Wherever people live together in or near homelands that harbour joint natural resources such as forest, water, minerals, oil etc., they must collaborate, co-exist and share these resources irrespective of their geneti...Wherever people live together in or near homelands that harbour joint natural resources such as forest, water, minerals, oil etc., they must collaborate, co-exist and share these resources irrespective of their genetic, social, cultural, and political peculiarities. This is not always the case when self-interest, ethnic divisions, elitist politics, economic interest and power tussle set in. The Nso and Oku people who reside in the Ngongbaa Forest area constitute an example of joint management of resources where at one period, their relationship over the management of the Oku Mountain Forest was cordial and at another, the relationship became conflictive. This study was designed to study the influence of the KIFP forest management policies on the Nso indigenous forest Management system in Ngongbaa Forest, and its implications. The data collected for the study was secured through the administration of a questionnaire to residents of 10 villages adjacent to the Ngongbaa Forest, and forest users who carried out livelihood activities there between 1963 and 2015. These forest user groups include beekeepers, rat trappers, grazers, mushroom gatherers, ground honey/tree honey harvesters, carvers, etc. The investigation also extended to the traditional leaders of Nso and Oku who are in charge of the land tenure systems. The findings show that the Oku Mountain Forest is jointly owned by the Nso and Oku people. The Nso own the eastern half of the forest known as Ngongbaa Forest while the Oku own the western half, known as the Kilum Forest. The cordial relationship that existed between these people ensured the conservation of the forest. But the conflicts that later set in, especially due to the creation of the Kilum Mountain Forest Project in 1987 later changed to the Kilum Ijim Forest Project (KIFP) in 1992 sidelined the local communities which was contrary to the dispositions of the new Cameroon forest law enacted in 1994. Thus, the indigenous conservation practices became ignored which the local population never digested well. This seriously jeopardized the wellbeing of the forest in general.展开更多
Service and information resources are two kinds of major shared resources in virtual enterprises, where, service resources include third party’s service resources and enterprise’s legacy service resources,and inform...Service and information resources are two kinds of major shared resources in virtual enterprises, where, service resources include third party’s service resources and enterprise’s legacy service resources,and information resources include database resources and file resources. Since service and information resources have distributed, autonomic, remotely bound as well as some other similar characteristics, an implementation mechanism on managing shared resources based on UDDI are presented. XML instances are used to describe resources authorization information, WSDL based special XML instance represents information resource metadata, and these XML instances are referenced by tModel for realizing the purpose of managing shared resources metadata based on UDDI.展开更多
The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense ...The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense resource allocation with multi-armed bandits to maximize the network's overall benefit.Firstly,we propose the method for dynamic setting of node defense resource thresholds to obtain the defender(attacker)benefit function of edge servers(nodes)and distribution.Secondly,we design a defense resource sharing mechanism for neighboring nodes to obtain the defense capability of nodes.Subsequently,we use the decomposability and Lipschitz conti-nuity of the defender's total expected utility to reduce the difference between the utility's discrete and continuous arms and analyze the difference theoretically.Finally,experimental results show that the method maximizes the defender's total expected utility and reduces the difference between the discrete and continuous arms of the utility.展开更多
Fast recovery and minimum utilization of resources are the two main criteria for determining the protection scheme quality. We address the problem of providing a hybrid protection approach on elastic optical networks ...Fast recovery and minimum utilization of resources are the two main criteria for determining the protection scheme quality. We address the problem of providing a hybrid protection approach on elastic optical networks under contiguity and continuity of available spectrum constraints. Two main hypotheses are used in this paper for backup paths computation. In the first case, it is assumed that backup paths resources are dedicated. In the second case, the assumption is that backup paths resources are available shared resources. The objective of the study is to minimize spectrum utilization to reduce blocking probability on a network. For this purpose, an efficient survivable Hybrid Protection Lightpath (HybPL) algorithm is proposed for providing shared or dedicated backup path protection based on the efficient energy calculation and resource availability. Traditional First-Fit and Best-Fit schemes are employed to search and assign the available spectrum resources. The simulation results show that HybPL presents better performance in terms of blocking probability, compared with the Minimum Resources Utilization Dedicated Protection (MRU-DP) algorithm which offers better performance than the Dedicated Protection (DP) algorithm.展开更多
