Since the electronic resources and Internet Web sites became popular, distance education courses offered via the Internet could play an important role in providing global digital resources and teaching the knowledge o...Since the electronic resources and Internet Web sites became popular, distance education courses offered via the Internet could play an important role in providing global digital resources and teaching the knowledge of international library and information standards for bibliographic databases with electronic and web resources.This paper uses the example of the author's new online course: ILS 608 Cataloging and Development of a Digital Union Catalog for Ancient Chinese Books to demonstrate the global re...展开更多
Wherever people live together in or near homelands that harbour joint natural resources such as forest, water, minerals, oil etc., they must collaborate, co-exist and share these resources irrespective of their geneti...Wherever people live together in or near homelands that harbour joint natural resources such as forest, water, minerals, oil etc., they must collaborate, co-exist and share these resources irrespective of their genetic, social, cultural, and political peculiarities. This is not always the case when self-interest, ethnic divisions, elitist politics, economic interest and power tussle set in. The Nso and Oku people who reside in the Ngongbaa Forest area constitute an example of joint management of resources where at one period, their relationship over the management of the Oku Mountain Forest was cordial and at another, the relationship became conflictive. This study was designed to study the influence of the KIFP forest management policies on the Nso indigenous forest Management system in Ngongbaa Forest, and its implications. The data collected for the study was secured through the administration of a questionnaire to residents of 10 villages adjacent to the Ngongbaa Forest, and forest users who carried out livelihood activities there between 1963 and 2015. These forest user groups include beekeepers, rat trappers, grazers, mushroom gatherers, ground honey/tree honey harvesters, carvers, etc. The investigation also extended to the traditional leaders of Nso and Oku who are in charge of the land tenure systems. The findings show that the Oku Mountain Forest is jointly owned by the Nso and Oku people. The Nso own the eastern half of the forest known as Ngongbaa Forest while the Oku own the western half, known as the Kilum Forest. The cordial relationship that existed between these people ensured the conservation of the forest. But the conflicts that later set in, especially due to the creation of the Kilum Mountain Forest Project in 1987 later changed to the Kilum Ijim Forest Project (KIFP) in 1992 sidelined the local communities which was contrary to the dispositions of the new Cameroon forest law enacted in 1994. Thus, the indigenous conservation practices became ignored which the local population never digested well. This seriously jeopardized the wellbeing of the forest in general.展开更多
Network virtualization can effectively establish dedicated virtual networks to implement various network functions.However,the existing research works have some shortcomings,for example,although computing resource pro...Network virtualization can effectively establish dedicated virtual networks to implement various network functions.However,the existing research works have some shortcomings,for example,although computing resource properties of individual nodes are considered,node storage properties and the network topology properties are usually ignored in Virtual Network(VN)modelling,which leads to the inaccurate measurement of node availability and priority.In addition,most static virtual network mapping methods allocate fixed resources to users during the entire life cycle,and the users’actual resource requirements vary with the workload,which results in resource allocation redundancy.Based on the above analysis,in this paper,we propose a dynamic resource sharing virtual network mapping algorithm named NMA-PRS-VNE,first,we construct a new,more realistic network framework in which the properties of nodes include computing resources,storage resources and topology properties.In the node mapping process,three properties of the node are used to measure its mapping ability.Second,we consider the resources of adjacent nodes and links instead of the traditional method of measuring the availability and priority of nodes by considering only the resource properties,so as to more accurately select the physical mapping nodes that meet the constraints and conditions and improve the success rate of subsequent link mapping.Finally,we divide the resource requirements of Virtual Network Requests(VNRs)into basic subrequirements and variable sub-variable requirements to complete dynamic resource allocation.The former represents monopolizing resource requirements by the VNRs,while the latter represents shared resources by many VNRs with the probability of occupying resources,where we keep a balance between resource sharing and collision among users by calculating the collision probability.Simulation results show that the proposed NMAPRS-VNE can increase the average acceptance rate and network revenue by 15%and 38%,and reduce the network cost and link pressure by 25%and 17%.展开更多
To ensure the security of resource and intelligence sharing in 6G,blockchain has been widely adopted in wireless communications and applications.Although blockchain can ensure the traceability and non-tamperability of...To ensure the security of resource and intelligence sharing in 6G,blockchain has been widely adopted in wireless communications and applications.Although blockchain can ensure the traceability and non-tamperability of data in the concatenated blocks,it cannot guarantee the honest behaviors of users in the application before the generation of transactions.Thus,additional technologies are required to ensure that the source of blockchain data is reliable.In this paper,the detailed procedure is designed for the application-oriented task validation in the blockchainenhanced computing resource sharing and transactions in ultra dense networks(UDN).The corresponding queuing model is built and analyzed with the consideration of the wireless re-transmission and the probability of malicious deception by users.Based on the analysis results,the UDN deployment is optimized to save network cost while ensuring latency performance.Numerical results verify our analysis,and the optimized system deployment including the number and service capacities of both base stations and mobile edge computing(MEC)servers are also given with various system settings.展开更多
