Delay analysis method is adopted to study the service capacity of a widened intersection. Traffic simulation software VISSIM is used for microscopic simulation of a widened intersection so as to obtain a delay curve. ...Delay analysis method is adopted to study the service capacity of a widened intersection. Traffic simulation software VISSIM is used for microscopic simulation of a widened intersection so as to obtain a delay curve. The delay-volume model of a widened intersection is established based on traffic simulation. The suggested value of basic service capacity of the widened left-turn lane is given along with how to determine correction factors and practical service capacity.展开更多
Based on the assumption that the customer is time and price sensitive and price is a piecewise function of the delivery time, a service delivery time guarantee decision model is proposed, and the existence of the opti...Based on the assumption that the customer is time and price sensitive and price is a piecewise function of the delivery time, a service delivery time guarantee decision model is proposed, and the existence of the optimal service delivery time guarantee L^* is proved. Furthermore, the impact of the correlation parameters on the optimal L^* is analyzed. It is revealed that if the optimal L^* is smaller than the industry level L0, the service provider with low cost should quote a shorter delivery time, and the service provider should increase the delivery time guarantee under the conditions of the decrease in customer time sensitivity or the increase in the difference of the customer reservation payment. When L^* 〉 L0, the service provider should quote a longer delivery time guarantee and should increase the delivery time guarantee and reduce the price under the conditions of the increase in the customer price sensitivity or the decrease in the mean customer reservation payment.展开更多
Cyber physical system(CPS)provides more powerful service by cyber and physical features through the wireless communication.As a kind of social organized network system,a fundamental question of CPS is to achieve servi...Cyber physical system(CPS)provides more powerful service by cyber and physical features through the wireless communication.As a kind of social organized network system,a fundamental question of CPS is to achieve service self-organization with its nodes autonomously working in both physical and cyber environments.To solve the problem,the social nature of nodes in CPS is firstly addressed,and then a formal social semantic descriptions is presented for physical environment,node service and task in order to make the nodes communicate automatically and physical environment sensibly.Further,the Horn clause is introduced to represent the reasoning rules of service organizing.Based on the match function,which is defined for measurement between semantics,the semantic aware measurement is presented to evaluate whether environment around a node can satisfy the task requirement or not.Moreover,the service capacity evaluation method for nodes is addressed to find out the competent service from both cyber and physical features of nodes.According to aforementioned two measurements,the task semantic decomposition algorithm and the organizing matrix are defined and the service self-organizing mechanism for CPS is proposed.Finally,examinations are given to further verify the efficiency and feasibility of the proposed mechanism.展开更多
In wireless multimedia communications, it is extremely difficult to derive general end-to-end capacity results because of decentralized packet scheduling and the interference between communicating nodes. In this paper...In wireless multimedia communications, it is extremely difficult to derive general end-to-end capacity results because of decentralized packet scheduling and the interference between communicating nodes. In this paper, we present a state-based channel capacity perception scheme to provide statistical Quality-of-Service (QoS) guarantees under a medium or high traffic load for IEEE 802.11 wireless multi-hop networks. The proposed scheme first perceives the state of the wireless link from the MAC retransmission information and extends this information to calculate the wireless channel capacity, particularly under a saturated traffic load, on the basis of the interference among flows and the link state in the wireless multi-hop networks. Finally, the adaptive optimal control algorithm allocates a network resource and forwards the data packet by taking into consideration the channel capacity deployments in multi-terminal or multi-hop mesh networks. Extensive computer simulations demonstrate that the proposed scheme can achieve better performance in terms of packet delivery ratio and network throughput compared to the existing capacity prediction schemes.展开更多
Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in tra...Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in traditional server, achieves computing capacity, storage capacity and service capacity distri- bution according to need in application-level. Under the new server model, the segregation and protection of user space and system space as well as the security monitoring of virtual resources are the important factors of ultimate security guarantee. This article presents a large-scale and expansible distributed invasion detection system of virtual computing environment based on virtual machine. The system supports security monitoring management of global resources and provides uniform view of security attacks under virtual computing environment, thereby protecting the user applications and system security under capacity services domain.展开更多
Economic issue is the very focus of China's wind power development.Although all the security problems can be dealt with through technical measures,the compensation for supportive thermal power units and the subsid...Economic issue is the very focus of China's wind power development.Although all the security problems can be dealt with through technical measures,the compensation for supportive thermal power units and the subsidy from economically developed regions to resource-outputting regions would require a higher level of strategic considerations.The core purpose of developing wind energy is to reduce pollutant emissions,so planners should take into account the overall cost of all sides,without touching the bottom of social affordability.展开更多