Web of Things(WoT)resources are not only numerous,but also have a wide range of applications and deployments.The centralized WoT resource sharing mechanism lacks flexibility and scalability,and hence cannot satisfy re...Web of Things(WoT)resources are not only numerous,but also have a wide range of applications and deployments.The centralized WoT resource sharing mechanism lacks flexibility and scalability,and hence cannot satisfy requirement of distributed resource sharing in large-scale environment.In response to this problem,a trusted and secure mechanism for WoT resources sharing based on context and blockchain(CWoT-Share)was proposed.Firstly,the mechanism can respond quickly to the changes of the application environment by dynamically determining resource access control rules according to the context.Then,the flexible resource charging strategies,which reduced the fees paid by the users who shared more resources and increased the fees paid by users who frequently used resources maliciously,were used to fulfill efficient sharing of WoT resources.Meanwhile,the charging strategies also achieve load balancing by dynamic selection of WoT resources.Finally,the open source blockchain platform Ethereum was used for the simulation and the simulation results show that CWoT-Share can flexibly adapt to the application environment and dynamically adjust strategies of resource access control and resource charging.展开更多
Since the electronic resources and Internet Web sites became popular, distance education courses offered via the Internet could play an important role in providing global digital resources and teaching the knowledge o...Since the electronic resources and Internet Web sites became popular, distance education courses offered via the Internet could play an important role in providing global digital resources and teaching the knowledge of international library and information standards for bibliographic databases with electronic and web resources.This paper uses the example of the author's new online course: ILS 608 Cataloging and Development of a Digital Union Catalog for Ancient Chinese Books to demonstrate the global re...展开更多
In the post-pandemic era,libraries need to improve the emergency support of electronic resources and establish a relatively perfect electronic resource support system in order to adapt to the construction goal of the ...In the post-pandemic era,libraries need to improve the emergency support of electronic resources and establish a relatively perfect electronic resource support system in order to adapt to the construction goal of the national emergency system as well as realize their own transformation and development.It must be realized through enhancing awareness and planning,strengthening policy support and top-level design,realizing rapid response and intelligent response,improving technical support,promoting resource synergy,integration,and sharing,strengthening community integration,as well as providing intelligent management and services.展开更多
To accommodate the diversified emerging use cases in 5G,radio access networks(RAN)is required to be more flexible,open,and versatile.It is evolving towards cloudification,intelligence and openness.By embedding computi...To accommodate the diversified emerging use cases in 5G,radio access networks(RAN)is required to be more flexible,open,and versatile.It is evolving towards cloudification,intelligence and openness.By embedding computing capabilities within RAN,it helps to transform RAN into a natural cost effective radio edge computing platform,offering great opportunity to further enhance RAN agility for diversified services and improve users’quality of experience(Qo E).In this article,a logical architecture enabling deep convergence of communication and computing in RAN is proposed based on O-RAN.The scenarios and potential benefits of sharing RAN computing resources are first analyzed.Then,the requirements,design principles and logical architecture are introduced.Involved key technologies are also discussed,including heterogeneous computing infrastructure,unified computing and communication task modeling,joint communication and computing orchestration and RAN computing data routing.Followed by that,a VR use case is studied to illustrate the superiority of the joint communication and computing optimization.Finally,challenges and future trends are highlighted to provide some insights on the potential future work for researchers in this field.展开更多
To ensure the security of resource and intelligence sharing in 6G,blockchain has been widely adopted in wireless communications and applications.Although blockchain can ensure the traceability and non-tamperability of...To ensure the security of resource and intelligence sharing in 6G,blockchain has been widely adopted in wireless communications and applications.Although blockchain can ensure the traceability and non-tamperability of data in the concatenated blocks,it cannot guarantee the honest behaviors of users in the application before the generation of transactions.Thus,additional technologies are required to ensure that the source of blockchain data is reliable.In this paper,the detailed procedure is designed for the application-oriented task validation in the blockchainenhanced computing resource sharing and transactions in ultra dense networks(UDN).The corresponding queuing model is built and analyzed with the consideration of the wireless re-transmission and the probability of malicious deception by users.Based on the analysis results,the UDN deployment is optimized to save network cost while ensuring latency performance.Numerical results verify our analysis,and the optimized system deployment including the number and service capacities of both base stations and mobile edge computing(MEC)servers are also given with various system settings.展开更多