Environments with reciprocal patchiness of resources, in which the availability of two resources such as light and soil nutrients are patchily distributed in horizontal space and negatively correlated in each patch, a...Environments with reciprocal patchiness of resources, in which the availability of two resources such as light and soil nutrients are patchily distributed in horizontal space and negatively correlated in each patch, are common in many ecosystems. The strategies by which clonal plants adapt to this type of heterogeneous environment were examined in three stoloniferous herbs,Potentilla reptans L. var. sericophylla Franch., P. anserina L. and Halerpestes ruthenica (Jacq.) Qvcz., commonly inhabiting forest understories, grasslands and low saline meadows, respectively. As pairs of connected ramets were subjected to reciprocal patchiness of light and nutrients, stolon connection between the two ramets significantly enhanced biomass of both ramet growing in low light intensity but high soil nutrient condition (LH ramet) and ramet growing in high light intensity but low soil nutrient condition (HL ramet) as well as whole ramet pairs (consisting of LH ramets and HL ramets). Additionally, stolon connection greatly increased root/shoot ratio of LH ramet while significantly decreased that of HL ramet. The results indicate that a reciprocal transportation of resources between interconnected ramets and a functional specialization of ramets in uptake of abundant resources occurred. By resource sharing and functional specialization, clonal plants can efficiently acquire locally abundant resources and buffer the stress caused by reciprocal patchiness of resources.展开更多
The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense ...The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense resource allocation with multi-armed bandits to maximize the network's overall benefit.Firstly,we propose the method for dynamic setting of node defense resource thresholds to obtain the defender(attacker)benefit function of edge servers(nodes)and distribution.Secondly,we design a defense resource sharing mechanism for neighboring nodes to obtain the defense capability of nodes.Subsequently,we use the decomposability and Lipschitz conti-nuity of the defender's total expected utility to reduce the difference between the utility's discrete and continuous arms and analyze the difference theoretically.Finally,experimental results show that the method maximizes the defender's total expected utility and reduces the difference between the discrete and continuous arms of the utility.展开更多
A natural history museum is a museum for collection, researching and presenting natural environment and natural heritages about natural history. In the research, based on the analysis on necessity of university museum...A natural history museum is a museum for collection, researching and presenting natural environment and natural heritages about natural history. In the research, based on the analysis on necessity of university museums’ services to society in resources sharing, the difficulties and dilemmas were summarized in sharing resources of museums and the approaches for resources sharing were explored with the case of Natural History Museum of Zhengzhou Normal University in order to investigate the way for better services of university museum to the public.展开更多
Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on-...Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on- demand allocation of network resources are particularly important in Cloud computing. Ho- wever, nearly all-current available cloud com- puting platforms are either proprietary or their software infrastructure is invisible to the rese- arch community except for a few open-source platforms. For universities and research insti- tutes, more open and testable experimental plat- forms are needed in a lab-level with PCs. In this paper, a platform of infrastructure resou- rce sharing system (Platform as a Service (PaaS)) is developed in virtual Cloud comput- hug environment. Its architecture, core modules, main functions, design and operational envir- onment and applications are introduced in de- tail. It has good expandability and can impr- ove resource sharing and utilization and is app- lied to regular computer science teaching and research process.展开更多
Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mu...Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mutability to control the usage process and an architecture to illustrate how TC technologies support policy enforcement with bidirectional attestation. The properties required for attestation should include not only integrity measurement value of platform and related application, but also reputation of users and access history, in order to avoid the limitation of the existing approaches. To make a permission, it is required to evaluate both the authorization and conditions of the subject and the object in resource usage to ensure trustable resources to be transferred to trusted users and platform.展开更多
Service and information resources are two kinds of major shared resources in virtual enterprises, where, service resources include third party’s service resources and enterprise’s legacy service resources,and inform...Service and information resources are two kinds of major shared resources in virtual enterprises, where, service resources include third party’s service resources and enterprise’s legacy service resources,and information resources include database resources and file resources. Since service and information resources have distributed, autonomic, remotely bound as well as some other similar characteristics, an implementation mechanism on managing shared resources based on UDDI are presented. XML instances are used to describe resources authorization information, WSDL based special XML instance represents information resource metadata, and these XML instances are referenced by tModel for realizing the purpose of managing shared resources metadata based on UDDI.展开更多