This paper is motivated by a concern in China's current medical practice in which patients can bypass the primary care and seek secondary care directly.We employ a queueing approach to examine two settings,i.e.the...This paper is motivated by a concern in China's current medical practice in which patients can bypass the primary care and seek secondary care directly.We employ a queueing approach to examine two settings,i.e.the gatekeeping and non-gatekeeping settings,in a service system consisting of two types of service provider-one with basic skills(C-H),e.g.community hospital,and the other with advanced skills(AAA-H),e.g.specialist hospital.Customers are heterogeneous with respect to service requirement.The C-H can only serve customers with a complexity level of service requirement lower than the cure threshold,while the AAA-H can serve all customers.We aim to analyze the social planner's capacity decision for the C-H in both settings and assess the relative merit of each setting with respect to total social welfare,i.e.the sum of customer benefits net of customer delay costs and service providers7 operating costs.Our findings show that when the C-H's capacity is exogenous,the gatekeeper setting is preferable if the capacity of the C-H is in the intermediate range because customers'self-selection behavior gives rise to negative externality.When the C-H's capacity is optimized by the social planner,the non-gatekeeping setting is preferable if the capacity of the AAA-H is large or the cure threshold is high,because customers'self-selection behavior as well as the investment in the C-H's capacity can result in a better distribution of demand among the two service providers.The gatekeeping setting is preferable if the cure threshold is low because it is economical for the social planner to invest in a large capacity in the C-H to serve all customers.We also show numerically the conditions under which the two settings can achieve the first-best solution.展开更多
Computational grids (CGs) are large scale networks of geographically distributed aggregates of resource clusters that may be contributed by distinct organizations for the provision of computing services such as mode...Computational grids (CGs) are large scale networks of geographically distributed aggregates of resource clusters that may be contributed by distinct organizations for the provision of computing services such as model simulation, compute cycle and data mining. Traditionally, the decision-making strategies underlying the grid management mechanisms rely on the physical view of the grid resource model. This entails the need for complex multi-dimensional search strategies and a considerable level of resource state information exchange between the grid management domains. In this paper we argue that with the adoption of service oriented grid architectures, a logical service-oriented view of the resource model provides a more appropriate level of abstraction to express the grid capacity to handle incoming service requests. In this respect, we propose a quantification model of the aggregated service capacity of the hosting environment that is updated based on the monitored state of the various environmental resources required by the hosted services. A comparative experimental validation of the model shows its performance towards enabling an adequate exploitation of provisioned services.展开更多
Mathematical models show that the urbanization process is an important factor affecting the transfer of labor among economic sectors.The regression results using time-series data since China’s reform and opening up s...Mathematical models show that the urbanization process is an important factor affecting the transfer of labor among economic sectors.The regression results using time-series data since China’s reform and opening up show that there is significant positive correlation between urbanization and the service industry’s ability to create jobs.However,there is no Granger Causation between them.Therefore,China should shift from focusing on industry park construction to paying more attention to improving urban functions by increasing their employment density of urban services.展开更多
In a peer-to-peer file-sharing system, a free-rider is a node which downloads files from its peers but does not share files to other nodes. Analyzing the free-riders’ impact on system throughputs is essential in exam...In a peer-to-peer file-sharing system, a free-rider is a node which downloads files from its peers but does not share files to other nodes. Analyzing the free-riders’ impact on system throughputs is essential in examining the performance of peer-to-peer file-sharing systems. We find that the free-riders’ impact largely depends on nodes behavior, including their online time and greed of downloading files. We extend an existing peer-to-peer system model and classify nodes according to their behavior. We focus on two peer-to-peer architectures: centralized indexing and distributed hash tables. We find that when the cooperators in a system are all greedy in downloading files, the system throughput has little room to increase while the cooperators throughput degrade badly with the increasing percent of greedy free-riders in the system. When all the cooperators are non-greedy with long average online time, the system throughput has much room to increase and the cooperators throughput degrade little with a high percent of greedy free-riders in the system. We also find that if a system can tolerate a high percent of greedy free-riders without suffering much throughput degradation, the system must contain some non-greedy cooperators that contribute great idle service capacity to the system.展开更多
文摘Delay analysis method is adopted to study the service capacity of a widened intersection. Traffic simulation software VISSIM is used for microscopic simulation of a widened intersection so as to obtain a delay curve. The delay-volume model of a widened intersection is established based on traffic simulation. The suggested value of basic service capacity of the widened left-turn lane is given along with how to determine correction factors and practical service capacity.