Network virtualization can effectively establish dedicated virtual networks to implement various network functions.However,the existing research works have some shortcomings,for example,although computing resource pro...Network virtualization can effectively establish dedicated virtual networks to implement various network functions.However,the existing research works have some shortcomings,for example,although computing resource properties of individual nodes are considered,node storage properties and the network topology properties are usually ignored in Virtual Network(VN)modelling,which leads to the inaccurate measurement of node availability and priority.In addition,most static virtual network mapping methods allocate fixed resources to users during the entire life cycle,and the users’actual resource requirements vary with the workload,which results in resource allocation redundancy.Based on the above analysis,in this paper,we propose a dynamic resource sharing virtual network mapping algorithm named NMA-PRS-VNE,first,we construct a new,more realistic network framework in which the properties of nodes include computing resources,storage resources and topology properties.In the node mapping process,three properties of the node are used to measure its mapping ability.Second,we consider the resources of adjacent nodes and links instead of the traditional method of measuring the availability and priority of nodes by considering only the resource properties,so as to more accurately select the physical mapping nodes that meet the constraints and conditions and improve the success rate of subsequent link mapping.Finally,we divide the resource requirements of Virtual Network Requests(VNRs)into basic subrequirements and variable sub-variable requirements to complete dynamic resource allocation.The former represents monopolizing resource requirements by the VNRs,while the latter represents shared resources by many VNRs with the probability of occupying resources,where we keep a balance between resource sharing and collision among users by calculating the collision probability.Simulation results show that the proposed NMAPRS-VNE can increase the average acceptance rate and network revenue by 15%and 38%,and reduce the network cost and link pressure by 25%and 17%.展开更多
Environments with reciprocal patchiness of resources, in which the availability of two resources such as light and soil nutrients are patchily distributed in horizontal space and negatively correlated in each patch, a...Environments with reciprocal patchiness of resources, in which the availability of two resources such as light and soil nutrients are patchily distributed in horizontal space and negatively correlated in each patch, are common in many ecosystems. The strategies by which clonal plants adapt to this type of heterogeneous environment were examined in three stoloniferous herbs,Potentilla reptans L. var. sericophylla Franch., P. anserina L. and Halerpestes ruthenica (Jacq.) Qvcz., commonly inhabiting forest understories, grasslands and low saline meadows, respectively. As pairs of connected ramets were subjected to reciprocal patchiness of light and nutrients, stolon connection between the two ramets significantly enhanced biomass of both ramet growing in low light intensity but high soil nutrient condition (LH ramet) and ramet growing in high light intensity but low soil nutrient condition (HL ramet) as well as whole ramet pairs (consisting of LH ramets and HL ramets). Additionally, stolon connection greatly increased root/shoot ratio of LH ramet while significantly decreased that of HL ramet. The results indicate that a reciprocal transportation of resources between interconnected ramets and a functional specialization of ramets in uptake of abundant resources occurred. By resource sharing and functional specialization, clonal plants can efficiently acquire locally abundant resources and buffer the stress caused by reciprocal patchiness of resources.展开更多
A natural history museum is a museum for collection, researching and presenting natural environment and natural heritages about natural history. In the research, based on the analysis on necessity of university museum...A natural history museum is a museum for collection, researching and presenting natural environment and natural heritages about natural history. In the research, based on the analysis on necessity of university museums’ services to society in resources sharing, the difficulties and dilemmas were summarized in sharing resources of museums and the approaches for resources sharing were explored with the case of Natural History Museum of Zhengzhou Normal University in order to investigate the way for better services of university museum to the public.展开更多
Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on-...Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on- demand allocation of network resources are particularly important in Cloud computing. Ho- wever, nearly all-current available cloud com- puting platforms are either proprietary or their software infrastructure is invisible to the rese- arch community except for a few open-source platforms. For universities and research insti- tutes, more open and testable experimental plat- forms are needed in a lab-level with PCs. In this paper, a platform of infrastructure resou- rce sharing system (Platform as a Service (PaaS)) is developed in virtual Cloud comput- hug environment. Its architecture, core modules, main functions, design and operational envir- onment and applications are introduced in de- tail. It has good expandability and can impr- ove resource sharing and utilization and is app- lied to regular computer science teaching and research process.展开更多
Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mu...Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mutability to control the usage process and an architecture to illustrate how TC technologies support policy enforcement with bidirectional attestation. The properties required for attestation should include not only integrity measurement value of platform and related application, but also reputation of users and access history, in order to avoid the limitation of the existing approaches. To make a permission, it is required to evaluate both the authorization and conditions of the subject and the object in resource usage to ensure trustable resources to be transferred to trusted users and platform.展开更多
In recent years, the number of permanent residents in Chengdu, Sichuan Province, China has continued to grow, and the number of private cars keeps rising. A series of problems caused by difficult parking and random pa...In recent years, the number of permanent residents in Chengdu, Sichuan Province, China has continued to grow, and the number of private cars keeps rising. A series of problems caused by difficult parking and random parking in old communities are common. This paper will take the parking problem of the old community in <span style="font-family:Verdana;">Yingmenkou</span><span style="font-family:Verdana;"> community, Chengdu, China as an example to summarize the current situation and parking problems of the private car parking facilities in these old communities. Based on Chengdu’s current old community parking management policy, parking facility renovation </span><span style="font-family:Verdana;">and</span><span style="font-family:Verdana;"> expansion policy, </span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">this paper </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">research</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">es</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> and establish</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">es</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> a parking resource sharing model suitable for old communities. The simulation results show that this model has a small footprint and is easy to install and disassemble. It can be freely spliced and combined units according to the size of the old community and the needs of residents. It is suitable for old communities with no centralized parking lot and high parking demand by residents.</span></span></span>展开更多
The nature of networked manufacturing and agile manufacturing is to recognize enterprise resources timely and accurately. This paper mainly discusses an enterprise resource model method and the construction process. F...The nature of networked manufacturing and agile manufacturing is to recognize enterprise resources timely and accurately. This paper mainly discusses an enterprise resource model method and the construction process. Furthermore, the system frameworks of software and application are put forward to realize various enterprise resources management based on a resource business process. Thus, we ensure the integration and sharing of enterprise resources for the requirement of networked manufacturing.展开更多
China Academic Digital Library & Information System(CADLIS) was established as a public service system in 1996. Its mission is to improve the resource sharing for China's higher education. The framework of CAD...China Academic Digital Library & Information System(CADLIS) was established as a public service system in 1996. Its mission is to improve the resource sharing for China's higher education. The framework of CADLIS is constructed to allow easy interconnection and interoperability. This paper presents an introduction to the portal,academic resources, bibliographic system, service network, digital library technical platform,standards and criteria of CADLIS as well.展开更多
The term environmental innovation system refers to an innovation network composed of enterprises,universities,and research institutions involved in the development and diffusion of environmental technology,with the pa...The term environmental innovation system refers to an innovation network composed of enterprises,universities,and research institutions involved in the development and diffusion of environmental technology,with the participation of a government.An environmental innovation system not only exerts important impact on the achievement of carbon neutrality but also affects social and economic activities.Investigations on environmental innovation system performance constantly assume a singlestage independent system while ignoring its internal structure.However,such systems are composed of environmental innovation research and development(R&D)and environmental innovation conversion subsystems.A two-stage data envelopment analysis(DEA)model is developed in this study to analyze the efficiency of Chinese regional environmental innovation system by opening the"black box"and considering shared resources.Empirical results indicated that China presents high overall environmental innovation efficiency although some regions need to improve.Regions with low efficiencies in both environmental innovation R&D(EIR)and environmental innovation conversion(EIC)subsystems should expand their investment in and strengthen the management of environmental innovation resources.Regions with low EIR efficiency should improve the absorption and transformation of environmental innovation achievements.Regions with low EIC efficiency should increase investment in the commercialization of environmental innovation achievements and encourage green economy industries,such as new energy,art,tourism,and environmental protection.展开更多