In recent years, the number of permanent residents in Chengdu, Sichuan Province, China has continued to grow, and the number of private cars keeps rising. A series of problems caused by difficult parking and random pa...In recent years, the number of permanent residents in Chengdu, Sichuan Province, China has continued to grow, and the number of private cars keeps rising. A series of problems caused by difficult parking and random parking in old communities are common. This paper will take the parking problem of the old community in <span style="font-family:Verdana;">Yingmenkou</span><span style="font-family:Verdana;"> community, Chengdu, China as an example to summarize the current situation and parking problems of the private car parking facilities in these old communities. Based on Chengdu’s current old community parking management policy, parking facility renovation </span><span style="font-family:Verdana;">and</span><span style="font-family:Verdana;"> expansion policy, </span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">this paper </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">research</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">es</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> and establish</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">es</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> a parking resource sharing model suitable for old communities. The simulation results show that this model has a small footprint and is easy to install and disassemble. It can be freely spliced and combined units according to the size of the old community and the needs of residents. It is suitable for old communities with no centralized parking lot and high parking demand by residents.</span></span></span>展开更多
Web of Things(WoT)resources are not only numerous,but also have a wide range of applications and deployments.The centralized WoT resource sharing mechanism lacks flexibility and scalability,and hence cannot satisfy re...Web of Things(WoT)resources are not only numerous,but also have a wide range of applications and deployments.The centralized WoT resource sharing mechanism lacks flexibility and scalability,and hence cannot satisfy requirement of distributed resource sharing in large-scale environment.In response to this problem,a trusted and secure mechanism for WoT resources sharing based on context and blockchain(CWoT-Share)was proposed.Firstly,the mechanism can respond quickly to the changes of the application environment by dynamically determining resource access control rules according to the context.Then,the flexible resource charging strategies,which reduced the fees paid by the users who shared more resources and increased the fees paid by users who frequently used resources maliciously,were used to fulfill efficient sharing of WoT resources.Meanwhile,the charging strategies also achieve load balancing by dynamic selection of WoT resources.Finally,the open source blockchain platform Ethereum was used for the simulation and the simulation results show that CWoT-Share can flexibly adapt to the application environment and dynamically adjust strategies of resource access control and resource charging.展开更多
The Intelligent Grouping and Resource Sharing (IGRS) standard is set to enable intelligent grouping, resource sharing and services collaboration among information devices. An IGRS system adopts open architecture, that...The Intelligent Grouping and Resource Sharing (IGRS) standard is set to enable intelligent grouping, resource sharing and services collaboration among information devices. An IGRS system adopts open architecture, that is, the devices abide by the IGRS standard are interoperable with devices following other standards such as Universal Plug and Play (UPnP). The IGRS supports multiple application frameworks and special applications. Developers can use an IGRS media application framework with various media format standards, such as AVS and MPEG-2, to develop multimedia applications. Applied among computers, consumer electronics, and communication devices, the IGRS standard can realize resource sharing and services collaboration in a certain range of wired or wireless network domain.展开更多
Standardization is the basis of e-government construction which aims to link organically government affair systems of different departments through standardized method and provide technical guidelines and specificatio...Standardization is the basis of e-government construction which aims to link organically government affair systems of different departments through standardized method and provide technical guidelines and specifications for collaborative work in all affair aspects. Standardized coordination and optimization can help to guarantee the safety and reliability of e-government construction and promote efficiency. This article discusses the achievements, existing problems and experience of Shandong e-government standardization.展开更多
AIM: To identify the current roles of eye and health care workers in eye care delivery and investigate their potential roles in screening and detection for management of diabetic retinopathy(DR) through task sharin...AIM: To identify the current roles of eye and health care workers in eye care delivery and investigate their potential roles in screening and detection for management of diabetic retinopathy(DR) through task sharing.METHODS: Purposive sampling of 24 participants including health administrators, members from non-government organizations and all available eye care workers in Takeo province were recruited. This cross sectional mixed method study comprised a survey and in-depth interviews. Data were collected from medical records at Caritas Takeo Eye Hospital(CTEH) and Kiri Vong District Referral Hospital Vision Centre, and a survey and interviews with participants were done to explore the potential roles for task sharing in DR management. Qualitative data were transcribed into a text program and then entered into N-Vivo(version 10) software for data management and analysis. RESULTS: From 2009 to 2012, a total of 105 178 patients were examined and 14 030 eye surgeries were performed in CTEH by three ophthalmologists supported by ophthalmic nurses in operating and eye examination for patients. Between January 2011 and September 2012, 151 patients(72 males) with retinal pathology including 125(83%) with DR visited CTEH. In addition 170 patients with diabetes were referred to CTEH for eye examinations from Mo Po Tsyo screening programs for people with diabetes. Factors favouring task sharing included high demand for eye care services and scarcity of ophthalmologists.CONCLUSION: Task sharing and team work for eye care services is functional. Participants favor the potential role of ophthalmic nurses in screening for DR through task sharing.展开更多
