A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social netw...A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social networkandused to construct homogeneous and heterogeneous graphs.Secondly,a graph neural networkmodel is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network.Then,high-order neighbor nodes,hidden neighbor nodes,displayed neighbor nodes,and social data nodes are used to update user nodes to expand the depth and breadth of user preferences.Finally,a multi-layer attention network is used to classify user nodes in the homogeneous graph into two classes:allow access and deny access.The fine-grained access control problem in social networks is transformed into a node classification problem in a graph neural network.The model is validated using a dataset and compared with other methods without losing generality.The model improved accuracy by 2.18%compared to the baseline method GraphSAGE,and improved F1 score by 1.45%compared to the baseline method,verifying the effectiveness of the model.展开更多
In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pa...In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pages. Our framework model consists of three sub-models: one for user file access, one for web pages, and one for storage servers. Web pages are assumed to consist of different types and sizes of objects, which are characterized using several categories: articles, media, and mosaics. The model is implemented with a discrete event simulation and then used to investigate the performance of our system over a variety of parameters in our model. Our performance measure of choice is mean response time and by varying the composition of web pages through our categories, we find that our framework model is able to capture a wide range of conditions that serve as a basis for generating a variety of user request patterns. In addition, we are able to establish a set of parameters that can be used as base cases. One of the goals of this research is for the framework model to be general enough that the parameters can be varied such that it can serve as input for investigating other distributed applications that require the generation of user request access patterns.展开更多
Hanoi’s rapid urbanization has led to a surge in private vehicle ownership, particularly motorcycles, amidst inadequate public transportation infrastructure. Despite government efforts, many still prefer motorized tr...Hanoi’s rapid urbanization has led to a surge in private vehicle ownership, particularly motorcycles, amidst inadequate public transportation infrastructure. Despite government efforts, many still prefer motorized transport, citing mobility and safety concerns, exacerbated by insufficient pedestrian infrastructure. This study examines the motivations behind this reliance on motorized vehicles, particularly motorcycles, in Hanoi. Findings reveal safety and convenience as primary factors driving motorized transport use, especially for accessing bus stations. Economic incentives could promote non-motorized travel and public transport adoption. Policy implications highlight the importance of addressing economic factors and improving access infrastructure to manage motorized vehicle reliance and foster sustainable urban mobility in Hanoi.展开更多
The traditional orthogonal multiple access(OMA)is unable to satisfy the needs of large number of smart devices.To increase the transmission rate in the limited spectrum resource,implementation of both non-orthogonal m...The traditional orthogonal multiple access(OMA)is unable to satisfy the needs of large number of smart devices.To increase the transmission rate in the limited spectrum resource,implementation of both non-orthogonal multiple access(NOMA)and successive interference cancelation(SIC)is essential.In this paper,an optimal resource allocation algorithm in NOMA is proposed to maximize the total system rate in a multi-sector multi-subcarrier relay-assisted communication network.Since the original problem is a non-convex problem with mixed integer programming which is non-deterministic polynomial-time(NP)-hard,a three-step solution is proposed to solve the primal problem.Firstly,we determine the optimal power allocation of the outer users by using the approach of monotonic discrimination,and then the optimal user pairing is determined.Secondly,the successive convex approximation(SCA)method is introduced to transform the non-convex problem involving central users into convex one,and the Lagrangian dual method is used to determine the optimal solution.Finally,the standard Hungarian algorithm is utilized to determine the optimal subcarrier matching.The simulation results show that resource allocation algorithm is able to meet the user performance requirements with NOMA,and the total system rate is improved compared to the existing algorithms.展开更多
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario...Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication.展开更多
A result revealed by the Department of Statistics, 29,000 elderly people have registered for Visually Impaired Card in 2014, which was 51.2% of all visually impaired people. With annual growth rate of 1.56%, this numb...A result revealed by the Department of Statistics, 29,000 elderly people have registered for Visually Impaired Card in 2014, which was 51.2% of all visually impaired people. With annual growth rate of 1.56%, this number increased yearly by 1,100 people. According to WHO, 285 million people worldwide were estimated to be visually impaired, which is 4.24% of overall population in 2012. From age distribution point of view, most visually impaired people, accounted for 2.76% of overall population, were above age 50. In average, there are 7 visually impaired people in every 100 people above 50 years old. In Taiwan, 549,000 people over age 50 are estimated to be visually impaired. Therefore we expect there is a large amount of visually impaired people. The main purpose of this research is to collect adaptability information on the cognitive model of senior visually impaired people on their work status, social participation status, and leisure activities via questionnaire survey. Furthermore, descriptive video service is used to as an accessible long-term care application for visually impaired senior users. To solve disability circumstances and improve home care quality through visually impaired APP POe (proof-of-concept). The result of this research will serve as an important basis for other researches in related study field, a reference for practice application. As a result in encouraging profit-seeking enterprises design a user oriented products. And even be an opening for mobile accessibility services benchmark on technology social care for disability and senior users.展开更多