Unreasonable allocation of shared resources reduces the system efficiency and is a considerable operational risk.Sub-processes with insufficient portion of shared resources could not help accomplish complicated tasks,...Unreasonable allocation of shared resources reduces the system efficiency and is a considerable operational risk.Sub-processes with insufficient portion of shared resources could not help accomplish complicated tasks,and overstaffing and idle resources will occur in the sub-processes assigned with redundant shared resources.This unfair portion distribution may cause internal contradictions among sub-processes and even lead to the collapsing of the entire system.This study proposes a data-driven,mixed two-stage network data envelopment analysis model.This method aims to reasonably define the allocation portion of shared extra intermediate resources among several nonhomogeneous subsystems and measure the overall system performance.A data set of 58 international hotels is used to test the features of the proposed model.展开更多
文摘Wherever people live together in or near homelands that harbour joint natural resources such as forest, water, minerals, oil etc., they must collaborate, co-exist and share these resources irrespective of their genetic, social, cultural, and political peculiarities. This is not always the case when self-interest, ethnic divisions, elitist politics, economic interest and power tussle set in. The Nso and Oku people who reside in the Ngongbaa Forest area constitute an example of joint management of resources where at one period, their relationship over the management of the Oku Mountain Forest was cordial and at another, the relationship became conflictive. This study was designed to study the influence of the KIFP forest management policies on the Nso indigenous forest Management system in Ngongbaa Forest, and its implications. The data collected for the study was secured through the administration of a questionnaire to residents of 10 villages adjacent to the Ngongbaa Forest, and forest users who carried out livelihood activities there between 1963 and 2015. These forest user groups include beekeepers, rat trappers, grazers, mushroom gatherers, ground honey/tree honey harvesters, carvers, etc. The investigation also extended to the traditional leaders of Nso and Oku who are in charge of the land tenure systems. The findings show that the Oku Mountain Forest is jointly owned by the Nso and Oku people. The Nso own the eastern half of the forest known as Ngongbaa Forest while the Oku own the western half, known as the Kilum Forest. The cordial relationship that existed between these people ensured the conservation of the forest. But the conflicts that later set in, especially due to the creation of the Kilum Mountain Forest Project in 1987 later changed to the Kilum Ijim Forest Project (KIFP) in 1992 sidelined the local communities which was contrary to the dispositions of the new Cameroon forest law enacted in 1994. Thus, the indigenous conservation practices became ignored which the local population never digested well. This seriously jeopardized the wellbeing of the forest in general.
文摘Service and information resources are two kinds of major shared resources in virtual enterprises, where, service resources include third party’s service resources and enterprise’s legacy service resources,and information resources include database resources and file resources. Since service and information resources have distributed, autonomic, remotely bound as well as some other similar characteristics, an implementation mechanism on managing shared resources based on UDDI are presented. XML instances are used to describe resources authorization information, WSDL based special XML instance represents information resource metadata, and these XML instances are referenced by tModel for realizing the purpose of managing shared resources metadata based on UDDI.
基金supported by the National Natural Science Foundation of China(NSFC)[grant numbers 62172377,61872205]the Shandong Provincial Natural Science Foundation[grant number ZR2019MF018]the Startup Research Foundation for Distinguished Scholars No.202112016.
文摘The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense resource allocation with multi-armed bandits to maximize the network's overall benefit.Firstly,we propose the method for dynamic setting of node defense resource thresholds to obtain the defender(attacker)benefit function of edge servers(nodes)and distribution.Secondly,we design a defense resource sharing mechanism for neighboring nodes to obtain the defense capability of nodes.Subsequently,we use the decomposability and Lipschitz conti-nuity of the defender's total expected utility to reduce the difference between the utility's discrete and continuous arms and analyze the difference theoretically.Finally,experimental results show that the method maximizes the defender's total expected utility and reduces the difference between the discrete and continuous arms of the utility.
文摘Fast recovery and minimum utilization of resources are the two main criteria for determining the protection scheme quality. We address the problem of providing a hybrid protection approach on elastic optical networks under contiguity and continuity of available spectrum constraints. Two main hypotheses are used in this paper for backup paths computation. In the first case, it is assumed that backup paths resources are dedicated. In the second case, the assumption is that backup paths resources are available shared resources. The objective of the study is to minimize spectrum utilization to reduce blocking probability on a network. For this purpose, an efficient survivable Hybrid Protection Lightpath (HybPL) algorithm is proposed for providing shared or dedicated backup path protection based on the efficient energy calculation and resource availability. Traditional First-Fit and Best-Fit schemes are employed to search and assign the available spectrum resources. The simulation results show that HybPL presents better performance in terms of blocking probability, compared with the Minimum Resources Utilization Dedicated Protection (MRU-DP) algorithm which offers better performance than the Dedicated Protection (DP) algorithm.
基金This study is funded by“The National Natural Science Foundation of China(No.61972211,No.61771258)”.
