The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called M...The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.展开更多
This article is about orthogonal frequency-division multiplexing with quadrature amplitude modulation combined with code division multiplexing access for complex data transmission. It aims to present a method which us...This article is about orthogonal frequency-division multiplexing with quadrature amplitude modulation combined with code division multiplexing access for complex data transmission. It aims to present a method which uses two interfering subsets in order to improve the performance of the transmission scheme. The idea is to spread in a coherent manner some data amongst two different codes belonging to the two different subsets involved in complex orthogonal frequency-division multiplexing with quadrature amplitude modulation and code division multiplexing access. This will improve the useful signal level at the receiving side and therefore improve the decoding process especially at low signal to noise ratio. However, this procedure implies some interference with other codes therefore creating a certain noise which is noticeable at high signal to noise ratio.展开更多
To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development...To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.展开更多
The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting syste...The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting system using automatic addressable single-lamp control technology,and outlines the main development direction for this technology in modern tunnel lighting.The aim is to offer insights that can inform the rational deployment of this technology,thereby enhancing the lighting control effectiveness in modern tunnels and meeting their specific lighting requirements more effectively.展开更多
Modern shared-memory multi-core processors typically have shared Level 2(L2)or Level 3(L3)caches.Cache bottlenecks and replacement strategies are the main problems of such architectures,where multiple cores try to acc...Modern shared-memory multi-core processors typically have shared Level 2(L2)or Level 3(L3)caches.Cache bottlenecks and replacement strategies are the main problems of such architectures,where multiple cores try to access the shared cache simultaneously.The main problem in improving memory performance is the shared cache architecture and cache replacement.This paper documents the implementation of a Dual-Port Content Addressable Memory(DPCAM)and a modified Near-Far Access Replacement Algorithm(NFRA),which was previously proposed as a shared L2 cache layer in a multi-core processor.Standard Performance Evaluation Corporation(SPEC)Central Processing Unit(CPU)2006 benchmark workloads are used to evaluate the benefit of the shared L2 cache layer.Results show improved performance of the multicore processor’s DPCAM and NFRA algorithms,corresponding to a higher number of concurrent accesses to shared memory.The new architecture significantly increases system throughput and records performance improvements of up to 8.7%on various types of SPEC 2006 benchmarks.The miss rate is also improved by about 13%,with some exceptions in the sphinx3 and bzip2 benchmarks.These results could open a new window for solving the long-standing problems with shared cache in multi-core processors.展开更多
Address terms are an important resource for conveying relationships.In daily interactions,the use of address terms is unavoidable.Therefore,the choose of address terms is particularly critical to make communicate smoo...Address terms are an important resource for conveying relationships.In daily interactions,the use of address terms is unavoidable.Therefore,the choose of address terms is particularly critical to make communicate smoothly with people.Previous scholars have studied address terms from a wide range of perspectives.But there is not much research on Chinese address terms based on speech act theory,which is put forward by John Langshaw Austin.By observing communicative conversations,several findings have been emerged from the analysis.They are professional title,affectionate address terms,and common address terms.These findings express the existential significance of address terms,which are the premise for people to maximize their illocutionary act when communicating.Correct understanding and grasp of the use of address terms is conductive to unfolding the communicative dialogue more smoothly.展开更多
Climate change,which is the result of human activities,has wide-ranging impact.It poses a serious threat to human rights.Environmental rights are where the protection of the ecological environment and the development ...Climate change,which is the result of human activities,has wide-ranging impact.It poses a serious threat to human rights.Environmental rights are where the protection of the ecological environment and the development of human rights intersect.In view of the close relationship between the actions for addressing climate change and environmental rights,China should integrate the protection of environmental rights into the actions for addressing climate change,so as to achieve simultaneous development of both.In the process of coping with climate change,the right to climate stability that mainly pursues a“harmless”environment and the right to a more livable climate that pursues a“beautiful eco-environment”are specific manifestations of environmental rights and should be the priority of protection efforts.However,there are still some obstacles to achieving the coordinated development of the efforts to address climate change and the protection of environmental rights because traditional rights protection methods mainly give individuals subjective rights with the power to claim and are thus difficult to meet the needs of environmental rights protection in the context of climate change,and there are inherent value differences between responding to climate change and the realization of other human rights.Building a multi-level national obligation system to address climate change,giving full play to the role of courts in responding to climate change through moderate judicial activism,and coordinating the efforts to cope with climate change and the development of human rights under the guidance of a holistic system view are effective ways to overcome the aforementioned difficulties.展开更多
针对多径环境下异步长短码直扩码分多址信号(long and short code direct sequence code division multiple access,LSC-DS-CDMA)伪码估计难的问题,提出一种基于张量分解和联合估计的伪码估计方法,采用重叠窗对接收信号进行分段并构建...针对多径环境下异步长短码直扩码分多址信号(long and short code direct sequence code division multiple access,LSC-DS-CDMA)伪码估计难的问题,提出一种基于张量分解和联合估计的伪码估计方法,采用重叠窗对接收信号进行分段并构建张量模型。为改善传统线性步长搜索算法结合梯度下降的方法分解因子矩阵收敛较慢的问题,提出改进的线性步长搜索算法,结合使用动量梯度下降法对各子张量进行Tucker分解得到各因子矩阵,所需的迭代次数大大减少;利用接收增益矩阵和移位相乘解决复合码的排序模糊和幅度模糊问题;利用最大似然准则联合估计复合码和多径信道后,使用梅西算法和相关运算估计每个用户的长码和短码。仿真结果表明,该方法能够有效估计多径异步LSC-DS-CDMA信号的伪码。展开更多
基金supported by the National Key Research and Development Program of China(No.2016YFB0800601)the Key Program of NSFC-Tongyong Union Foundation(No.U1636209)+1 种基金the National Natural Science Foundation of China(61602358)the Key Research and Development Programs of Shaanxi(No.2019ZDLGY13-04,No.2019ZDLGY13-07)。
文摘The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.