From the perspective of information resource sharing, the authors investigated the ratio and degree of users' satisfaction with resource sharing among college libraries, public libraries and research libraries in ...From the perspective of information resource sharing, the authors investigated the ratio and degree of users' satisfaction with resource sharing among college libraries, public libraries and research libraries in Nanjing city. Based on the analysis and discussion about the findings, the authors summarized the library resource sharing system in satisfying users' information requirements, including its pros and cons. At last, further considerations have been provided on how to improve library resource sharing system in the region.展开更多
In the post-pandemic era,libraries need to improve the emergency support of electronic resources and establish a relatively perfect electronic resource support system in order to adapt to the construction goal of the ...In the post-pandemic era,libraries need to improve the emergency support of electronic resources and establish a relatively perfect electronic resource support system in order to adapt to the construction goal of the national emergency system as well as realize their own transformation and development.It must be realized through enhancing awareness and planning,strengthening policy support and top-level design,realizing rapid response and intelligent response,improving technical support,promoting resource synergy,integration,and sharing,strengthening community integration,as well as providing intelligent management and services.展开更多
Resource sharing in the different parts of the clonal white clover plant (Trifolium repens L.) was investigated in this study. The results showed that the integration of water and nitrogen metabolism occured among par...Resource sharing in the different parts of the clonal white clover plant (Trifolium repens L.) was investigated in this study. The results showed that the integration of water and nitrogen metabolism occured among parental, young and old branches of a plant when water passed through its stolons. Under the sufficient supply of light, water and nutrients from soil the newly developed branches showed similar capacity in taking in sufficient water and nitrogen to that of old branches. The development of the new branches did not affect the growth of the old and parental branches attached. The results also indicated that energy values in roots was significantly related with plant age, however, the energy values were various in the different parts of a plant.展开更多
To accommodate the diversified emerging use cases in 5G,radio access networks(RAN)is required to be more flexible,open,and versatile.It is evolving towards cloudification,intelligence and openness.By embedding computi...To accommodate the diversified emerging use cases in 5G,radio access networks(RAN)is required to be more flexible,open,and versatile.It is evolving towards cloudification,intelligence and openness.By embedding computing capabilities within RAN,it helps to transform RAN into a natural cost effective radio edge computing platform,offering great opportunity to further enhance RAN agility for diversified services and improve users’quality of experience(Qo E).In this article,a logical architecture enabling deep convergence of communication and computing in RAN is proposed based on O-RAN.The scenarios and potential benefits of sharing RAN computing resources are first analyzed.Then,the requirements,design principles and logical architecture are introduced.Involved key technologies are also discussed,including heterogeneous computing infrastructure,unified computing and communication task modeling,joint communication and computing orchestration and RAN computing data routing.Followed by that,a VR use case is studied to illustrate the superiority of the joint communication and computing optimization.Finally,challenges and future trends are highlighted to provide some insights on the potential future work for researchers in this field.展开更多
The adoption of Cloud Computing services in everyday business life has grown rapidly in recent years due to the many benefits of this paradigm. The various collaboration tools offered by Cloud Computing have eliminate...The adoption of Cloud Computing services in everyday business life has grown rapidly in recent years due to the many benefits of this paradigm. The various collaboration tools offered by Cloud Computing have eliminated or reduced the notion of distance between entities of the same company or between different organizations. This has led to an increase in the need to share resources (data and services). Community Cloud environments have thus emerged to facilitate interactions between organizations with identical needs and with specific and high security requirements. However, establishing trust and secure resource sharing relationships is a major challenge in this type of complex and heterogeneous environment. This paper proposes a trust assessment model (SeComTrust) based on the Zero Trust cybersecurity strategy. First, the paper introduces a community cloud architecture subdivided into different security domains. Second, it presents a process for selecting a trusted organization for an exchange based on direct or recommended trust value and reputation. Finally, a system for promoting or relegating organizations in the different security domains is applied. Experimental results show that our model guarantees the scalability of a community cloud with a high success rate of secure and quality resource sharing.展开更多
文摘Since the electronic resources and Internet Web sites became popular, distance education courses offered via the Internet could play an important role in providing global digital resources and teaching the knowledge of international library and information standards for bibliographic databases with electronic and web resources.This paper uses the example of the author's new online course: ILS 608 Cataloging and Development of a Digital Union Catalog for Ancient Chinese Books to demonstrate the global re...