文摘Web of Things(WoT)resources are not only numerous,but also have a wide range of applications and deployments.The centralized WoT resource sharing mechanism lacks flexibility and scalability,and hence cannot satisfy requirement of distributed resource sharing in large-scale environment.In response to this problem,a trusted and secure mechanism for WoT resources sharing based on context and blockchain(CWoT-Share)was proposed.Firstly,the mechanism can respond quickly to the changes of the application environment by dynamically determining resource access control rules according to the context.Then,the flexible resource charging strategies,which reduced the fees paid by the users who shared more resources and increased the fees paid by users who frequently used resources maliciously,were used to fulfill efficient sharing of WoT resources.Meanwhile,the charging strategies also achieve load balancing by dynamic selection of WoT resources.Finally,the open source blockchain platform Ethereum was used for the simulation and the simulation results show that CWoT-Share can flexibly adapt to the application environment and dynamically adjust strategies of resource access control and resource charging.
文摘Since the electronic resources and Internet Web sites became popular, distance education courses offered via the Internet could play an important role in providing global digital resources and teaching the knowledge of international library and information standards for bibliographic databases with electronic and web resources.This paper uses the example of the author's new online course: ILS 608 Cataloging and Development of a Digital Union Catalog for Ancient Chinese Books to demonstrate the global re...
文摘In the post-pandemic era,libraries need to improve the emergency support of electronic resources and establish a relatively perfect electronic resource support system in order to adapt to the construction goal of the national emergency system as well as realize their own transformation and development.It must be realized through enhancing awareness and planning,strengthening policy support and top-level design,realizing rapid response and intelligent response,improving technical support,promoting resource synergy,integration,and sharing,strengthening community integration,as well as providing intelligent management and services.
基金jointly supported by the Beijing University of Posts and Telecommunications-China Mobile Research Institute Joint Innovation Centerthe National Key Research and Development Program of China under Grant 2021YFB2900200the National Natural Science Foundation of China under Grant 62201073 and 61925101。
文摘To accommodate the diversified emerging use cases in 5G,radio access networks(RAN)is required to be more flexible,open,and versatile.It is evolving towards cloudification,intelligence and openness.By embedding computing capabilities within RAN,it helps to transform RAN into a natural cost effective radio edge computing platform,offering great opportunity to further enhance RAN agility for diversified services and improve users’quality of experience(Qo E).In this article,a logical architecture enabling deep convergence of communication and computing in RAN is proposed based on O-RAN.The scenarios and potential benefits of sharing RAN computing resources are first analyzed.Then,the requirements,design principles and logical architecture are introduced.Involved key technologies are also discussed,including heterogeneous computing infrastructure,unified computing and communication task modeling,joint communication and computing orchestration and RAN computing data routing.Followed by that,a VR use case is studied to illustrate the superiority of the joint communication and computing optimization.Finally,challenges and future trends are highlighted to provide some insights on the potential future work for researchers in this field.
文摘To ensure the security of resource and intelligence sharing in 6G,blockchain has been widely adopted in wireless communications and applications.Although blockchain can ensure the traceability and non-tamperability of data in the concatenated blocks,it cannot guarantee the honest behaviors of users in the application before the generation of transactions.Thus,additional technologies are required to ensure that the source of blockchain data is reliable.In this paper,the detailed procedure is designed for the application-oriented task validation in the blockchainenhanced computing resource sharing and transactions in ultra dense networks(UDN).The corresponding queuing model is built and analyzed with the consideration of the wireless re-transmission and the probability of malicious deception by users.Based on the analysis results,the UDN deployment is optimized to save network cost while ensuring latency performance.Numerical results verify our analysis,and the optimized system deployment including the number and service capacities of both base stations and mobile edge computing(MEC)servers are also given with various system settings.
基金We are grateful for the support of the Natural Science Foundation of Shandong Province(No.ZR2020LZH008,ZR2020QF112,ZR2019MF071)the National Natural Science Foundation of China(61373149).