According to the fact that the secondary users' delay requirements for data transmission are not unitary in cognitive radio networks, the secondary users are divided into two classes, denoted by SU1 and SU2, respecti...According to the fact that the secondary users' delay requirements for data transmission are not unitary in cognitive radio networks, the secondary users are divided into two classes, denoted by SU1 and SU2, respectively. It is assumed that SU1 has a higher priority to occupy the primary users' unutilized channels than SU2. A preemptive resume priority M/G/1 queuing network is used to model the multiple spectrum handoffs processing. By using a state transition probability matrix and a cost matrix, the average cumulative delays of SU1 and SU2 are calculated, respectively. Numerical results show that the more the primary user's traffic load, the more rapidly the SU2's cumulative handoff delay grows. Compared with the networks where secondary users are unitary, the lower the SUI's arrival rate, the more obviously both SUI's and SU2's handoff delays decrease. The admission access regions limited by the maximum tolerable delay can also facilitate the design of admission control rules for graded secondary users.展开更多
In the future fifth generation(5G) systems,non-orthogonal multiple access(NOMA) is a promising technology that can greatly enhance the network capacity compared to orthogonal multiple access(OMA) .In this paper,we pro...In the future fifth generation(5G) systems,non-orthogonal multiple access(NOMA) is a promising technology that can greatly enhance the network capacity compared to orthogonal multiple access(OMA) .In this paper,we propose a novel random access(RA) and resource allocation scheme for the coexistence of NOMA-based and OMAbased machine-to-machine(M2M) communications,which aims at improving the number of successful data packet transmissions and guaranteeing the quality of service(Qo S) (e.g.,the minimum data rate requirement) for M2 M communications.The algorithm of joint user equipment(UE) paring and power allocation is proposed for the coexisting RA(i.e.,the coexistence of NOMA-based RA and OMA-based RA) .The resource allocation for the coexisting RA is investigated,thus improving the number of successful data packet transmissions by more efficiently using the radio resources.Simulation results demonstrate that the proposed RA and resource allocation scheme outperforms the conventional RA in terms of the number of successful data packet transmissions,thus is a promising technology in future M2 M communications.展开更多
The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform...The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform the user’s language needs into the product features in real-time. A rifle was taken as a research instance and soldiers were chosen as evaluation customers. The theory of fuzzy set and semantic difference are adopted to evaluate the relationship between user’s needs and product features as well as their alternatives. FAHP (fuzzy analytic hierarchy process) is utilized to judge the user’s satisfactory forms. This method can also be applied to other product form designs.展开更多
基金supported by the National Natural Science Foundation of China Project(No.62302540)The Open Foundation of Henan Key Laboratory of Cyberspace Situation Awareness(No.HNTS2022020)+2 种基金Natural Science Foundation of Henan Province Project(No.232300420422)The Natural Science Foundation of Zhongyuan University of Technology(No.K2023QN018)Key Research and Promotion Project of Henan Province in 2021(No.212102310480).
文摘A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social networkandused to construct homogeneous and heterogeneous graphs.Secondly,a graph neural networkmodel is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network.Then,high-order neighbor nodes,hidden neighbor nodes,displayed neighbor nodes,and social data nodes are used to update user nodes to expand the depth and breadth of user preferences.Finally,a multi-layer attention network is used to classify user nodes in the homogeneous graph into two classes:allow access and deny access.The fine-grained access control problem in social networks is transformed into a node classification problem in a graph neural network.The model is validated using a dataset and compared with other methods without losing generality.The model improved accuracy by 2.18%compared to the baseline method GraphSAGE,and improved F1 score by 1.45%compared to the baseline method,verifying the effectiveness of the model.
文摘In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pages. Our framework model consists of three sub-models: one for user file access, one for web pages, and one for storage servers. Web pages are assumed to consist of different types and sizes of objects, which are characterized using several categories: articles, media, and mosaics. The model is implemented with a discrete event simulation and then used to investigate the performance of our system over a variety of parameters in our model. Our performance measure of choice is mean response time and by varying the composition of web pages through our categories, we find that our framework model is able to capture a wide range of conditions that serve as a basis for generating a variety of user request patterns. In addition, we are able to establish a set of parameters that can be used as base cases. One of the goals of this research is for the framework model to be general enough that the parameters can be varied such that it can serve as input for investigating other distributed applications that require the generation of user request access patterns.
文摘Hanoi’s rapid urbanization has led to a surge in private vehicle ownership, particularly motorcycles, amidst inadequate public transportation infrastructure. Despite government efforts, many still prefer motorized transport, citing mobility and safety concerns, exacerbated by insufficient pedestrian infrastructure. This study examines the motivations behind this reliance on motorized vehicles, particularly motorcycles, in Hanoi. Findings reveal safety and convenience as primary factors driving motorized transport use, especially for accessing bus stations. Economic incentives could promote non-motorized travel and public transport adoption. Policy implications highlight the importance of addressing economic factors and improving access infrastructure to manage motorized vehicle reliance and foster sustainable urban mobility in Hanoi.