基金The National Natural Science Foundation of China(No. 71171046,70771026)
文摘Based on the assumption that the customer is time and price sensitive and price is a piecewise function of the delivery time, a service delivery time guarantee decision model is proposed, and the existence of the optimal service delivery time guarantee L^* is proved. Furthermore, the impact of the correlation parameters on the optimal L^* is analyzed. It is revealed that if the optimal L^* is smaller than the industry level L0, the service provider with low cost should quote a shorter delivery time, and the service provider should increase the delivery time guarantee under the conditions of the decrease in customer time sensitivity or the increase in the difference of the customer reservation payment. When L^* 〉 L0, the service provider should quote a longer delivery time guarantee and should increase the delivery time guarantee and reduce the price under the conditions of the increase in the customer price sensitivity or the decrease in the mean customer reservation payment.
基金Supported by the National Natural Science Foundation of China(61103069,71171148)the National High-Tech Research and Development Plan of China(″863″ Plan)(2012BAD35B01)+2 种基金the Innovation Program of Shanghai Municipal Education Commission(13YZ052)the Shanghai Committee of Science and Technology(11DZ1501703,11dz12106001)the Program of Shanghai Normal University(DXL125,DCL201302)
文摘Cyber physical system(CPS)provides more powerful service by cyber and physical features through the wireless communication.As a kind of social organized network system,a fundamental question of CPS is to achieve service self-organization with its nodes autonomously working in both physical and cyber environments.To solve the problem,the social nature of nodes in CPS is firstly addressed,and then a formal social semantic descriptions is presented for physical environment,node service and task in order to make the nodes communicate automatically and physical environment sensibly.Further,the Horn clause is introduced to represent the reasoning rules of service organizing.Based on the match function,which is defined for measurement between semantics,the semantic aware measurement is presented to evaluate whether environment around a node can satisfy the task requirement or not.Moreover,the service capacity evaluation method for nodes is addressed to find out the competent service from both cyber and physical features of nodes.According to aforementioned two measurements,the task semantic decomposition algorithm and the organizing matrix are defined and the service self-organizing mechanism for CPS is proposed.Finally,examinations are given to further verify the efficiency and feasibility of the proposed mechanism.
基金supported by the National Natural Science Foundation of China under Grants No.60972038,No.61001077,No.61101105 the Scientific Research Foundation for Nanjing University of Posts and Telecommunications under Grant No.NY211007+2 种基金 the Open Research Fund of National Mobile Communications Research Laboratory,Southeast University under Grant No.2011D05 Specialized Research Fund for the Doctoral Program of Higher Education under Grant No.20113223120002 University Natural Science Research Project of Jiangsu Province under Grant No.11KJB510016
文摘In wireless multimedia communications, it is extremely difficult to derive general end-to-end capacity results because of decentralized packet scheduling and the interference between communicating nodes. In this paper, we present a state-based channel capacity perception scheme to provide statistical Quality-of-Service (QoS) guarantees under a medium or high traffic load for IEEE 802.11 wireless multi-hop networks. The proposed scheme first perceives the state of the wireless link from the MAC retransmission information and extends this information to calculate the wireless channel capacity, particularly under a saturated traffic load, on the basis of the interference among flows and the link state in the wireless multi-hop networks. Finally, the adaptive optimal control algorithm allocates a network resource and forwards the data packet by taking into consideration the channel capacity deployments in multi-terminal or multi-hop mesh networks. Extensive computer simulations demonstrate that the proposed scheme can achieve better performance in terms of packet delivery ratio and network throughput compared to the existing capacity prediction schemes.
基金Supported by the High Technology Research and Development Programme of China (No. 2003AA1Z2070 ) and the National Natural Science Foundation of China (No. 90412013).