文摘Network virtualization can effectively establish dedicated virtual networks to implement various network functions.However,the existing research works have some shortcomings,for example,although computing resource properties of individual nodes are considered,node storage properties and the network topology properties are usually ignored in Virtual Network(VN)modelling,which leads to the inaccurate measurement of node availability and priority.In addition,most static virtual network mapping methods allocate fixed resources to users during the entire life cycle,and the users’actual resource requirements vary with the workload,which results in resource allocation redundancy.Based on the above analysis,in this paper,we propose a dynamic resource sharing virtual network mapping algorithm named NMA-PRS-VNE,first,we construct a new,more realistic network framework in which the properties of nodes include computing resources,storage resources and topology properties.In the node mapping process,three properties of the node are used to measure its mapping ability.Second,we consider the resources of adjacent nodes and links instead of the traditional method of measuring the availability and priority of nodes by considering only the resource properties,so as to more accurately select the physical mapping nodes that meet the constraints and conditions and improve the success rate of subsequent link mapping.Finally,we divide the resource requirements of Virtual Network Requests(VNRs)into basic subrequirements and variable sub-variable requirements to complete dynamic resource allocation.The former represents monopolizing resource requirements by the VNRs,while the latter represents shared resources by many VNRs with the probability of occupying resources,where we keep a balance between resource sharing and collision among users by calculating the collision probability.Simulation results show that the proposed NMAPRS-VNE can increase the average acceptance rate and network revenue by 15%and 38%,and reduce the network cost and link pressure by 25%and 17%.
文摘Environments with reciprocal patchiness of resources, in which the availability of two resources such as light and soil nutrients are patchily distributed in horizontal space and negatively correlated in each patch, are common in many ecosystems. The strategies by which clonal plants adapt to this type of heterogeneous environment were examined in three stoloniferous herbs,Potentilla reptans L. var. sericophylla Franch., P. anserina L. and Halerpestes ruthenica (Jacq.) Qvcz., commonly inhabiting forest understories, grasslands and low saline meadows, respectively. As pairs of connected ramets were subjected to reciprocal patchiness of light and nutrients, stolon connection between the two ramets significantly enhanced biomass of both ramet growing in low light intensity but high soil nutrient condition (LH ramet) and ramet growing in high light intensity but low soil nutrient condition (HL ramet) as well as whole ramet pairs (consisting of LH ramets and HL ramets). Additionally, stolon connection greatly increased root/shoot ratio of LH ramet while significantly decreased that of HL ramet. The results indicate that a reciprocal transportation of resources between interconnected ramets and a functional specialization of ramets in uptake of abundant resources occurred. By resource sharing and functional specialization, clonal plants can efficiently acquire locally abundant resources and buffer the stress caused by reciprocal patchiness of resources.
基金Supported by Henan Fundamental and Advanced Technology Program(082300460100)Zhengzhou Key Technology Research&Development Program(10PTGN449)Zhengzhou Normal University Program(2012075)~~
文摘A natural history museum is a museum for collection, researching and presenting natural environment and natural heritages about natural history. In the research, based on the analysis on necessity of university museums’ services to society in resources sharing, the difficulties and dilemmas were summarized in sharing resources of museums and the approaches for resources sharing were explored with the case of Natural History Museum of Zhengzhou Normal University in order to investigate the way for better services of university museum to the public.
基金supported by the Coalition for National Science Fundingunder Grant No.61150110486the Central University Funding under Grant No.ZYGX2013J073
文摘Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on- demand allocation of network resources are particularly important in Cloud computing. Ho- wever, nearly all-current available cloud com- puting platforms are either proprietary or their software infrastructure is invisible to the rese- arch community except for a few open-source platforms. For universities and research insti- tutes, more open and testable experimental plat- forms are needed in a lab-level with PCs. In this paper, a platform of infrastructure resou- rce sharing system (Platform as a Service (PaaS)) is developed in virtual Cloud comput- hug environment. Its architecture, core modules, main functions, design and operational envir- onment and applications are introduced in de- tail. It has good expandability and can impr- ove resource sharing and utilization and is app- lied to regular computer science teaching and research process.
基金the National Natural Science Foundation of China (60673071, 60743003,90718005,90718006)the National High Technology Research and Development Program of China (2006AA01Z442,2007AA01Z411)
文摘Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mutability to control the usage process and an architecture to illustrate how TC technologies support policy enforcement with bidirectional attestation. The properties required for attestation should include not only integrity measurement value of platform and related application, but also reputation of users and access history, in order to avoid the limitation of the existing approaches. To make a permission, it is required to evaluate both the authorization and conditions of the subject and the object in resource usage to ensure trustable resources to be transferred to trusted users and platform.