文摘Wherever people live together in or near homelands that harbour joint natural resources such as forest, water, minerals, oil etc., they must collaborate, co-exist and share these resources irrespective of their genetic, social, cultural, and political peculiarities. This is not always the case when self-interest, ethnic divisions, elitist politics, economic interest and power tussle set in. The Nso and Oku people who reside in the Ngongbaa Forest area constitute an example of joint management of resources where at one period, their relationship over the management of the Oku Mountain Forest was cordial and at another, the relationship became conflictive. This study was designed to study the influence of the KIFP forest management policies on the Nso indigenous forest Management system in Ngongbaa Forest, and its implications. The data collected for the study was secured through the administration of a questionnaire to residents of 10 villages adjacent to the Ngongbaa Forest, and forest users who carried out livelihood activities there between 1963 and 2015. These forest user groups include beekeepers, rat trappers, grazers, mushroom gatherers, ground honey/tree honey harvesters, carvers, etc. The investigation also extended to the traditional leaders of Nso and Oku who are in charge of the land tenure systems. The findings show that the Oku Mountain Forest is jointly owned by the Nso and Oku people. The Nso own the eastern half of the forest known as Ngongbaa Forest while the Oku own the western half, known as the Kilum Forest. The cordial relationship that existed between these people ensured the conservation of the forest. But the conflicts that later set in, especially due to the creation of the Kilum Mountain Forest Project in 1987 later changed to the Kilum Ijim Forest Project (KIFP) in 1992 sidelined the local communities which was contrary to the dispositions of the new Cameroon forest law enacted in 1994. Thus, the indigenous conservation practices became ignored which the local population never digested well. This seriously jeopardized the wellbeing of the forest in general.
基金We are grateful for the support of the Natural Science Foundation of Shandong Province(No.ZR2020LZH008,ZR2020QF112,ZR2019MF071)the National Natural Science Foundation of China(61373149).
文摘Network virtualization can effectively establish dedicated virtual networks to implement various network functions.However,the existing research works have some shortcomings,for example,although computing resource properties of individual nodes are considered,node storage properties and the network topology properties are usually ignored in Virtual Network(VN)modelling,which leads to the inaccurate measurement of node availability and priority.In addition,most static virtual network mapping methods allocate fixed resources to users during the entire life cycle,and the users’actual resource requirements vary with the workload,which results in resource allocation redundancy.Based on the above analysis,in this paper,we propose a dynamic resource sharing virtual network mapping algorithm named NMA-PRS-VNE,first,we construct a new,more realistic network framework in which the properties of nodes include computing resources,storage resources and topology properties.In the node mapping process,three properties of the node are used to measure its mapping ability.Second,we consider the resources of adjacent nodes and links instead of the traditional method of measuring the availability and priority of nodes by considering only the resource properties,so as to more accurately select the physical mapping nodes that meet the constraints and conditions and improve the success rate of subsequent link mapping.Finally,we divide the resource requirements of Virtual Network Requests(VNRs)into basic subrequirements and variable sub-variable requirements to complete dynamic resource allocation.The former represents monopolizing resource requirements by the VNRs,while the latter represents shared resources by many VNRs with the probability of occupying resources,where we keep a balance between resource sharing and collision among users by calculating the collision probability.Simulation results show that the proposed NMAPRS-VNE can increase the average acceptance rate and network revenue by 15%and 38%,and reduce the network cost and link pressure by 25%and 17%.
