In this paper, a special three-step difference scheme is applied to the solution of nonlinear time-evolution equations, whose coefficients are determined according to accuracy constraints, necessary conditions of squa...In this paper, a special three-step difference scheme is applied to the solution of nonlinear time-evolution equations, whose coefficients are determined according to accuracy constraints, necessary conditions of square conservation, and historical observation information under the linear supposition. As in the linear case, the schemes also have obvious superiority in overall performance in the nonlinear case compared with traditional finite difference schemes, e.g., the leapfrog(LF) scheme and the complete square conservation difference(CSCD) scheme that do not use historical observations in determining their coefficients, and the retrospective time integration(RTI) scheme that does not consider compatibility and square conservation. Ideal numerical experiments using the one-dimensional nonlinear advection equation with an exact solution show that this three-step scheme minimizes its root mean square error(RMSE) during the first 2500 integration steps when no shock waves occur in the exact solution, while the RTI scheme outperforms the LF scheme and CSCD scheme only in the first 1000 steps and then becomes the worst in terms of RMSE up to the 2500th step. It is concluded that reasonable consideration of accuracy, square conservation, and historical observations is also critical for good performance of a finite difference scheme for solving nonlinear equations.展开更多
Mobile agent technology has drawn a tremendous amount of attention from researchers in distributed computing recently as it promises to provide an elegant and efficient way of solving complex distributed problems, as ...Mobile agent technology has drawn a tremendous amount of attention from researchers in distributed computing recently as it promises to provide an elegant and efficient way of solving complex distributed problems, as well as offering a new approach to human-computer-interaction. In mobile agent systems, the mobile agent travels autonomously from one computer to another within the agent enabled networks, executes itself in the agent execution environment, collects useful information and makes its own decision or behalf of its owner. This mobility nature of mobile agent demands its unique name in the whole network otherwise it gets lost or conflicts with other mobile agent having same name. This paper proposes a naming scheme which promises a unique name for a mobile agent within that network. Key words mobile agent - mobile agent platform - naming scheme展开更多
The safe harbor rule was introduced to exempt Internet service providers(ISPs)from liability for copyright infringement committed by ISP users.Nevertheless,the safe harbor rule was crafted for ISPs that provide passiv...The safe harbor rule was introduced to exempt Internet service providers(ISPs)from liability for copyright infringement committed by ISP users.Nevertheless,the safe harbor rule was crafted for ISPs that provide passive,content-neutral service to distribute copyrighted works.Therefore,the safe harbor rule is difficult to accommodate UGC(user-generated-content)platforms due to their active role in facilitating the distribution and even the creation of copyrighted works.The uncertainty of UGC platforms’liability has led copyright owners to directly target individual UGC creators.In order to unleash the creativity of users without harming the interests of copyright owners,a levy scheme should be introduced.Under the levy scheme,users are allowed to freely use copyrighted works to create UGC for non-commercial purpose.UGC platforms are required to remunerate the copyright owners of the copyrighted works used in the UGC posted on the platforms based on the popularity of the UGC.展开更多
The Internet of Things(IoT)provides new opportunities for different IoT platforms connecting various devices together.The need to identify those devices is the foremost important to perform any kind of operation.Many ...The Internet of Things(IoT)provides new opportunities for different IoT platforms connecting various devices together.The need to identify those devices is the foremost important to perform any kind of operation.Many organizations and standard bodies that provide specifications and frameworks for the IoT currently have their own identification mechanisms.Some existing industrial identification mechanisms can also be used in the IoT.There is no common Identification Scheme(IS)for the IoT as yet,because of the political and commercial differences amongst the standard bodies.The unavailability of a unified IS method makes the inter-working among IoT platforms challenging.This paper analyses and compares ISs used by several selected IoT platforms.This work will help in understanding the need for a common identification mechanism to provide inter-working among different IoT platforms.展开更多
基金the Ministry of Science and Technology of China for the National Basic Research Program of China(973 Program,Grant No.2011CB309704)
文摘In this paper, a special three-step difference scheme is applied to the solution of nonlinear time-evolution equations, whose coefficients are determined according to accuracy constraints, necessary conditions of square conservation, and historical observation information under the linear supposition. As in the linear case, the schemes also have obvious superiority in overall performance in the nonlinear case compared with traditional finite difference schemes, e.g., the leapfrog(LF) scheme and the complete square conservation difference(CSCD) scheme that do not use historical observations in determining their coefficients, and the retrospective time integration(RTI) scheme that does not consider compatibility and square conservation. Ideal numerical experiments using the one-dimensional nonlinear advection equation with an exact solution show that this three-step scheme minimizes its root mean square error(RMSE) during the first 2500 integration steps when no shock waves occur in the exact solution, while the RTI scheme outperforms the LF scheme and CSCD scheme only in the first 1000 steps and then becomes the worst in terms of RMSE up to the 2500th step. It is concluded that reasonable consideration of accuracy, square conservation, and historical observations is also critical for good performance of a finite difference scheme for solving nonlinear equations.
文摘Mobile agent technology has drawn a tremendous amount of attention from researchers in distributed computing recently as it promises to provide an elegant and efficient way of solving complex distributed problems, as well as offering a new approach to human-computer-interaction. In mobile agent systems, the mobile agent travels autonomously from one computer to another within the agent enabled networks, executes itself in the agent execution environment, collects useful information and makes its own decision or behalf of its owner. This mobility nature of mobile agent demands its unique name in the whole network otherwise it gets lost or conflicts with other mobile agent having same name. This paper proposes a naming scheme which promises a unique name for a mobile agent within that network. Key words mobile agent - mobile agent platform - naming scheme
基金This work was supported by Guangdong Planning Office of Philosophy and Social Sciences 2020(project no.GD20YFX05).
文摘The safe harbor rule was introduced to exempt Internet service providers(ISPs)from liability for copyright infringement committed by ISP users.Nevertheless,the safe harbor rule was crafted for ISPs that provide passive,content-neutral service to distribute copyrighted works.Therefore,the safe harbor rule is difficult to accommodate UGC(user-generated-content)platforms due to their active role in facilitating the distribution and even the creation of copyrighted works.The uncertainty of UGC platforms’liability has led copyright owners to directly target individual UGC creators.In order to unleash the creativity of users without harming the interests of copyright owners,a levy scheme should be introduced.Under the levy scheme,users are allowed to freely use copyrighted works to create UGC for non-commercial purpose.UGC platforms are required to remunerate the copyright owners of the copyrighted works used in the UGC posted on the platforms based on the popularity of the UGC.
基金This work is supported by the Institute for Information&communications Technology Promotion(IITP)grant funded by the Korean government Ministry of Science and ICT(MSIT)(No.B0184-15-1001,Federated Interoperable Semantic IoT Testbeds and Applications).
文摘The Internet of Things(IoT)provides new opportunities for different IoT platforms connecting various devices together.The need to identify those devices is the foremost important to perform any kind of operation.Many organizations and standard bodies that provide specifications and frameworks for the IoT currently have their own identification mechanisms.Some existing industrial identification mechanisms can also be used in the IoT.There is no common Identification Scheme(IS)for the IoT as yet,because of the political and commercial differences amongst the standard bodies.The unavailability of a unified IS method makes the inter-working among IoT platforms challenging.This paper analyses and compares ISs used by several selected IoT platforms.This work will help in understanding the need for a common identification mechanism to provide inter-working among different IoT platforms.