文摘Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in traditional server, achieves computing capacity, storage capacity and service capacity distri- bution according to need in application-level. Under the new server model, the segregation and protection of user space and system space as well as the security monitoring of virtual resources are the important factors of ultimate security guarantee. This article presents a large-scale and expansible distributed invasion detection system of virtual computing environment based on virtual machine. The system supports security monitoring management of global resources and provides uniform view of security attacks under virtual computing environment, thereby protecting the user applications and system security under capacity services domain.
文摘Economic issue is the very focus of China's wind power development.Although all the security problems can be dealt with through technical measures,the compensation for supportive thermal power units and the subsidy from economically developed regions to resource-outputting regions would require a higher level of strategic considerations.The core purpose of developing wind energy is to reduce pollutant emissions,so planners should take into account the overall cost of all sides,without touching the bottom of social affordability.
文摘This paper is motivated by a concern in China's current medical practice in which patients can bypass the primary care and seek secondary care directly.We employ a queueing approach to examine two settings,i.e.the gatekeeping and non-gatekeeping settings,in a service system consisting of two types of service provider-one with basic skills(C-H),e.g.community hospital,and the other with advanced skills(AAA-H),e.g.specialist hospital.Customers are heterogeneous with respect to service requirement.The C-H can only serve customers with a complexity level of service requirement lower than the cure threshold,while the AAA-H can serve all customers.We aim to analyze the social planner's capacity decision for the C-H in both settings and assess the relative merit of each setting with respect to total social welfare,i.e.the sum of customer benefits net of customer delay costs and service providers7 operating costs.Our findings show that when the C-H's capacity is exogenous,the gatekeeper setting is preferable if the capacity of the C-H is in the intermediate range because customers'self-selection behavior gives rise to negative externality.When the C-H's capacity is optimized by the social planner,the non-gatekeeping setting is preferable if the capacity of the AAA-H is large or the cure threshold is high,because customers'self-selection behavior as well as the investment in the C-H's capacity can result in a better distribution of demand among the two service providers.The gatekeeping setting is preferable if the cure threshold is low because it is economical for the social planner to invest in a large capacity in the C-H to serve all customers.We also show numerically the conditions under which the two settings can achieve the first-best solution.
文摘Computational grids (CGs) are large scale networks of geographically distributed aggregates of resource clusters that may be contributed by distinct organizations for the provision of computing services such as model simulation, compute cycle and data mining. Traditionally, the decision-making strategies underlying the grid management mechanisms rely on the physical view of the grid resource model. This entails the need for complex multi-dimensional search strategies and a considerable level of resource state information exchange between the grid management domains. In this paper we argue that with the adoption of service oriented grid architectures, a logical service-oriented view of the resource model provides a more appropriate level of abstraction to express the grid capacity to handle incoming service requests. In this respect, we propose a quantification model of the aggregated service capacity of the hosting environment that is updated based on the monitored state of the various environmental resources required by the hosted services. A comparative experimental validation of the model shows its performance towards enabling an adequate exploitation of provisioned services.
文摘Mathematical models show that the urbanization process is an important factor affecting the transfer of labor among economic sectors.The regression results using time-series data since China’s reform and opening up show that there is significant positive correlation between urbanization and the service industry’s ability to create jobs.However,there is no Granger Causation between them.Therefore,China should shift from focusing on industry park construction to paying more attention to improving urban functions by increasing their employment density of urban services.
基金the National High Technology Re-search and Development Program (863) of China(No. 2007AA01Z457)the Shanghai Science and Technology Development Funds (No. 07QA14033)
文摘In a peer-to-peer file-sharing system, a free-rider is a node which downloads files from its peers but does not share files to other nodes. Analyzing the free-riders’ impact on system throughputs is essential in examining the performance of peer-to-peer file-sharing systems. We find that the free-riders’ impact largely depends on nodes behavior, including their online time and greed of downloading files. We extend an existing peer-to-peer system model and classify nodes according to their behavior. We focus on two peer-to-peer architectures: centralized indexing and distributed hash tables. We find that when the cooperators in a system are all greedy in downloading files, the system throughput has little room to increase while the cooperators throughput degrade badly with the increasing percent of greedy free-riders in the system. When all the cooperators are non-greedy with long average online time, the system throughput has much room to increase and the cooperators throughput degrade little with a high percent of greedy free-riders in the system. We also find that if a system can tolerate a high percent of greedy free-riders without suffering much throughput degradation, the system must contain some non-greedy cooperators that contribute great idle service capacity to the system.