文摘In recent years, the number of permanent residents in Chengdu, Sichuan Province, China has continued to grow, and the number of private cars keeps rising. A series of problems caused by difficult parking and random parking in old communities are common. This paper will take the parking problem of the old community in <span style="font-family:Verdana;">Yingmenkou</span><span style="font-family:Verdana;"> community, Chengdu, China as an example to summarize the current situation and parking problems of the private car parking facilities in these old communities. Based on Chengdu’s current old community parking management policy, parking facility renovation </span><span style="font-family:Verdana;">and</span><span style="font-family:Verdana;"> expansion policy, </span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">this paper </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">research</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">es</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> and establish</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">es</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> a parking resource sharing model suitable for old communities. The simulation results show that this model has a small footprint and is easy to install and disassemble. It can be freely spliced and combined units according to the size of the old community and the needs of residents. It is suitable for old communities with no centralized parking lot and high parking demand by residents.</span></span></span>
文摘The nature of networked manufacturing and agile manufacturing is to recognize enterprise resources timely and accurately. This paper mainly discusses an enterprise resource model method and the construction process. Furthermore, the system frameworks of software and application are put forward to realize various enterprise resources management based on a resource business process. Thus, we ensure the integration and sharing of enterprise resources for the requirement of networked manufacturing.
基金sponsored by the National Planning Office of Philosophy and Social Science (Grant No.04BTQ002)
文摘China Academic Digital Library & Information System(CADLIS) was established as a public service system in 1996. Its mission is to improve the resource sharing for China's higher education. The framework of CADLIS is constructed to allow easy interconnection and interoperability. This paper presents an introduction to the portal,academic resources, bibliographic system, service network, digital library technical platform,standards and criteria of CADLIS as well.
基金This research was financially supported by the National Natural Science Foundation of China(Grant Nos.71904084,71971203,71571173,and 71921001)the Philosophy and Social Science Foundation in Colleges and Universities in Jiangsu Province(Grant No.2020SJA0340)+3 种基金the Major Programme of National Social Science Foundation of China(Grant No.21&ZD110)Postdoctoral Science Foundation of China(Grant No.2020TQ0145)the Natural Science Foundation for Jiangsu Province(Grant No.BK20190427)the Innovation and Entrepreneurship Foundation for Doctor of Jiangsu Province,the Four Batch Talent Programs of China,and the Fundamental Research Funds for the Central Universities(Grant No.WK2040160028).
文摘The term environmental innovation system refers to an innovation network composed of enterprises,universities,and research institutions involved in the development and diffusion of environmental technology,with the participation of a government.An environmental innovation system not only exerts important impact on the achievement of carbon neutrality but also affects social and economic activities.Investigations on environmental innovation system performance constantly assume a singlestage independent system while ignoring its internal structure.However,such systems are composed of environmental innovation research and development(R&D)and environmental innovation conversion subsystems.A two-stage data envelopment analysis(DEA)model is developed in this study to analyze the efficiency of Chinese regional environmental innovation system by opening the"black box"and considering shared resources.Empirical results indicated that China presents high overall environmental innovation efficiency although some regions need to improve.Regions with low efficiencies in both environmental innovation R&D(EIR)and environmental innovation conversion(EIC)subsystems should expand their investment in and strengthen the management of environmental innovation resources.Regions with low EIR efficiency should improve the absorption and transformation of environmental innovation achievements.Regions with low EIC efficiency should increase investment in the commercialization of environmental innovation achievements and encourage green economy industries,such as new energy,art,tourism,and environmental protection.
基金The research is supported by the National Natural Science Foundation of China(Grant Nos.71871223,71790615,91846301,and 71828101)Innovation-Driven Planning Foundation of Central South University(Grant No.2019CX041)Graduate Student Independent Exploration and Innovation Project of Central South University(Grant No.2019zzts922).
文摘Unreasonable allocation of shared resources reduces the system efficiency and is a considerable operational risk.Sub-processes with insufficient portion of shared resources could not help accomplish complicated tasks,and overstaffing and idle resources will occur in the sub-processes assigned with redundant shared resources.This unfair portion distribution may cause internal contradictions among sub-processes and even lead to the collapsing of the entire system.This study proposes a data-driven,mixed two-stage network data envelopment analysis model.This method aims to reasonably define the allocation portion of shared extra intermediate resources among several nonhomogeneous subsystems and measure the overall system performance.A data set of 58 international hotels is used to test the features of the proposed model.