基金This work was partly supported by the Natural Science Foundation of Hebei Province(F2019203095)the National Natural Science Foundation of China(61873223,61803328)the National Key R&D Program of China(2018YFB1702100)。
文摘The traditional orthogonal multiple access(OMA)is unable to satisfy the needs of large number of smart devices.To increase the transmission rate in the limited spectrum resource,implementation of both non-orthogonal multiple access(NOMA)and successive interference cancelation(SIC)is essential.In this paper,an optimal resource allocation algorithm in NOMA is proposed to maximize the total system rate in a multi-sector multi-subcarrier relay-assisted communication network.Since the original problem is a non-convex problem with mixed integer programming which is non-deterministic polynomial-time(NP)-hard,a three-step solution is proposed to solve the primal problem.Firstly,we determine the optimal power allocation of the outer users by using the approach of monotonic discrimination,and then the optimal user pairing is determined.Secondly,the successive convex approximation(SCA)method is introduced to transform the non-convex problem involving central users into convex one,and the Lagrangian dual method is used to determine the optimal solution.Finally,the standard Hungarian algorithm is utilized to determine the optimal subcarrier matching.The simulation results show that resource allocation algorithm is able to meet the user performance requirements with NOMA,and the total system rate is improved compared to the existing algorithms.
文摘Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication.
文摘A result revealed by the Department of Statistics, 29,000 elderly people have registered for Visually Impaired Card in 2014, which was 51.2% of all visually impaired people. With annual growth rate of 1.56%, this number increased yearly by 1,100 people. According to WHO, 285 million people worldwide were estimated to be visually impaired, which is 4.24% of overall population in 2012. From age distribution point of view, most visually impaired people, accounted for 2.76% of overall population, were above age 50. In average, there are 7 visually impaired people in every 100 people above 50 years old. In Taiwan, 549,000 people over age 50 are estimated to be visually impaired. Therefore we expect there is a large amount of visually impaired people. The main purpose of this research is to collect adaptability information on the cognitive model of senior visually impaired people on their work status, social participation status, and leisure activities via questionnaire survey. Furthermore, descriptive video service is used to as an accessible long-term care application for visually impaired senior users. To solve disability circumstances and improve home care quality through visually impaired APP POe (proof-of-concept). The result of this research will serve as an important basis for other researches in related study field, a reference for practice application. As a result in encouraging profit-seeking enterprises design a user oriented products. And even be an opening for mobile accessibility services benchmark on technology social care for disability and senior users.
基金The National Natural Science Foundation of China(No.60972026,61271207)the National Science and Technology Major Project(No.2010ZX03006-002-01)+1 种基金the Specialized Research Fund for the Doctoral Program of Higher Education(No.20090092110009)the Specialized Development Foundation for the Achievement Transformation of Jiangsu Province(No.BA2010023)
文摘According to the fact that the secondary users' delay requirements for data transmission are not unitary in cognitive radio networks, the secondary users are divided into two classes, denoted by SU1 and SU2, respectively. It is assumed that SU1 has a higher priority to occupy the primary users' unutilized channels than SU2. A preemptive resume priority M/G/1 queuing network is used to model the multiple spectrum handoffs processing. By using a state transition probability matrix and a cost matrix, the average cumulative delays of SU1 and SU2 are calculated, respectively. Numerical results show that the more the primary user's traffic load, the more rapidly the SU2's cumulative handoff delay grows. Compared with the networks where secondary users are unitary, the lower the SUI's arrival rate, the more obviously both SUI's and SU2's handoff delays decrease. The admission access regions limited by the maximum tolerable delay can also facilitate the design of admission control rules for graded secondary users.
基金supported by the National Natural Science Foundation of China(61501056)National Science and Technology Major Project of China(No.2016ZX03001012)the Research Fund of ZTE Corporation
文摘In the future fifth generation(5G) systems,non-orthogonal multiple access(NOMA) is a promising technology that can greatly enhance the network capacity compared to orthogonal multiple access(OMA) .In this paper,we propose a novel random access(RA) and resource allocation scheme for the coexistence of NOMA-based and OMAbased machine-to-machine(M2M) communications,which aims at improving the number of successful data packet transmissions and guaranteeing the quality of service(Qo S) (e.g.,the minimum data rate requirement) for M2 M communications.The algorithm of joint user equipment(UE) paring and power allocation is proposed for the coexisting RA(i.e.,the coexistence of NOMA-based RA and OMA-based RA) .The resource allocation for the coexisting RA is investigated,thus improving the number of successful data packet transmissions by more efficiently using the radio resources.Simulation results demonstrate that the proposed RA and resource allocation scheme outperforms the conventional RA in terms of the number of successful data packet transmissions,thus is a promising technology in future M2 M communications.
文摘The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform the user’s language needs into the product features in real-time. A rifle was taken as a research instance and soldiers were chosen as evaluation customers. The theory of fuzzy set and semantic difference are adopted to evaluate the relationship between user’s needs and product features as well as their alternatives. FAHP (fuzzy analytic hierarchy process) is utilized to judge the user’s satisfactory forms. This method can also be applied to other product form designs.