文摘To ensure the security of resource and intelligence sharing in 6G,blockchain has been widely adopted in wireless communications and applications.Although blockchain can ensure the traceability and non-tamperability of data in the concatenated blocks,it cannot guarantee the honest behaviors of users in the application before the generation of transactions.Thus,additional technologies are required to ensure that the source of blockchain data is reliable.In this paper,the detailed procedure is designed for the application-oriented task validation in the blockchainenhanced computing resource sharing and transactions in ultra dense networks(UDN).The corresponding queuing model is built and analyzed with the consideration of the wireless re-transmission and the probability of malicious deception by users.Based on the analysis results,the UDN deployment is optimized to save network cost while ensuring latency performance.Numerical results verify our analysis,and the optimized system deployment including the number and service capacities of both base stations and mobile edge computing(MEC)servers are also given with various system settings.
文摘Environments with reciprocal patchiness of resources, in which the availability of two resources such as light and soil nutrients are patchily distributed in horizontal space and negatively correlated in each patch, are common in many ecosystems. The strategies by which clonal plants adapt to this type of heterogeneous environment were examined in three stoloniferous herbs,Potentilla reptans L. var. sericophylla Franch., P. anserina L. and Halerpestes ruthenica (Jacq.) Qvcz., commonly inhabiting forest understories, grasslands and low saline meadows, respectively. As pairs of connected ramets were subjected to reciprocal patchiness of light and nutrients, stolon connection between the two ramets significantly enhanced biomass of both ramet growing in low light intensity but high soil nutrient condition (LH ramet) and ramet growing in high light intensity but low soil nutrient condition (HL ramet) as well as whole ramet pairs (consisting of LH ramets and HL ramets). Additionally, stolon connection greatly increased root/shoot ratio of LH ramet while significantly decreased that of HL ramet. The results indicate that a reciprocal transportation of resources between interconnected ramets and a functional specialization of ramets in uptake of abundant resources occurred. By resource sharing and functional specialization, clonal plants can efficiently acquire locally abundant resources and buffer the stress caused by reciprocal patchiness of resources.
基金supported by the National Natural Science Foundation of China(NSFC)[grant numbers 62172377,61872205]the Shandong Provincial Natural Science Foundation[grant number ZR2019MF018]the Startup Research Foundation for Distinguished Scholars No.202112016.
文摘The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things.To guarantee the network's overall security,we present a network defense resource allocation with multi-armed bandits to maximize the network's overall benefit.Firstly,we propose the method for dynamic setting of node defense resource thresholds to obtain the defender(attacker)benefit function of edge servers(nodes)and distribution.Secondly,we design a defense resource sharing mechanism for neighboring nodes to obtain the defense capability of nodes.Subsequently,we use the decomposability and Lipschitz conti-nuity of the defender's total expected utility to reduce the difference between the utility's discrete and continuous arms and analyze the difference theoretically.Finally,experimental results show that the method maximizes the defender's total expected utility and reduces the difference between the discrete and continuous arms of the utility.
基金Supported by Henan Fundamental and Advanced Technology Program(082300460100)Zhengzhou Key Technology Research&Development Program(10PTGN449)Zhengzhou Normal University Program(2012075)~~
文摘A natural history museum is a museum for collection, researching and presenting natural environment and natural heritages about natural history. In the research, based on the analysis on necessity of university museums’ services to society in resources sharing, the difficulties and dilemmas were summarized in sharing resources of museums and the approaches for resources sharing were explored with the case of Natural History Museum of Zhengzhou Normal University in order to investigate the way for better services of university museum to the public.
基金supported by the Coalition for National Science Fundingunder Grant No.61150110486the Central University Funding under Grant No.ZYGX2013J073
文摘Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on- demand allocation of network resources are particularly important in Cloud computing. Ho- wever, nearly all-current available cloud com- puting platforms are either proprietary or their software infrastructure is invisible to the rese- arch community except for a few open-source platforms. For universities and research insti- tutes, more open and testable experimental plat- forms are needed in a lab-level with PCs. In this paper, a platform of infrastructure resou- rce sharing system (Platform as a Service (PaaS)) is developed in virtual Cloud comput- hug environment. Its architecture, core modules, main functions, design and operational envir- onment and applications are introduced in de- tail. It has good expandability and can impr- ove resource sharing and utilization and is app- lied to regular computer science teaching and research process.