文摘This article is about orthogonal frequency-division multiplexing with quadrature amplitude modulation combined with code division multiplexing access for complex data transmission. It aims to present a method which uses two interfering subsets in order to improve the performance of the transmission scheme. The idea is to spread in a coherent manner some data amongst two different codes belonging to the two different subsets involved in complex orthogonal frequency-division multiplexing with quadrature amplitude modulation and code division multiplexing access. This will improve the useful signal level at the receiving side and therefore improve the decoding process especially at low signal to noise ratio. However, this procedure implies some interference with other codes therefore creating a certain noise which is noticeable at high signal to noise ratio.
基金supported by the National Key R&D Program of China(Project Number:2022YFB2902100).
文摘To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.
文摘The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting system using automatic addressable single-lamp control technology,and outlines the main development direction for this technology in modern tunnel lighting.The aim is to offer insights that can inform the rational deployment of this technology,thereby enhancing the lighting control effectiveness in modern tunnels and meeting their specific lighting requirements more effectively.
文摘Modern shared-memory multi-core processors typically have shared Level 2(L2)or Level 3(L3)caches.Cache bottlenecks and replacement strategies are the main problems of such architectures,where multiple cores try to access the shared cache simultaneously.The main problem in improving memory performance is the shared cache architecture and cache replacement.This paper documents the implementation of a Dual-Port Content Addressable Memory(DPCAM)and a modified Near-Far Access Replacement Algorithm(NFRA),which was previously proposed as a shared L2 cache layer in a multi-core processor.Standard Performance Evaluation Corporation(SPEC)Central Processing Unit(CPU)2006 benchmark workloads are used to evaluate the benefit of the shared L2 cache layer.Results show improved performance of the multicore processor’s DPCAM and NFRA algorithms,corresponding to a higher number of concurrent accesses to shared memory.The new architecture significantly increases system throughput and records performance improvements of up to 8.7%on various types of SPEC 2006 benchmarks.The miss rate is also improved by about 13%,with some exceptions in the sphinx3 and bzip2 benchmarks.These results could open a new window for solving the long-standing problems with shared cache in multi-core processors.
文摘Address terms are an important resource for conveying relationships.In daily interactions,the use of address terms is unavoidable.Therefore,the choose of address terms is particularly critical to make communicate smoothly with people.Previous scholars have studied address terms from a wide range of perspectives.But there is not much research on Chinese address terms based on speech act theory,which is put forward by John Langshaw Austin.By observing communicative conversations,several findings have been emerged from the analysis.They are professional title,affectionate address terms,and common address terms.These findings express the existential significance of address terms,which are the premise for people to maximize their illocutionary act when communicating.Correct understanding and grasp of the use of address terms is conductive to unfolding the communicative dialogue more smoothly.
基金This paper is a phased achievement of the 2022 judicial research major project of the Supreme People’s Court,“Research on Judicial Service to Guarantee Carbon Peak and Carbon Neutrality”(Project Approval No.ZGFYZDKT20220301)the major project of the National Social Science Foundation,“Research on Legal Regulations for Biodiversity Protection under the Overall System View”(Project Approval No.19ZDA162).
文摘Climate change,which is the result of human activities,has wide-ranging impact.It poses a serious threat to human rights.Environmental rights are where the protection of the ecological environment and the development of human rights intersect.In view of the close relationship between the actions for addressing climate change and environmental rights,China should integrate the protection of environmental rights into the actions for addressing climate change,so as to achieve simultaneous development of both.In the process of coping with climate change,the right to climate stability that mainly pursues a“harmless”environment and the right to a more livable climate that pursues a“beautiful eco-environment”are specific manifestations of environmental rights and should be the priority of protection efforts.However,there are still some obstacles to achieving the coordinated development of the efforts to address climate change and the protection of environmental rights because traditional rights protection methods mainly give individuals subjective rights with the power to claim and are thus difficult to meet the needs of environmental rights protection in the context of climate change,and there are inherent value differences between responding to climate change and the realization of other human rights.Building a multi-level national obligation system to address climate change,giving full play to the role of courts in responding to climate change through moderate judicial activism,and coordinating the efforts to cope with climate change and the development of human rights under the guidance of a holistic system view are effective ways to overcome the aforementioned difficulties.
文摘针对多径环境下异步长短码直扩码分多址信号(long and short code direct sequence code division multiple access,LSC-DS-CDMA)伪码估计难的问题,提出一种基于张量分解和联合估计的伪码估计方法,采用重叠窗对接收信号进行分段并构建张量模型。为改善传统线性步长搜索算法结合梯度下降的方法分解因子矩阵收敛较慢的问题,提出改进的线性步长搜索算法,结合使用动量梯度下降法对各子张量进行Tucker分解得到各因子矩阵,所需的迭代次数大大减少;利用接收增益矩阵和移位相乘解决复合码的排序模糊和幅度模糊问题;利用最大似然准则联合估计复合码和多径信道后,使用梅西算法和相关运算估计每个用户的长码和短码。仿真结果表明,该方法能够有效估计多径异步LSC-DS-CDMA信号的伪码。