of equalization of medical care service.
基金the Project “Evaluation and verification of candidate solutions for international standardization of 5G” supported by National Science and Technology Major Project of the Ministry of Science and Technology (2018ZX03001024-006)
文摘With the rapid development of 5G NR(New Radio),the explosive increment of traffic amount is calling the utilization of unlicensed band.3GPP has proposed LAA(Licensed Assisted Access)to use LTE in unlicensed band and pointed out that NR-U(NR-Unlicensed)can reuse most designs of it.However,the existing channel access mechanism of LAA is conservative under the coexistence scenario of NR-U,which leads to the waste of time resource.To address the problem this paper proposes a hybrid channel access mechanism to take advantage of the LBT(Listen-Before-Talk)mechanism of LAA when channel is quite busy and transmit directly with reduced power when it is relatively idle.The channel busy degree is judged by a series of periodically updated adaptive thresholds.System-level simulation verifies that under the coexistence scenario of NR-U the proposed mechanism can achieve higher UPT(User Perceived Throughput)and lower delay than other channel access mechanisms.
文摘The main challenge in AI governance today is striking a balance between controlling AI dangers and fostering AI innovation.Regulators in a number of nations have progressively extended the regulatory sandbox,which was first implemented in the banking sector,to AI governance in an effort to reduce the conflict between regulation and innovation.The AI regulatory sandbox is a new and feasible route for AI governance in China that not only helps to manage the risks of technology application but also prevents inhibiting AI innovation.It keeps inventors'trial-and-error tolerance space inside the regulatory purview while offering a controlled setting for the development and testing of novel AI that hasn't yet been put on the market.By providing full-cycle governance of AI with the principles of agility and inclusive prudence,the regulatory sandbox offers an alternative to the conventional top-down hard regulation,expost regulation,and tight regulation.However,the current system also has inherent limitations and practical obstacles that need to be overcome by a more rational and effective approach.To achieve its positive impact on AI governance,the AI regulatory sandbox system should build and improve the access and exit mechanism,the coordination mechanism between the sandbox and personal information protection,and the mechanisms of exemption,disclosure,and communication.
基金supported by the National Key Research and Development Program of China(grant number 2019YFE0123600)。
文摘The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT.
文摘针对IEEE802.11e Medium Access Control层的QoS机制高负载时存在远端节点冲突和低优先级业务资源被耗尽的问题,提出在牺牲较小带宽的基础上增加一条忙音信道,取代CTS帧在数据信道上的广播,减少远端节点的冲突.仿真结果表明,该方案具有较小的冲突概率,有效地减少了远端节点冲突.同时提出一个解决公平性问题的新思路:在避退时间发送忙音抢占信道,以期提高低优先级业务的接入概率.
基金ACKNOWLEDGEMENT This paper is supported by the Opening Project of State Key Laboratory for Novel Software Technology of Nanjing University, China (Grant No.KFKT2012B25) and National Science Foundation of China (Grant No.61303263).
文摘As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes.
基金Project supported by the National Nature Science Foundation of China (Grant Nos 60773085 and 60801051)
文摘In this paper, the effect of imperfect channel state information at the receiver, which is caused by noise and other interference, on the multi-access channel capacity is analysed through a statistical-mechanical approach. Replica analyses focus on analytically studying how the minimum mean square error (MMSE) channel estimation error appears in a multiuser channel capacity formula. And the relevant mathematical expressions are derived. At the same time, numerical simulation results are demonstrated to validate the Replica analyses. The simulation results show how the system parameters, such as channel estimation error, system load and signal-to-noise ratio, affect the channel capacity.
文摘Cloud computing belongs to a set of policies,protocols,technologies through which one can access shared resources such as storage,applications,net-works,and services at relatively low cost.Despite the tremendous advantages of cloud computing,one big threat which must be taken care of is data security in the cloud.There are a dozen of threats that we are being exposed to while avail-ing cloud services.Insufficient identity and access management,insecure inter-faces and Applications interfaces(APIs),hijacking,advanced persistent threats,data threats,and many more are certain security issues with the cloud platform.APIs and service providers face a huge challenge to ensure the security and integ-rity of both network and data.To overcome these challenges access control mechanisms are employed.Traditional access control mechanisms fail to monitor the user operations on the cloud platform and are prone to attacks like IP spoofing and other attacks that impact the integrity of the data.For ensuring data integrity on cloud platforms,access control mechanisms should go beyond authentication,identification,and authorization.Thus,in this work,a trust-based access control mechanism is proposed that analyzes the data of the user behavior,network beha-vior,demand behavior,and security behavior for computing trust value before granting user access.The method that computes thefinal trust value makes use of the fuzzy logic algorithm.The trust value-based policies are defined for the access control mechanism and based on the trust value outcome the access control is granted or denied.
文摘To adapt to the development of mobile communication technologies in the next 10-year timeframe and better meet an ever-increasing demand for data services,3GPP has started the Long Term Evolution(LTE) and System Architecture Evolution(SAE) study projects.In view of the high-speed and bursty feature of future data services,the Evolved Packet System(EPS) makes quite a few enhancements and improvements in Quality of Service(QoS).By introducing such technologies as default bearer and aggregate resource scheduling,the EPS truly realizes the objective of 'Always Online' for users,improves data rates and thus enhances user experience ultimately.Furthermore,an appropriate mapping between the EPS QoS Class Identifier(QCI) parameter and Universal Mobile Telecommunication System (UMTS) QoS parameter is designed regarding future interoperability scenario between UMTS Terrestrial Radio Access Network(UTRAN) and Evolved UTRAN (E-UTRAN).