基金the National Natural Science Foundation of China (60673071, 60743003,90718005,90718006)the National High Technology Research and Development Program of China (2006AA01Z442,2007AA01Z411)
文摘Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mutability to control the usage process and an architecture to illustrate how TC technologies support policy enforcement with bidirectional attestation. The properties required for attestation should include not only integrity measurement value of platform and related application, but also reputation of users and access history, in order to avoid the limitation of the existing approaches. To make a permission, it is required to evaluate both the authorization and conditions of the subject and the object in resource usage to ensure trustable resources to be transferred to trusted users and platform.
文摘Service and information resources are two kinds of major shared resources in virtual enterprises, where, service resources include third party’s service resources and enterprise’s legacy service resources,and information resources include database resources and file resources. Since service and information resources have distributed, autonomic, remotely bound as well as some other similar characteristics, an implementation mechanism on managing shared resources based on UDDI are presented. XML instances are used to describe resources authorization information, WSDL based special XML instance represents information resource metadata, and these XML instances are referenced by tModel for realizing the purpose of managing shared resources metadata based on UDDI.
文摘In recent years, the number of permanent residents in Chengdu, Sichuan Province, China has continued to grow, and the number of private cars keeps rising. A series of problems caused by difficult parking and random parking in old communities are common. This paper will take the parking problem of the old community in <span style="font-family:Verdana;">Yingmenkou</span><span style="font-family:Verdana;"> community, Chengdu, China as an example to summarize the current situation and parking problems of the private car parking facilities in these old communities. Based on Chengdu’s current old community parking management policy, parking facility renovation </span><span style="font-family:Verdana;">and</span><span style="font-family:Verdana;"> expansion policy, </span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">this paper </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">research</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">es</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> and establish</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">es</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> a parking resource sharing model suitable for old communities. The simulation results show that this model has a small footprint and is easy to install and disassemble. It can be freely spliced and combined units according to the size of the old community and the needs of residents. It is suitable for old communities with no centralized parking lot and high parking demand by residents.</span></span></span>
基金This study is funded by“The National Natural Science Foundation of China(No.61972211,No.61771258)”.
文摘Web of Things(WoT)resources are not only numerous,but also have a wide range of applications and deployments.The centralized WoT resource sharing mechanism lacks flexibility and scalability,and hence cannot satisfy requirement of distributed resource sharing in large-scale environment.In response to this problem,a trusted and secure mechanism for WoT resources sharing based on context and blockchain(CWoT-Share)was proposed.Firstly,the mechanism can respond quickly to the changes of the application environment by dynamically determining resource access control rules according to the context.Then,the flexible resource charging strategies,which reduced the fees paid by the users who shared more resources and increased the fees paid by users who frequently used resources maliciously,were used to fulfill efficient sharing of WoT resources.Meanwhile,the charging strategies also achieve load balancing by dynamic selection of WoT resources.Finally,the open source blockchain platform Ethereum was used for the simulation and the simulation results show that CWoT-Share can flexibly adapt to the application environment and dynamically adjust strategies of resource access control and resource charging.
文摘The Intelligent Grouping and Resource Sharing (IGRS) standard is set to enable intelligent grouping, resource sharing and services collaboration among information devices. An IGRS system adopts open architecture, that is, the devices abide by the IGRS standard are interoperable with devices following other standards such as Universal Plug and Play (UPnP). The IGRS supports multiple application frameworks and special applications. Developers can use an IGRS media application framework with various media format standards, such as AVS and MPEG-2, to develop multimedia applications. Applied among computers, consumer electronics, and communication devices, the IGRS standard can realize resource sharing and services collaboration in a certain range of wired or wireless network domain.
文摘Standardization is the basis of e-government construction which aims to link organically government affair systems of different departments through standardized method and provide technical guidelines and specifications for collaborative work in all affair aspects. Standardized coordination and optimization can help to guarantee the safety and reliability of e-government construction and promote efficiency. This article discusses the achievements, existing problems and experience of Shandong e-government standardization.
基金Supported by the Centre for Eye Research Austral(CERA),Royal Victorian Eye&Ear Hospital,MelbourneCERA receives Operational Infrastructure Support from the Victorian Government
文摘AIM: To identify the current roles of eye and health care workers in eye care delivery and investigate their potential roles in screening and detection for management of diabetic retinopathy(DR) through task sharing.METHODS: Purposive sampling of 24 participants including health administrators, members from non-government organizations and all available eye care workers in Takeo province were recruited. This cross sectional mixed method study comprised a survey and in-depth interviews. Data were collected from medical records at Caritas Takeo Eye Hospital(CTEH) and Kiri Vong District Referral Hospital Vision Centre, and a survey and interviews with participants were done to explore the potential roles for task sharing in DR management. Qualitative data were transcribed into a text program and then entered into N-Vivo(version 10) software for data management and analysis. RESULTS: From 2009 to 2012, a total of 105 178 patients were examined and 14 030 eye surgeries were performed in CTEH by three ophthalmologists supported by ophthalmic nurses in operating and eye examination for patients. Between January 2011 and September 2012, 151 patients(72 males) with retinal pathology including 125(83%) with DR visited CTEH. In addition 170 patients with diabetes were referred to CTEH for eye examinations from Mo Po Tsyo screening programs for people with diabetes. Factors favouring task sharing included high demand for eye care services and scarcity of ophthalmologists.CONCLUSION: Task sharing and team work for eye care services is functional. Participants favor the potential role of ophthalmic nurses in screening for DR through task sharing.
基金supported by the National Social Science Foundation of China(Grant No.06BTQ017)
文摘From the perspective of information resource sharing, the authors investigated the ratio and degree of users' satisfaction with resource sharing among college libraries, public libraries and research libraries in Nanjing city. Based on the analysis and discussion about the findings, the authors summarized the library resource sharing system in satisfying users' information requirements, including its pros and cons. At last, further considerations have been provided on how to improve library resource sharing system in the region.
文摘In the post-pandemic era,libraries need to improve the emergency support of electronic resources and establish a relatively perfect electronic resource support system in order to adapt to the construction goal of the national emergency system as well as realize their own transformation and development.It must be realized through enhancing awareness and planning,strengthening policy support and top-level design,realizing rapid response and intelligent response,improving technical support,promoting resource synergy,integration,and sharing,strengthening community integration,as well as providing intelligent management and services.
文摘Resource sharing in the different parts of the clonal white clover plant (Trifolium repens L.) was investigated in this study. The results showed that the integration of water and nitrogen metabolism occured among parental, young and old branches of a plant when water passed through its stolons. Under the sufficient supply of light, water and nutrients from soil the newly developed branches showed similar capacity in taking in sufficient water and nitrogen to that of old branches. The development of the new branches did not affect the growth of the old and parental branches attached. The results also indicated that energy values in roots was significantly related with plant age, however, the energy values were various in the different parts of a plant.
基金jointly supported by the Beijing University of Posts and Telecommunications-China Mobile Research Institute Joint Innovation Centerthe National Key Research and Development Program of China under Grant 2021YFB2900200the National Natural Science Foundation of China under Grant 62201073 and 61925101。
文摘To accommodate the diversified emerging use cases in 5G,radio access networks(RAN)is required to be more flexible,open,and versatile.It is evolving towards cloudification,intelligence and openness.By embedding computing capabilities within RAN,it helps to transform RAN into a natural cost effective radio edge computing platform,offering great opportunity to further enhance RAN agility for diversified services and improve users’quality of experience(Qo E).In this article,a logical architecture enabling deep convergence of communication and computing in RAN is proposed based on O-RAN.The scenarios and potential benefits of sharing RAN computing resources are first analyzed.Then,the requirements,design principles and logical architecture are introduced.Involved key technologies are also discussed,including heterogeneous computing infrastructure,unified computing and communication task modeling,joint communication and computing orchestration and RAN computing data routing.Followed by that,a VR use case is studied to illustrate the superiority of the joint communication and computing optimization.Finally,challenges and future trends are highlighted to provide some insights on the potential future work for researchers in this field.
文摘The adoption of Cloud Computing services in everyday business life has grown rapidly in recent years due to the many benefits of this paradigm. The various collaboration tools offered by Cloud Computing have eliminated or reduced the notion of distance between entities of the same company or between different organizations. This has led to an increase in the need to share resources (data and services). Community Cloud environments have thus emerged to facilitate interactions between organizations with identical needs and with specific and high security requirements. However, establishing trust and secure resource sharing relationships is a major challenge in this type of complex and heterogeneous environment. This paper proposes a trust assessment model (SeComTrust) based on the Zero Trust cybersecurity strategy. First, the paper introduces a community cloud architecture subdivided into different security domains. Second, it presents a process for selecting a trusted organization for an exchange based on direct or recommended trust value and reputation. Finally, a system for promoting or relegating organizations in the different security domains is applied. Experimental results show that our model guarantees the scalability of a community cloud with a high success rate of secure and quality resource sharing.